DataVisor – is Big Data helping, or harming, online security?

by Maria Ilie, Andrei Nicolae, Maria Ficiu and Matei Butucescu

Recent Concerns in Online Security

16 days- that’s the average time a cyber threat can exist on a government network before being detected [1]. Considering the sensitive data that is stored on their servers, the mean response time of these government agencies is concerning.

To add to this kind of vulnerability, with the emerging Internet of Things (IOT) sector, both the number of threats, and their impact, is set to substantially increase. As IOT evolves, so will cybersecurity have to expand as a field.

screen-shot-2015-04-29-at-1-49-13-pm

Where does Big Data come into play?

The main issue with processing vulnerabilities is incomplete data. Government agencies, as well as most small and medium companies, don’t have the time or resources to process all the security information that they have. Security analysts are in consensus when they say that big data security companies will be crucial to fix this problem[2].

 

why-not-big-data

By outsourcing their security issues to companies that use big data analytics efficiently, any organization storing sensitive data can benefit from economies of scale made by the aforementioned companies, as they have far vaster datasets to analyze and more specialized employees.

Why DataVisor?

Value Proposition

DataVisor is a cybersecurity company that uses big data and machine learning to help its customers find malicious accounts and prevent attacks, fraud and account takeovers [3]. Its platform can analyze billions of events per hour, and detects threats in real time- far better than the 16 day industry average.

Customer Relationships

A barrier for government agencies and small companies to implement big data solutions is its lack of resources to convert the data. Raw data isn’t useful if it’s not transformed into the right format, and transforming it takes time and effort. DataVisor is cloud-based and does all the needed data transformation for its customers, so the customers’ input is minimum, which makes it extremely convenient to use [3].

datavisor

Opportunities

With the expansion of the IOT scene, DataVisor and other cybersecurity companies’ scope will increase, and as DataVisor offer the type of service that pertains to small companies and government agencies, a great opportunity for them will be to expand into this area.

Threats

With the increase in work opportunities will also come an increase in stakes. Unlike in a classic data breach scenario, where the only negative consequence is loss of company reputation, as security will start to touch more and more aspects of human life, a hacking could mean loss of human lives. In this case, if DataVisor falls behind the attackers in terms of innovation, it faces immediate bankruptcy.

Privacy concerns

One of the listed causes for the lack of use of big data in security analysis is privacy concerns. If we consider that security firms can be themselves subject to vulnerabilities, the consequences of a data leak can be devastating.

 

References and preliminary bibliography

Images:

Featured image: Cybersecurity. Retrieved from  http://briandcolwell.com/wp-content/uploads/2016/08/Cybersecurity01_Web.jpg

Why companies don’t use big data image:https://www.microsoft.com/

IOT vulnerabilities image:https://www.pubnub.com/wp-content/uploads/2015/04/Screen-Shot-2015-04-29-at-1.49.13-PM.png

Secure cloud image: http://www.all-internet-security.com/wp-content/uploads/2015/08/Security_IoT.jpg

Text references:

[1] How big data analytics can improve cybersecurity. Retrieved from  http://www.bsminfo.com/doc/how-big-data-analytics-can-improve-cybersecurity-for-your-government-it-clients-0001

[2]How data can help improve cyber security efforts. Retrieved from http://kognitio.com/big-data-can-help-improve-cyber-security-efforts/

[3] Datavisor. Retrieved from https://www.datavisor.com/product/

Using big data to defend against cyber security threats. Retrieved from http://www.csc.com/cybersecurity/publications/93325/104033-using_big_data_to_defend_against_cyber_security_threats

The use case for big data and security analytics. Retrieved from https://securityintelligence.com/the-use-case-for-big-data-and-security-analytics-an-interview-with-ben-wuest/

Cybersecurity is the killer app for big data analytics. Retrieved from http://www.csoonline.com/article/2942083/big-data-security/cybersecurity-is-the-killer-app-for-big-data-analytics.html

Big data advancing cybersecurity. Retrieved from https://www.solutionary.com/resource-center/blog/2016/02/big-data-advancing-cybersecurity/

The future of cybersecurity. Retrieved from http://www.computerworld.com/article/2893656/the-future-of-cybersecurity-big-data-and-data-science.html

Microsoft report: Enhancing Cybersecurity with Big Data: Challenges & Opportunities. Retrieved from http://www.microsoft.com/

Advertisements

3 thoughts on “DataVisor – is Big Data helping, or harming, online security?

  1. “Government agencies, as well as most small and medium companies, don’t have the time or resources to process all the security information that they have.”

    Actually they do. That’s what the NSA was originally designed for, increasing the comsec and infosec of the Americans. And they do have the resources to process all the relevant information, they basically buy any 0-day they could get.

    I think the problem in this regard is not that they don’t know vulnerabilities, but they just prefer to keep them a secret to exploit them themselves. They even further introduce new vulnerabilities and backdoors knowing that they can potentially also be exploited by other crackers.

    And in general I think the best way to deal with this issue is to separate things that don’t have to be connected. There is no good reason why the parts of your car that are responsible for accelerating or using the brakes should be implemented on the same chip that is responsible for networking and isolating (airgapping) these to would drastically increase security with no significant increase of costs.

    Like

    1. Thank you for your observation! Knowing about these vulnerabilities and actually implementing protection against them are two different things. While the NSA might be up to date with all the newest security threats, if you look at small local government pages, it’s easy to find many examples of hacked web-sites. For instance, the DMV site contains sensitive information about people’s vehicles- what if that got hacked? And the 16-day statistic wouldn’t be true if they would have perfect protection.
      Finally, when taking about the NSA we’re only looking at the Us, but many countries don’t have any form of protection at all.

      Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s