Feeds

Beyond the relational database

Advanced data storage, access and analytics

  • alert
  • submit to reddit

3 Big data security analytics techniques

Tech Panel The ‘Big Data’ Bandwagon is now in full flow and IT professionals are already being swamped with marketing explaining why they cannot afford to leave information unmined.

Once again, we are being bombarded with terms and messages that are ambiguous at best, meaningless at worst and simply confusing most of the time. So in true Freeform Dynamics and Reg style, we want to get a handle on just what you think about the latest bandwagon to pitch up.

What we are seeing is a number of different technologies that originated in storage, access and analytical solutions are now attempting to move into business use under the label of ‘big data’. So what’s happening with your use of relational databases and how, if at all, are you exploiting Hadoop and emerging Big Data technologies?

We think it’s still early days and that data scientists are about as rare as honest politicians, but to help us understand how emerging solutions are being used or how they are influencing your plans going forwards, we would like your help by completing our latest Reg reader study.

You don’t need to be a big data or analytics expert to take part. In fact what we want is to understand how much knowledge and experience of specific technologies exists among readers and how you see ‘Big data’ and traditional data storage and manipulation solutions fitting together, if at all.

Ready to have a go? If so, please click here to get started.

3 Big data security analytics techniques

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.