Data SolutionsSept-Oct 2019TheConnection Strategies for Capturing and Creating Value from your Security Data by Steve Tcherchian September 30, 2019 written by Steve Tcherchian [vc_row][vc_column][vc_empty_space][vc_column_text]Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make better-informed business decisions and provide strategic insights that give your company a competitive advantage in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the last decade, computing power has advanced to the point where generating and storing massive amounts of data has become highly cost-efficient. Amassing business data is similar to a dog successfully chasing a car – now that we’ve caught it, what do we do with it? With all that data available, most businesses struggle to figure out how to take advantage of it. According to Forrester, up to 73% of data within an enterprise goes unused for analytics. We are so used to extracting targeted information from data that we simply ignore what we don’t understand and throw it away as noise. This problem is prevalent in every industry, but especially in the security world. Security teams are overwhelmed with the vast amounts of data generated from firewalls, intrusion detection systems, network appliances and other devices. It’s impossible to expect security teams to interpret all this data. We unintentionally end up focusing on what we already know how to analyze and ignoring what we don’t. Typical alerting systems are configured to raise alarms, but only when they encounter a defined binary event or a threshold being reached. For example, if three or more failed authentication attempts performed in succession are detected, the system is configured to generate an alert. Yet successful authentication attempts are mostly categorized as business as usual and ignored, even if they’re occurring at off times or from unexpected locations The current mean time to detect a breach is over six months. Most organizations have all the data they need to identify a breach much faster than that, yet they are still unable to detect and react to a breach in even a semi-reasonable amount of time. This is due to: The volume and velocity of the data being generated Not looking for patterns in all of the data available – the unknown unknowns Not having the proper context for the data available If your system is ever breached, you don’t need to look at the failed authentication events – you need to look for anomalies in the successful ones! Most organizations are well down the path on their journey of capturing and storing all of their data for future analytics in data Lakes, large repositories of raw data in any format. Capturing, storing and securing that data is key. Once the data is available, it can be analyzed and its value maximized using a variety of methods. This is where the fun (and benefit) starts! On HPE NonStop servers, XYGATE Merged Audit (XMA) gathers, normalizes and stores security audit data from both the system and its applications. Merged Audit is your central repository for all NonStop security data. This is your NonStop Security Data Lake. In some environments, the data XMA gathers can amount to tens of millions of records per system, per day. With that kind of volume, you might think it’s nearly impossible to draw all of the value out of from this massive amount of data. This data can be fed to an external Security Information Event Manager (SIEM) or your Security Orchestration, Automation and Response (SOAR) solution for alerting, but most of it likely falls into that 73% that is treated as noise and does nothing but occupy disk space. To continue reading, click here. [/vc_column_text][vc_empty_space][/vc_column][/vc_row] September 30, 2019 0 comment 0 FacebookTwitterPinterestEmail
Data SolutionsSept-Oct 2019TheConnection Challenging One-Size Fits All Computing How have things changed? by Iain Liston-Brown September 30, 2019 by Iain Liston-Brown September 30, 2019 [vc_row][vc_column][vc_empty_space][vc_column_text]Introduction Having been in the industry for four decades allows you to see both trends and hype from the global IT marketing machines. In this article I am glancing back over my career but also looking forward and challenging some of the ways solution architecture makes decisions and why … 0 FacebookTwitterPinterestEmail
Data SolutionsSept-Oct 2019TheConnection Using NSDA to understand query workloads by Paul Denzinger September 30, 2019 by Paul Denzinger September 30, 2019 We are all aware of the inherent value of customer data within the databases that support our applications. This data identifies customers, accounts, transactional interactions and other patterns that are important for understanding customer behaviors and habits – all of which are useful for improving business processes and customer … 0 FacebookTwitterPinterestEmail
Data SolutionsSept-Oct 2019TheConnection Back For More by Richard Buckle September 30, 2019 by Richard Buckle September 30, 2019 It has been quite a while since I was given the opportunity to spend as much time as I have of late in my office. There is a nice feeling about having an opportunity to follow routines. We all live busy lives and there’s no doubt that having time … 0 FacebookTwitterPinterestEmail
Data SolutionsSept-Oct 2019TheConnection NonStop Trends & Wins by justin September 30, 2019 by justin September 30, 2019 There has been a lot more interest in virtual NonStop since the support of the VMware Hypervisor. I am aware of many proof of concepts testing virtual NonStop. There still seems to be some confusion around what virtual NonStop means exactly. Many jump to the conclusion that NonStop can … 0 FacebookTwitterPinterestEmail
Data SolutionsSept-Oct 2019TheConnection News From HPE’s NonStop Enterprise Division by Keith Moore September 30, 2019 by Keith Moore September 30, 2019 [vc_row][vc_column][vc_empty_space][vc_column_text]As we go into the third decade of the 21st century, we see how much the predictions about data proliferation were mostly true. In the 20th century, we considered terabytes of storage to be large and difficult to manage. Now, it is common for enterprises to manage exabytes – … 0 FacebookTwitterPinterestEmail
DataData SolutionsFall 2019Storage Protecting your most vital applications and data with HPE Mission Critical Software by Diana Cortes September 24, 2019 by Diana Cortes September 24, 2019 In our connected 24×7 economy, experiencing downtime for most applications has become cost-prohibitive for business, not only financially but also in loss of reputation. Minimizing downtime has long been a core tenet of IT teams the world over, especially those working with vital applications such as enterprise resource planning, … 1 FacebookTwitterPinterestEmail
Data SolutionsJuly-August2019SecurityTheConnection PROTECTING YOUR DATA: WHO IS RESPONSIBLE? by Henry Fonseca July 30, 2019 by Henry Fonseca July 30, 2019 There are several different factors to consider when thinking about protecting your data. The subject can be complex and usually involves multiple parties. Let’s begin with a simple thought exercise. Think about how much personal information you share on a day-to-day basis, online or otherwise. Consider who and what … 0 FacebookTwitterPinterestEmail
Data SolutionsInnovationJuly-August2019TheConnection NonStop Trends & Wins by justin July 30, 2019 by justin July 30, 2019 Everyone and every company seem to be designing for the cloud. Of course “the Cloud” means different things to different people but in general I think we can agree that when the term comes up it means something like Amazon or Azure. One has the capability of quickly bringing … 0 FacebookTwitterPinterestEmail
Data SolutionsStorageSummer 2019 Möbius Partners and Texas Christian University: Standing Up Active-Active Data Centers with Zero Downtime by Felipe Neto July 8, 2019 by Felipe Neto July 8, 2019 [vc_row][vc_column][vc_column_text css_animation=”bounceInDown” css=”.vc_custom_1565296854586{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #92b43d !important;}”]Challenges: Separate data centers and aging storage Lag during high availability tests Disaster preparedness Business Continuity Solution: Active-Active Data Centers VMware vSphere 6.5 2 HPE 8440 StoreServe All-Flash Arrays Benefits: Ease of management HPE Peer Persistence allows high-availability … 0 FacebookTwitterPinterestEmail