Quantcast
Channel: Blog | Dell
Viewing all articles
Browse latest Browse all 17822

Big Data is Big – and Security! – at EMCworld 2014.

$
0
0
EMC logo

big data

I’m at EMCworld 2014 this week, coordinating the security-related sessions, meeting with customers and doing briefings. There hasn’t been time for me to go to any sessions other than the RSA ones, unfortunately, but I did get to the keynotes by Joe Tucci and David Goulden on Monday, and the keynotes by Pat Gelsinger and Paul Maritz on Tuesday. Though the themes of security and trust weren’t a focus of the keynotes this year, as they were last year especially in David Goulden’s keynote, those themes are getting lots of air time at EMCworld 2014 as well. At the end of his keynote, Paul Maritz (Pivotal CEO) remarked that security is one of the most important use cases for big data, touching briefly on the collaboration between Pivotal and RSA and the transformation in security represented by security analytics. Derek Lin, who moved from RSA to Pivotal last year, provided concrete examples of this application of big data to security in his EMCworld presentation on “Information Security Analytics”, such as in his discussion of the use of big data analytics to uncover fraud in financial services. pivotals Matthew Gardiner, in his EMCworld session, focused on this topic of leveraging big data for security, especially in terms of detecting and responding to advanced threats. As he put it in his presentation, “Are there analytic techniques that are designed to draw actionable intelligence (see better) from oceans of diverse & fast-changing data?”  The answer, not only in Derek’s and Matthew’s presentations, but throughout the security discussions, in the customer and press meetings I had, in the exhibition hall and in hallway conversations was a resounding “Yes – big data!” The EMCworld sessions will be available publicly soon, both as pdfs and as videos. I’ll be sure to post links to them in a future blog, as soon as they’re available. I think you’ll find them very valuable, in exploring the transformation of security enabled by big data.

Viewing all articles
Browse latest Browse all 17822

Trending Articles