Fichier de travail (INPUT) : ./DUMP-TEXT/1-3-utf8.txt
Encodage utilisé (INPUT) : utf-8
Forme recherchée : ([Bb]ig [Dd]ata)|([Mm]egadonnées)|([Dd]onnées [Mm]assives)|([Mm]egadados)|(大数据)|([Dd]atos [Mm]asivos)
_________________________________________________________________________________________________
- Ligne n°132 : Introduction to big data security analytics in the enterprise
- Ligne n°141 : Expert Dan Sullivan explains what big data security analytics is and how
Ligne n°142 : these tools are applied to security monitoring to enable broader and more ...
Ligne n°180 : ... * CW500: Jitender Arora, GE Capital Europe – ComputerWeekly- Ligne n°181 : * Big data analytics can reduce cyber risks, says ISF –
Ligne n°182 : ComputerWeekly ...
Ligne n°182 : ... ComputerWeekly- Ligne n°183 : * Five factors for evaluating big data security ... – SearchSecurity
Ligne n°192 : ... * SIEM Battleground Unfolds Security School –SearchSecurity.com- Ligne n°193 : * Big Data Universe Expands –SearchDataManagement
Ligne n°205 : ... monitoring and analyzing data about events on servers, networks and- Ligne n°206 : other devices. Advances in big data analytics are now applied to
Ligne n°207 : security monitoring, and they enable both broader and more in-depth ...
Ligne n°207 : ... security monitoring, and they enable both broader and more in-depth- Ligne n°208 : analysis. In many ways, big data security analytics and analysis is an
Ligne n°209 : extension of security information and event management (SIEM) and ...- Ligne n°215 : Big data security analysis tools usually span two functional
Ligne n°216 : categories: SIEM, and performance and availability monitoring (PAM). ...
Ligne n°218 : ... behavioral analysis, as well as database and application monitoring.- Ligne n°219 : PAM tools focus on operations management. However, big data analytics
Ligne n°220 : tools are more than just SIEM and PAM tools coupled together; they are ...- Ligne n°224 : Like SIEM, big data analytics tools have the ability to accurately
Ligne n°225 : discover devices on a network. In some cases, a configuration ...
Ligne n°228 : ... tools as well as integration with LDAP or Active Directory servers are- Ligne n°229 : other must-have features of big data analytics. Support for incident
Ligne n°230 : response workflows varies among SIEM tools, but are essential when ...
Ligne n°230 : ... response workflows varies among SIEM tools, but are essential when- Ligne n°231 : working with big data volumes of logs and other sources of security
Ligne n°232 : event data. ...- Ligne n°234 : Five key features distinguish big data security analytics from other
Ligne n°235 : information security domains. ...- Ligne n°239 : One of the key distinguishing features of big data analytics is
Ligne n°240 : scalability. These platforms must have the ability to collect data in ...- Ligne n°246 : It is important to understand that big data security analytics is not
Ligne n°247 : just examining packets in a stateless manner or performing deep packet ...
Ligne n°249 : ... to correlate events across time and space that is a key differentiator- Ligne n°250 : of big data analytics platforms. This means the stream of events logged
Ligne n°251 : by one device, such as a Web server, may be highly significant with ...- Ligne n°256 : Another essential function of big data analytics is reporting and
Ligne n°257 : support for analysis. Security professionals have long had reporting ...
Ligne n°261 : ... both of these existing tools are necessary but not sufficient to meet- Ligne n°262 : the demands of big data.
Ligne n°264 : ... Visualization tools are also needed to present information derived from- Ligne n°265 : big data sources in ways that can be readily and rapidly identified by
Ligne n°266 : security analysts. For example, Sqrrl uses visualization techniques to ...- Ligne n°270 : Key feature #3: Persistent big data storage
- Ligne n°272 : Big data security analytics gets its name because the storage and
Ligne n°273 : analysis capabilities of these platforms distinguish them from other ...
Ligne n°273 : ... analysis capabilities of these platforms distinguish them from other- Ligne n°274 : security tools. These platforms employ big data storage systems, such
Ligne n°275 : as the Hadoop Distributed File System (HDFS) and longer latency ...- Ligne n°283 : In addition to physical devices and virtual servers, big data security
Ligne n°284 : analytics must attend to software-related security. ...- Ligne n°286 : Big data analysis systems, such as MapReduce and Spark, address the
Ligne n°287 : computational requirements of security analytics. Long-term persistent ...- Ligne n°299 : Another key feature of big data security analytics platforms is
Ligne n°300 : intelligence feeds, where established vulnerability databases as well ...
Ligne n°301 : ... as security blogs and other news sources are continually updated with- Ligne n°302 : potentially useful information. Big data security platforms can ingest
Ligne n°303 : data from a variety of sources, deduplicate threat notices and ...
Ligne n°309 : ... overwhelming analysts and other infosec professionals and limiting- Ligne n°310 : their ability to discern key events. Useful big data security analytics
Ligne n°311 : tools frame data in the context of users, devices and events. ...- Ligne n°326 : The final distinguishing characteristic of big data security analytics
Ligne n°327 : is the breadth of functional security areas it spans. Of course, big ...
Ligne n°330 : ... includes anything from laptops and smartphones to Internet of Things- Ligne n°331 : devices. In addition to physical devices and virtual servers, big data
Ligne n°332 : security analytics must attend to software-related security. For ...- Ligne n°339 : Big data analytics platforms can also use intrusion detection products
Ligne n°340 : that analyze system or environment behavior in order to spot possible ...- Ligne n°343 : The differences of big data security analytics
- Ligne n°345 : Big data security analytics is qualitatively different from other forms
Ligne n°346 : of security analytics. The need for scalability, tools for integrating ...
Ligne n°348 : ... contextual information, and the breadth of security functions that must- Ligne n°349 : be supported in big data security analytics are leading vendors to
Ligne n°350 : apply advanced data analysis and storage tools to information security. ...
Ligne n°353 : ... scenarios and the types of companies that would benefit the most (and- Ligne n°354 : least) from big data security analytics. It will also present how IT
Ligne n°355 : departments can make the business case for implementing this technology ...- Ligne n°360 : Learn more about the new era of big data security analytics.
- Ligne n°362 : Can big data security analytics revolutionize information security?
- Ligne n°364 : How big data security analytics is harnessing new tools for better
Ligne n°365 : security. ...- Ligne n°377 : * Five factors for evaluating big data security analytics platforms
Ligne n°378 : * The business case for big data security analytics ...
Ligne n°377 : ... * Five factors for evaluating big data security analytics platforms- Ligne n°378 : * The business case for big data security analytics
Ligne n°379 : * What enterprises should know about threat intelligence tools ...
Ligne n°386 : ... study says- Ligne n°387 : * NSA’s big data security analytics reaches the enterprise with Sqrrl
Ligne n°388 : * Research finds more organizations use big data analytics for ...
Ligne n°387 : ... * NSA’s big data security analytics reaches the enterprise with Sqrrl- Ligne n°388 : * Research finds more organizations use big data analytics for
Ligne n°389 : security ...
Ligne n°399 : ... (BUTTON) Load More (BUTTON) View All Get started- Ligne n°400 : * Five factors for evaluating big data security analytics platforms
Ligne n°401 : * The business case for big data security analytics ...
Ligne n°400 : ... * Five factors for evaluating big data security analytics platforms- Ligne n°401 : * The business case for big data security analytics
Ligne n°402 : * Comparing the top security analytics tools in the industry ...
Ligne n°412 : ... * Data-classification levels for compliance: Why simple is best- Ligne n°413 : * What is 'big data'? Understanding big data security issues
- Ligne n°413 : * What is 'big data'? Understanding big data security issues
Ligne n°414 : * Security big data: Preparing for a big data collection ...
Ligne n°413 : ... * What is 'big data'? Understanding big data security issues- Ligne n°414 : * Security big data: Preparing for a big data collection
- Ligne n°414 : * Security big data: Preparing for a big data collection
Ligne n°415 : implementation ...
Ligne n°415 : ... implementation- Ligne n°416 : * Intro: How big data benefits enterprise information security
Ligne n°417 : posture ...- Ligne n°433 : Are big data security analytics tools on your organization's agenda for its
Ligne n°434 : security program? Why or why not? ...- Ligne n°442 : Are big data security analytics tools on your organization's agenda for its
Ligne n°443 : security program? Why or why not? ...
Ligne n°542 : ... according to Gartner, paving the way for CIOs to play a more ...- Ligne n°543 : * FTC report puts spotlight on consumer protection in the big data
Ligne n°544 : era ...
Ligne n°544 : ... era- Ligne n°545 : A new FTC report zeroes in on the unethical use of big data. Also
Ligne n°546 : in Searchlight: Uber pitches customized entertainment; Google ... ...