SHARE
Security / June 1, 2016

Big Data and Security Analytics

The traditional approach to security-based analytics has been to focus on network packets and logs in order to provide critical input information. However, with everything on the rise (network traffic volumes, network speeds, mobile device numbers), developing analytics based solely on packets and logs now demands greater amounts of computational resources. To solve this problem and improve security analytics, the use of Big Data analytics is becoming essential. Read the full article and learn more about how Gigamon’s Metadata Engine supports this Big Data analytics need.

 


Active Visibility. This blog series looks at critical cyber-security issues that can be mitigated or better managed by adopting new and innovative approaches to traffic visibility and monitoring. The ability to gain complete traffic visibility is essential to directing traffic to security appliances and solutions to optimize their effectiveness. In addition, there are new “best practices” to improve security through traffic monitoring for virtual and cloud infrastructure. This blog series will identify tactical as well as strategic issues around this topic. See past blogs – Blog #1 – Blog #2 – Blog #3 – Blog #4 – Blog #5 – Blog #6 – Blog #7 – Blog #8 – Blog #9 – Blog #10 – Blog #11 – Blog #12 – Blog #13 – Blog #14 – Blog #15 – Blog #16 – Blog #17 – Blog #18 – Blog #19 – Blog #20

}
Back to top