How to Be Ready for Big Data

Big Data is coming, but for most organizations it's three-to-five years away. That doesn't mean you shouldn't prepare now. Analyzing Big Data will require reference information like that provided by a semantic data model. And once you mine the data, you need to secure it.

By
Tue, March 20, 2012
Page 4

The capability to correlate that data and draw inferences from it could be valuable, but it is also toxic because if that correlated data were to go outside the organization and wind up in someone else's hands, it could be devastating both to the individual and the organization.

Warnock says the risk is often worth it. "Downstream analytics is the reason you gather all this data in the first place," he says. But organizations should then follow best practices by encrypting it.

"Over time, just as it's best practice to protect the perimeter with firewalls, it will be best practice to encrypt data at rest," he says.

When it comes to Big Data, Warnock says the key to encryption is transparent data encryption: essentially encrypting everything on the fly as it is captured and written to disk. That way, every piece of data ingested by the organization is protected. In the past, companies have resisted such measures because of the monetary cost and performance cost. But Warnock notes that many tools are now open source, driving down their cost in dollars, and the performance hit has dropped substantially to only 3 percent to 5 percent at the application layer.

The other step to really making that encryption secure is an automated key management solution. "The secret for big data security, and quite frankly any kind of security, is key management," Warnock says. "Key management is the weak link in this whole encryption process."

Thor Olavsrud is a senior writer for CIO.com. Follow him @ThorOlavsrud..

Our Commenting Policies