All the latest UK technology news, reviews and analysis

RSA: Big data highlighted as IT security panacea

26 Feb 2013

Security tools built around big data analytics are the key to address the cyber security issues in the enterprise sector, according to RSA chairman Art Coviello.

During his RSA 2013 keynote, Coviello highlighted the need for companies to adapt to the ever-changing world of cyber security.

Coviello said that using the large quantities of information at a firm's disposal is the key to combating the growing threat of cyber spying and cybercrime.

"Big data technology has arrived so embrace it," Coviello said.

According to Coviello, 2012 was the year that big data came of age and security teams must use the tools that came out last year and implement them into their company.

He recommended that firms begin to transfer their current security plans to a system that heavily incorporates big data analytics. Coviello also recommended training employees to use big data science and hiring big data scientists during his presentation.

"New tools and techniques are coming online to analyse all of this data. It won't be long before big data applications and stores become the 'crown jewels' of an organisation," continued Coviello.

The past view years have seen a dramatic jump in big data offering in the security sector. IBM launched an updated version of its security tools last month. The update brought with it the ability to leverage big data to detect and prevent future cyber attacks.

Juniper also launched a product earlier this month that leverages big data intelligent for enterprise security administrators. Coviello named dropped the product during his keynote to illuminate the growing number of tools available in the sector.

While Coviello highlighted the changing world of enterprise security, he also warned that it's important to not overhype the current threat of cyber attacks. He specifically pointed to the recent attacks on Apple and Microsoft as something that should have been expected.

"A truly disruptive attack may be possible but at this time it's highly unlikely," continued Coviello.

Coviello said that the attacks shouldn't come as a surprise as the security field has been facing similar threats for years. It was important that realise the risks of high-profile firms being successfully attack had been understood for years.

A similar statement was given by Microsoft corporate vice president of Trustworthy Computing Scott Charney during his RSA keynote. Charney outlined a case for optimism by showcasing the security world's past adversity and successes.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
James Dohnert

James is a freelance writer and editor. In addition to ClickZ, his work has appeared in publications like V3, The Commonwealth Club,, and Shonen Jump magazine. He studied Journalism at Weber State University.

More on Security
What do you think?
blog comments powered by Disqus

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?

Popular Threads

Powered by Disqus
Sony Xperia Z2 Tablet powered by Android KitKat 4.4

Sony Xperia Z2 Tablet video

We take a look at the lightweight, waterproof tablet

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

Senior Java Developer that loves Google App Engine & FOOD

Why FOODit? FOODit has the goal of eradicating terrible...

IT Operations Manager

IT Operations Manager Scale PO5: £39,351 - £42...

IT Infrastructure Project Manager

IT Infrastructure Project Manager Ref: CAM000005...
To send to more than one email address, simply separate each address with a comma.