Sign up for our newsletter and get the latest big data news and analysis.

Intel Using Big Data to Bolster Enterprise Security

Intel is being recognized as one of the first companies to actually use Big Data and analytics to improve security, writes Bob Violino of CSO Magazine.

In fact, Intel’s efforts have earned them top honors in the newly inaugurated CSO40 awards, “which recognize security projects that have delivered outstanding business value,” according to Violino’s story published in NetworkWorld.

Intel’s specific contribution is its Security Business Intelligence (SBI) initiative, a platform that the company has been working on since 2010. Last year all the elements of the initiative began to fall into place as a major part of Intel’s “Protect to Enable” enterprise security strategy. The software has the ability to filter billions of events per day, providing the enterprise with reasonable levels of protection without hampering the flow of information throughout the organization.

The SBI architecture is based on four elements: identity and access management; data protection; infrastructure, which includes secure trust zones within the enterprise private cloud; and SBI itself that features a flexible dashboard and a predictive engine.

The primary goals of the SBI platform are to use big data and advanced analytics to improve Intel’s ability to predict, prevent, detect and respond to cyberthreats; develop the tools and reporting capabilities to distill large amounts of data into meaningful analysis; and use the resulting analysis to cut overall costs by reducing or eliminating other security controls that may be less effective,” writes Violino. “Intel IT is also looking at ways to use trusted sensor and event information from its platforms to improve the quality and reliability of the SBI system.”

The SBI platform is a work in progress – Intel is enhancing its ability to identify and quickly respond to advanced threats, as well as using predictive analytics to incorporate preventative measures and corrective controls in future implementations.

Read the Full Story.

Resource Links: