New Era Of Analytic
Dwika Sudrajat ([email protected])VIDE Freeman Consulting – Hong Kong
Enterprise Content Management
Security/Intelligence Extension: Needs
© 2013 IBM Corporation
Analyze Telco & social data to:• Gather criminal evidence• Prevent criminal activities• Proactively apprehend criminals• Customer Retention
Crime prediction & protection
Reduce Customer Churn
Security/Intelligence Extension enhances traditional security solutions by analyzing all types and sources of under-leveraged data
Enhanced Intelligence & Surveillance Insight
Analyze data-in-motion & at rest to:• Find associations • Uncover patterns and facts• Maintain currency of information
Real-time Cyber Attack Prediction & Mitigation
Analyze network traffic to:• Discover new threats early• Detect known complex threats• Take action in real-time
Where Is This “Big Data” Coming From ?
12+ TBs
of tweet data every day
25+ TBs of
log data every day
? T
Bs
of
dat
a e
very
d
ay
2+ billion people on the
Web by end 2011
30 billion RFID tags today
(1.3B in 2005)
4.6 billion camera phones
world wide
100s of millions of GPS
enabled devices
sold annually
76 million smart meters in 2009… 200M by 2014
Raw
Lo
gs a
nd M
ach
ine
Dat
a Indexing, Search
Statistical Modeling
Root Cause Analysis
Federated Navigation &
Discovery
Real-time Analysis
Only storewhat is needed
Operations Analysis: Value & Diagram
Machine DataAccelerator
OPERATIONAL - ANALYSIS
Capabilities:
Hadoop & Stream Computing
• Intelligent Infrastructure Management: log analytics, energy bill forecasting, energy consumption optimization, anomalous energy usage detection, presence-aware energy management
• Optimized building energy consumption with centralized monitoring; Automated preventive and corrective maintenance
Big Data Is Big Data Is NewNew Big Data Is Only About Big Data Is Only About Massive Data VolumeMassive Data Volume Big Data Means Big Data Means HadoopHadoop Big Data Need ABig Data Need A Data WarehouseData Warehouse Big Data Means Big Data Means Unstructured DataUnstructured Data Big Data Is for Big Data Is for Social Media Social Media & & Sentiment AnalysisSentiment Analysis
Big Data Is Big Data Is NewNew Big Data Is Only About Big Data Is Only About Massive Data VolumeMassive Data Volume Big Data Means Big Data Means HadoopHadoop Big Data Need ABig Data Need A Data WarehouseData Warehouse Big Data Means Big Data Means Unstructured DataUnstructured Data Big Data Is for Big Data Is for Social Media Social Media & & Sentiment AnalysisSentiment Analysis
The Myth About Big Data
Big Data Is..
It is all about better Analytic on a broader spectrum of data, and
therefore represents an opportunity to create even more differentiation
among industry peers.
Volume
of Tweets create daily.
12+ terabytes
Variety
of different types of data.
100’sVeracity
decision makers trust their information.
Only 1 in 3
With Big Data, We’ve Moved into a New Era of Analytics
trade eventsper second.
5+million
Velocity
0011010100100100100110100101010011100101001111001000100100010010001000100101
Analytic With Data-In-Motion & Data At Rest
9
01011001100011101001001001001110001001010010010110010010100110010010100100101010001001001100100101001001010100010010110001001010010010110010010100110010010100100101010001001001100100101001001010100010010
Op
po
rtu
nit
y C
ost
Sta
rts
Her
e
01100100101001001010100010010011001001010010010101000100101100010010100100101100100101001100100101001001010100010010011001001010010010101000100100110010010100100101010001001001100100101001001010100010010011001001010010010101000100101100010010100100101100100101001100100101001001010100010010011001001010010010101000100100110010010100100101010001001011000100101001001011001001010
AdaptiveAnalytics
Model
BootstrapEnrich
Data Ingest
The Secure IoT Architecture – IT Plus OT!
Services
Application InterfacesApplication Interfaces
Infrastructure InterfacesInfrastructure Interfaces
New Business Models Partner Ecosystem
ApplicationsApplications
Application Enablement PlatformApplication Enablement Platform
Application Centric InfrastructureApplication Centric Infrastructure
SecuritySecurity
Data Integrati
on
Data Integrati
onBig DataBig Data AnalyticsAnalytics Control
Systems
Control Systems
Application
Integration
Application
Integration Network and
Perimeter Security
Physical Security
Device-level Security /
Anti-tampering
Cloud-based Threat Analysis /
Protection
End-to-End Data Encryption
Services
Indicators of CompromiseBig data spotlight on systems at high risk for an active breach
•Automated compromise analysis & determination
•Prioritized list of compromised devices
•Quick links for quick root cause analysis and remediation
Advanced Malware Protection Deployment
Dedicated Advanced Malware Protection (AMP) appliance
Advanced Malware Protection for FirePOWER (NGIPS, NGFW)
FireAMP for hosts, virtual and mobile devices
Complete solution suite to protect the extended network
Advanced Malware Detection
One-to-One
Signature-based, 1st line of defense
Fuzzy Fingerprinting
Advanced AnalyticsMachine Learning
Analyzes 400+ attributes for unknown malware
Detection lattice considers content from each engine for real time file disposition
Cloud-based delivery results in better protection plus lower storage & compute burden on endpoint
Algorithms identify polymorphic malware
Combines data from lattice with global trends
Retrospective Security
• Continuous Analysis - Retrospective detection of malware beyond the event horizon
• Trajectory – Determine scope by tracking malware in motion and activity
•File Trajectory – Visibility across organization, centering on a given file
•Device Trajectory – Deep visibility into file activity on a single system
Always Watching… Never Forgets… Turns Back Time
Cisco Delivers
Continuous Capability
Complexity Reduction
Point-in-Time and Contiuous
Protection Across the
Network and Data Center
Fits and Adapts
to Changing Business Models
whereever the Threat
Manifests
Global Intelligence
With Context
Detects and Stops Advanced Threats
Advanced Threat
Protection
UnmatchedVisibility