{"id":613,"date":"2014-05-04T22:08:00","date_gmt":"2014-05-04T20:08:00","guid":{"rendered":"https:\/\/www.canacoon.com\/?page_id=613"},"modified":"2017-03-16T12:01:41","modified_gmt":"2017-03-16T11:01:41","slug":"bdsi-2","status":"publish","type":"page","link":"https:\/\/www.canacoon.com\/en\/bdsi-2\/","title":{"rendered":"BDSI &#8211; Big Data Security Intelligence"},"content":{"rendered":"<p class=\"text_26 highlight_blue\">The evolution of security incident and event management (SIEM) or: using smart data analysis to create a big data security intelligence (BDSI) system<\/p>\n<p>State-of-the-art SIEM systems are designed to detect and report security-relevant incidents from a large amount of data using prescribed analysis tools. However, their effectiveness depends to a great extent on how they are planned and installed, which can also be said of many complex issues. But in this field, a very wide range of varying expertise is required. Shortcomings in one area quickly make a SIEM system expensive and you\u2019ll also reduce the benefits that you could theoretically gain from the system as well as impact the future viability of the landscape.<\/p>\n<p>To set up a SIEM system properly and to advise customers as independently as possible about future-proof solutions, considerable knowledge is needed: As well as product-specific skills, expertise concerning attackers and processes \u2013 for example, incident processes and their requirements (sometimes in an international context) \u2013 is a must. In modern environments, data mining experience is also crucial. This experience serves as the basis for broadening the classic SIEM system from rule-based or pattern-based recognition to the recognition of correlations from mass data analyses using many different sources by deploying mathematical algorithms. canacoon refers to this as BIG DATA SECURITY INTELLIGENCE \u2013 or BDSI for short. <\/p>\n<p>But why should companies start thinking about BIG DATA SECURITY INTELLIGENCE (BDSI), when all they\u2019re tasked with is setting up a SIEM system? The answer is simple. Attackers adjust their behavior fast, meaning that you need to catch up quickly and make changes. Self-learning systems that learn from their own data and can recognize correlations can even be used to forecast attacks, putting them in the top class of data mining tools. But you\u2019ll need more than just a SIEM system. Your IT architectures and systems must be enabled and extensible, ensuring optimal investment protection. An appropriate data mining background is therefore indispensable. <\/p>\n<p>We are happy to advise you and empower you to determine the probability of attacks on your systems and to take proactive action. <\/p>\n<h4>Background<\/h4>\n<p>Even creative hackers use some kind of logic in their attacks. There are dependencies and sequences that need to be observed to make an attack work. However, these vary according to context and they change constantly. Furthermore, target systems also change and are suddenly identified as vulnerable as soon as a security gap becomes apparent. One of the objectives of BIG DATA SECURITY INTELLIGENCE (BDSI) is to establish a connection between all this data.<br \/>\nAttackers are always a step ahead. But you can reduce the distance significantly and efficiently.<br \/>\nSelf-learning systems that can detect interrelations enable potential or current risks to be traced in a targeted way. <\/p>\n<h3>Example of a Big Data Security Intelligence \/ BDSI Environment<\/h3>\n<div class=\"row mt_30\">\n<div class=\"col-md_5\">\n<a href=\"https:\/\/www.canacoon.com\/wp-content\/uploads\/2015\/05\/BDSI_Big_Data_Security_Intelligence_canacoon_en.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.canacoon.com\/wp-content\/uploads\/2015\/05\/BDSI_Big_Data_Security_Intelligence_canacoon_en.jpg\" alt=\"Security Analytics and Intelligence example grafic\" width=\"949\" height=\"504\" class=\"aligncenter size-full wp-image-896 img_responsive\" srcset=\"https:\/\/www.canacoon.com\/wp-content\/uploads\/2015\/05\/BDSI_Big_Data_Security_Intelligence_canacoon_en.jpg 949w, https:\/\/www.canacoon.com\/wp-content\/uploads\/2015\/05\/BDSI_Big_Data_Security_Intelligence_canacoon_en-700x372.jpg 700w\" sizes=\"auto, (max-width: 949px) 100vw, 949px\" \/><\/a>\n<\/div>\n<h4>Are you interested and would you like to find out more? Then feel free to contact us.<\/h4>\n<h3>Do you need data protection and\/or security consulting for your business intelligence or big data environment? Would you like to know how secure your IT landscape really is? Or are you looking for a big data security strategy? We can help here, too. More information about <a href=\"https:\/\/www.canacoon.com\/en\/our-services\/\" title=\"Our Services\">canacoon\u2019s services<\/a><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>The evolution of security incident and event management (SIEM) or: using smart data analysis to create a big data security intelligence (BDSI) system State-of-the-art SIEM systems are designed to detect and report security-relevant incidents from a large amount of data using prescribed analysis tools. However, their effectiveness depends to a great extent on how they [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":242,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-613","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.canacoon.com\/en\/wp-json\/wp\/v2\/pages\/613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.canacoon.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.canacoon.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.canacoon.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.canacoon.com\/en\/wp-json\/wp\/v2\/comments?post=613"}],"version-history":[{"count":8,"href":"https:\/\/www.canacoon.com\/en\/wp-json\/wp\/v2\/pages\/613\/revisions"}],"predecessor-version":[{"id":1090,"href":"https:\/\/www.canacoon.com\/en\/wp-json\/wp\/v2\/pages\/613\/revisions\/1090"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.canacoon.com\/en\/wp-json\/wp\/v2\/media\/242"}],"wp:attachment":[{"href":"https:\/\/www.canacoon.com\/en\/wp-json\/wp\/v2\/media?parent=613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}