Idc:rsa 2014--security analysis based on large data is the future

Source: Internet
Author: User
Keywords Security large data
Tags analysis analytics application applications based cloud cloud security data

February 24, 2014 at the RSA 2014 security conference in San Francisco, USA, there are about 20 issues to be set up, including security analysis, application security, cloud Security and virtualization, cryptography, data security and privacy, managing risk compliance, hackers and threats, human factors in security, mobile security, policy and management , security policy, security trends and innovations, technology architecture, etc.

The most striking of the Assembly's agenda is undoubtedly the Innovation Sandbox Innovation Forum. Attendees can watch product demos, exchange ideas, promote new technology innovation and new ways of thinking, potentially change the development of the information security industry, and echo the theme of this Congress-"capitalizing on Collective FDI (using collective intelligence)". Finally RedOwl Analytics won the "Most Innovative Company" award, RedOwl Analytics mainly based on large data analysis and investigation of new ideas, provide active intelligent security analysis solutions to reduce business risk.

Through the innovation of 10 companies, IDC found that 7 of the innovative solutions were based on security analytics to deal with new threats, and 2 showed emerging mobile security solutions. It is obvious that security analysis based on large data technology is an emerging security technology field.

2013 can be said to be the year of large data applications, many enterprises have applied commercial or open source large data technology to support the business system, the value of large data more and more high. And based on large data security analysis technology, through the collection of information security data from a variety of data sources, in-depth analysis and mining of valuable information, the unknown security threat to achieve early response, reduce risk, achieve the best security protection, based on large data intelligent security analysis will be the development trend of the security field.

IDC believes that the emergence of innovative forums in these innovative companies need to continue to enhance research and development, improve the value of the solution to win more customers, the future financing of the listing or mergers and acquisitions potential is huge, I believe that soon will be a second or even more "FireEye." But throughout the domestic market, currently based on large data security applications are relatively few, domestic manufacturers should draw on the experience of these innovative companies, input technology research and development innovation, work together with the industry to create more and more valuable security analysis applications. With the support of large data, innovative information security technologies will be better able to deal with security threats. In addition, the old security solution provider, if still holding outdated ideas and product technology, but only to be satisfied with tinkering, will certainly be in the wave of technological innovation to defeat the next.

The RSA Conference to participate in the Chinese manufacturers have 9, are: Huawei, Stone Network division, Arnhem, Ann Day laboratory, Venus Chen, Green Union, Days, Rong Xin, Qihoo 360 and Jinshan. At present, the "Chinese hacker Threat Theory" is becoming more serious, causing some foreign security companies to be hostile to China. IDC believes that to eliminate the prejudices of the western countries and improve the ability of Chinese security enterprises is the fundamental, hope that there will be more Chinese information security companies to the world stage, only the overall impact of large enough to pry into the international market, eliminate negative speech, so that trust and cooperation to become a reality.

In addition, the RSA2014 security conference also discussed the privacy protection, the NSA PRISM program and international cooperation and other hot issues. Because of the Prism gate incident, people to the NSA a lot of controversy, the NSA to participate in the event is hoping to rebuild trust, IDC believes that in the era of information security has risen to national security strategy, the NSA has a long way to rebuild trust in the road. Technically speaking, it is really necessary to use collective wisdom to solve the increasingly complex information security problems. From the point of view of concrete operation, it is the key to strengthen international cooperation and strengthen the communication between government and enterprises.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.