Big data: What does an enterprise CIO do with big data?

Source: Internet
Author: User
Keywords Big data safe big whatever.
With large data, the collection of all data may become easier, and it means that the organization needs to secure it. And ask the CIO to consider the security architecture from the outset.

At present, some regions and countries have begun to protect each piece of data, it http://www.aliyun.com/zixun/aggregation/11872.html "> access to data requires credentials, including the enterprise security framework.

"By doing this, our enterprise data gets better security." "The CIO said," We have more granular control, we do the reporting, and the ability to meet audit requirements. Each block of data is treated as an asset. Who has the right to view it, who has the right to change it, who has the right to delete the part of the asset, and so on, these are combined with encryption technology, if someone breaks the free control of the entire organization, once they illegally get the data, there is another protection, so that they can not get the content of the upper and lower data. ”

Gazzang ' Swarnock (CIO of a company) agreed that large data collected and used by its companies were soon found to have so-called "toxic data." For example, the CIO can still use monitoring to refine data insights and user behavior, assuming that the company's data is logged in offsite, how they are online, how long they browse online, how much data they use, how they operate, and whether the data is moving or staying. Similarly, wireless communications companies may also have many users ' credit card numbers, social Security numbers, buying habits and any information patterns they use, and the data generated by the satellite data will also need to be well protected.

When CIOs and businesses step into the big data age, the key to secure encryption is the encryption of transparent data. Basically, data security is captured and written to some detail in disk encryption. In this way, each piece of data that is ingested by the organization is protected. In the past, companies have lowered the building because of cost control, but the existing standards have been greatly reduced, and data security applications only account for the 3%~5% of total expenditure.

With regard to the security of large data, frankly, any security, key factor or management tool, especially the management of the key, will affect the entire encryption process. The application of large data will lead to changes in the business model and impact on the technical framework, and the operating model will change.

(Responsible editor: Lu Guang)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.