Big Data Archives - ARCON https://arconnet.com/category/big-data/ ARCON - Award-winning Risk Management Solutions Fri, 12 Aug 2016 09:10:59 +0000 en-US hourly 1 https://arconnet.com/wp-content/uploads/2019/12/Arcnnet-Favicon.png Big Data Archives - ARCON https://arconnet.com/category/big-data/ 32 32 Disruptive Technologies Have Changed the World but Also Increased Risks https://arconnet.com/disruptive-technologies-have-changed-the-world-but-also-increased-risks/ https://arconnet.com/disruptive-technologies-have-changed-the-world-but-also-increased-risks/#respond Fri, 12 Aug 2016 09:10:59 +0000 https://arconnet.com/?p=975 Disruptive technologies such as Internet of Things (IOTs) and cloud computing have created enormous opportunities for global organizations. They have changed the way global corporations conduct business. According to the Australian government, disruptive technologies could generate up to $625 billion through economic activities every year by 2030 in the Asia-Pacific (APAC) region alone.

While disruptive technologies create new opportunities they also make IT assets vulnerable. Indeed, with tons of data stored in cloud, organizations risk data breach from malicious outsiders.

Massive data breach incident involving the professional networking giant, LinkedIn is a good example, where hackers took advantage of security gaps of the company by attacking servers deployed on cloud. According to lawsuits, hackers were able to steal LinkedIn users’ personal information by using “botnet”, a highly coordinated computerized network. Hackers manipulated six of the company’s IT security systems deployed for preventing breach of personal data. However, malefactors also took advantage of the data stored in cloud, lawsuits showed. A cloud-service company contracted by LinkedIn to deploy personal data of users got attacked as the user interaction with LinkedIn existed in a less secured environment, allowing cyber-frauds to send requests to LinkedIn servers to pilfer the data.

Technological innovation ushered by IOTs promises amazing possibilities that could make our day-to-day lives more exciting, and efficient. But the technology also comes with risks. As IOTs store plenty of personal information, vulnerability to cyberattacks such as denial-of-service (DOS) kind of assaults remains a big concern. A Washington-based family recently went through a horrible experience. A baby monitor got hacked by a stranger, who sent petrifying messages to a kid, also heard by her mother.

Likewise, your company’s highly classified information is always under threat from identity thefts. Data breach could bring an organization to a standstill and lead to billions of dollars in losses. As highly classified information becomes a key asset in the age of “Big Data” analytics, threats always lurk from malicious insiders, and cyber-frauds. Organizations’ success, in this backdrop, will not just depend upon collecting sizable amount of crucial database but also safeguarding it.

ARCON provides state-of-the-art technology aimed at mitigating information systems related risks thereby enabling organizations to comply with Governance, Risk Management and Compliance (GRC) requirements. The company, in particular, is known for its unique Privileged Identity Management / Privileged Access Management solution, which helps deter the misuse of ‘privileged identities’.

Learn more about us at www.arconnet.com

]]>
https://arconnet.com/disruptive-technologies-have-changed-the-world-but-also-increased-risks/feed/ 0
Data like water https://arconnet.com/data-like-water/ https://arconnet.com/data-like-water/#respond Tue, 08 Sep 2015 10:37:04 +0000 https://arconnet.com/?p=1006 is data like water?
Data like water is an interesting analogy, It was only during one of my vacations that along a beach, i realized how the two are really similar and especially in the world of technology how data flow is akin to water flow. This paper tries to establish similarities, one’s ability to capture and track source. Further how identities are critical and how data can be tagged to various users. Also it is critical to examine the storage and linkages to the identities under which data is stored.

how important is data
data shape is fluid
Data, the most important element in the 21st century is generated in different forms and formats within various organizations. The size and shape of data is very similar to “Water”, it is constantly changing size and shape as it moves from one desk to another and one corporation to another.

While the analogy may be slightly out of context in the real world, but this analogy finds a perfect fit when it comes to securing Data. The question one needs to ask, is it even possible to capture, understand, track the source of a constantly evolving matter such as DATA.

like human bodies are made of water, organizations are made of data
It is said that 99% of human body is made of water. The importance of water can never be debated. If one were to take this analogy and extend it to Data, it cannot be debated that data is the single most important element for any organization such that its survival is dependent on this single element. Let us take a deep dive and understand what are the types of data in any organization?

The following can be a brief description of types of data within an organization Viz: Financial, Sales Lead, Payroll, Employee, Customer Information, projects, contract bids etc this list could continue. If one reviews any organization closely it would not be surprise that every piece of information captured, processed and output stored or distributed would be critical data. Any breach of such data intentionally or unintentionally could lead to disaster including lock down of business. One is surprised how this is currently treated in any organization.

data deserves the due attention!
Data i guess is critical, established beyond doubt. However in this complex business environment as well as the multiple interfaces makes it absolutely difficult to track, monitor and protect the source, data at rest or data in motion.

It is also important to note that Data is generally perceived to be information generated by electronic systems, but that is not true, all information generated including on hard copies i.e paper is Data.

Organizations spend millions protecting devices and technology, however in the coming years security will be DATA centric.

protecting data
identities are important
There are several solutions which now protect databases viz; database firewall, data access management solutions etc. There are several approaches one can follow, however one of the most important approach is to ensure that identities are mapped to all that is generated or stored and these identities are adequately tracked and monitored.

It is important to establish the source where data is generated, modified or is used. Identities play a very important role as they are the identifiers or touch points in any organization. To protect data, it is imperative to create an arc over the identities such that they are identified, controlled and monitored. It is at this stage imperative to map every identity and the biggest hole in identity management is the how privilege identities are managed. Privilege identities are ones that have the unfettered access to all data and could cause the most damage if compromised.

Privilege Identity Management is an area which is still underinvested by corporations across the world and FAITH is still the best control.

]]>
https://arconnet.com/data-like-water/feed/ 0
Cloud Computing The business Perspective https://arconnet.com/cloud-computing-the-business-perspective/ https://arconnet.com/cloud-computing-the-business-perspective/#respond Tue, 25 Aug 2015 10:44:34 +0000 https://arconnet.com/?p=1010 Summary: The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. Learn more about the various risks associated with cloud computing and how to choose the best cloud computing solution for your organization.

The Business Perspective
The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. However, if cloud computing is to achieve its potential, there needs to be a clear understanding of the various issues involved, both from the perspectives of the providers and the consumers of the technology. While a lot of research is currently taking place in the technology itself, there is an equally urgent need for understanding the business-related issues surrounding cloud computing.

Cloud Computing and Risk
The emergence of cloud computing is a fundamental shift towards new on-demand business models together with new implementation models for the applications portfolio, the infrastructure, and the data, as they are provisioned as virtual services using the cloud. These technological and commercial changes have an impact on current working practices. Businesses need to understand the impact of the new combinations of technology layers, and how they work together. A crucial part of this is analyzing and assessing the risks involved.

For example, the use of shared resources, in multi-tenanted cloud systems and across multiple organizations seeking economies of scale, results in companies relying upon a common cloud service or platform. What attendant risks might this bring to the tenant consumer of the service, and to the sellers and providers of the cloud services? How will it impact their expectations of service levels and performance?

This is a fundamental issue for any enterprise that considers using the cloud.

Here’s a list of five risks any business faces as a customer of a public cloud service.

  • Shared access
  • Virtual exploits
  • Authentication, authorization, and access control
  • Availability
  • Ownership

Controlling Risks in the Cloud
All organizations should have policies to establish controls to prevent and detect the unauthorized procurement and use of cloud services, regardless of management’s position on venturing into cloud computing. Due to the low cost of initiating cloud services relative to traditional technology purchases, current controls such as expenditure limits may not trigger appropriate attention from management.

For example, a small business unit of a large corporation independently decided to leverage a cloud-based customer relationship management (CRM) system for a new product’s sales initiative. With no established corporate cloud policy, the business unit started this initiative without engaging the internal IT group or making a capital expenditure request. (The cloud solution required only Internet access and a credit card.) Once launched, the system was populated with data about customers and prospects. Consequently, confidential customer information was being stored outside the corporation’s internal computing environment without being subject to the organization’s controls or operating procedures.

For organizations that have decided to adopt cloud computing, the following are some suggested risk responses with respect to unauthorized cloud activity

  • Establish a cloud usage policy that clearly articulates the business processes and data that management deems appropriate to be supported by cloud computing solutions;
  • Create or update a policy that identifies who is authorized to procure cloud computing services;
  • Identify approved cloud vendors; and Define policy and communicate guidance on the management of relationships with CSPs.

Adopting Cloud
Before you leap into the cloud, you’re going to have to do some leg work. The good news is that the steps are similar to those you would take

to implement any technology solution.

Develop a strategic plan
What you are going to spend your IT budget on? A CRM solution? A database? A phone system? Figure

out what exactly you need to do in the cloud.

Understand your internal business processes
For example, if you have determined that you need a CRM solution, you need to understand how you are going to facilitate your business processes through the system. Try to envision how everything will work together.

Assess your capacity, budget and must haves
You may want x, y, and z, but can you realistically afford them and leverage them effectively? What are your “must-haves” in a solution?

Review your options
You can easily register for a trial with most of these applications to see if it is a good fit. The main commitment you’ll need to make is time — you need to invest enough time to understand how well the solution meets your needs and impacts your business processes. So, dig in, get your hands dirty, and see if there’s a good fit for your organization. Do some reading, too. Make an informed decision.

Engage with a partner as necessary
As with many technology solutions, applications available in the cloud can be implemented by your organization or by a partner. To determine which option is best for you, consider the cost of your time, the importance of accountability, and the value of ensuring everything is done right the first time. If you don’t have time for trial and error, consider working with an experienced partner who can streamline the process and get you up and running painlessly.

Opt for a Solutions
Partnering with the right provider will make your transition to cloud computing seamless and ensure your custom solution meets all your computing requirements. Here are a few tips to help you select the best cloud computing provider for your business:

Custom Cloud Solutions
Before you start researching the list of providers, remove the notion of a one-size-fits-all solution from your mind. It would be nice if one provider could offer you the perfect package that solved all of your problems, but that doesn’t exist. When it comes to cloud computing options, you’ll want to partner with a provider that can offer any combination of public, private and hybrid clouds.

Breadth of Cloud Services and Technologies
The best cloud computing providers have experience that extends beyond cloud technology. The best provider to partner with will understand the value of everything cloud related, including servers, security, Software-as-a-Service (SaaS) and much more. If your cloud computing provider doesn’t understand, and offer, all of these features, it will be difficult for them to enhance their service offering as your business grows.

Find a Provider that Understands Your Business
When you’re selecting a cloud computing provider, it is vital that your provider understands the needs of your business and employees. Choosing solely based on price is rarely successful, because you typically have to sacrifice something important in order to secure the lowest price.

Accommodating Your Needs Now and in the Future
Last but not least, cloud computing providers need to understand not only where your business is today, but where it is going in the future.

The business world is not a static environment. Things change, people change and demands change. Choose a cloud computing provider that can keep up, with your business and technology trends.

About ARCON
ARCON is a leading technology company specializing in risk control solutions. ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms. ARCON in the last one decade has been at the forefront of innovations in risk control solutions, with its roots strongly entranced in identifying business risk across industries it is in a unique position to react with innovative solutions/products.

Learn more about us at https://www.arconnet.com

]]>
https://arconnet.com/cloud-computing-the-business-perspective/feed/ 0