New ESG data reveals that enterprise organizations believe that the intersection of security analytics and big data is here today or will arrive very soon At the 2012 RSA Security Conference, ESG participated on a panel of experts to discuss whether security analytics would soon be considered “big data.” ESG and the other panelists agreed that this intersection was coming, we just weren’t sure of the timing.Were we right? ESG recently completed research project to find out. As part of this effort, ESG surveyed 257 security professionals working at enterprise organizations (i.e. more than 1,000 employees) were provided with the following definition of “big data:”ESG considers data to be big once the volume exceeds the capability and boundaries of traditional IT infrastructure. Difficulties include capture, storage, search, sharing, analysis, and visualization. “Big data” requires engineers to rethink and possibly redesign architectures such that they can support business requirements as data volumes grow. When applied to analytics, big data can also be characterized by the speed with which organizations require data processing, data integration, and data analytics tasks be completed in order to spot business trends, prevent diseases, combat crime, etc. Once presented with this description, security professionals were asked this simple question: Based upon this definition, do you believe that security data collection and analysis would be considered “big data” at your organization? The result? The RSA panel was right about the trend but overly conservative about the timing. Forty-four percent of enterprise security professionals believe that security data collection and analysis would be considered “big data” at their organizations today while another 44% believe that security data collection and analysis will become “big data” at their organizations within the next 24 months. To be clear, this does not mean that CISOs are actively hiring data scientists, implementing Hadoop, and sending CISSPs out for training on Cassandra, Hive, MapReduce, or Pig. It does indicate however that they are collecting massive amounts of data and existing security analytics tools can no longer keep up. As a result, IT risk continues to increase – a very scary scenario.CISOs may not have the time to piece together big data security analytics solutions but security vendors should be all over this! Some already are: IBM, SAIC, and Splunk for example. Others will follow suit soon. Security analytics is getting harder and harder so we need new tools, services, and expertise. As the ESG data indicates, we no longer have to postulate that this will happen in the future – it’s happening now. For users, this means massive near-term changes to their security infrastructure, investment, and organizations. For vendors it means new lucrative market opportunities beginning immediately. Finally, those rare security professionals proficient in mathematics and statistics will be sitting in the cat-bird seat for rapid career advancement. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe