|System z on Facebook
Infographic inside: System z and big data - why you still need to protect the world's most secure platforms
Megan Moyer 110000GJAE firstname.lastname@example.org | | Tags:  big_data infographic system_z mark_simmonds hadoop data_security security database | 5,023 Visits
Product Marketing Manager, Information Management Division
You've heard this before but I'll repeat it here to set the tone of this blog entry. The rate at which organizations are storing and processing data increases exponentially. Ninety percent of the world's data was created in the last two years - indicative of the exponential growth rates we all face. Now enter big data which in addition to the database that we know and love leverages all that "differently structured" information from a wide variety of sources - emails, social media, sensor and machine generated data and then some.
I was surprised at a recent survey (June 2011) which revealed the #1 use for big data technologies was to analyze data and transactions from enterprise applications. Analytics and decisions engines are being co-located with the transactional data – as it is rich in value and its provenance is understood and trusted. Combining different sources of information big data can help build the bigger picture of a person, organization, product, service, market, etc creating deeper understanding and insight through these same analytics engines. So the database becomes central to big data initiatives.
So what has this got to do with System z, I hear you ask? Stay with me...there are some very impressive stats on how the top banks, life/health insurance companies, retailers etc store their data on the platform because of it's integrity, scalability, resilience, performance but also..... its security. It's a platform that has security built in throughout the stack - cryptographic hardware, OS level security, security built into the middleware and leveraged by the applications above it. Some will tell you that it's never been hacked and that some of the most sensitive information in the world might be stored on it. So you don't need to buy additional security solutions right? Ehh... wrong. Even IBM System z and other high security platforms need additional forms of protection.
Here's why.... Many organizations lose track of what databases they have overtime. Many data breaches occur from inside the organization. Attempted attacks may go unnoticed until an audit months later. Separation of roles within the organization ensure that privileged users do not abuse their access. And how can you design and build policies that can be deployed and managed across the enterprise, regardless of platform, database and even types of data - even Hadoop data?
So that's why even the world’s most secure computing platforms such IBM System z still need real-time monitoring, threat detection and protection to reduce business risks and costs.
I will be watching for real world security and governance issues as they arise in the media - and they will arise - commenting and how these incidents may have been avoided - asking for you input and views. But for now here's the whole picture for you in a data security infographic with a white paper for more detail.