Do you really know what’s happening on your network? Sure, you can see how traffic’s flowing and perhaps even identify some threats to your agency’s cyber security. But with the growing deluge of information it can be tough for any organization, let alone government agencies that are doing more with less and facing more cyber attacks than ever to find the valuable information from the diverse and siloed data sources that make up an agency’s IT infrastructure.
Without the ability to identify information that is critical to the success of an agency’s mission, IT personnel can find themselves constantly reacting to threats, rather than being able to get ahead of the curve to initiate a proactive, predictive, or even preventative cyber security strategy.
Recently, Bill Lochten, National Vice President for Software AG Government Solutions and Chris Steel, Chief Solutions Architect for Software AG Government Solutions, sat down to talk about how real-time insight into data streams can move government agencies closer to a preventative cyber security strategy and improve overall cyber resilience.
So just how can government agencies turn huge data volumes from an obstacle into an asset?
For both Steel and Lochten, the key lies in being able to analyze data in real-time to ward off a potential cyber security breach before it becomes an actual problem. Given that once cyber criminals or cyber spies enter a network they can remain undetected for months, if not years, the importance of mitigating a cyber breach before it can take root, is the most vital step.
Based on what Chris Steel has learned from meeting with government CIOs and CTOs the notion of real-time analysis runs contrary to data analysis norms in most agencies. Based on technology that agencies are using, much of which falls into the category of legacy equipment, data has to be processed and analyzed in batches over time. “In terms of cyber that isn’t quick enough. We need to react in real time, using tools to run analytics in real time and respond in microseconds; and further down the road use predictive analytics to predict those attacks and block them before they get in,” said Steel in a recent interview with On the Front Lines.
Interested in learning more about how Big Data can be analyzed in real time, or perhaps even seeing how it functions in a proof of concept trial? Click here to read the rest of the interview with Steel and Lochten.