Book description
Companies of all sizes are considering data lakes as a way to deal with terabytes of security data that can help them conduct forensic investigations and serve as an early indicator to identify bad or relevant behavior. Many think about replacing their existing SIEM (security information and event management) systems with Hadoop running on commodity hardware.
Before your company jumps into the deep end, you first need to weigh several critical factors. This O'Reilly report takes you through technological and design options for implementing a data lake. Each option not only supports your data analytics use cases, but is also accessible by processes, workflows, third-party tools, and teams across your organization.
Within this report, you'll explore:
- Five questions to ask before choosing architecture for your backend data store
- How data lakes can overcome scalability and data duplication issues
- Different options for storing context and unstructured log data
- Data access use cases covering both search and analytical queries via SQL
- Processes necessary for ingesting data into a data lake, including parsing, enrichment, and aggregation
- Four methods for embedding your SIEM into a data lake
Publisher resources
Table of contents
-
1. The Security Data Lake
- Leveraging Big Data Technologies to Build a Common Data Repository for Security
- Comparing Data Lakes to SIEM
- Implementing a Data Lake
- Understanding Types of Data
- Choosing Where to Store Data
- Knowing How Data Is Used
- Storing Data
- Accessing Data
- Ingesting Data
- Understanding How SIEM Fits In
- Acknowledgments
- Appendix: Technologies To Know and Use
Product information
- Title: The Security Data Lake
- Author(s):
- Release date: April 2015
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491927694
You might also like
book
Deploying a Modern Security Data Lake
Cybersecurity experts are overwhelmed, constantly on guard against malicious activity on their networks. Further complicating these …
book
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to …
book
Cloud Security Handbook
A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples …
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …