The Keys to Big Data Security Analytics Solutions: Algorithms, Visualization, Context, and Automation (AVCA)

ESG research indicates that 44% of organizations believe that their current level of security data collection and analysis could be classified as “big data,” while another 44% believe that their security data collection and analysis will be classified as “big data” within the next two years (note: In this case, big data security analytics is defined as, “security data sets that grow so large that they become awkward to work with using on-hand security analytics tools”).

So enterprises will likely move to some type of big data security analytics product or solution over the next few years. That said, many CISOs I speak with remain confused about this burgeoning category and need help cutting through the hype.

Topics: IBM Check Point Palo Alto Networks Cisco Hadoop Information and Risk Management HP McAfee Security and Privacy Security big data security analytics SIEM Narus LogRhythm 21CT RSA Security SilverTail LexisNexis Solera Networks Lancope click security Hexis Cyber Solutions Splunk

VCs Jumping Back Into Security Investments

It’s a herd mentality out on Sand Hill Rd. Over the past few years, VCs shied away from many infrastructure and security companies, preferring to bet on cloud computing, mobile computing, and social networking startups.

Now that these markets are saturated and somewhat stagnant, VCs have returned to the information security market like the swallows of Capistrano. According to PWC and the National Venture Capital Association, security funding in 2012 was up 60% over dollars committed in 2010. Judging by the crowds at the RSA Conference in February, I’m sure that VC investment will grow precipitously in 2013 as well.

Topics: Cybersecurity Palo Alto Networks Information and Risk Management FireEye Security and Privacy Security CISO SilverTail cybercrime Imperva venture capital president obama