For things that are dearest, most important and valuable to us, we come up with ways to protect them. Insurance policies, laws, to even safe deposit boxes and the hiring of security guards are all means to safeguard whatever deemed precious to us. The introduction of General Data Protection Regulation (GDPR) protects valuable personal information of all individuals within the European Union, as the power of data is beyond imagination in present time. A timely case in point is the recent turmoil at Facebook. The data of more than 50 million Facebook users was harvested by a UK-based data mining company, Cambridge Analytica, to build psychographic profiles that were later utilized by the Trump campaign during the 2016 election for voter identifications, targeted advertisement campaigns, voter behavior predictions, and more. The result? Let’s just say the power of data is well recognized.
The compliance to the GDPR requires a comprehensive data governance strategy, and the associated challenges and solutions are perfectly summed up in our recent white paper. While the regulation is extensive and complex in its requirements, fundamental to GDPR compliance is cybersecurity. Specifically, under the regulation, entities are under legal obligation to notify the supervisory authority as well as all individuals deemed impacted adversely by a data breach, within a maximum of 72 hours after becoming aware of the attack. This extends the conversation from a narrow focus on threat prevention mechanisms, such as firewalls and endpoint security, to a broader vision that includes the complementary additions of threat detection and response. As cyber criminals become more sophisticated at figuring out standardized security and evading defenses, a shift from “reactive” to “proactive” cybersecurity strategy with the aid of technology advancement is imperative.
Gaining that “one-step-ahead” advantage against intruders is not an easy task: organizations need to utilize and analyze all data made available to them. In order to do that, they need a complete security data platform that provides the following capabilities:
To effectively combat cyber threats, companies need to employ a best-of-breed approach that centers around the best available modern technologies in big data, advanced analytics, and machine learning. Also is the need for a future-proof solution that is able to evolve with the elevating sophistication of cyber-attacks. Based on these criteria, the Hortonworks Cybersecurity Platform (HCP) powered by Apache Metron, is precisely engineered to visualize diverse, streaming security data at scale to aid enterprises in real-time detection and response to threats, with the incorporation of below core components:
Last but not least, and maybe the most important of all, the extensibility of Hortonworks Cybersecurity Platform makes it a promising long-term solution that scales with future demands. As a 100% open-source platform, HCP expands on the company’s commitment to an open approach to software development that spurs innovation, by leveraging the knowledge, expertise, and continuous commitments from the established open-source community. Moreover, Metron provides a pluggable framework to add new custom parsers for new data sources, new enrichment services to provide more contextual info to the raw streaming data, pluggable extensions for threat intel feeds, and the ability to customize the security dashboards. Machine learning and other models can also be plugged into the real-time streams providing huge extensibility, which is crucial in ensuring progressive success in this never-ending battle against cyber criminals.
To learn more, please visit:
This content is not intended to constitute legal advice. Readers should consult with their legal counsel regarding compliance with GDPR and other laws and regulations applicable to their particular situation and intended use of any Hortonworks products and services.