The Security Data Lake

Companies of all sizes are considering data lakes as a way to deal with terabytes of security data that can help them conduct forensic investigations and serve as an early indicator to identify bad or relevant behavior. Many think about replacing their existing SIEM (security information and event m...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Raffael Marty
Format: Buch
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Raffael Marty
description Companies of all sizes are considering data lakes as a way to deal with terabytes of security data that can help them conduct forensic investigations and serve as an early indicator to identify bad or relevant behavior. Many think about replacing their existing SIEM (security information and event management) systems with Hadoop running on commodity hardware.Before your company jumps into the deep end, you first need to weigh several critical factors. This O'Reilly report takes you through technological and design options for implementing a data lake. Each option not only supports your data analytics use cases, but is also accessible by processes, workflows, third-party tools, and teams across your organization.Within this report, you'll explore:Five questions to ask before choosing architecture for your backend data storeHow data lakes can overcome scalability and data duplication issuesDifferent options for storing context and unstructured log dataData access use cases covering both search and analytical queries via SQLProcesses necessary for ingesting data into a data lake, including parsing, enrichment, and aggregationFour methods for embedding your SIEM into a data lake
format Book
fullrecord <record><control><sourceid>safari</sourceid><recordid>TN_cdi_safari_books_v2_9781491927748</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>9781491927748</sourcerecordid><originalsourceid>FETCH-LOGICAL-b9517-f8cf70051d9f8447566405b8228df4568ae188f3d6942dbc572fe7b7b831057d3</originalsourceid><addsrcrecordid>eNpVjj1rwzAUABVKoK3jtbOHrgZ9v_fG4H4FDBnizEayJGIcMFhOof--Q7N0Om45bsOehSZBEizxB1YS4N1B4yMrcx49V0TSGoIn9tJdYnWKw20Z15_qza2uat0Ud2yb3DXH8s6CnT_eu-arbo-fh2bf1p6MgDrhkIBzIwIl1BqMtZobj1JiSNpYdFEgJhUsaRn8YECmCB48KsENBFWw179udsktY-_necr9t-z_batffT82ZQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype></control><display><type>book</type><title>The Security Data Lake</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Raffael Marty</creator><creatorcontrib>Raffael Marty</creatorcontrib><description>Companies of all sizes are considering data lakes as a way to deal with terabytes of security data that can help them conduct forensic investigations and serve as an early indicator to identify bad or relevant behavior. Many think about replacing their existing SIEM (security information and event management) systems with Hadoop running on commodity hardware.Before your company jumps into the deep end, you first need to weigh several critical factors. This O'Reilly report takes you through technological and design options for implementing a data lake. Each option not only supports your data analytics use cases, but is also accessible by processes, workflows, third-party tools, and teams across your organization.Within this report, you'll explore:Five questions to ask before choosing architecture for your backend data storeHow data lakes can overcome scalability and data duplication issuesDifferent options for storing context and unstructured log dataData access use cases covering both search and analytical queries via SQLProcesses necessary for ingesting data into a data lake, including parsing, enrichment, and aggregationFour methods for embedding your SIEM into a data lake</description><identifier>ISBN: 9781491927748</identifier><identifier>ISBN: 1491927747</identifier><identifier>EISBN: 1491927690</identifier><identifier>EISBN: 9781491927694</identifier><language>eng</language><publisher>O'Reilly Media, Inc</publisher><creationdate>2015</creationdate><tpages>25</tpages><format>25</format><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,780,784,786,24761</link.rule.ids></links><search><creatorcontrib>Raffael Marty</creatorcontrib><title>The Security Data Lake</title><description>Companies of all sizes are considering data lakes as a way to deal with terabytes of security data that can help them conduct forensic investigations and serve as an early indicator to identify bad or relevant behavior. Many think about replacing their existing SIEM (security information and event management) systems with Hadoop running on commodity hardware.Before your company jumps into the deep end, you first need to weigh several critical factors. This O'Reilly report takes you through technological and design options for implementing a data lake. Each option not only supports your data analytics use cases, but is also accessible by processes, workflows, third-party tools, and teams across your organization.Within this report, you'll explore:Five questions to ask before choosing architecture for your backend data storeHow data lakes can overcome scalability and data duplication issuesDifferent options for storing context and unstructured log dataData access use cases covering both search and analytical queries via SQLProcesses necessary for ingesting data into a data lake, including parsing, enrichment, and aggregationFour methods for embedding your SIEM into a data lake</description><isbn>9781491927748</isbn><isbn>1491927747</isbn><isbn>1491927690</isbn><isbn>9781491927694</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2015</creationdate><recordtype>book</recordtype><sourceid>OODEK</sourceid><recordid>eNpVjj1rwzAUABVKoK3jtbOHrgZ9v_fG4H4FDBnizEayJGIcMFhOof--Q7N0Om45bsOehSZBEizxB1YS4N1B4yMrcx49V0TSGoIn9tJdYnWKw20Z15_qza2uat0Ud2yb3DXH8s6CnT_eu-arbo-fh2bf1p6MgDrhkIBzIwIl1BqMtZobj1JiSNpYdFEgJhUsaRn8YECmCB48KsENBFWw179udsktY-_necr9t-z_batffT82ZQ</recordid><startdate>20150415</startdate><enddate>20150415</enddate><creator>Raffael Marty</creator><general>O'Reilly Media, Inc</general><scope>OHILO</scope><scope>OODEK</scope></search><sort><creationdate>20150415</creationdate><title>The Security Data Lake</title><author>Raffael Marty</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-b9517-f8cf70051d9f8447566405b8228df4568ae188f3d6942dbc572fe7b7b831057d3</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2015</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Raffael Marty</creatorcontrib><collection>O'Reilly Online Learning: Corporate Edition</collection><collection>O'Reilly Online Learning: Academic/Public Library Edition</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Raffael Marty</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>The Security Data Lake</btitle><date>2015-04-15</date><risdate>2015</risdate><isbn>9781491927748</isbn><isbn>1491927747</isbn><eisbn>1491927690</eisbn><eisbn>9781491927694</eisbn><abstract>Companies of all sizes are considering data lakes as a way to deal with terabytes of security data that can help them conduct forensic investigations and serve as an early indicator to identify bad or relevant behavior. Many think about replacing their existing SIEM (security information and event management) systems with Hadoop running on commodity hardware.Before your company jumps into the deep end, you first need to weigh several critical factors. This O'Reilly report takes you through technological and design options for implementing a data lake. Each option not only supports your data analytics use cases, but is also accessible by processes, workflows, third-party tools, and teams across your organization.Within this report, you'll explore:Five questions to ask before choosing architecture for your backend data storeHow data lakes can overcome scalability and data duplication issuesDifferent options for storing context and unstructured log dataData access use cases covering both search and analytical queries via SQLProcesses necessary for ingesting data into a data lake, including parsing, enrichment, and aggregationFour methods for embedding your SIEM into a data lake</abstract><pub>O'Reilly Media, Inc</pub><tpages>25</tpages></addata></record>
fulltext fulltext
identifier ISBN: 9781491927748
ispartof
issn
language eng
recordid cdi_safari_books_v2_9781491927748
source O'Reilly Online Learning: Academic/Public Library Edition
title The Security Data Lake
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T17%3A23%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-safari&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=The%20Security%20Data%20Lake&rft.au=Raffael%20Marty&rft.date=2015-04-15&rft.isbn=9781491927748&rft.isbn_list=1491927747&rft_id=info:doi/&rft_dat=%3Csafari%3E9781491927748%3C/safari%3E%3Curl%3E%3C/url%3E&rft.eisbn=1491927690&rft.eisbn_list=9781491927694&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true