SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
E MC G R EENPLUM

Advanced Cyber Analytics
with Greenplum database
Massively Scalable Data Warehousing Meets
Large-Scale Analytics Processing

                                                     Computer Network Defense Strategy Requires
   Greenplum in                                      Cyber Analytics
   government                                        Today’s “cyber domain” is growing rapidly in both size and complexity with the proliferation of
   Greenplum is working with a number of             networked communication devices, cloud-based compute services, and network access points.
   leading government organizations to               This creates several new challenges in the effort to build a sophisticated Computer Network
   consolidate their data and perform the            Defense (CND) strategy to protect, monitor, analyze, detect, and respond to unauthorized activity
   complex, mission-critical analysis necessary to   within an enterprise’s network(s). As part of such a strategy, organizations and government
   support their overall mandates and charters.
                                                     agencies are performing cyber analytics as the means to implement both predictive defense
   Greenplum’s database is being deployed to         and adaptive approaches towards cyber security.
   solve some of the most challenging analytical
   and data processing applications including:       Sophisticated attackers may go undetected for a long period of time and are the ones responsible
   •	Fraud detection and cyber security              for the majority of the damage. These types of exploits are referred to as “slow and low” attacks.
                                                     Unfortunately, current cyber security devices generally do a poor job of detecting these attacks.
   •	Compliance and regulatory analysis
                                                     Exploitations such as zero-day exploits, intrusion prevention/detention system (IPS/IDS) evasion,
   •	Energy consumption and carbon
                                                     and stealth network reconnaissance usually span days to months and sometimes even years
     footprint managements
                                                     making it difficult to recognize any type of pattern or signature.
   •	Large-scale trend analysis
                                                     The Challenges
                                                     To halt these types of attacks and exploits, vast amounts of data need to be first collected and
                                                     then analyzed. This data needs to become actionable in order to understand past and current
                                                     events, and how to prepare for future events. However, to transform and correlate data into
                                                     actionable cyber analytics results requires overcoming three challenges:
                                                     •	Big Data – How can terabytes and petabytes of data be transformed into information that
                                                       enables vital discoveries and timely decisions?
                                                     •	Sophisticated Requirements – What is available to support adaptive rule engines and models
                                                       that will evolve faster than those of adversaries?
                                                     •	Fast Performance – How can analysts be enabled to get results quickly (in a matter of seconds)
The Greenplum Story                                    from their complex queries?
Data warehousing and analytics innovator
Greenplum was acquired by EMC in July 2010,          As the cyber domain continues to grow, more and more cyber data is being collected inreal-time
becoming the foundation of the new EMC Data          by log capture, commercial IDS/IPS products, homegrown network sensors, and other sources.
Computing Division. Greenplum’s software             This cyber data quickly becomes overwhelming as it is captured at numerous points and in
and appliance products deliver the big               various formats throughout the network. As this happens, it becomes apparent that the major
data analytics platform of the future, enabling
                                                     inhibitors to successfully accomplishing enterprise-wide cyber analytics is the requirement to
actionable insight from vast and diverse datasets.




white paper
handle large amounts of data, while also having the ability to apply sophisticated (and
                                                      adaptive) rules engines, models, and scoring techniques in a near real-time window. In other
                                                      words, there is a requirement for a massively scalable data warehouse that will act as the
                                                      foundation for advanced analytics, having the ability to ingest cyber data at incredible rates to
                                                      produce actionable steps.
New Capabilities in Data
Intensive Computing                                   Current database architectures are limited
The Pacific Northwest National Laboratory             Online Transaction Processing (OLTP) vs. Massively Parallel
(PNNL), a U.S. Department of Energy laboratory,       Processing (MPP)
and Greenplum are working together to deliver
                                                      Greenplum database utilizes a shared-nothing, massively parallel processing (MPP)
innovative cyber analytics and data-intensive
computing solutions to the public sector.             architecture that has been designed for analytical processing. Most of today’s general-purpose
                                                      relational database management systems are designed for Online Transaction Processing (OLTP)
The work at PNNL incorporates multiple streams
                                                      applications. OLTP transaction workloads require quick access and updates to a small set of
of data to benefit both human and automated
analysis. Cyber data such as host, network, and       records. This work is typically performed in a localized area on disk, with one or a small number
information from the World Wide Web are being         of parallel units. Shared-everything architectures, in which processors share a single large disk
fused with human-oriented data such as psycho-        and memory, are well suited to OLTP workloads (Figure 1). Shared-disk architectures, such as
social, political, and cultural information to form   Oracle and the underlying databases for today’s security information and event management
a more complete understanding of adversaries,         (SIEM) products are quickly overwhelmed by the full table scans, multiple complex table joins,
motives, and social networks.
                                                      sorting, and aggregation operations against vast volumes of data. OLTP architectures are not
This and numerous other cyber analytics               designed for the levels of parallel processing required to execute complex analytical queries,
projects are ongoingat PNNL, including deep           and tend to bottleneck as a result of failures of the query planner to leverage parallelism, lack
forensics, critical infrastructure protections,
                                                      of aggregate I/O bandwidth, and inefficient movement of the data between nodes.
SCADA security, and insider threat protection.
                                                      To transcend these limitations, Greenplum built a shared-nothing MPP database, designed
                                                      from the ground up for data warehousing and large-scale analytics processing. The Greenplum
                                                      database shared-nothing architecture separates the physical storage of data into small units
                                                      on individual segment servers each with a dedicated, independent, high-bandwidth channel
                                                      connection to local disks (Figure 2). The segment servers are able to process every query in a
                                                      fully parallel manner, use all disk connections simultaneously, and efficiently flow data between
                                                      segments as query plans dictate. Because Greenplum’s shared-nothing database automatically
                                                      distributes data and makes query workloads parallel across all available hardware, it dramatically
                                                      outperforms general-purpose database systems on analytical workloads.




                                                      Shared-Disk
                                                      (ie: Oracle Rac)




                                                      Figure 1: Traditional OLTP Database Shared-Everything Architecture
Shared-Nothing
                                                      (ie: Greenplum)



Transparency Delivered
The USAspending.gov site is an Internet-scale
data and analytics platform that leverages
the industry’s most cutting-edge database,
distributed systems, virtualization and cloud
computing technologies. The core database
engine, powered by Greenplum, receives
fine-grained spendingdetails and aggregates
and distills this information into a form that can
easily be visualized and explored by the public.
It fully utilizes the parallelism of dozens of com-
pute cores to perform SQL-based aggregation
and analysis, and employs both row-oriented
and column-oriented processing as well
as powerful in-database compression to
maximize performance. The results of analysis
                                                      Figure 2: Greenplum’s MPP Shared-Nothing Architecture
and aggregation flow to a scalable frontline tier
of Greenplum Database instances that are tuned
to perform complex slicing and dicing of this
data to large volumes of users concurrently.

All of these components arerunning within             The Greenplum solution
Nebula, an innovative, efficient and highly
                                                      Organizations and government agencies employ Greenplum’s database software as the
scalable private federal cloudcomputing
platform developedby NASA to make its                 data-warehousing platform for large-scale Cyber Analytics. Greenplum’s database software allows
vastquantities of data available tothe public.        a cluster of commodity servers and storage to operate as a single data warehouse supercomputer,
                                                      automatically partitioning data and parallelizing queries to achieve performance tens or hundreds
                                                      of times of faster than traditional cyber tools or relational databases. With production data
                                                      warehouses ranging from several terabytes to well over the petabyte threshold, Greenplum easily
                                                      addresses the scalability requirement for cyber analytics. Additionally, Greenplum’s Massively
                                                      Parallel Processing (MPP) shared-nothing architecture allows for data ingest rates of multiple TBs/
                                                      hour, while not hindering the analytics anduser queries.

                                                      Greenplum’s database software is more than a typical data warehouse. With Greenplum
                                                      Database 4.0, cyber analysts and data analysts are able to use common analytical tools like
                                                      SQL, C/C++, Java, Python, Perl, R, SAS, and many others to interrogate the data. Analysts can
                                                      also use Greenplum’s built-in functionality and support of MapReduce.

                                                      Historically, cyber forensics and cyber analytics have been limited to after-the-fact detection
                                                      rather than preventive defense. However, if an analyst or automated systems are able to
                                                      recognize adverse activity as it is occurring, there is the possibility of preventing it. An example
                                                      from industry is credit card fraud detection, where Greenplum databases are often used as the
                                                      underlying platform to recognize, in real time, that a transaction does not meet a user’s profile,
                                                      and then send an alert or prevent the transaction from being completed.


                                                      Summary
                                                      When Greenplum’s database is used for cyber analytics, it allows organizations to perform
                                                      pattern analysis, anomaly detection, and other operations to accomplish deep cyber forensic
                                                      analysis and uncover malicious network activity. Greenplum can help discover non-obvious
                                                      relationships on the network by quickly correlating and analyzing cyber data. Some of the key
                                                      benefits of implementing Greenplum database for cyber analytics are:
•	Scalability – from tens of terabytes to multiple petabytes
 greenplum Products                                  •	Fast queries results and load times run against a massively parallel processing database
 Greenplum Database                                  •	Holistic view of enterprise-wide cyber security posture
 Greenplum Database, a major release of              •	Cost-effective acquisition and operational costs
 Greenplum’s industry-leading massively parallel     •	Advanced “in-database” analytics
 processing (MPP) database product, is the cul-
                                                     •	Support of row- and column-oriented database tables
 mination of more than seven years of develop-
 ment. Already regarded as the most scalable         •	Compressions
 mission-critical analytical database and in use     •	Better analytic performance
 at more than 200 leading enterprises world-
                                                     •	Support of MapReduce
 wide, in this new release, Greenplum Database
 raises the bar with numerous powerful features      •	Support for PMML (predictive modeling mark-up language)
 and enhancements.                                   •	Data Mining Models
 Greenplum Chorus Software                           •	Sophisticated text analytic capabilities
 Greenplum Chorus Software is a new class            •	Flexibility to implement Greenplum in a private cloud or on dedicated servers
 of software that empowers people within an          •	Self-service provisioning of databases/datamarts for dedicated analysis
 enterprise to more easily collaborate and derive
                                                     •	Web interface for data analyst collaboration
 insight from their data. As the first commercial
 Enterprise Data Cloud platform, it provides the     A successful CND is more than network sensors positioned throughout a network and then
 key services necessary to realize the benefits of   locally queried and analyzed by a SIEM product. CND requires an orchestrated approach with
 private cloud computing techniques and social       the ability to have a real-time holistic view of events and threats. Cyber analytics is about
 collaboration for enterprise data warehousing
                                                     pattern recognition and real-time analytics. This requires a database built specifically for data
 and analytics.
                                                     warehousing and analytical processing, such as Greenplum database.
 Greenplum HD Product Family

 The EMC Greenplum HD product family enables
 you to take advantage of big data analytics
 without the overhead and complexity of a project
 built from scratch.

 Greenplum Data Computing Appliance Family

 This family of advanced “all-in-one” appliances
 delivers a fast loading, highly scalable,
 parallel computing platform for next-gen data
 warehousing and analytics.




  CONTACT US
  To learn more about how EMC Greenplum
  products, services and solutions can help
  you realize big data opportunities visit us        ABOUT EMC GREENPLUM and the data computing products division EMC’s new Data Computing
  at www.greenplum.com.                              Products Division is driving the future of data warehousing and analytics with breakthrough products
                                                     including EMC Greenplum Data Computing Appliance Family, EMC Greenplum Database, EMC Greenplum
                                                     Database Community Edition, and EMC Greenplum Chorus— the industry’s first Enterprise Data Cloud
                                                     platform. The division’s products embody the power of open systems, cloud computing, virtualization,
                                                     and social collaboration—enabling global organizations to gain greater insight and value from their data
                                                     than ever before possible.

                                                     EMC2, EMC, and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other
                                                     countries. All other trademarks used herein are the property of their respective owners. © Copyright 2011 EMC Corporation. All rights
                                                     reserved. Published in the USA. 2011-0329




EMC Greenplum
Division Headquarters
1900 South Norfolk Street San Mateo, CA 94403
Tel: 650-286-8012
www.greenplum.com

Más contenido relacionado

La actualidad más candente

A time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloudA time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloudLeMeniz Infotech
 
A time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloudA time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloudNexgen Technology
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...ijcsit
 
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Angelo Corsaro
 
Introduction of grid computing
Introduction of grid computingIntroduction of grid computing
Introduction of grid computingPooja Dixit
 
11. grid scheduling and resource managament
11. grid scheduling and resource managament11. grid scheduling and resource managament
11. grid scheduling and resource managamentDr Sandeep Kumar Poonia
 
A TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUD
A TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUDA TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUD
A TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUDI3E Technologies
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...IRJET Journal
 
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...IRJET Journal
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in theIJNSA Journal
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
 
Analysis of SOFTWARE DEFINED STORAGE (SDS)
Analysis of SOFTWARE DEFINED STORAGE (SDS)Analysis of SOFTWARE DEFINED STORAGE (SDS)
Analysis of SOFTWARE DEFINED STORAGE (SDS)Kaushik Rajan
 
Agent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningAgent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningEditor IJCATR
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageIaetsd Iaetsd
 
Challenges and advantages of grid computing
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computingPooja Dixit
 

La actualidad más candente (19)

Real timedata
Real timedataReal timedata
Real timedata
 
A time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloudA time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloud
 
A time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloudA time efficient approach for detecting errors in big sensor data on cloud
A time efficient approach for detecting errors in big sensor data on cloud
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...
COMPLETE END-TO-END LOW COST SOLUTION TO A 3D SCANNING SYSTEM WITH INTEGRATED...
 
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
Coupling-Based Internal Clock Synchronization for Large Scale Dynamic Distrib...
 
prj exam
prj examprj exam
prj exam
 
Introduction of grid computing
Introduction of grid computingIntroduction of grid computing
Introduction of grid computing
 
Open problems big_data_19_feb_2015_ver_0.1
Open problems big_data_19_feb_2015_ver_0.1Open problems big_data_19_feb_2015_ver_0.1
Open problems big_data_19_feb_2015_ver_0.1
 
11. grid scheduling and resource managament
11. grid scheduling and resource managament11. grid scheduling and resource managament
11. grid scheduling and resource managament
 
A TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUD
A TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUDA TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUD
A TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUD
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
 
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in the
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
Analysis of SOFTWARE DEFINED STORAGE (SDS)
Analysis of SOFTWARE DEFINED STORAGE (SDS)Analysis of SOFTWARE DEFINED STORAGE (SDS)
Analysis of SOFTWARE DEFINED STORAGE (SDS)
 
Agent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningAgent-Driven Distributed Data Mining
Agent-Driven Distributed Data Mining
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
 
Challenges and advantages of grid computing
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computing
 

Destacado

Visual resume for Brad Wehring
Visual resume for Brad WehringVisual resume for Brad Wehring
Visual resume for Brad Wehringwehring1
 
สุขศึกษา,ศิลปะ,การงานอาชีพฯ
สุขศึกษา,ศิลปะ,การงานอาชีพฯสุขศึกษา,ศิลปะ,การงานอาชีพฯ
สุขศึกษา,ศิลปะ,การงานอาชีพฯjojowhisky
 
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...EMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
Informe criterio identificacion cliente
Informe criterio identificacion clienteInforme criterio identificacion cliente
Informe criterio identificacion clienteNathalia Sanchez
 
RSA Report: Bolware – Onyx Variant
RSA Report: Bolware – Onyx VariantRSA Report: Bolware – Onyx Variant
RSA Report: Bolware – Onyx VariantEMC
 
Third lesson
Third lessonThird lesson
Third lessonmeteab
 
Right Triangle Trigonometry
Right Triangle TrigonometryRight Triangle Trigonometry
Right Triangle TrigonometryDan Etz
 
Skatta platform overview
Skatta platform overviewSkatta platform overview
Skatta platform overviewZak Lichfield
 
IG2 Assignment Brief
IG2 Assignment BriefIG2 Assignment Brief
IG2 Assignment Briefsophiemcavoy1
 
Presentacion ingles problema de mi comunidad
Presentacion ingles problema de mi comunidadPresentacion ingles problema de mi comunidad
Presentacion ingles problema de mi comunidadthebosser
 
Primary vs secondary source
Primary vs secondary sourcePrimary vs secondary source
Primary vs secondary sourceTravis Klein
 
Mon economic assumptions
Mon economic assumptionsMon economic assumptions
Mon economic assumptionsTravis Klein
 

Destacado (20)

Day 6 civil war
Day 6 civil warDay 6 civil war
Day 6 civil war
 
Visual resume for Brad Wehring
Visual resume for Brad WehringVisual resume for Brad Wehring
Visual resume for Brad Wehring
 
สุขศึกษา,ศิลปะ,การงานอาชีพฯ
สุขศึกษา,ศิลปะ,การงานอาชีพฯสุขศึกษา,ศิลปะ,การงานอาชีพฯ
สุขศึกษา,ศิลปะ,การงานอาชีพฯ
 
Storyboard
StoryboardStoryboard
Storyboard
 
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
 
Wed mexico
Wed mexicoWed mexico
Wed mexico
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
Informe criterio identificacion cliente
Informe criterio identificacion clienteInforme criterio identificacion cliente
Informe criterio identificacion cliente
 
RSA Report: Bolware – Onyx Variant
RSA Report: Bolware – Onyx VariantRSA Report: Bolware – Onyx Variant
RSA Report: Bolware – Onyx Variant
 
Third lesson
Third lessonThird lesson
Third lesson
 
Presentation2
Presentation2Presentation2
Presentation2
 
Bobby charlton
Bobby charltonBobby charlton
Bobby charlton
 
Korea1a
Korea1aKorea1a
Korea1a
 
Right Triangle Trigonometry
Right Triangle TrigonometryRight Triangle Trigonometry
Right Triangle Trigonometry
 
Skatta platform overview
Skatta platform overviewSkatta platform overview
Skatta platform overview
 
IG2 Assignment Brief
IG2 Assignment BriefIG2 Assignment Brief
IG2 Assignment Brief
 
Math
MathMath
Math
 
Presentacion ingles problema de mi comunidad
Presentacion ingles problema de mi comunidadPresentacion ingles problema de mi comunidad
Presentacion ingles problema de mi comunidad
 
Primary vs secondary source
Primary vs secondary sourcePrimary vs secondary source
Primary vs secondary source
 
Mon economic assumptions
Mon economic assumptionsMon economic assumptions
Mon economic assumptions
 

Similar a White Paper: Advanced Cyber Analytics with Greenplum Database

Dataintensive
DataintensiveDataintensive
Dataintensivesulfath
 
Gridcomputingppt
GridcomputingpptGridcomputingppt
Gridcomputingpptnavjasser
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeCognizant
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsBob Marcus
 
EMC Greenplum Database version 4.2
EMC Greenplum Database version 4.2 EMC Greenplum Database version 4.2
EMC Greenplum Database version 4.2 EMC
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAijp2p
 
Real time big data analytical architecture for remote sensing application
Real time big data analytical architecture for remote sensing applicationReal time big data analytical architecture for remote sensing application
Real time big data analytical architecture for remote sensing applicationLeMeniz Infotech
 
Use Big Data Technologies to Modernize Your Enterprise Data Warehouse
Use Big Data Technologies to Modernize Your Enterprise Data Warehouse Use Big Data Technologies to Modernize Your Enterprise Data Warehouse
Use Big Data Technologies to Modernize Your Enterprise Data Warehouse EMC
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiDataWorks Summit
 
Big data and computing grid
Big data and computing gridBig data and computing grid
Big data and computing gridThang Nguyen
 
GridComputing-an introduction.ppt
GridComputing-an introduction.pptGridComputing-an introduction.ppt
GridComputing-an introduction.pptNileshkuGiri
 
November 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopNovember 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopYahoo Developer Network
 
Accelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUAccelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUJoshua Patterson
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
Real callenges in big data security
Real callenges in big data securityReal callenges in big data security
Real callenges in big data securitybalasahebcomp
 

Similar a White Paper: Advanced Cyber Analytics with Greenplum Database (20)

Dataintensive
DataintensiveDataintensive
Dataintensive
 
Gridcomputingppt
GridcomputingpptGridcomputingppt
Gridcomputingppt
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical Systems
 
EMC Greenplum Database version 4.2
EMC Greenplum Database version 4.2 EMC Greenplum Database version 4.2
EMC Greenplum Database version 4.2
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
 
Real time big data analytical architecture for remote sensing application
Real time big data analytical architecture for remote sensing applicationReal time big data analytical architecture for remote sensing application
Real time big data analytical architecture for remote sensing application
 
Big Data
Big DataBig Data
Big Data
 
40 41
40 4140 41
40 41
 
Use Big Data Technologies to Modernize Your Enterprise Data Warehouse
Use Big Data Technologies to Modernize Your Enterprise Data Warehouse Use Big Data Technologies to Modernize Your Enterprise Data Warehouse
Use Big Data Technologies to Modernize Your Enterprise Data Warehouse
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
 
Big data and computing grid
Big data and computing gridBig data and computing grid
Big data and computing grid
 
Grid computing
Grid computingGrid computing
Grid computing
 
GridComputing-an introduction.ppt
GridComputing-an introduction.pptGridComputing-an introduction.ppt
GridComputing-an introduction.ppt
 
November 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopNovember 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with Hadoop
 
Accelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUAccelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPU
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
 
Real callenges in big data security
Real callenges in big data securityReal callenges in big data security
Real callenges in big data security
 

Más de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS BreachEMC
 

Más de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

White Paper: Advanced Cyber Analytics with Greenplum Database

  • 1. E MC G R EENPLUM Advanced Cyber Analytics with Greenplum database Massively Scalable Data Warehousing Meets Large-Scale Analytics Processing Computer Network Defense Strategy Requires Greenplum in Cyber Analytics government Today’s “cyber domain” is growing rapidly in both size and complexity with the proliferation of Greenplum is working with a number of networked communication devices, cloud-based compute services, and network access points. leading government organizations to This creates several new challenges in the effort to build a sophisticated Computer Network consolidate their data and perform the Defense (CND) strategy to protect, monitor, analyze, detect, and respond to unauthorized activity complex, mission-critical analysis necessary to within an enterprise’s network(s). As part of such a strategy, organizations and government support their overall mandates and charters. agencies are performing cyber analytics as the means to implement both predictive defense Greenplum’s database is being deployed to and adaptive approaches towards cyber security. solve some of the most challenging analytical and data processing applications including: Sophisticated attackers may go undetected for a long period of time and are the ones responsible • Fraud detection and cyber security for the majority of the damage. These types of exploits are referred to as “slow and low” attacks. Unfortunately, current cyber security devices generally do a poor job of detecting these attacks. • Compliance and regulatory analysis Exploitations such as zero-day exploits, intrusion prevention/detention system (IPS/IDS) evasion, • Energy consumption and carbon and stealth network reconnaissance usually span days to months and sometimes even years footprint managements making it difficult to recognize any type of pattern or signature. • Large-scale trend analysis The Challenges To halt these types of attacks and exploits, vast amounts of data need to be first collected and then analyzed. This data needs to become actionable in order to understand past and current events, and how to prepare for future events. However, to transform and correlate data into actionable cyber analytics results requires overcoming three challenges: • Big Data – How can terabytes and petabytes of data be transformed into information that enables vital discoveries and timely decisions? • Sophisticated Requirements – What is available to support adaptive rule engines and models that will evolve faster than those of adversaries? • Fast Performance – How can analysts be enabled to get results quickly (in a matter of seconds) The Greenplum Story from their complex queries? Data warehousing and analytics innovator Greenplum was acquired by EMC in July 2010, As the cyber domain continues to grow, more and more cyber data is being collected inreal-time becoming the foundation of the new EMC Data by log capture, commercial IDS/IPS products, homegrown network sensors, and other sources. Computing Division. Greenplum’s software This cyber data quickly becomes overwhelming as it is captured at numerous points and in and appliance products deliver the big various formats throughout the network. As this happens, it becomes apparent that the major data analytics platform of the future, enabling inhibitors to successfully accomplishing enterprise-wide cyber analytics is the requirement to actionable insight from vast and diverse datasets. white paper
  • 2. handle large amounts of data, while also having the ability to apply sophisticated (and adaptive) rules engines, models, and scoring techniques in a near real-time window. In other words, there is a requirement for a massively scalable data warehouse that will act as the foundation for advanced analytics, having the ability to ingest cyber data at incredible rates to produce actionable steps. New Capabilities in Data Intensive Computing Current database architectures are limited The Pacific Northwest National Laboratory Online Transaction Processing (OLTP) vs. Massively Parallel (PNNL), a U.S. Department of Energy laboratory, Processing (MPP) and Greenplum are working together to deliver Greenplum database utilizes a shared-nothing, massively parallel processing (MPP) innovative cyber analytics and data-intensive computing solutions to the public sector. architecture that has been designed for analytical processing. Most of today’s general-purpose relational database management systems are designed for Online Transaction Processing (OLTP) The work at PNNL incorporates multiple streams applications. OLTP transaction workloads require quick access and updates to a small set of of data to benefit both human and automated analysis. Cyber data such as host, network, and records. This work is typically performed in a localized area on disk, with one or a small number information from the World Wide Web are being of parallel units. Shared-everything architectures, in which processors share a single large disk fused with human-oriented data such as psycho- and memory, are well suited to OLTP workloads (Figure 1). Shared-disk architectures, such as social, political, and cultural information to form Oracle and the underlying databases for today’s security information and event management a more complete understanding of adversaries, (SIEM) products are quickly overwhelmed by the full table scans, multiple complex table joins, motives, and social networks. sorting, and aggregation operations against vast volumes of data. OLTP architectures are not This and numerous other cyber analytics designed for the levels of parallel processing required to execute complex analytical queries, projects are ongoingat PNNL, including deep and tend to bottleneck as a result of failures of the query planner to leverage parallelism, lack forensics, critical infrastructure protections, of aggregate I/O bandwidth, and inefficient movement of the data between nodes. SCADA security, and insider threat protection. To transcend these limitations, Greenplum built a shared-nothing MPP database, designed from the ground up for data warehousing and large-scale analytics processing. The Greenplum database shared-nothing architecture separates the physical storage of data into small units on individual segment servers each with a dedicated, independent, high-bandwidth channel connection to local disks (Figure 2). The segment servers are able to process every query in a fully parallel manner, use all disk connections simultaneously, and efficiently flow data between segments as query plans dictate. Because Greenplum’s shared-nothing database automatically distributes data and makes query workloads parallel across all available hardware, it dramatically outperforms general-purpose database systems on analytical workloads. Shared-Disk (ie: Oracle Rac) Figure 1: Traditional OLTP Database Shared-Everything Architecture
  • 3. Shared-Nothing (ie: Greenplum) Transparency Delivered The USAspending.gov site is an Internet-scale data and analytics platform that leverages the industry’s most cutting-edge database, distributed systems, virtualization and cloud computing technologies. The core database engine, powered by Greenplum, receives fine-grained spendingdetails and aggregates and distills this information into a form that can easily be visualized and explored by the public. It fully utilizes the parallelism of dozens of com- pute cores to perform SQL-based aggregation and analysis, and employs both row-oriented and column-oriented processing as well as powerful in-database compression to maximize performance. The results of analysis Figure 2: Greenplum’s MPP Shared-Nothing Architecture and aggregation flow to a scalable frontline tier of Greenplum Database instances that are tuned to perform complex slicing and dicing of this data to large volumes of users concurrently. All of these components arerunning within The Greenplum solution Nebula, an innovative, efficient and highly Organizations and government agencies employ Greenplum’s database software as the scalable private federal cloudcomputing platform developedby NASA to make its data-warehousing platform for large-scale Cyber Analytics. Greenplum’s database software allows vastquantities of data available tothe public. a cluster of commodity servers and storage to operate as a single data warehouse supercomputer, automatically partitioning data and parallelizing queries to achieve performance tens or hundreds of times of faster than traditional cyber tools or relational databases. With production data warehouses ranging from several terabytes to well over the petabyte threshold, Greenplum easily addresses the scalability requirement for cyber analytics. Additionally, Greenplum’s Massively Parallel Processing (MPP) shared-nothing architecture allows for data ingest rates of multiple TBs/ hour, while not hindering the analytics anduser queries. Greenplum’s database software is more than a typical data warehouse. With Greenplum Database 4.0, cyber analysts and data analysts are able to use common analytical tools like SQL, C/C++, Java, Python, Perl, R, SAS, and many others to interrogate the data. Analysts can also use Greenplum’s built-in functionality and support of MapReduce. Historically, cyber forensics and cyber analytics have been limited to after-the-fact detection rather than preventive defense. However, if an analyst or automated systems are able to recognize adverse activity as it is occurring, there is the possibility of preventing it. An example from industry is credit card fraud detection, where Greenplum databases are often used as the underlying platform to recognize, in real time, that a transaction does not meet a user’s profile, and then send an alert or prevent the transaction from being completed. Summary When Greenplum’s database is used for cyber analytics, it allows organizations to perform pattern analysis, anomaly detection, and other operations to accomplish deep cyber forensic analysis and uncover malicious network activity. Greenplum can help discover non-obvious relationships on the network by quickly correlating and analyzing cyber data. Some of the key benefits of implementing Greenplum database for cyber analytics are:
  • 4. • Scalability – from tens of terabytes to multiple petabytes greenplum Products • Fast queries results and load times run against a massively parallel processing database Greenplum Database • Holistic view of enterprise-wide cyber security posture Greenplum Database, a major release of • Cost-effective acquisition and operational costs Greenplum’s industry-leading massively parallel • Advanced “in-database” analytics processing (MPP) database product, is the cul- • Support of row- and column-oriented database tables mination of more than seven years of develop- ment. Already regarded as the most scalable • Compressions mission-critical analytical database and in use • Better analytic performance at more than 200 leading enterprises world- • Support of MapReduce wide, in this new release, Greenplum Database raises the bar with numerous powerful features • Support for PMML (predictive modeling mark-up language) and enhancements. • Data Mining Models Greenplum Chorus Software • Sophisticated text analytic capabilities Greenplum Chorus Software is a new class • Flexibility to implement Greenplum in a private cloud or on dedicated servers of software that empowers people within an • Self-service provisioning of databases/datamarts for dedicated analysis enterprise to more easily collaborate and derive • Web interface for data analyst collaboration insight from their data. As the first commercial Enterprise Data Cloud platform, it provides the A successful CND is more than network sensors positioned throughout a network and then key services necessary to realize the benefits of locally queried and analyzed by a SIEM product. CND requires an orchestrated approach with private cloud computing techniques and social the ability to have a real-time holistic view of events and threats. Cyber analytics is about collaboration for enterprise data warehousing pattern recognition and real-time analytics. This requires a database built specifically for data and analytics. warehousing and analytical processing, such as Greenplum database. Greenplum HD Product Family The EMC Greenplum HD product family enables you to take advantage of big data analytics without the overhead and complexity of a project built from scratch. Greenplum Data Computing Appliance Family This family of advanced “all-in-one” appliances delivers a fast loading, highly scalable, parallel computing platform for next-gen data warehousing and analytics. CONTACT US To learn more about how EMC Greenplum products, services and solutions can help you realize big data opportunities visit us ABOUT EMC GREENPLUM and the data computing products division EMC’s new Data Computing at www.greenplum.com. Products Division is driving the future of data warehousing and analytics with breakthrough products including EMC Greenplum Data Computing Appliance Family, EMC Greenplum Database, EMC Greenplum Database Community Edition, and EMC Greenplum Chorus— the industry’s first Enterprise Data Cloud platform. The division’s products embody the power of open systems, cloud computing, virtualization, and social collaboration—enabling global organizations to gain greater insight and value from their data than ever before possible. EMC2, EMC, and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2011 EMC Corporation. All rights reserved. Published in the USA. 2011-0329 EMC Greenplum Division Headquarters 1900 South Norfolk Street San Mateo, CA 94403 Tel: 650-286-8012 www.greenplum.com