KuppingerCole Report
Advisory Note
By Mike Small

Big Data Security, Governance, Stewardship

An ever-increasing number of devices, sensors and people are connected to the global internet and generate data. The analysis of this data can help organizations to improve their effectiveness and make better decisions. However, there are concerns over the trustworthiness of the data as well as the ethics of its use. This report describes how good Information Stewardship helps to ensure that Big Data is used in ways that are ethical, compliant and secure.

1 Executive Summary

An ever-increasing number of devices, sensors and people are connected to the global internet and generate, communicate, share and access data. The vo ...

Login Free 30-day Select Access Get full Access

2 Highlights

This report describes how organizations should implement information stewardship to meet the challenges for security and governance of Big Data. The h ...

Login Free 30-day Select Access Get full Access

3 What is Big Data?

*An ever-increasing number of devices, sensors and people are connected to the global internet and generate, communicate, share and access data. The v ...

There are many sources of data as illustrated in Figure 1. On traditional devices such as PC’s and servers, productivity applications generate busines ...

Login Free 30-day Select Access Get full Access

4 Smart Information

*Big Data, in itself, has no meaning and little value. Smart Information is Big Data analysed to make it useful - for example to improve effectiveness ...

The volume of data available together with the computing power provided by cloud services has led to the new forms of data analytics.

These have ...

Login Free 30-day Select Access Get full Access

5 Information Stewardship

*Information stewardship covers the wide range of processes involved in managing information as a key asset. Big Data increases the need for good info ...

Information stewardship is highly relevant to ensuring that information is not only properly secured but also that it is used ethically.

The cont ...

Login Free 30-day Select Access Get full Access

6 Big Data Challenges

Big Data magnifies the challenges that apply to the use, governance and security of normal data.

Big Data makes it possible to identify individua ...

Login Free 30-day Select Access Get full Access

6.1 Insecure Infrastructure

The infrastructure involved in the acquisition, storage and analysis of Big Data needs to be secure.

The technology that underlies the processing ...

Login Free 30-day Select Access Get full Access

6.2 Poor Data Management

Big Data turns the classical information lifecycle on its head.

Good data management is essential to ensure the value and veracity of Big Data. I ...

Login Free 30-day Select Access Get full Access

6.3 Ethics and Compliance

*The volume of data and the computer power that is now available have widened the gap between what regulations and laws permit and what is technically ...

Login Free 30-day Select Access Get full Access

7 Big Data Information Stewardship

*Information stewardship uses good governance techniques to ensure that Big Data is acquired, used and managed in ways that are ethical, compliant and ...

Login Free 30-day Select Access Get full Access

7.1 Big Data Information Governance

Governance sets the rules and objectives while management does the job in alignment with these.

The distinction between governance and management ...

For Big Data this means that:

  • There must be clearly defined business objectives for the use of Big Data. These should include consideration of ethi ...
Login Free 30-day Select Access Get full Access

7.2 Big Data Lifecycle Management

*It is important that the lifecycle of Big Data is properly managed from creation or acquisition through its use and disposal. This area needs special ...

Login Free 30-day Select Access Get full Access

7.3 Information Stewardship Culture

An information stewardship culture is critical to ensuring that data is used ethically as well as in a way that is secure and compliant.

A cultur ...

Login Free 30-day Select Access Get full Access

7.4 Information Centric Security for Big Data

Information centric security puts the information as the central concern of the security objectives, policies, processes and technologies.

Good i ...

Information centric security puts the information as the central concern of the security objectives, policies, processes and technologies. The basic o ...

Login Free 30-day Select Access Get full Access

8 Recommendations

*Big Data creates both big opportunities and big risks for organizations. Good Information Stewardship helps to ensure that Big Data is used in ways t ...

The infrastructure for processing Big Data must be secured. This infrastructure must be acquired, built, run and managed using the same discipline ...

Login Free 30-day Select Access Get full Access

Copyright

©2019 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top