• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Secure
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Umbrella and SecureX
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella Package Comparison
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
      • What is Security Service Edge (SSE)
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • For Customers
      • Support
      • Customer Success Webinars
      • Cisco Umbrella Studio
    • Get the 2022 Cloud Scurity Comparison Guide
  • Trends & Threats
    • Market Trends
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
      • Cyber Threat Categories and Definitions
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Security

Answering Your Big Questions on Big Data

By OpenDNS Team
Posted on March 20, 2014
Updated on May 27, 2020

Share

FacebookTweetLinkedIn

Unless you’ve been living under a rock for the last ten years, you have heard the term “big data.” Do you know what it means? If you’re like most people, you probably answered something to the effect of “kinda.” Well, let’s clear a few things up.

This image (above) was created using the 3D visualization tool developed by the OpenDNS Security Labs. Visualization is an increasingly important component of the big data security techniques OpenDNS uses to predict, detect and protect against the most complex and sophisticated attacks.

What’s the big deal with big data?

Companies of all types are adopting big data practices to improve their operational efficiency and better understand their customers’ needs and wants. Businesses properly leveraging big data see higher productivity and profits than their counterparts. The power of big data is no fallacy, and the trend has gone mainstream. In fact, 70% of enterprise organizations have either deployed or are planning to deploy big data-related projects and programs, according to the 2014 IDG Enterprise Big Data Research report.

What is big data?

It can be difficult to decipher the meaning of big data amidst the buzzwords and marketing speak. Big data is definitely big, but it is also misnamed, as Tom Davenport mentions in his new book, Big Data at Work: Dispelling the Myths, Uncovering the Opportunities.  Big Data means different things to different people, but it can be generally defined as the following:

Data that is too large, unstructured and/or rapidly changing to store and analyze using traditional database management and analysis tools.

To better understand big data, the core characteristics are often referred to as the four V’s of big data: volume (size), velocity (speed of change), variety (lack of structure) and veracity (trustworthiness). Many have recently been adding a fifth V, value, to highlight the importance of obtaining value from the data.

Is bigger better?

With over 90% of all the data in the world having been generated in the last 2.5 years, there is no denying that big data is getting bigger. As our digital footprint rapidly increases, it is easy to get caught up in the quest to capture more and more data. While more data is often beneficial, in most cases additional data collection isn’t where organizations should be focusing their efforts. Prior to wanting more, ensure that you are making the best use of existing data. Are you successfully obtaining value from the data you already have? The value of your data does not lie in its volume – it lies in the use and reuse of it. So before making your big data even bigger, structure your existing data, analyze it, and ensure that you obtain value from it. Remember, your data is only as good as the insights you glean from it.

What is the biggest risk related to the adoption of big data?

Big data initiatives are costly. It is easy to become overwhelmed by the search for the right tools. The biggest threat that organizations face as they look to leverage big data lies in its general use and application. Companies need to spend more time thinking through the application of the data that is collected and analyzed. The majority of big data initiatives begin seeing their full ROI after 18 months. Preparation is key.

What is the “next big thing” in big data?

Many view real-time big data analytics as the next big thing. I disagree. I believe there is something much bigger. The ‘next big thing’ in big data is something that makes it easier to uncover the ‘the next big thing’. This involves getting answers to questions that would otherwise go unasked. Current big data analysis is too dependent on human intuition and initiation.

As Gurjeet Singh, Co-Founder and CEO of Ayasdi, states in his Fast Company article,
“Every Big Data exploration starts with human assumptions and biases that amount to an educated guess in the form of a query … with more larger and complex datasets, it is simply too difficult for the brain to make the connections that lead to making the optimal query.”
I believe Gurjeet is spot on, and I let him know that. There is too much reliance on asking the right questions. Automating the discovery of insight through advances in data-led discovery is the next big thing in big data. This will empower businesses to better attack big data analytics from both ends, targeted high-value questions and data-led discovery. Some of the biggest problems have solutions that are buried in data. This breakthrough in big data technology will allow us to begin finding valuable answers to questions we didn’t know to ask in the first place.

Previous Post:

Previous Article

Next Post:

Next Article

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2023 Cisco Umbrella