Contact Us
SaaS Log InXRay Login
Big Data

Big data: It’s important to know where it is, how secure it is, and who is using it

Nastel Technologies®
May 6, 2020

Track and monitor who has access, when it’s accessed, and why, to keep it safe and use it to its full potential.

Companies are failing at managing their structured and unstructured data, and two recent reports illustrate the problem. Many enterprises don’t know how employees are using their data, and they deal with incidents of employee insider data hacks that can be as threatening as data compromises that come from the outside, according to Virtru, a data encryption company. In 2019, Forrester reported that between 60 and 73 percent of all data within an enterprise goes unused for analytics.

Both examples tell us that companies can do a better job at managing this data, so here are some ways to do so.

Take a data-centric approach to security

Companies secure their data by installing network firewalls, monitoring network endpoints, and detecting viruses and malware as these elements enter the network. 

What companies don’t consistently do is take a data-centric view of security that monitors data usage from the viewpoint of who is touching the data itself, and when and where they’re doing it.

eal-time monitoring, tracking, and reporting of who is accessing which data when and where can keep IT and data owners informed of how their data is being used so they have an audit trail of all access instances. This helps them ensure that data is being used properly by authorized users. The practice protects against information and intellectual property breaches and misappropriation, such as when an employee walks out the door with a thumb drive of information pulled from a server.

The data tracker tells you the location of the data download, who the user was, whether the data extraction conformed to a data usage pattern expected for that user, and where the extraction was performed. As a preemptive security and forensics measure, knowing where your data is, who is using it, how it is being used, and when it is being used is an important aspect of data management that network firewalls, vulnerability checks, and intrusion detection don’t fully cover.

Tracking the data makes a difference when 25 percent of employees leave their work stations unsecured, a growing number work from remote locations, and 30 percent of companies report that employees are their greatest source of security risks.

“IT today is challenged by the huge amount of data that is being generated each day,” said Rick Jones, president and CEO of Iconium, which provides data tracking and context security solutions for the IBM mainframe, the platform for 60 percent of the world’s business processing. “Keeping data owners informed of who, where, and when data is being consumed requires tools that are specifically focused on data, which has become a new focus in IT because of governance and compliance requirements, insider threats, and company policies.”

Know your data’s lineage to optimize its use

Monitoring data use can also inform application developers and planners where, when, how, and by whom data is being used.

For example, if you’re writing a customer master file application for sales, you might also discover that the data you’re accessing is being used by field service, engineering, and even manufacturing. This can expand the use of your application to many more people in the company, which gives you better leverage and value from your data and the application.

“We don’t care about databases and schemas,” said Seth Proctor, CEO of Tranquil Data, which provides software for data tracking and discovery. “We are concerned about the lineage of the data and how the data is being used so that software developers can leverage this data for other data opportunities.”

Understanding the multiple uses of data, including where the data is not being used but could be, can even spark new products that build a company’s brand. For data managers, whether management is in big data or more traditional structured data, data management can be taken to a new level.

This article originally appeared on To read the full article and see the images, click here.

Nastel Technologies uses machine learning to detect anomalies, behavior and sentiment, accelerate decisions, satisfy customers, innovate continuously.  To answer business-centric questions and provide actionable guidance for decision-makers, Nastel’s AutoPilot® for Analytics fuses:

  • Advanced predictive anomaly detection, Bayesian Classification and other machine learning algorithms
  • Raw information handling and analytics speed
  • End-to-end business transaction tracking that spans technologies, tiers, and organizations
  • Intuitive, easy-to-use data visualizations and dashboards

Nastel Technologies is the global leader in Integration Infrastructure Management (i2M). It helps companies achieve flawless delivery of digital services powered by integration infrastructure by delivering tools for Middleware Management, Monitoring, Tracking, and Analytics to detect anomalies, accelerate decisions, and enable customers to constantly innovate, to answer business-centric questions, and provide actionable guidance for decision-makers. It is particularly focused on IBM MQ, Apache Kafka, Solace, TIBCO EMS, ACE/IIB and also supports RabbitMQ, ActiveMQ, Blockchain, IOT, DataPower, MFT, IBM Cloud Pak for Integration and many more.


The Nastel i2M Platform provides:


Write a comment
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment * This field is required!
First name * This field is required!
Email * Please, enter valid email address!

Schedule your Meeting


Schedule your Meeting


Schedule a Meeting to Learn More