Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

How Will Big Data Change Security?

In this three-article series, we will look at the underlying technologies that make up the Big Data revolution

By Steve Van Till
Big Data
Big Data
To view this table of information on Big Data larger, click here.
Big Data
Big Data
April 1, 2013

 

The signs are all around that Big Data is the first major post-cloud technology that can change our useof data as much as the cloud has changed the way we deploy it.

Industry analyst IDC, for example, predicts that Big Data will grow from only $3.2B in 2010 to $16.9B in 2015, for a compound annual growth rate of 40 percent. While servers and software account for significant portions of this growth, storage alone will grow 61 percent per year over this period — a familiar benchmark for anyone who has been following the explosive growth of data generated by IP surveillance video.

Using a more technical measure another analyst, CSC, predicts that by 2020, we will see a 4,300 percent increase in the rate of annual data generation. The Web itself is a huge data generator, with every click literally generating more information about who used the Internet and how. But the “Internet of Things” (IOT) is also now poised to become an equally large data contributor, as more and more smart devices become part of our lives and report back to one database or another on interactions in the physical world.

With respect to IOT, electronic security has for once been out in front of the IT industry, as we have been measuring and monitoring interactions with the physical world for many years before IOT came into vogue. Now that Big Data is beginning to unlock the value in all that IOT data, the question is whether the security industry will also move toward exploiting this data with the latest and most powerful tools.

In this three-article series, we will look at the underlying technologies that make up the Big Data revolution, and we’ll examine which of these technologies hold the most promise for improving the way we deliver security to our customers. And by security I mean real security – not just the parts and pieces and wires and cables and servers – real security that improves our customers’ safety and their bottom line.

           

One Big Trend, Many Technologies

The first thing to recognize about Big Data is that it’s not just one technology, or one type of technology, or even technologies that are all aimed at the same target. It’s really a collection of many confluent technologies that have all made the macroscopic phenomenon of Big Data possible at this point in history. We’ve seen similar technology confluence in the security industry before, for example, once widely available inexpensive CCDs and worldwide Internet connectivity suddenly made IP surveillance far more valuable and effective than its predecessor, and far more valuable than either of those technologies alone.

Now in its second year on the Gartner hype cycle, Big Data is seen to be a multiplicity of technologies that are all either climbing toward the peak of hype, or just slightly past it as they move inexorably through the trough of disillusionment and on to the plateau of productive applications. The core technologies often associated with Big Data that have some relevance in security are summarized in the table. This table is by no means exhaustive, as the tool sets in this space evolve rapidly, and the criteria for inclusion are somewhat in the eye of the beholder.

 

Big Data and the Cloud

It is difficult to think about Big Data technologies without cloud computing. Due to the scale of Big Data problems, the massive IaaS and SaaS cloud platforms now commercially available by the hour are almost always going to be the most cost-efficient way to try out solutions and run them over the long term. As Raul Chong of IBM states, “The cloud computing model is a perfect match for big data since cloud computing provides unlimited resources on demand.”

            Many of the technologies described above are now available “as a service” through a growing number of startups which can help companies deploy Big Data solutions without having to master all of the underlying technology or build out a massive data center. GoodData, for example, is a new company that provides the entire analytical software stack, servers and storage. You just bring your data. Similarly, Amazon’s new Redshift service promises a petabyte-scale data warehouse at one-tenth the cost of traditional systems.

            These types of services put Big Data within reach of many organizations who would not otherwise consider it. Can they do the same for the security industry?

 

Cost-Benefit and ROI

            One of the toughest things to understand at this point in the evolution of Big Data is what the ROI might be for any particular application. What makes sense for a financial services institution or a large oil company may not make sense for a physical security application. A million dollar project can be justified when there is $10 million in near-term ROI, but can that same expense be supported by a security system? What if that million dollar expenditure would save ten lives in the next year?

 

What's in it for the
Security Industry?

            The question of what’s in it for the security industry will force us to look at security systems differently. The small business owner with three doors and a few cameras probably has little use for Big Data. On the other hand, the property manager or retail chain with a thousand locations would clearly benefit from viewing security holistically across the entire enterprise. But if the security systems in those thousand locations are all managed locally, the data can’t be analyzed in the aggregate, and its value is severely limited. Cloud-based systems that can easily span the entire enterprise therefore take on a new significance as Big Data platforms in addition to the many other cost-benefit advantages they offer.

            In the remainder of this series, we’ll take on three central aspects of how Big Data technology can enable a much richer use of the data that our systems are already collecting:

•  Big Data support for real-time decision making

•  Big Data and advanced analytics of security event data

•  Industry norms and benchmarks made possible by Big Data

            What will we find?  If, as the Wall Street Journalsuggests, only 0.5 percent of the digital universe stable is actually being analyzed, then I’m pretty sure there’s a pony somewhere in that pile of the other 99.5 percent.

KEYWORDS: big data cloud computing cost-benefit analysis data management Internet of Things (IoT) Security Return on Investment (ROI)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Untitled 1
Steve Van Till is the Founder, President and CEO of Brivo, the global leader in cloud-based physical access control and Software-as-a-Service solutions. He has previously served in a variety of senior management roles in high technology companies spanning Web development, healthcare, and satellite communications. A Board Member of the Security Industry Association (SIA), he also currently serves as Chairman of the SIA Standards Committee. He is a frequent author and speaker, as well as the inventor of numerous patents. Steve has been honored by Security Magazine as one of “The Top 25 Most Influential People in the Security Industry.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data feat

    How Will Big Data Change Security?

    See More
  • money_enews

    How Security Can Use Big Data Best

    See More
  • Steve Van Till

    Changing Security with Big Data, the Internet of Things and Social Media

    See More
×
To view this table of information on Big Data larger, click here.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!