Advisory Note: From Big Data to Smart Information - 70750

Report Details

Big Data is characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. However, the term “Big Data” is as much a reflection of the limitations of the current technology as it is a statement on the quantity, speed or variety of data. The term Big Data needs to be understood as data which has greater quantity, variety or speed than can be comfortably processed using the technology that you already have.

Big Data comes from a number of sources both internal and external. Many organizations have accumulated large amounts of data which they are not exploiting. There is an even larger amount of data which is held in publicly available sources, like government databases, social media, as well as data which organization would be willing to share.

Big Data is nothing more than the symbols which are processed by the computer. Big Data, in itself, has little meaning and no value. Smart Information is Big Data processed and analyzed in a way that makes it useful - for example to provide answers to questions. This is an important distinction because it is the analysis and interpretation of Big Data that adds value – not the data itself.

Smart Information can help organizations to make better decisions. Studies have shown that organizations that base strategies, planning, marketing and operations on data rather than opinion are more successful. Smart Information is an important resource that can be used to improve organizational performance.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
May 14, 2013

Advisory Note: From Big Data to Smart Information - 70750

Big Data is characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. However, the term “Big Data” is as much a reflection of the limitations of the current technology as it is a…

€495.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Leadership Compass

Database and Big Data Security

This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. We examine the broad range of technologies…

Executive View

BigID

In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. BigID enables organizations to take action on that data to meet privacy, security, and governance requirements by…

Advisory Note

Advisory Note: Big Data Security, Governance, Stewardship - 72565

An ever-increasing number of devices, sensors and people are connected to the global internet and generate data.  The analysis of this data can help organizations to improve their effectiveness and make better decisions.  However, there are concerns over the trustworthiness of the…

Executive View

Executive View: Axiomatics Data Security - 70345

Axiomatics provides a number of solutions for dynamic policy-driven data masking and access filtering for relational databases and Big Data stores. This suite applies an Attribute Based Access Control mechanism across multiple data stores, and centralizes policy-based authorization rules…

Survey

KuppingerCole und BARC gemeinsame Studie: Big Data und Informationssicherheit - 74001

Angesichts immer fortschrittlicherer und häufigerer Cyber-Angriffe sowie der Tatsache, dass die traditionelle Idee des Sicherheitsperimeters fast gänzlich ausgestorben ist, müssen Unternehmen ihre Strategien in Bezug auf Cyber-Sicherheit überdenken. Neue Lösungen…

Survey

KuppingerCole and BARC Joint Study: Big Data and Information Security - 74001

As cyber-attacks are becoming increasingly advanced and persistent, and the traditional notion of a security perimeter has all but ceased to exist, organizations have to rethink their cybersecurity strategies. The new Real-Time Security Intelligence solutions are combining Big Data and…

Executive View

Executive View: Centrify for Big Data - 71531

Centrify Server Suite integrates Hadoop and NoSQL clusters into Microsoft Active Directory for user authentication, authorization and auditing.

Advisory Note

Advisory Note: Enterprise Big Data IAM – Challenges and Opportunities - 71207

The problem of enterprises grappling with large multiple data and information systems is nothing new. What has changed are the internal and external market expectations, the new technology choices and the constraints and opportunities provided by emerging regulations. Take a deep breath and…

Advisory Note

Advisory Note: Big Data Security, Governance, Stewardship - 71017

Big Data is often characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. These properties are usually referred to as volume, velocity and variety. However there are two other important…

Executive View

Executive View: SAP HANA for Big Data - 70994

Smart information is big data analyzed to provide answers to business questions. SAP HANA is the new runtime backend for SAP Enterprise Applications. It provides high performance database through “in-memory” processing and storage and is especially suited for instant analytics…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

IGA in a World of Zero Trust

IGA in a World of Zero Trust
Richard Hill

Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “never (blindly) trusts”, but “always verifies.” This traditionally meant verifying Who has access to What resource. In the past, the Who typically meant a human with a digital identity being given access to some application within an organization. Once the individual was given access to said application, that individual would be verified [...]

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00