Preventing Disastrous Events Through The Power of Anomaly Detection In Machine Data

Preventing Disastrous Events Through The Power of Anomaly Detection In Machine Data

Preventing Disastrous Events Through the Power of Anomaly Detection in Machine Data

In August, a single server failed and the NASDAQ went down for three hours. In January, GlobalPayments reported that a hack compromising millions of credit card accounts cost them $93 million to recover from. In both cases, nobody took action until the damage was done because quite simply, nobody could. IT planners could not proactively head off the failure or breach because they had no suspicious behavior or early warning system to alert them that something was going amiss; all they had were mountains of event logs that needed to be pored through after the damage was already said and done.

nasdaq2

(Image Source: Shutterstock)

To prevent such catastrophes in the future, three things are required:

  • A machine learning engine that can analyze and learn from data – as well as human interaction and feedback – in order to get smarter over time;
  • Big Data technologies;
  • And of course, a cloud platform for ease of management.

Machine logs are the output of every application, website, server and supporting IT infrastructure component in the enterprise. This means that IT teams are inundated by massive amounts of machine log data. Digging through all of this data for something meaningful is not only unwieldy and unappealing, but also ultimately drives down productivity and increases costs. IT teams need to be able to not only visualize, but also analyze machine data in a way that can provide clear insight into what events in that stream of data are benign and what events are malicious that would require immediate attention. By being able to make sense of machine data from an “event” perspective, IT teams can create optimal functionality around any environment and also bring a true, proactive approach to IT management.

The goal of combining Big Data and a machine learning engine all within a cloud platform is to make events easily known and to procure insight on such events prior to their occurrences, which would result in significantly fewer headaches for IT managers and CIOs. Big Data technologies enable a holistic approach to analysis of data without binding to schemas, volumes or batch analytics. A machine learning engine provides advanced algorithms that learn and analyze from data as well as humans to increase intelligence over time. And lastly, the combination of these components in a cloud-based management platform enables an elastic compute at the massive scale that’s needed to analyze this amount of data in real-time across all vectors. By having this capability, IT managers can then create playbooks and remediation steps to prevent certain events and anticipate the impact to their organization.

Event detection can play a big role in optimizing system availability and performance; when a process, application or infrastructure component fails or slows down, it’s typically presaged by multiple events occurring simultaneously or in rapid succession. Out-of-the-ordinary or “anomaly” event detection can decipher how this series of events and their patterns vary from the norm, and what the variation means to the business. The power behind anomaly detection is neither a single technology nor a single technique. It’s typically a set of algorithms that work synergistically, leveraging machine learning techniques as well as mathematical and statistical analysis.

The benefits are clear, but there are many solutions out there that claim to do this, but do not leverage the three critical components for successful anomaly detection: machine learning engine, big data analytics and a cloud management platform. Without these three things working harmoniously together, it is that much more difficult to proactively manage the IT environment. Coming full circle, disastrous events such as the NASDAQ going down or a company losing millions of dollars could have been prevented through the power of machine data and anomaly detection.

sanjayBy Sanjay Sarathy, CMO of Sumo Logic

Sanjay joins Sumo Logic with over seventeen years of marketing, business development and community building experience in both SaaS and enterprise software environments. Prior to Sumo Logic, he was at Vindicia, a SaaS company that provides online billing and marketing solutions for for companies selling digital content and services. He also spent time at Above All Software, Qualys, Sun Microsystems and NetDynamics. Sanjay has a BA in Quantitative Economics from Stanford University and a MBA from the Haas School of Business at UC Berkeley.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…