SHARE
Facebook X Pinterest WhatsApp

Taking On Next-Generation Cyberattacks With Streaming Analytics

thumbnail
Taking On Next-Generation Cyberattacks With Streaming Analytics

cyberattacks

In urgent situations, such as where a breach will be costly, or someone’s well-being is at risk, historical data and batch processing simply won’t cut it.

Written By
thumbnail
Joel Hans
Joel Hans
Jul 3, 2017

It’s no secret that cyberattacks are on the rise, and that while many companies are investing heavily in solutions that aim to protect their people and assets, there’s much more to be done.

Stephanie Balaouras, a vice president and research director at Forrester, says that organizations need to invest not just in any security solutions, but, more specifically, in ones that allow them to automate detection and response to the threat itself. Balaouras was speaking at Forrester’s recent Counteract Cyberattacks and Fraud with Streaming Analytics webinar (free registration).

“We can layer as many preventative solutions as possible in our environment,” she said, “but ultimately we’re not going to be able to stop every single attack. It’s become imperative that we’re able to detect infiltrations as quickly as possible, and respond to them immediately.”

Surprising sources of cyberattacks

According to a recent Forrester study, a large number of organizations across different industries self-reported that they were victims of cyberattacks. It might have taken them an average of 245 days to realize there was an intrusion at all, but 41 percent of respondents reported that their attacks came from internal sources, whether that was a malicious party, or just someone wanting to work from home and emailing confidential information to a personal account.

Attackers are focusing on personally identifiable information, intellectual property, authentication credentials, and credit card data, all of which can be monetized on the black market. Balaouras is quick to point out that credit cards aren’t as profitable for hackers as personal information, such as a leaked medical record—the more personal the information, the easier it is for malicious parties to commit fraud-based crimes around it.

Infiltrations are happening on a number of fronts, but software vulnerabilities (42 percent), stolen credentials (37 percent), and phishing (37 percent) lead the pack. But the goal in cybersecurity shouldn’t be just targeting the most popular vulnerabilities and layering on more security packages, Balaouras said. Instead, organizations need to deploy detection and automated response capabilities, and quickly, if they want to maintain any semblance of security in the years to come.

“The goal is not just detection, but the ability to limit the impact of the breach before it turns into something enormous,” Balaouras says.

Advertisement

Changing the cybersecurity conversation

A number of elements make security automation difficult for businesses. Those in security operations centers (SOCs) find themselves overwhelmed by the sheer number of alerts, and it’s not easy to simply hire more security workers—these people are few and far between, and are highly sought after for their skills.

Instead, organizations should think about empowering their SOC with more data and automated workflows to help them make smarter decisions and move faster. But Balaouras says that in urgent situations, such as where a breach will be costly, or someone’s well-being is at risk, historical data and batch processing simply won’t cut it.

“There will always be more preventative solutions, we’re always going to be able to layer more preventative solutions, but ultimately we need to improve our detection capabilities and our ability to make an automated response,” Balaouras said.

By layering real-time streaming analytics into the SOC, these algorithms can aggregate threat intelligence from a number of disparate sources, track malicious insiders, prioritize alerts, detect the signs of infiltration, and much more. And when it comes to streaming analytics, “real-time” refers to seconds or even milliseconds—anything slower isn’t powerful enough for this next generation of security hardening.

Advertisement

Getting faster with cybersecurity analytics

Steve Wilkes, co-founder and CTO of Striim,, who joined Balaouras on the webinar, says that companies need to think about making their security data analytics faster so that they can be proactive rather than reactive. In the past, a company might collect log files from a number of discrete security solutions and store them in a Hadoop cluster for later processing. Now, being able to transform, filter, and aggregate those logs in real-time unlocks new proactive (and automated) security workflows.

Wilkes offers one potential use case . It’s a common practice to lock out specific IP addresses after a number of failed logins to a particular server or service to prevent a brute-force attack on a user’s credentials. But if an attacker tries to log into a number of servers simultaneously, to get around that brute-force prevention tactic, the SOC might never correlate  all of the failed logins as coming from a single, determined source. Instead, streaming analytics can take the logs from each of the servers and their security systems and automatically correlate the intrusion attempts as coming from a single external IP. It can then automatically put that IP on a blacklist, or warn the SOC before the attacker actually gains access.

By analyzing a high throughput of data from any number of disparate sources, and pulling them together in highly customizable ways, organizations can detect intrusions faster and shut them down with impunity. Balaouras and Wilkes agreed that by aiming higher than simply bringing down that “245 days to detecting a breach” figure, organizations can set themselves up to meet—and defeat—the cyberattacks that are inevitably on their way.

Advertisement

Learn more:

Streaming analytics

Use cases: compliance and anti-fraud

thumbnail
Joel Hans

Joel Hans is a copywriter and technical content creator for open source, B2B, and SaaS companies at Commit Copy, bringing experience in infrastructure monitoring, time-series databases, blockchain, streaming analytics, and more. Find him on Twitter @joelhans.

Recommended for you...

The Rise of Autonomous BI: How AI Agents Are Transforming Data Discovery and Analysis
Beyond Procurement: Optimizing Productivity, Consumer Experience with a Holistic Tech Management Strategy
Rishi Kohli
Jan 3, 2026
Smart Governance in the Age of Self-Service BI: Striking the Right Balance
Why the Next Evolution in the C-Suite Is a Chief Data, Analytics, and AI Officer

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.