ITC Security Threat of the Week – Week 24: Big Data – The Four Phases

 In ITC's Threat of the Week

‘Big Data’ is the name increasingly being used for the huge amounts of structured and unstructured data generated by the exponential growth in interconnected devices such as smartphones and tablets; and of new sources of raw data such as social media, mobile apps, video, sensors and so on. In the autumn of 2012, IBM and Oxford University co-operated in a survey of over 1000 companies, of whom 28% were implementing ‘Big Data’ projects.
The IBM/OU survey divided the process of Big Data adoption into four linked phases. These are summarised below:
Educate
The Educate phase of Big Data adoption is where businesses gather knowledge and make market observation. Many companies remain perpetually at this stage of adoption. In addition to research, the most crucial aspect of the Educate phase is to formulate a clear vision and plan of action as to how Big Data will be applied in a way which will make it work specifically for your organisation.
Explore
The Explore phase involves the development of a more detailed strategy for Big Data adoption for your company or organisation that it has ownership over, based on its particular requirements and challenges. A key aspect of the Explore phase involves selecting the correct data tools for your business’s needs. Big Data covers a lot of different technologies and data types, including well-understood sources of data that have been revolutionised by technical refinements such as real-time information gathering. It is also at this phase that effective data storage solutions should be considered in detail.
Engage
In this phase, it is time for an organisation to plot Big Data initiatives geared to create validity for both data and requirements. In the Engage phase, the testing of Big Data tools, strategies and methodologies must be transformed from purely theoretical exercises into actual applications, in the form of pilots and proof of concepts.
Execute
In the Execute phase, a company or organisation’s Big Data strategies become reality in the form of at least two or more complete and functioning Big Data initiatives. However, development does not stop here, as companies continue to deploy advanced analytics to improve performance.
No matter which of the four phases your company stands at, there will always be a need for effective security of data storage systems and data transmission. With ITC Security and our comprehensive suite of services which can be tailored to your needs, you can be assured that your business’s data and data management systems will be well-protected from outside interference. If you would like to learn more, please get in contact at [email protected] or call 020 7517 3900.

Author: Kevin Whelan

Recent Posts

Leave a Comment

Tel:
+44 (0) 20 7517 3900

 

Contact ITC Secure

If you have a question, request, comment or requirement, please send us an email now and we will get back to you by return

totw