8 Data Visualization Methods For Security Pros - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Data Management // Big Data Analytics
News
12/31/2013
11:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

8 Data Visualization Methods For Security Pros

Use data visualization to get the most out of security analytics datasets.

Just as a picture is worth a thousand words, a good data visualization can offer much more information about a large dataset than raw numbers or outputs ever could. As security teams advance their security analytics practices, data visualization will play an important role in their day-to-day analysis. Here are some of the most effective ways organizations today are graphically crunching numbers to gain a better understanding of their security postures.


Hierarchical Tree Map

Hierarchical tree maps can offer a spatially ordered, at-a-glance view of rankings that can prove particularly useful in areas like IP addresses and classes in object-oriented design. Color, size of boxes, and location on the tree map can all play a role in weighting an object's significance in ranking. According to Frank Dickson, an analyst with Frost & Sullivan, WatchGuard offers a good example of this in its Dimension visibility product, which filters traffic to highlight the most critical information on active users and their connections, with a pivot option to facilitate drill-down and filtering tasks.

Read the rest of this article on Dark Reading.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
Commentary
The Growing Security Priority for DevOps and Cloud Migration
Joao-Pierre S. Ruth, Senior Writer,  9/3/2020
Commentary
Dark Side of AI: How to Make Artificial Intelligence Trustworthy
Guest Commentary, Guest Commentary,  9/15/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
Slideshows
Flash Poll