Tech Leaders Enlist Analytics to Fight Cyber-Crime

 
 
By Karen A. Frenkel  |  Posted 07-06-2015 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Tech Leaders Enlist Analytics to Fight Cyber-Crime
    Next

    Tech Leaders Enlist Analytics to Fight Cyber-Crime

    By Karen A. Frenkel
  • Previous
    Way to Combat False Alarms Needed
    Next

    Way to Combat False Alarms Needed

    62% of surveyed IT professionals said traditional security approaches result in too many alerts and false positives for them to handle.
  • Previous
    Security Analytics Favored
    Next

    Security Analytics Favored

    Security analytics ranked at the top for perceived value when compared to total cost of ownership. 57% of IT professionals would implement security analytics to acquire unique or specialized data for context.
  • Previous
    Confidence in Security Analytics
    Next

    Confidence in Security Analytics

    Of IT professionals already using security analytics, 95% are confident that they can detect a security concern before it has a significant impact.
  • Previous
    Security Analytics Needed
    Next

    Security Analytics Needed

    70% of respondents said they either have an investment in security analytics, or would make an investment if they had sufficient resources.
  • Previous
    Security Analytics Not Widespread
    Next

    Security Analytics Not Widespread

    Security analytics ranked second-to-last in deployment for the second year in a row.
  • Previous
    Reasons for Using Advanced Security Analytics
    Next

    Reasons for Using Advanced Security Analytics

    Provides unique or specialized data for context: 57%, Data flexibility and adaptability: 36%, Better data correlation and fidelity for creating responses: 36%, Lowering false positives: 29%, A way to reduce incident response time: 29%
  • Previous
    Ranked Reasons for Security Analytics
    Next

    Ranked Reasons for Security Analytics

    The top-ranked five reasons for using security analytics are: 1. Providing highly actionable intelligence/context for incident prioritization. 2. Providing data aggregation and correlation. 3. Improving long-term trend or anomaly analysis. 4. Enhancing or accelerating post-incident forensics. 5. Enhancing breach or compromise (incident) response
  • Previous
    Most Needed Tool
    Next

    Most Needed Tool

    Asked what they wanted most out of a tool that accelerated breach detection, 39% of respondents said they seek better trend analysis and anomaly detection to reduce false positives.
  • Previous
    Too Many False Positives
    Next

    Too Many False Positives

    62% of respondents see too many false positives and have too many alerts to handle, shaking their confidence that security protections are in place.
  • Previous
    Too Much Uncorroborated Data
    Next

    Too Much Uncorroborated Data

    38% of respondents do not feel confident about security because there is too much uncorroborated data and little context about that data.
 

IT professionals are using advanced security analytics to identify and mitigate cyber-crimes before they have a significant impact on their organization and customers, according to a new report. Enterprise Management Associates, an IT and data management research and consulting firm, and Prelert, which provides machine learning anomaly detection for IT security, partnered to produce the report, titled "Data-Driven Security Reloaded." They studied 18 areas of technology to understand why organizations are deploying them, why they feel they do or do not receive value from them, and how they use them to prevent, detect and respond to threats to their information assets. "Security analytics, though a relatively new field of technology, is the next step in detection and response technology," said David Monahan, research director at EMA. "Machine-learning algorithms and analysis techniques have advanced far beyond the capabilities of what was available in the commercial markets only two to three years ago."

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register