SHARE
Facebook X Pinterest WhatsApp

Why IT Pros Are in Denial of Security Threats

Nov 20, 2015

Why IT Pros Are in Denial of Security Threats

Why IT Pros Are in Denial of Security ThreatsWhy IT Pros Are in Denial of Security Threats

IT security pros don’t regard themselves as potential targets of cyber-attacks, possibly accounting for a lack of cyber-preparedness.

Cyber-Attacks of Most ConcernCyber-Attacks of Most Concern

Asked what type of cyber-attack causes the greatest concern, 67% of respondents named advanced persistent threats, 57% named zero-day attacks and 37% pointed to login attacks.

Threat Detection Technologies One Year OutThreat Detection Technologies One Year Out

43% of respondents say that 12 months from now their technology use would not change and 6% said it would decrease.

Consequences of Poor Threat IntelligenceConsequences of Poor Threat Intelligence

60% of respondents said that during the last two years, poor threat intelligence prevented them from stopping at least five security breaches.

Adoption of Machine-Generated IntelligenceAdoption of Machine-Generated Intelligence

65% of respondents believe machine-generated intelligence is essential to a strong cyber-defense because current threat intelligence is inaccurate or incomplete.

Use of Security AnalyticsUse of Security Analytics

Only 36% of respondents say their IT security team uses security analytics. Of these respondents, 64% believe security analytics is essential (19%) or very important (45%).

Security Alert PrioritiesSecurity Alert Priorities

64% of respondents would like alert severity assigned by device. 34% say their companies use this approach.

Time for Detected Anomaly AlertTime for Detected Anomaly Alert

34% of respondents say it takes hours to receive intelligence that security analytics has detected an anomaly. 11% say it takes minutes and 6% say it takes seconds.

Integration of Intelligence Reports With Other ToolsIntegration of Intelligence Reports With Other Tools

The most desirable features of machine-generated intelligence solutions are clear, concise and unambiguous intelligence reports and integration with security information and event management (SIEM) save file and other network monitoring tools.

Top Reasons for Investing in Machine-Generated SolutionsTop Reasons for Investing in Machine-Generated Solutions

The top four reasons for buying machine generated tools are: To speed up detection of anomalies: 65%. To speed up intelligence generation: 55%. Accuracy of intelligence: 50%. Reduce severity of attacks: 49%

Most Likely Criterion for Machine-Generated IntelligenceMost Likely Criterion for Machine-Generated Intelligence

Companies are most likely to measure the increased ability of machine-generated intelligence to respond quickly to a cyber-attack and prevent loss of confidential information.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.