Information Security has always been a large producer and consumer of data. More sophisticated best practices combined with expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to Big Data proportions. As a result, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.
"It is virtually impossible for information security organizations to keep up with the burgeoning level of alerts using traditional tools," says Monahan. "Just as business groups are turning to Big Data, Business Intelligence tools to gain actionable intelligence for solving their complex problems, security analysts, incident responders and forensic analysts need similar capabilities to protect, analyze and respond to the deluge of complex attacks. Research shows that leading edge security organizations are finding these capabilities in the form of Security Analytics and Threat Analytics solutions."
The research analyzed various aspects of 13 security technologies used in Security Management. These technologies included tools that have been in use for over ten years, such as Web Security Gateways, Network Admission Control (NAC) and Security Event & Incident Management (SIEM), as well as many newcomers such as Advanced Persistent Threat (APT)/ Advanced Targeted Attack (ATA) detection, Cloud Application Security and Advanced Security Analytics (SA) or Threat Analytics (TA).
The era of Big Data has demonstrated to information security, however, that there is more that can, and must, be done to identify threats, reduce risk, address fraud and improve compliance monitoring activities. Practitioners can reap the security value of new forms of structured and unstructured data such as Human Resources records, employee calendars and email, and other data not consumed by traditional log management and SIEM technologies; new adaptive algorithms called Machine Learning and Big Data analysis techniques can be utilized to identify abstract data relationships, anomalies, trends, fraudulent and other behavioral changes within the data. Ultimately, the era of Big Data is driving the next technology evolution.
Key Findings include:
• Over 50% of organizations have not deployed SIEM, a foundational security technology.
• 46% of respondents believe SA/TA is the next evolution in SIEM.
• 95% of SA/TA users received "expected" to "greater than expected" value from their solution.
• 65% of respondents said they need advanced automated response to keep up with security alerts.
• 69% of respondents were "less than confident" to "highly doubtful" they could detect an important security issue before it had significant impact.
• 90% of organizations that have deployed a combination of
The EMA "The Evolution of Data Driven Security" Research Report is available online.
For an overview of key highlights from this new research view the on-demand Webinar.
Founded in 1996,
Read the full story at http://www.prweb.com/releases/2014/06/prweb11928986.htm
Most Popular Stories
- 'Lucy's' Super Powers Tops 'Hercules' at Box Office
- The Rise and Fall of Richard Alarcon
- The 2014 Fastest-Growing 100
- U.N. Renews Demand for Gaza Cease-Fire
- Vancrest Assisted Living Project to Add 20 Jobs
- 'Sharknado' Sequel Has Bite and Lots of Laughs
- Nissan Profits Rise on Growth in U.S., China
- Fighting Blocks Investigators, Police From MH17 Crash Site
- Pending Home Sales Slipped in June
- Shania Twain's Vegas residency ending after 110 shows