Whenever you visit our websites, information may be collected using cookies and similar tools to improve your user experience and to enhance the performance of the website.
Closing this message means you accept the use of cookies.
Organizations have broad and diverse security analytics and operations objective…
5External changes and internal inefficiencies make security analytics and operati…
The security data pipeline continues to grow in volume and complexity
1IT is evolving from SIEM to SOAPA
Staffing and skills shortages lead inevitably to managed services
SOCs will have a ‘cloudy’ future
Organizations are incorporating machine learning and automation/orchestration…
1Conclusion
Research methodology
Respondent demographics
ESG Research Report: The rise of cloud-based security analytics and operations technologies
ESG Research Report
Dec 23, 2019
Security analytics and operations can be complex, requiring highly skilled professionals and detailed processes. To overcome these issues, security teams tend to deploy an array of security analytics tools and technologies to collect, process, analyze, and act upon growing volumes of security telemetry. Despite this investment, however, many organizations continue to find it difficult to manage cyber risk or detect and respond to cyber incidents.
How can CISOs address these issues and develop effective security analytics and operations processes? In order to get more insight into these trends, ESG surveyed 406 IT and cybersecurity professionals at organizations in North America (US and Canada) involved with the planning, implementation, and/or operations of their organization’s information security policies, processes (including purchase decisions), or technical safeguards and familiar with their organization’s collection and/or analysis of security data in support of information security management strategy.
Page Count: 30
Table of Contents
Executive summary(3)
Introduction
Research findings(6)
Organizations have broad and diverse security analytics and operations objectives
External changes and internal inefficiencies make security analytics and operations difficult(5)
The security data pipeline continues to grow in volume and complexity
IT is evolving from SIEM to SOAPA(1)
Staffing and skills shortages lead inevitably to managed services
SOCs will have a ‘cloudy’ future
Organizations are incorporating machine learning and automation/orchestration into their technology plans
This Master Survey Results presentation focuses on the fundamental changes to application architecture and the infrastructure platforms that host them, as well as their impact on existing cybersecurity technologies and the traditional approaches to…