Fidelis Cybersecurity, a leading automated detection and response provider, today released the results of a study examining current trends and practices of threat detection and response in enterprise companies. The study, conducted by 360Velocity and Dr. Chenxi Wang, Founder of the Jane Bond Project, found that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations centers (SOCs).
The study was conducted over the span of three months, interviewing security practitioners from enterprise companies in a cross-section of industries: Software-as-a-Service (SaaS), retail, financial services, healthcare, consumer services, and high tech. The results reveal how different organizations manage SOCs, incident response and threat hunting tasks.
“The study findings are only further proof that with a rising threat landscape, continued constraints on both the availability and bandwidth of well-trained SOC analysts, SOCs are increasingly burdened,” said Tim Roddy, VP of cybersecurity product strategy. “Organizations need to look at automating common tasks, integrating network visibility with endpoint detection and response, and shifting the focus from identifying signatures and indicators to attacker Techniques, Tactics, and Procedures (TTPs).”
As the threat landscape changes and enterprises move to adopt additional layers of defensive technologies, SOCs are being overwhelmed by the sheer volume of alerts and the number of investigations that require their attention. Furthermore, the study, found that in addition to a capacity issue, SOCs are facing a skills gap/training issue, as many organizations struggled to recruit, train, and retain qualified SOC analysts. Other key findings include:
“Our study uncovered a number of notable findings,” said Wang. “For organizations that want to operate efficient, highly effective security operations, we recommend following best practices such as automating tier 1 and tier 2 analysts tasks, identifying further opportunities to eliminate manual tasks, and standardize processes and procedures for threat detection and response.”