INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Similar documents
MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Spotlight Report. Information Security. Presented by. Group Partner

THREAT HUNTING REPORT

Best wishes for 2018! Bryan Ware, CEO. Haystax Technology INSIDER THREAT PREDICTIONS FOR

THREAT HUNTING REPORT

INSIDER THREAT 2018 REPORT PRESENTED BY:

GDPR COMPLIANCE REPORT

THREAT MONITORING, DETECTION & RESPONSE

Incident Response Agility: Leverage the Past and Present into the Future

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

RSA NetWitness Suite Respond in Minutes, Not Months

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

THREAT HUNTING 2017 REPORT PRESENTED BY

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

MITIGATE CYBER ATTACK RISK

Managed Endpoint Defense

align security instill confidence

CyberArk Privileged Threat Analytics

CLOUD SECURITY REPORT

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

CloudSOC and Security.cloud for Microsoft Office 365

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

State of Cloud Survey GERMANY FINDINGS

Building Resilience in a Digital Enterprise

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Cyber Resilience. Think18. Felicity March IBM Corporation

THALES DATA THREAT REPORT

CLOUD SECURITY 2017 SPOTLIGHT REPORT PRESENTED BY

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Uncovering the Risk of SAP Cyber Breaches

empow s Security Platform The SIEM that Gives SIEM a Good Name

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Mastering The Endpoint

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

From Managed Security Services to the next evolution of CyberSoc Services

CyberEdge Group 2018 Cyberthreat Defense Report

The 2017 State of Endpoint Security Risk

Modern Database Architectures Demand Modern Data Security Measures

Moving from Prevention to Detection March 2017

locuz.com SOC Services

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

74% 2014 SIEM Efficiency Report. Hunting out IT changes with SIEM

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

INTELLIGENCE DRIVEN GRC FOR SECURITY

Cybersecurity Survey Results

A Data-Centric Approach to Endpoint Security

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Cyber Threat Landscape April 2013

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

INSIDER THREAT 2018 REPORT PRESENTED BY

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Best Practices in Securing a Multicloud World

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

NEXT GENERATION SECURITY OPERATIONS CENTER

GDPR: An Opportunity to Transform Your Security Operations

Building a Threat Intelligence Program

Are we breached? Deloitte's Cyber Threat Hunting

The Cost of Denial-of-Services Attacks

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Securing Your Microsoft Azure Virtual Networks

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

MCAFEE INTEGRATED THREAT DEFENSE SOLUTION

McAfee Public Cloud Server Security Suite

Simplify, Streamline and Empower Security with ISecOps

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

Securing Your Digital Transformation

Securing Your Amazon Web Services Virtual Networks

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Big Data Cybersecurity Analytics Research Report Sponsored by Cloudera

Fidelis Overview. 15 August 2016 ISC2 Cyber Defense Forum

Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way

SIEMLESS THREAT MANAGEMENT

IT TRENDS REPORT 2016:

INTEGRATION BRIEF DFLabs and Jira: Streamline Incident Management and Issue Tracking.

SIEMLESS THREAT DETECTION FOR AWS

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

SIEM Solutions from McAfee

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

CHIME and AEHIS Cybersecurity Survey. October 2016

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

The Third Annual Study on the Cyber Resilient Organization

Incident Response Services

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Office 365 Buyers Guide: Best Practices for Securing Office 365

Reducing Cybersecurity Costs & Risk through Automation Technologies

ForeScout Extended Module for Splunk

Transcription:

2019 SIEM REPORT

INTRODUCTION Security Information and Event Management (SIEM) is a powerful technology that allows security operations teams to collect, correlate and analyze log data from a variety of systems across the entire IT infrastructure stack to identify and report security threats and suspicious activity. The 2019 SIEM Report represents one of the most comprehensive surveys on SIEM to date, designed to explore the latest trends, key challenges, and solution preferences for SIEM. The survey reveals that three-quarters of cybersecurity professionals confirm SIEM is very important to extremely important to their organization s security postures (76%). An impressive eight out of 10 SIEM users are satisfied with the effectiveness of their SIEM platform (86%). They say SIEM delivers on the promise of #1 faster detection and response, #2 more efficient security operations, and #3 better visibility into threats as the highest ranked benefits. For more than 7 out of 10 organizations, SIEM resulted in better detection of threats and a measurable reduction in security breaches. Survey participants consider SIEM most effective for #1 detecting unauthorized access, #2 advanced persistent threats, and 3# insider attacks. The single biggest hurdle to maximizing the value of SIEM continues to be the lack of skilled security staff, providing an opportunity for additional automation of threat management. When it comes to threat management priorities for the next 12 months, cybersecurity professionals focus on improving threat detection (55%), followed by proactive hunting for cyber threats (48%) and improved investigating and analyzing of threats (44%). We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report. Thank you, Holger Schulze Holger Schulze CEO and Founder Cybersecurity Insiders 2019 SIEM REPORT 2

CONFIDENCE IN OVERALL SECURITY POSTURE A majority of cybersecurity professionals (54%) feel less than very confident in their organization s overall security posture. How confident are you in your organization s overall security posture? 54% feel less than very confident in their organization s overall security posture. 44% 34% 7% 3% Not at all confident 12% Extremely confident Not at all confident Not so confident Somewhat confident Very confident Extremely confident 2019 SIEM REPORT 3

IMPORTANCE OF SIEM Among the various security controls and technologies, SIEM plays a very to extremely important role in organizations security postures, according to a large majority of IT security professionals (76%). How important is SIEM to your organization s security posture? 76% Believe SIEM is very to extremely important to organizations security postures. 44% 1% 17% 6% Not at all important 32% Extremely important Not at all important Not so important Somewhat important Very important Extremely important 2019 SIEM REPORT 4

SIEM USE Seven out of 10 organizations in our survey already use SIEM platforms for security information and event management. Twenty percent are planning to implement SIEM in the future. Of the SIEM adopters, almost eight of 10 organizations have been using SIEM for at least one year and 40% for more than three years. Does your organization actively use a SIEM platform or service? 69% 21% SIEM YES, we use SIEM NO, but SIEM is planned in the future 10% No plans to use SIEM 2019 SIEM REPORT 5

SIEM DELIVERY The majority of SIEM deployments are delivered on premises (54%). SIEM as a service is gaining momentum, either as a dedicated service (25%) or delivered in hybrid on-prem / service models (21%). Is your SIEM delivered as a managed service or software installed on premises? 54% 25% 21% On-premises Delivered as a service Hybrid (On-premises plus as a service) 2019 SIEM REPORT 6

SIEM SATISFACTION Companies are surprisingly satisfied with their SIEM investments. A large majority of 86% rate the effectiveness of their SIEM positively in its ability to identify and remediate cyber threats. How would you rate your organization s effectiveness in using SIEM to identify and remediate cyber threats? 86% are somewhat to extremely satisfied with their organization s effectiveness in using SIEM 37% 32% 3% 11% Not at all effective 17% Extremely effective Not at all effective Not so effective Somewhat effective Very effective Extremely effective 2019 SIEM REPORT 7

SIEM BENEFITS When asked about the main benefits organizations derive from their SIEM platform, the ability to provide faster detection of and response to security events is most important (23%). This is followed by more efficient security operations (14%) and better visibility into threats (12%) all key elements of the core value proposition of SIEM. What main benefit is your SIEM platform providing? 23% 14% 12% Faster detection and response More efficient security operations Better visibility into threats 8% 8% 8% Better prioritization of indicators of compromise (IOC) Better compliance posture Better threat analysis Better reporting of threat management 7% Reduced staff workload through automation 6% Better collection of threat data 6% No benefits 3% Better threat remediation 2% Other 3% 2019 SIEM REPORT 8

SIEM REDUCES BREACHES An overwhelming majority (three quarters) of respondents confirm that their deployment and use of SIEM resulted not only in improved ability to detect threats but also in a measurable reduction of security breaches for their organization. This is the ultimate confirmation of the technology s overall value and effectiveness. Has the occurrence of security breaches in your organization changed as a result of using SIEM? Significant reduction in breaches Some reduction in breaches No improvement 30% 76% 24% 46% Report SIEM resulted in reduction of security breaches How has your ability to detect threats changed after implementing SIEM? Much better Better 30% 28% 47% 75% confirm SIEM improved ability to detect threats About the same 21% Worse 4% 2019 SIEM REPORT 9

SPEED OF DETECTION Eight out of 10 security events are detected within hours half of them within minutes. It is reassuring that only a very small fraction of respondents report their SIEM detects security events only after weeks or months of dwell time. How quickly can your SIEM platform typically detect possible security events or compromise? 20% 19% Within seconds Within hours 40% Within minutes 14% Within days 4% 1% Within weeks 2% Within 1 month > 1 month 2019 SIEM REPORT 10

ATTACK DETECTION Organizations report that their SIEM platform is most effective at detecting unauthorized access (46%), followed by advanced persistent threats (42%) and insider attacks (37%). However, the lower detection rates for prolific zero-day attacks (28%) or denial of service attacks (29%) are concerning. Which types of attacks is SIEM technology most effective in detecting? 46% 42% 37% Unauthorized access Advanced persistent threats (APTs)/ targeted attacks Insider attacks (Malicious or careless insiders) 35% 34% 33% Malware (viruses, worms, trojans) Web application attacks (buffer overflows, SQL injections, cross-site scripting) Hijacking of accounts, services or resources Ransomware 33% Phishing attacks 33% Denial of service attacks (DoS/DDoS) 29% Zero-day attacks (against publicly unknown vulnerabilities) 28% Cryptojacking 15% Other 4% 2019 SIEM REPORT 11

BUSINESS IMPACT Reduced employee productivity (35%) and negative impact on IT staff resources (28%) are the most significant areas of business impact security incidents have on organizations. Surprisingly, few respondents mentioned regulatory fines (7%) or reputational damage (10%) as a result of security breaches. What negative impact did your business experience from security incidents in the past 12 months? 35% 28% Reduced employee productivity Deployment of IT resources to triage and remediate issue 27% 26% 20% Increased helpdesk time Disrupted business activities System downtime Data loss 19% Reduced revenue/lost business 10% Customer loss 10% Negative publicity/reputational damage 10% Loss/compromise of intellectual property 9% Regulatory fines 7% Lawsuit/legal issues 6% Other 3% 2019 SIEM REPORT 12

SIEM KEY USE CASES The survey confirms that the most important use case for SIEM is monitoring, correlation and analysis across multiple systems and applications (68%) to aid with the discovery of external and internal threats (62%). What are the most important use cases you utilize your SIEM platform for? 68% 62% Monitor, correlate and analyze activity across multiple systems and applications Discover external and internal threats 51% 51% 38% Monitor the activities of users Monitor server and database access Provide compliance reporting Monitor a combination of cloud and on-premises infrastructure (as opposed to cloud-only or on-premises-only) 37% Detect threats in cloud architecture including cloud access control (CASB) 36% Detect industry/vertical specific attacks (e.g. healthcare break-the-glass, financial fraud) 36% Provide analytics and workflow to support incident response 34% 2019 SIEM REPORT 13

SIEM EVALUATION CRITERIA As organizations evaluate new SIEM platforms, a number of decision criteria stand out. Cost considerations lead the list (66%), followed closely by product performance and effectiveness (65%) and product features (58%). Surprisingly, customer reviews (19%) play only a small role for organizations evaluating SIEM solutions in the market. What criteria do you consider most important when evaluating a SIEM solution? 66% Cost 65% Product performance and effectiveness 58% 52% 43% Product features/ functionality Support Product ease of use Vendor experience and reputation 42% Customer reviews 19% Other 4% 2019 SIEM REPORT 14

METHODOLOGY & DEMOGRAPHICS This report is based on the results of a comprehensive online survey of cybersecurity professionals to gain more insight into the latest trends, key challenges and solutions for SIEM. The respondents range from technical executives to managers and IT security practitioners, representing a balanced crosssection of organizations of varying sizes across multiple industries. CAREER LEVEL 19% 17% 14% 13% 10% 8% 19% CTO, CIO, CISO, CMO, CFO, COO Director Consultant Specialist Owner/CEO/President Manager/Supervisor Other DEPARTMENT 55% 9% 8% 7% 6% 5% 5% 5% IT Security IT Operations Compliance Sales Engineering Operations Product Management Other COMPANY SIZE 7% 14% 18% 6% 29% 11% 15% Fewer than 10 10-99 100-499 500-999 1,000-4,999 5,000 10,000 More than 10,000 SHARE OF IT INFRASTRUCTURE IN THE CLOUD 28% 28% 20% 10% 8% 6% Less than 10% 10-25% 26-50% 51-75% 76-90% More than 90% 2019 SIEM REPORT 15

HelpSystems helps you protect business-critical data with a suite of integrated and automated security solutions for defense in depth, comprehensive visibility, and streamlined reporting across your on-prem and cloud environments. www.helpsystems.com 2019 SIEM REPORT 16