Fidelis Cybersecurity, a leading automation detection and response provider, today released the results of a study examining current trends and practices of threat detection and response in enterprise companies. The study found that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations centers (SOCs).
The study was conducted over the span of three months, interviewing security practitioners from enterprise companies in a cross-section of industries: Software-as-a-Service (SaaS), retail, financial services, healthcare, consumer services, and high tech. The results reveal how different organizations manage SOCs, incident response and threat hunting tasks.
As the threat landscape changes and enterprises move to adopt additional layers of defensive technologies, SOCs are being overwhelmed by the sheer volume of alerts and the number of investigations that require their attention. Furthermore, the study, found that in addition to a capacity issue, SOCs are facing a skills gap/training issue, as many organizations struggled to recruit, train, and retain qualified SOC analysts. Other key findings include:
SOC analysts are being overwhelmed by alerts: Alerts and incidents are skyrocketing, but most SOC analysts (60 percent) can only handle between 7-8 investigations in a day. Only 10 percent of organizations said they can realistically handle 8-10 investigations in a day.
Integration is key for SOC automation, efficiency, and effectiveness: Seventy percent of survey respondents said that at least half of their security controls were NOT integrated. Lack of integration impedes not only the speed of investigation, but also the speed of remediation and control. The survey results showed a correlation between the companies that achieved a high alert triaging rate and those that have more integrated security controls.
Automation is not only becoming increasingly important for SOCs, but mandatory: A big theme in security operations today is automation. Increasing automation can lead to improved efficiency, reduced dwell time, and ultimately, better performance for security operations. Unfortunately, without automation, alert triaging can be a tedious process, which is why 83 percent of the companies had less than 50 percent of the alerts triaged daily.
SOC and Incident Response metrics are outdated and ineffective: Every organization interviewed uses metrics to measure SOC and Incident Response (IR) effectiveness. However, 80 percent feel that the metrics they are using today are ‘not effective’ or ‘had room for improvement.’
Threat hunting is an elite operation that exists only in the largest and most sophisticated organizations: Only 17 percent of organizations have a dedicated threat hunting team.
“Our study uncovered a number of notable findings,” said Wang. “For organizations that want to operate efficient, highly effective security operations, we recommend following best practices such as automating tier 1 and tier 2 analysts tasks, identifying further opportunities to eliminate manual tasks, and standardize processes and procedures for threat detection and response.”
To view the full report, visit: https://www.fidelissecurity.com/resources/state-soc.