1 / 4

Five Takeaways from Vanson Bourne & Juniper Networks Cybersecurity Market Research - Seceon

Cybersecurity has become a key issue impacting strategic decisions at the highest level within organizations. The increasing sophistication of todayu2019s threat landscape and growing number of high-profile breaches have impacted businesses of all sizes struggling to protect their most important assets u2013 data, reputation and people. Call Us: 1 (978)-923-0040

Download Presentation

Five Takeaways from Vanson Bourne & Juniper Networks Cybersecurity Market Research - Seceon

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. FiveTakeawaysfromVanson Bourne&Juniper Networks CybersecurityMarketResearch byPushpendraMishra| PostedbySunilK.Kotagiri Cybersecurityhasbecomeakeyissueimpactingstrategic decisionsatthehighestlevelwithin organizations.Theincreasingsophisticationoftoday’sthreatlandscapeandgrowing number ofhigh-prolebreacheshave impactedbusinessesofallsizesstrugglingtoprotecttheirmost importantassets–data, reputationandpeople. JuniperNetworksinassociationwithVansonBournerecentlyconducteda comprehensive studytoidentify,assessandinvestigatethetopcybersecuritythreatsthatenterprisesare experiencing.Theylookedathowthesethreatsandpainpointsarechangingorpredictedto changeinimmediatefuture,andhowAIandmachinelearningarehelpingenterprisesprotect themselvesfromconstantlychangingadversaries. Pleaseclickheretoviewthecompletereport. Asthisresearchpapercorrectlystated,cybersecurityistumulus. Infact,theonlyelementof thislandscapethatisstable,isthatitisunstable,unpredictableandeverchanging.Dening anddescribingthis new formofcrimeisrelativelyeasy,butpreventing itisacompletely differentgame. Iwould like to highlight a few very criticalndings of this research that are worth further discussionandconsideration: Only31% ofrespondentsbelievethatthecybersecuritysolutionsusedwithintheir organizationhavedoneexactlywhatthey promisedtodowhenthey werepurchased. Approaching nine-in-ten(86%)believethatiftheirorganizationweretouse andend-to-end solution theywouldbemuchmoresecure. Thesetwondingsarespoton.Seceon’sexperienceworkingwithhundredsofenterprisesbig andsmall,acrossmultipleverticals,demonstratesthatthebiggestchallengesecurityteams facetodayishavingtodealwiththesheervolumeofalertsfrommultiplesiloedsolutions securitysolutionsthataredeployedtoaddresssingularneeds.SILOsolutionslackglobal 

  2. FiveTakeaways fromVanson Bourne&JuniperNetworksCybersecurityMarketResearch-Seceon context,whichcausesahighvolumeofalertswithoutappropriatepriorityassigned.Asan example,aFirewallorIDSmayreportdownload ofalewithmalicioussignature,butitmay notknowiftheexecutionofthatmalware hasbeenpreventedbyEndPointProtection software. Whereas,anintelligentend-to-endsystemwillhave necessaryglobalcontext requiredtocorrelatethesetwopiecesofinformation,henceeliminatingthe needtoraisean alert,andresultinginreducedfalsepositivesandimprovedeffectivenessofsecurityteams. Spendingonuserbehavioranalyticsisforecasttoincreasesubstantially(30%growth). On average,$469,449wasspentoverthepastthreeyears,whereaspredictedspendingissetto reach$647,309overthenextthreeyears. Approachingnine-in-ten(87%)agreethatcybersecuritytoolswithAI/machine learning capabilitieswouldbeofgreatbenettotheirorganizations. Atpresent,therearemorethan800millionknownmalwaresignatures.Outofthose,more than100Msignatureswere discoveredandaddedinthelastyearalone.Thatis350Knew malwareandPotentially UnwantedApplications(PUA)discoveredeveryday;anabsolutely staggering number.Whatthismeansis,itisimpossibleforyourIDS,IPSandEndPoint Protectionagentsthatrelyonthesesignaturestokeepupwithnewmalware.Machine learningandbehavioralanalytics-driventhreatdetectionareextremely critical tobeableto combatagainstthesezero-secondthreats. Similarly,approximately 40%ofthreatsare duetomaliciousinsiders.Howdoyouidentify thesemaliciousinsiders,especiallythosewhoknowtherulesandthresholdsthattrigger alertsinthetraditionalSIEMsystems?Whencorrectlyimplementedwithstrongfeature engineering,machinelearningandarticialintelligence-drivencorrelationsthatadaptto changinghumanbehaviorcandetectandalertsecurityteamsaboutmaliciousinsiderswith verylowfalsepositive rate. Over eight-in-ten (82%) respondents believe that their organization would be ‘extremely willing” or “somewhat interested” in relinquishing control of cybersecurity to AI/machine learningtechnologies. This nding is somewhat surprising, but extremely gratifying. At last, the industry is starting torecognizethatitisimpossibleforsecurityanalyststohandlenearly10,000alertsperday. (Thatisthenumbera typicalFortune500Enterprise’security teamhastohandleeveryday.) Also,industrystatisticsdemonstratethatsecurity teamsareequippedtohandleonly1%of those10,000alerts;thisisbecause,onaverage, one hastoanalyze 672loginstancesper incidentandanalyzingeach loginstancetakesabout1.5minutes.Intotal,ittakes16.8person- hours to analyze eachincident. Considering these 2 factors, it is clear that humans alone cannothandlethe sheervolumeofalertsgenerated bysolutionstoday.Theyhave tobe augmented bymachinelearningand AI-drivencybersecuritysolutionstoautomatemundane humananalysis.Thisfreessecurityanalyststofocusonthemostimportanttasksthatonly humanscanperform. These are realchallengestodayanditissoimportanttoaddressthemimmediately asthe threatlandscapeisincreasingrapidly.Inthisnoisy spacewithnewentrants,oldvendors massagingtheirproductlinesandscoreofanalystsprovidingtheirviewsonhowcompanies mustbuildtheirsecurityposture,theendbuyernaturallygetsconfused.Inherenthuman natureisthatwheninconfusionordoubt,thedecision-makingslowsdown.But,notto forget,therearesignicantcostsduetothisdelay.Inmyopinion,itboilsdowntoasimple 

  3. FiveTakeaways fromVanson Bourne&JuniperNetworksCybersecurityMarketResearch-Seceon question from theendbuyer,“Arethereanyvendorstodaythatprovide comprehensiveend- to-endsecurity using theUserBehavioranalyticsandcutting-edge MachineLearning/AI technologiesorwestillneedtoinvestinsilosolutionstobuild asecurityposture?” Frominception,Seceonhasrecognized thatcybersecurityisn’tjustatechnologyproblem,buta humanproblem.Thereare notenoughpeoplewithsecurity skillsandattackexperience to properly identify, analyze and acton the high volume and dynamic nature of new-age threats. Ourinnovativemachinelearningand AI-drivenaiSIEMandaiMSSPsolutions,whichfeature intelligentcorrelationswithcontextualawarenesstoprioritizethealerts,havebeenrecognized fortheirinnovative approachandwonmorethan50industryawards.Seceonsolutionsnot only “detect the threats that matter,”but will stop them before they cause irreparable damage totheorganization. Here are somesalientfeaturesofouraiSIEMsolution: Visibility Ingests rawstreaming data(Identity,Web,Apps,Firewall,Proxy,Windows,DNSandDHCP) andFlows(NetFlow,SowandJow). Logically auto-discoversandcreatesassetgroups. ThreatDetection Machine learning and AI with actionable intelligence – eliminating the need to add rules. Behavioral analytics, predictive modeling and contextual real-time alerts with automated analysisandcorrelation. ThreatContainmentandElimination Out-of-the-boxautomated threatcontainmentandeliminationinreal-time. Providesclearactionablestepstoeliminatethreatswhichcanbefully automated. Compliance,Indexing and Reporting Regulatorycomliance(HIPAA,PCI,NIST,GDPR)assurance andcustomizableoperational reports. Logindexing,long-termstorageanddataanalyticsforforensicanalysis. Operations Management Microservicearchitecturefacilitatesrapidreploymentacrosscloud,on-premiseorhybrid. Simpliedlicensingbasedonthenumberofassets(versusthatamountofdataingested) 

  4. TolearnhowSeceonaiSIEM™andaiMSSP™solutionscanhelpyoutoprotectyour organization from sophisticatedtargetedandstrategic attacks,please visitwww.seceon.comor requestademo. Sunilisalifelong technologist,architect,and hands-onexecutiveandhandledeveryroleinthe softwareengineeringlifecycle inTechnologyCompanyatsomepoint.AsaCo-Founder,Sunil overseesthearchitecture,development,anddeliveryofSeceon’smostadvanced comprehensivecybersecurityplatform based oncuttingedge Big/FastData Architecturesand MachineLearning(ML)and ArticialIntelligence(AI).Sunilbringstechnicalleadershipwith overtwodecadesofexperience in softwaredevelopmentandmethodologies,architectingand deliveringcomplex Cybersecurity,BigData Analytics(Timeseries&Real-time),Business Intelligence,highly-scalabledistributedWeb,MobileandMissionCritical AppsforEnterprise, Mobile,Telecom,andCablemarkets.HeistheauthorofmultiplepatentsfortheCybersecurity, Service DenitionandOrchestrationplatformsandholdsaBSinElectronicsand CommunicationsandMSinComputerSciencefromtheIndianInstituteofTechnology(IIT), Madras. SunilpresentlylivesinBostonandenjoysreading, running andspendingtimewithfamily. Address - 238 Littleton Road Suite #206 Westford, MA 01886 Phone no - +1 (978)-923-0040 Email Id - sales@seceon.com Website- https://www.seceon.com/

More Related