Subscribe

RSA research reveals blind spots in threat detection


Johannesburg, 28 Apr 2016

RSA, The Security Division of EMC, has released the results of a new Threat Detection Effectiveness Survey that compiled insights from more than 160 respondents globally. The survey was designed to allow participants to self-assess how effective their organisations are at detecting and investigating cyber threats.

The research provides valuable global insight into the technologies organisations use, the data they gather to support this effort, and their satisfaction with their current tool sets. Additionally, respondents were asked which new technologies they plan to invest in and how they plan to evolve their strategies going forward.

A key insight from the survey was that respondents expressed deep dissatisfaction with their current threat detection and investigation capabilities. Only 24% of organisations surveyed indicated they were satisfied with their ability to detect and investigate threats. Only 8% of those organisations feel they can detect threats very quickly, with only 11% that can investigate threats very quickly. Speed in threat detection and investigation is a critical factor in reducing attacker dwell time and subsequently minimising damage and loss from cyber attacks.

There is a staggering imbalance between organisations that collect perimeter data (88%), and data from modern IT infrastructures (cloud-based infrastructure 27%, network packet 49%, identity management 55%, and endpoint 59%). Yet, companies that have incorporated these data sources into their detection strategies find them extremely valuable: those collecting network packet data ascribed 66% more value to that data for detecting and investigating threats than those that didn't, and those collecting endpoint data ascribed 57% more value to that data than those that didn't.

Data integration is also an issue. A quarter of respondents aren't integrating any data, and only 21% make all their data accessible from a single source. The prevalence of siloed data prevents correlation across data sources, slows investigations, and limits visibility into the full scope of an attack. Only 10% of respondents rated their ability to connect attacker activity across the data sources they collect as "very well".

Respondents didn't consider any of their current detection and investigation technologies particularly effective, giving them an average rating of "somewhat effective". While SIEM is deployed by more than two-thirds of respondents, more effective tools, such as network packet capture, endpoint forensics, and user behavioural analytics, lack the necessary adoption.

Finally, an encouraging finding was the increasing importance of identity data to aid detection and investigation. While only slightly more than half of organisations collect data from identity and access systems currently, those that do attributed 77% more value to that data for detection than those that do not. Further, user behavioural analytics, which can help organisations simplify detection based on spotting patterns of anomalous activity, is the most popular planned technology investment, with 33% of respondents planning to adopt this technology within the next 12 months.

"What the survey especially highlights for us operating in the southern African region is that legacy security technologies and strategies that are prevalent in many of our region's businesses need to radically and quickly be modernised in order to prevent the sophisticated cyber attacks that have become today's reality," adds Anton Jacobsz, managing director at Networks Unlimited, the company that distributes RSA solutions throughout southern Africa.

Share

Networks Unlimited

Networks Unlimited is a value-added distributor, offering the best and latest solutions within the converged technology, data centre, networking, and security landscapes. The company distributes best-of-breed products, including Arbor Networks, Aruba Networks, Fortinet, F5, Mellanox, ProLabs, Riverbed, RSA, SimpliVity and Tintri. The product portfolio provides solutions from the edge to the data centre, and addresses key areas such as cloud networking and integration, WAN optimisation, application performance management, application delivery networking, WiFi, mobile and networking security, load balancing, data-centre-in-a-box, and storage for virtual machines.

Since its formation in 1994, Networks Unlimited has continually adapted to today's progressively competitive and evolving marketplace, and has reaped the benefits by being a leading value-added distributor (VAD) within the sub-Saharan Africa market.

Editorial contacts

Lynne McCarthy
Networks Unlimited
(+27) 011 202 8400
lynne@nu.co.za