Uploaded on Dec 9, 2022
Cybersecurity has become a key issue impacting strategic decisions at the highest level within organizations. The increasing sophistication of today’s threat landscape and growing number of high-profile breaches have impacted businesses of all sizes struggling to protect their most important assets – data, reputation and people. Call Us: +1 (978)-923-0040
Five Takeaways from Vanson Bourne & Juniper Networks Cybersecurity Market Research - Seceon
Five Takeaways from
Vanson Bourne & Juniper
Networks Cybersecurity
Market Research
by Pushpendra Mishra |
Posted by Sunil K. Kotagiri
Cybersecurity has become a key issue impacting strategic decisions at the highest
level within organizations. The increasing sophistication of today’s threat landscape
and growing number of high-pro le breaches have impacted businesses of all sizes
struggling to protect their most important assets – data, reputation and people.
Juniper Networks in association with Vanson Bourne recently conducted a
comprehensive study to identify, assess and investigate the top cybersecurity
threats that enterprises are experiencing. They looked at how these threats and
pain points are changing or predicted to change in immediate future, and how AI
and machine learning are helping enterprises protect themselves from constantly
changing adversaries.
Please click here to view the complete report.
As this research paper correctly stated, cybersecurity is tumulus. In fact, the only
element of this landscape that is stable, is that it is unstable, unpredictable and
ever changing. De ning and describing this new form of crime is relatively easy,
but preventing it is a completely different game.
I would like to highlight a few very critical ndings of this research that are
worth further discussion and consideration:
Only 31% of respondents believe that the cybersecurity solutions used within their
organization have done exactly what they promised to do when they were purchased.
Approaching nine-in-ten (86%) believe that if their organization were to use and end-to-end
solution they would be much more secure.
These two ndings are spot on. Seceon’s experience working with hundreds of
enterprises big and small, across multiple verticals, demonstrates that the biggest
challenge security teams face today is having to deal with the sheer volume of
alerts from multiple siloed solutions security solutions that are deployed to address
singular needs. SILO solutions lack global
Five Takeaways from Vanson Bourne & Juniper Networks Cybersecurity Market Research
- Seceon
context, which causes a high volume of alerts without appropriate priority
assigned. As an example, a Firewall or IDS may report download of a le with
malicious signature, but it may not know if the execution of that malware has
been prevented by End Point Protection software. Whereas, an intelligent end-to-
end system wil l have necessary global context required to correlate these two
pieces of information, hence eliminating the need to raise an alert, and resulting in
reduced false positives and improved effectiveness of security teams.
Spending on user behavior analytics is forecast to increase substantially (30% growth). On
average, $469,449 was spent over the past three years, whereas predicted spending is set to
reach $647,309 over the next three years.
Approaching nine-in-ten (87%) agree that cybersecurity tools with AI/machine learning
capabilities would be of great bene t to their organizations.
At present, there are more than 800 million known malware signatures. Out of
those, more than 100M signatures were discovered and added in the last year
alone. That is 350K new malware and Potentially Unwanted Applications (PUA)
discovered every day; an absolutely staggering number. What this means is, it is
impossible for your IDS, IPS and End Point Protection agents that rely on these
signatures to keep up with new malware. Machine learning and behavioral
analytics-driven threat detection are extremely critical to be able to combat
against these zero-second threats.
Similarly, approximately 40% of threats are due to malicious insiders. How do
you identify these malicious insiders, especially those who know the rules and
thresholds that trigger alerts in the traditional SIEM systems? When correctly
implemented with strong feature engineering, machine learning and arti cial
intelligence-driven correlations that adapt to changing human behavior can
detect and alert security teams about malicious insiders with very low false
positive rate.
Over eight-in-ten (82%) respondents believe that their organization would be ‘extremely
willing” or “somewhat interested” in relinquishing control of cybersecurity to AI/machine
learning technologies.
This nding is somewhat surprising, but extremely gratifying. At last, the industry
is starting to recognize that it is impossible for security analysts to handle nearly
10,000 alerts per day. (That is the number a typical Fortune 500 Enterprise’ security
team has to handle every day.) Also, industry statistics demonstrate that security
teams are equipped to handle only 1% of those 10,000 alerts; this is because, on
average, one has to analyze 672 log instances per incident and analyzing each log
instance takes about 1.5 minutes. In total, it takes 16.8 person- hours to analyze
each incident. Considering these 2 factors, it is clear that humans alone cannot
handle the sheer volume of alerts generated by solutions today. They have to be
augmented by machine learning and AI-driven cybersecurity solutions to automate
mundane human analysis. This frees security analysts to focus on the most
important tasks that only humans can perform.
These are real challenges today and it is so important to address them immediately
as the threat landscape is increasing rapidly. In this noisy space with new entrants,
old vendors massaging their product lines and score of analysts providing their
views on how companies must build their security posture, the end buyer naturally
gets confused. Inherent human nature is that when in confusion or doubt, the
decision-making slows down. But, not to
forget, there are signicant costs due to this delay. In my opinion, it boils down to a
simple
Five Takeaways from Vanson Bourne & Juniper Networks Cybersecurity Market Research
- Seceon
question from the end buyer, “Are there any vendors today that provide comprehensive
end- to-end security using the User Behavior analytics and cutting-edge Machine Learning/AI
technologies or we still need to invest in silo solutions to build a security posture?”
From inception, Seceon has recognized that cybersecurity isn’t just a technology
problem, but a human problem. There are not enough people with security skills
and attack experience to properly identify, analyze and act on the high volume and
dynamic nature of new-age threats. Our innovative machine learning and AI-driven
aiSIEM and aiMSSP solutions, which feature intelligent correlations with contextual
awareness to prioritize the alerts, have been recognized for their innovative
approach and won more than 50 industry awards. Seceon solutions not only
“detect the threats that matter,” but will stop them before they cause irreparable
damage to the organization.
Here are some salient features of our aiSIEM solution:
Visibility
Ingests raw streaming data (Identity, Web, Apps, Firewall, Proxy, Windows, DNS
and DHCP) and Flows (NetFlow, S ow and J ow).
Logically auto-discovers and creates asset groups.
Threat Detection
Machine learning and AI with actionable intelligence – eliminating the need to
add rules. Behavioral analytics, predictive modeling and contextual real-time
alerts with automated analysis and correlation.
Threat Containment and Elimination
Out-of-the-box automated threat containment and elimination in real-
time. Provides clear actionable steps to eliminate threats which can be
fully automated.
Compliance, Indexing and Reporting
Regulatory comliance (HIPAA, PCI, NIST, GDPR) assurance and customizable
operational reports.
Log indexing, long-term storage and data analytics for forensic analysis.
Operations Management
Microservice architecture facilitates rapid reployment across cloud, on-premise or
hybrid. Simplied licensing based on the number of assets (versus that amount of
data ingested)
To learn how Seceon aiSIEM™ and aiMSSP™ solutions can help you to protect your
organization from sophisticated targeted and strategic attacks, please visit
www.seceon.com or request a demo.
Sunil is a lifelong technologist, architect, and hands-on executive and handled every
role in the software engineering lifecycle in Technology Company at some point. As
a Co-Founder, Sunil oversees the architecture, development, and delivery of
Seceon’s most advanced comprehensive cybersecurity platform based on cutting
edge Big/Fast Data Architectures and Machine Learning (ML) and Arti cial
Intelligence (AI). Sunil brings technical leadership with over two decades of
experience in software development and methodologies, architecting and delivering
complex Cybersecurity, Big Data Analytics (Time series & Real-time), Business
Intelligence, highly-scalable distributed Web, Mobile and Mission Critical Apps for
Enterprise, Mobile, Telecom, and Cable markets. He is the author of multiple patents
for the Cybersecurity, Service De nition and Orchestration platforms and holds a BS
in Electronics and Communications and MS in Computer Science from the Indian
Institute of Technology (IIT), Madras.
Sunil presently lives in Boston and enjoys reading, running and spending time with
family.
Address - 238 Littleton Road Suite #206 Westford,
MA 01886
Phone no - +1 (978)-923-0040
Email Id - [email protected]
Website - https://www.seceon.com/
Comments