White Paper

The State of Threat Detection and Response

<h2>Intelligence-Driven Threat Detection is Critical to Risk Mitigation and Management</h2> <p>Many organizations have invested in improving their threat detection capabilities over the past two years and express increased confidence in their ability to stop threats that have penetrated the network perimeter. However, these organizations also cite a number of weaknesses and areas for further improvement, including limited log visibility, limited threat visibility, and an over-reliance on manual processes.</p> <p>In 2020, Dark Reading surveyed IT and cybersecurity professionals to understand the technologies and processes they are using to detect threats, identify exposure to specific exploits, and search for incursions in historic log data. The resulting findings were used as the basis for this report.</p> <div class="media mb-2"> <div class="align-self-center mr-3"><span class="display-2">48</span><span class="display-4">%</span></div> <div class="media-body align-self-center"> <h4 class="m-0">have either significantly or somewhat improved their threat detection capabilities</h4> </div> </div> <div class="media mb-2"> <div class="align-self-center mr-3"><span class="display-2">60</span><span class="display-4">%</span></div> <div class="media-body align-self-center"> <h4 class="m-0">are able to detect most new threats in one day or less</h4> </div> </div> <div class="media mb-4"> <div class="align-self-center mr-3"><span class="display-2">36</span><span class="display-4">%</span></div> <div class="media-body align-self-center"> <h4 class="m-0">state that not having an automated process is the biggest limitation to detect threats on their networks</h4> </div> </div> <p><strong>Download the paper to learn about the tools organizations use to assess their threat detection capabilities as well as identify the limitations and challenges that might be hampering their success rate.</strong></p>

Download Now