ESG Research reveals best practices. Information security intelligence another driver for big data security analytics.
Published: December 14, 2012
According to ESG Research, 65% of organizations use external threat intelligence (i.e,. open source or commercial threat information) as part of their overall security analytics activities. This is yet another factor driving the intersection of big data and security analytics.
Of those enterprises that consume commercial threat intelligence, 29% say that it is “highly effective” in helping their organization address risk while another 66% say that commercial intelligence is “somewhat effective” in helping their organization address risk.
So how do some of the organizations use commercial threat intelligence so that it is “highly effective” in helping them reduce IT risk? ESG did some further data analysis to find out. It turns out that in these enterprises:
Leading security vendors like IBM, McAfee, RSA, Sourcefire, and Symantec provided out-of-the-box security intelligence in their latest security management technologies. There are numerous industry Information Sharing and Analysis Centers (ISACs) for exchanging security data. The U.S. Federal government wants to increase public/private partnerships for security data sharing. All of these efforts are intended to make new sources of security data “highly effective” resources for risk management and incident detection/response. Following the 4 steps described above could really help industry consortiums and individual organizations achieve these goals.
Read our complete ESG Research Brief, Security Intelligence a Key Component of Big Data Security Analytics, for more findings from ESG’s research about security intelligence.
*All views and opinions expressed in ESG blog posts are intended to be those of the post's author and do not necessarily reflect the views of Enterprise Strategy Group, Inc., or its clients. ESG bloggers do not and will not engage in any form of paid-for blogging. Click to see our complete Disclosure Policy.