Title: Cyber Security Technologies
1CyberSecurity Technologies
How To Get More Security
2CyberSecurity Sprawl Struggle
3Introduction
According to Cisco's 2018 Annual Cybersecurity
Report, 41 of organizations are using
technologies and services from as many as 50
different vendors. Managing this many disparate
security tools and services creates a costly
headache for any enterprise SOC. Put succinctly -
most SOCs aren't getting a great return on the
resource investments they've made.
4Best-of-Breed vs. Integrated Security Technologies
Within the purchasing process, organizations
ultimately had to make a choice - go for
best-of-breed solutions or choose a single-source
integrated option. While choosing best-of-breed
vs. an integrated option is clearly a
company-by-company choice, it appears we've
reached a tipping point where most SOCs realize
they can't continue down the path of managing
disparate tools as they have been.
5The More You See,
The More You Miss
Chief among the outcomes of a vast ecosystem of
security tools is a massive amount of alerts
triggered by the various technologies in your
stack. Security operations teams have never had
more data points available to them to identify,
investigate and analyze threats. So many data
points, in fact, that enterprise SOC teams can't
possibly get to them all.
6Security Automation and Orchestration
Turns out, it is possible to get the benefits of
an integrated, platform approach using the tools
you already have. Security automation and
orchestration is purpose built to address the
technology sprawl that has occurred in
cybersecurity over the past several years.
7Security Orchestration Platform
A security orchestration platform can enrich
individual alerts with data from across the
environment, grouping related alerts into cases
to combat alert fatigue and give analysts the
context they need to zero in on truly malicious
activity. By providing a unifying fabric,
security orchestration enables security teams to
do more and get more from the best-of-breed
technology investments they've already made.
8CyberSecurity Operation Center
9Integrate and Orchestrate
Most cyber security orchestration platforms
enable SOC teams to integrate the dozens of tools
they already use and manage them from one
interface. By providing this unifying fabric and
single pane of glass, analysts are able to
eliminate screen switching and security
operations organizations no longer need experts
in every single technology.
10Automate Repetitive Tasks
11Increasing Security Analyst Capacity
Security automation is ideal for these activities
that require a high amount of manual work,
require fast response, happen regularly and
require a significant degree of user involvement.
Automating these items greatly improves security
operations efficiency, freeing up analyst time
for more valuable tasks, increasing analyst
capacity, and ensuring alerts no longer go
uninvestigated.
12Gain Context and Deeper Insight
13Conclusion
Security orchestration platforms integrate data
across your entire security operations footprint,
enriching alerts and showing the full scope of
entities, artifacts and relationships impacted by
a threat. Armed with context, security analysts
are equipped to conduct more thorough
investigations, better address related alerts in
a single case and develop insights that lead to
real management of threats.