Business News | Independent Study: IT Security Officers Rely on External Support for Most Aspects of Threat Intelligence

New Delhi [India]March 23 (ANI/Bloomingdale): According to a survey commissioned by Forrester Consulting on behalf of Kaspersky, IT security managers seeking to strengthen internal threat intelligence (IT) programs would prefer to delegate five out of eight key IT aspects to external suppliers rather than developing them in-house.

For most respondents, faster threat detection, resolution and response are the primary benefits of using external solutions.

Read also | Miley Cyrus talks about her plane being struck by lightning, the singer assures fans she’s safe (see post).

Threat Intelligence has become a must for incident prevention and an important area in which organizations must invest. At the same time, this new specialty remains a challenge for IT security teams because it requires constant monitoring, analysis and interpretation of large amounts of fragmented information. data in addition to regular reassessment and adjustment of appropriate skills, sources and tools.

The new study, assessing threat intelligence practices among companies with mature cybersecurity functions, found that although 83% of decision makers recognize the crucial role of threat intelligence in building a resilient cybersecurity program and plan to invest in the field, IT remains a specialty challenge for all businesses.

Read also | Pune Shocker: 32-year-old man kills his wife, wraps her body in sari to get rid of her; Stopped.

Nearly two-thirds of IT security leaders (64%) said their organization struggled to align its threat intelligence program with its risk management program, and 62% struggled to implement measurement procedures to track the effectiveness of threat intelligence. Other major concerns include improving knowledge of the threat landscape, prioritizing information requirements from multiple stakeholders, and identifying data gaps.

To address these challenges and improve their threat intelligence program, IT security decision makers plan to implement a series of measures internally and leverage vendor offerings. Respondents believe it is more efficient to rely on external vendors for the majority of IT needs. Six in ten (61%) would implement support for processing raw intelligence information, 60% for human intelligence gathering and 59% for integrating data feeds with other security tools. However, companies still prioritize developing internal capabilities to choose and aggregate data sources.

The top two benefits of using vendor support are faster detection, remediation and response to threats (56%) and improved efficiency through automated reporting processes (52%). About half of respondents also said that external solutions can reduce the number of breaches and associated costs.

“The Threat Intelligence program strengthens a company’s defense, contributing to visibility into the threat landscape by providing relevant and actionable information. Facilitating the processing and analysis of threat intelligence, it enables companies to make timely and fully informed decisions available in the market is another challenge faced by IT security teams,” comments Artem Karasev, Product Marketing Lead, Corporate Product Marketing at Kaspersky. “Our experience in threat research suggests that, while there are virtually no criteria that are perfectly applicable to all organizations, the guiding principle for choosing external sources of threat intelligence should be quality rather than quantity.”

Kaspersky recommends paying particular attention to the following points when evaluating external threat intelligence solutions:

* Sources of information used by the vendor: Vendors that aggregate information from around the world can provide greater visibility into real threats and effectively correlate fragmented business.

* Ability to provide context: Contextual data helps reveal the “big picture,” further validating and supporting extended uses of the data. Relational context, such as domains associated with detected IP addresses or URLs the file was downloaded from, etc., drives incident investigation and supports better “scope” of incidents by uncovering indicators of newly acquired compromise on the network.

* Compatibility with existing solutions: A review of vendor delivery methods and integration systems ensures seamless integration of threat intelligence into existing security operations.

* Vendor Experience: A proven track record in threat investigation ensures the effectiveness of the solutions offered.

Saying that the study’s findings were not at all surprising, Dipesh Kaura, Managing Director of Kaspersky South Asia, added: “Given the nature of the job, IT is a highly dynamic and highly specialized field in which a better access to information about what is happening in the world, your security systems can be stronger. For this, it is better to rely on experts. At Kaspersky, we have a global research team dedicated to the detection and analysis of cybersecurity trends in real time. We have a platform to share their findings with our enterprise customers and the ability to customize our offerings in response to these threats.”

The full study Mature Threat Intelligence to Build Resilient Cybersecurity Programs is available via the link.

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. Kaspersky’s deep expertise in threat intelligence and security is constantly transformed into innovative security solutions and services to protect businesses, critical infrastructure, governments and consumers around the world.

The company’s comprehensive security portfolio includes industry-leading endpoint protection and a number of specialized security solutions and services to combat sophisticated and evolving digital threats. More than 400 million users are protected by Kaspersky technologies and we help 240,000 enterprise customers protect what matters most to them. Learn more at www.kaspersky.com.

This story is provided by Bloomingdale’s. ANI shall in no way be responsible for the content of this article. (ANI/Bloomingdale)

(This is an unedited and auto-generated story from syndicated newsfeed, LatestLY staff may not have edited or edited the body of the content)

Shirlene J. Manley