ESG Research reveals best practices. Security Intelligence driving big data security analytics According to ESG Research, 65% use external threat intelligence (i.e. open source or commercial threat information) as part of their overall security analytics activities. This is yet another factor driving the intersection of big data and security analytics. Of those enterprises that consume commercial threat intelligence, 29% say that it is “highly effective” in helping their organization address risk while another 66% say that commercial intelligence is “somewhat effective” in helping their organization address risk. So how do some of the organizations use commercial threat intelligence so that it “highly effective” in helping them reduce IT risk? ESG did some further data analysis to find out. It turns out that these enterprises:1. Security intelligence is used to support other security objectives. Rather than use security intelligence as a secondary data sources, “highly effective” organizations tended to have specific use cases and metrics for security intelligence. For example, many included security intelligence into formal risk management programs in order to fine-tune security controls, launch impromptu vulnerability scans, or lock-down systems.2. Security intelligence feeds are integrated into SIEM and GRC tools. “Highly effective” push data feeds directly into their security management and analytics technologies in order to correlate external threat intelligence with internal status and activities. Interestingly, these firms are also replacing security point tools with centralized enterprise-class security management systems. Clearly these “highly effective” organizations are also on the leading edge of big data security analytics.3. Highly effective organizations share security intelligence across the organizations. These enterprises seem to get their money’s worth as they make sure that security, risk, compliance, privacy, IT, and executive managers have access to customized views of security intelligence that can help them with their individual tasks and responsibilities.4. Highly effective organizations supplement security intelligence with external expertise. Risk management and incident detection/response are difficult activities requiring resources and expertise. Given the current security skills shortage, “highly effective” enterprises are most likely to turn to professional and/or managed service providers for help in these areas.Leading security vendors like IBM, McAfee, RSA, Sourcefire, and Symantec provide out-of-box security intelligence into their latest security management technologies. There are numerous industry Information Sharing and Analysis Centers (ISACs) for exchanging security data. The U.S. Federal government wants to increase public/private partnerships for security data sharing. All of these efforts are intended to make new sources of security data “highly effective” resources for risk management and incident detection/response. Following the 4 steps described above could really help industry consortiums and individual organizations achieve these goals. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe