News, news analysis, and commentary on the latest trends in cybersecurity technology.
Enterprises Planning SecOps Technology Deployments
With the easing of pandemic-related restrictions, enterprise defenders report they are investigating security operations technology to manage new risks that emerged over the past year.
Over the past year, many security leaders revamped their security strategies to keep up with rapid changes to the business environment caused by the pandemic. Data from the Dark Reading and Omdia "Enterprise Security in a Post Pandemic World" report shows most security leaders are concerned about remote access risks, vulnerabilities in newly rearchitected IT systems, and security exposures in cloud environments. As enterprises shift to a distributed business environment where some people will remain remote and others will return to the office, security leaders are looking at new technologies and services to improve the security measures in place and are willing to invest in various enterprise cybersecurity operations (SecOps) technologies.
According to the report, 37% of organizations are currently researching or actively evaluating products for cloud threat detection and response, and 25% have already deployed or are deploying the capability. Similarly, 36% are looking into attack surface management tools, and 26% have either already deployed or are currently deploying them. With cloud adoption soaring and the current shift to more distributed work and business environments, many security teams are considering future investment in SecOps technologies, such as behavioral analytics (34%), threat hunting (33%), extended detection and response (31%), and security orchestration and response (SOAR) platforms (27%).
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024