Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > IBM > IDC Intelligence-Led Security
 

IDC Intelligence-Led Security

White Paper Published By: IBM
IBM
Published:  Jul 26, 2017
Type:  White Paper
Length:  9 pages

While there has been improvement in the amount of time an attacker spends in a network before detection decreasing from years to days in many cases the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.



Tags : 
data security, threat intelligence, security operations, advanced security analysts