Close icon
ESG Logo

Trends in Modern Security Operations

What Makes SOC Modernization Mission Critical

Hero shield composition
Content

Research Objectives and Methodology

Objectives

This eBook discusses trends happening within enterprise security operations centers. When you read this eBook, you will see data showing:

  • The challenges driving change in security operations.
  • How your peers are changing up prioritizing and addressing growing attack surface and threat landscape complexity.
  • How improving detection engineering and the shortcomings of current approaches are top of mind for security strategists.
  • Forward-looking data on the pay off security professionals expect from transforming their SOC and if their organization will fund changes required.

Methodology

In the first quarter of 2022, ESG conducted a double-blind survey of 250 security decision makers in North America responsible for threat detection at their organization and who spend 50% or more of their daily time focused on security operations. All organizations represented in the research were enterprises employing 2,500+ individuals, and the sample was composed of a horizontal mix of industry verticals.

Highlighted Findings

document check icon
93%
of all surveyed security decision makers feel their organization needs to re-evaluate its SecOps priorities.
running icon
96%
of all security professionals surveyed indicated that they have made tradeoffs between efficacy and efficiency in order to keep up with security alerts.
alert icon
60%
of security professionals surveyed say alert triage is challenging or overwhelming.
settings icon
89%
of all surveyed security decision makers feel their organization needs a transformational or moderate amount of change in its SOC to mitigate business threats.
radar icon
77%
of security professionals surveyed desire new ways to engineer detection rules.
calendar icon
86%
of security professionals surveyed say the new detection lifecycle (i.e., identifying the need, creating the detection, testing, and deploying the detection) takes a week or more.

SOC Teams Are Reaching a Breaking Point: New Strategies Are Needed

As attackers exploit the massive amount of IT infrastructure change to leverage weak links and introduce new threats, security and IT teams are facing an uphill battle to transform their security operations infrastructure while fending off attacks.
89% graphic
of surveyed security decision makers feel their organization needs a transformational or moderate amount of change in its SOC to mitigate business threats (over the next 12- 24 months).

Organizations are struggling to keep up —change in the present mode of operation is needed

Organizations are taking a hard look at current security operations strategies, processes, and technologies in support of modern, cloud-driven, hybrid work usage models. As IT teams accelerate the move to modern cloud application development and deployment models, IT infrastructure and the threats targeting it are becoming more complex, leading security teams to rearchitect core security operating infrastructure.

This rearchitected security stack must be capable of scaling and analyzing signals from multiple cloud environments, while supporting a growing, diverse endpoint world comprises corporate-owned devices, personal devices used for work, third-party supply chain and partner devices, and the many connected IoT devices supporting infrastructure operations.

alert icon
77%
of security professionals surveyed report increased alert volumes.
running icon
96%
of security professionals surveyed are making tradeoffs between efficacy and efficiency to keep up.
Over half of security professionals surveyed report that alert triage is challenging or overwhelming.

Alert volumes continue to increase, resulting in a growing number of alerts that go uninvestigated

Meanwhile, as security controls grow in number and scope, security teams are facing a growing number of alerts, resulting in over half of surveyed security professionals reporting that alert triage is challenging or overwhelming. There are two logical drivers to this in the research:

  • Improperly configured threat detection solutions create a lot of noise.
  • The threat landscape continues to evolve, frequently outpacing SecOps countermeasures.

As a result, 96% of of security professionals surveyed indicated having made tradeoffs between efficacy and efficiency in order to keep up with security alerts.

Organizations Are Prioritizing SOC Modernization

93% graphic
of surveyed security decision makers feel their organization needs to re-evaluate its SecOps priorities.
Visibility into cloud workloads is a gap for many, which should drive investments in cloud detection and response solutions.

Most will reevaluate SecOps priorities to keep up

Given the level of change underway, organizations are reprioritizing investments in existing tools and processes, redirecting budgets and projects to implement converged, scalable platforms that can support this new IT operating environment.

Visibility into cloud workloads is a gap for many, which should drive investments in cloud detection and response solutions capable of sifting through a diverse, distributed set of signals to isolate threats.

Rapid attack surface growth is causing others to prioritize asset discovery and risk management, supporting security posture assessment and management activities, leading to prioritization of high-risk assets and infrastructure.

57% graphic
of security professionals surveyed worry that using existing SecOps solutions in unintended ways will cause additional problems

Where will security operations get more difficult over the next 12 to 24 months?

Using existing solutions in ways they were not intended will create more and more severe issues
57% bar graphic
Maintaining security over an increasing number of workloads in the public cloud
44% bar graphic
A continuing dependence on manual processes, leading to scalability problems
41% bar graphic
Keeping up with the detection of more advanced threats
40% bar graphic
A continuing dependence on manual processes, leading to scalability problems
37% bar graphic

What will be more difficult in the coming months?

As security teams rearchitect operational infrastructure, daily SecOps activities must continue to mitigate risk. This means security teams must leverage existing, less-thanoptimal solutions for daily operations while this infrastructure is upgraded in parallel.

Meanwhile, attack surface growth continues, especially with more cloud workload and infrastructure adoption, leaving many to supplement existing tools with manual processes to close gaps. And while change is underway in most organizations, many must continue to utilize current solutions for 12 to 24 months until modernization activities are implemented.

60% graphic
of all security professionals surveyed believe their C-suite and LOB executives do not fully recognize, or dramatically underestimate, the importance of SOCs to mitigate business risk or drive future business success

To what extent do line of business executives recognize the business value of the SOC?

Doughnut chart
To an extent but not fully
Fully
Line-of-business executives dramatically underestimate the SOC’s importance

C-suite alignment to the importance of SOC effectiveness is cause for concern

While security is a top priority for most organizations, almost two-thirds report that their executive leadership teams lack an understanding of the role of their security operations team in mitigating business risk or enabling future growth.

As organizations develop new strategies to modernize security operations, those who engage the C-suite early in the process stand a better chance of gaining visiblity and support for this critical business function. As CISOs engage further in business-level growth and operational planning, they have an opportunity to unleash friction and constraints that would otherwise limit opportunities.

Yet for many, this is more of a journey, requiring engagement with individual line-of-business leaders to bring risk mitigation and the security agenda into operational business strategies. As security leaders leverage hard metrics to demonstrate the value of security strategies, business leaders can begin to digest the strategic value of ongoing security infrastructure investment.

The Impact and Desire for Improved Threat Detection

With more advanced threats involving many different types of infrastructure, growing threat detection complexity is challenging many.
Where surveyed security professionals see the biggest gaps in their SOC capabilities.
scan icon
43%
Detection
zoom icon
42%
Investigation and triage
tools icon
40%
Response
vision icon
38%
Visibility
bullseye icon
32%
Hunting

Biggest SecOps Gaps

As a core security function, security operations depends on effective mechanisms to detect potential threats from all facets of their IT operating infrastructure.

With more advanced threats involving many different types of infrastructure, including network, endpoint, cloud workloads, SaaS applications, supply chain, and more, growing threat detection complexity is challenging many, driving new investments in mechanisms that are more capable of assimilating and analyzing security signals from this diverse set of operating infrastructure.

The rapid growth of extended detection and response (XDR) mechanisms is an outgrowth of this challenge, but these XDR mechanisms are highly dependent on a new level of threat detection rules to support them.

Security leaders put a premium on time spent on detection engineering, when compared to other security operations activities, yet limited skills exist in this important area.
60% graphic
of security professionals surveyed feel the time spent on detection engineering is more valuable than nearly any other activity that time could be used on.

The relative criticality of detection engineering

With such an important focus on threat detection, security teams are prioritizing investments in rules development, refinement, and management. Security leaders put a premium on time spent on detection engineering, when compared to other security operations activities, yet limited skills exist in this important area, limiting many in making progress.

As organizations rearchitect core security operations infrastructure, special focus is needed to ensure that investments in detection rules can be applied across multiple detection mechanisms, optimizing detection engineering investments.

Security professionals at organizations that extensively use automation for security operations were 2x more likely to develop/implement threat detection rules < 7 days.

The detection engineering lifecycle: How long it takes organizations to create a detection, test a detection, and deploy it to production.

Detection engineering bar chart
Only 14% graphic
of security professionals surveyed indicated being able to accomplish developing and implementing new threat detection rules in less than one week.

Significant time is required to develop and implement new threat detection rules

With such a high value placed on detection engineers, current processes typically require multiple weeks to develop, test, and implement new detection rules. This arduous, time-consuming process creates further challenges for security teams to allocate sufficient resources to this critical task. Combine this with the accelerating pace of new threat introduction and a general lack of resources and skills needed, and, for many, keeping up can seem like an almost impossible task.

57% blue graphic
of security professionals surveyed indicated being able to accomplish developing and implementing new threat detection rules in less than one week.
77% graphic
of surveyed security decision makers desire new ways to engineer detection rules.
78% graphic
of surveyed security decision makers say lack of integration impedes automation and other SecOps improvement.

How much work is required to manage detection rules?

In fact, 57% of organizations found the amount of work required to design, code, implement, and manage their threat detection rules either overwhelming or challenging. With staffing levels and skill sets identified as not meeting standards, the challenges are compounded by increased alert volume, triage, and analysis.

New strategies are needed to overcome these challenges. While detection engineering challenges result in three-quarters wanting new ways to better create and manage detection rules, organizations see additional challenges impeding progress. Struggles with the integration of security controls, visibility gaps, and lack of correlation and analytics capabilities all further impede threat detection improvement.

A Look Ahead: ROI and Funding Expectations to Accomplish the Task

The expected impact on dwell time of doubling the resources dedicated to threat detection engineering.

Detection engineering bar chart
75% graphic
of all security professionals surveyed expect a moderate or drastic reduction in dwell time.

Organizations believe investment in detection engineering will pay of

The good news is that security teams believe that increased investment in detection engineering will pay off, with three-quarters expecting a moderate or drastic reduction in attack dwell time. Detecting threats sooner reduces the potential and scope of damage and thwarts many attacks that would otherwise be successful with longer dwell times. But despite this potential outcome of further investment in detection engineering, few seem to be able to allocate sufficient resources to achieve these outcomes due to challenges in staffing and the long cycle time for detection engineering.

98% graphic
of all surveyed security decision makers are confident that their organization will fund the transformations needed in their SOC.

Security professionals’ confidence that their organization will fund the transformations needed in their SOC.

Doughnut chart
Very Confident
Confident
Not very confident

Most are confident that funding will be available

Organizations are providing budgetary support to keep pace with the ever-developing threat landscape. What will differentiate those who make gains versus those simply throwing money at a problem is how effective they are making decisions that not only increase support levels, but also increase efficiency and intelligent insights.

6 Ways to Modernize Your Security Operations

Brain icon
Understand Your Threat Coverage
  • Continually measure & prioritize.
  • Quickly identify coverage and data gaps through continuous maturity scoring and navigation with AI-driven recommendations mapped to the MITRE ATT&CK framework.
Zoom icon
Improve Detection Efficiency & Efficacy
  • Automate detection engineering.
  • Squash your backlog and reduce time to build and deploy pattern-based detections with no-code, out-of-the-box behavioral threat detection content based on frameworks, like MITRE ATT&CK and kill chains.
Focus icon
Enhance Your Hunting
  • Hunt for known & unknown patterns.Continually measure & prioritize.
  • Augment your detections with AI-driven hunting to find suspicious behavioral attack patterns and quickly deploy related detections.
Stopwatch icon
Reduce Time to Triage & Respond
  • Simplify investigations.
  • Automate the manual efforts of alert tuning, allowlisting, and triage observations through visualizing alert attack patterns and timelines on standard frameworks.
Settings icon
Automate Alert Collection & Normalization
  • Correlate across disparate vendor & cloud alerts.
  • Automatically ingest, normalize, tag, enrich, and correlate alerts from EDR/XDR, email security, and other tools and cloud workloads before events are indexed. One-step integration for ticketing and case management in ServiceNow, Jira, etc.
Cloud intelligence icon
Modernize Your SOC Architecture
  • Become cloud-ready.
  • Decouple security operations and analytics from underlying logging. Correlate across traditional storage, cloud workloads, and vendor alerts at ease, and start to phase out legacy SIEMs and costly data indexing.

How Anvilogic Can Help

Anvilogic logo

It’s time for a modern approach: Democratize threat detection across your hybrid, multi-cloud, and other data lakes.

Anvilogic is an AI-driven SOC platform for threat detection and incident response that helps to unify and automate security operations across people, processes, and technology, enabling security teams to reduce time, manual effort, complexity, and expertise needed for building detections and managing your overall SOC—through AI-driven recommendations and frameworks that continuously assess, prioritize, detect, hunt, and triage to quickly mitigate risk.

Start to minimize data ownership costs and empower your security team to automatically detect and respond to the incidents that matter most across your unique attack surfaces. Anvilogic meets your data where it’s at and queries your data within and across your platforms, only correlating the alerts that matter, enabling your security team to focus on high-fidelity alerts and not on configuring tools.

Learn More

Demographics

The data in this report was derived from a survey fielded between February 16 and February 19, 2022.

These figures detail the demographics of respondents to the survey. Totals in figures and tables throughout this report may not add up to 100% due to rounding.

The margin of error for a sample size of 250 at the 95% confidence level is + or - 6 percentage points.

Respondents by Title

Pie chart by title

Respondents by Industry

Pie chart by industry

Respondents by Number of Employees

Bar chart by employees

About Anvilogic

Anvilogic is a Palo Alto-based AI cybersecurity startup founded by security veterans and data scientists from Fortune 500 companies. In 2019, we started building an AI-based SOC platform to lower the barrier to entry for detection engineering and threat hunting skill sets desperately needed in cybersecurity.

Book a demo