Cyber Security Improvement Insights—Security Intelligence and Analytics
An Analysis of the Solution Landscape and Best Practices in Asia-Pacific
03-Aug-2018
Asia Pacific
Market Research
Technology is increasingly advancing, so does threat landscape. Cyber attackers are attempting to breach companies' defenses every second, using increasingly sophisticated methods. Security teams are constantly challenged by the lack of skilled manpower and the right visibility of threats to their organizations’ assets.
Despite current security infrastructures offering many tools to counter cybercriminal activities, very little integration between them could be made possible, which translate to wastage of limited time and resources. This is coupled with the fact that organizations have enormous volumes of security data to review on a continuous basis, which make it impossible to achieve without the use of automation and the correlation of high volumes of intelligence through the use of analytics. By relying on the automation that security intelligence and analytics solutions offer, organizations are able to stand ahead of the ever-evolving cyber-attacks, and meanwhile rely lesser on human capital’s requirement.
The paper will introduce more details on the solutions that enable security intelligence and analytics platform, which include Threat Intelligence platform (TIP), Threat intelligence feeds (TIF), Security Information and events management (SIEM), User and Entity Behavior Analytics (UEBA) and Security Automation and Orchestration.
Security intelligence and analytics trends in Asia-Pacific, key considerations for security intelligence and analytics, analysis of active cyber security solution providers in the Asia-Pacific Security Intelligence and analytics market are also being discussed in this paper.
To conclude, the security intelligence and analytics industry is expected to evolve in the future years, as more enterprises realize how innovations such as machine learning, automation and orchestration can help them better detect and respond toward attacks.
Companies mentioned in this paper include Anomali, Bitscan, EclectricIQ, IN SEC Security, LookingGlass, ThreatConnect, Crowd Strike, FireEye, Kaspersky Lab, NSFOCUS, Saint Security, Sophos, Symantec, AlienVault, DarkTrace, Exabeam, IBM Security, Infoscience Corporation, INTEC Inc., LogRhythm, McAfee, Micro Focus, RSA, Splunk, ZOHO Japan Corporation, Demisto, Hexadite, Siemplify. The countries included in this study are Australia, New Zealand, Singapore, Malaysia, Indonesia, the Philippines, Thailand, Vietnam, China, Hong Kong, Taiwan, India, Japan, and South Korea.
Key Questions This Study Will Answer
· How security intelligence and analytics platform (SIAP) evolves?
· What are the solutions that enable a security intelligence and analytics platform?
· What are the security intelligence and analytics trends in Asia Pacific?
· What are the key considerations of security intelligence and analytics solution?
· Who are the industry players that provide solution in the security intelligence and analytics market?
- 1. Basic Setup of SIEM Receiving Logs from Perimeter Defense Tools, Asia-Pacific, 2017
- 2. Expansion of Correlation with Endpoint and Behavioral Detection Logs, Asia-Pacific, 2017
- 3. Creating a Predictive Model Through Threat Intelligence Feeds, Asia-Pacific, 2017
Purchase includes:
- Report download
- Growth Dialog™ with our experts
Growth Dialog™
A tailored session with you where we identify the:- Strategic Imperatives
- Growth Opportunities
- Best Practices
- Companies to Action
Impacting your company's future growth potential.
Deliverable Type | Market Research |
---|---|
No Index | No |
Podcast | No |
Table of Contents | | The Need of Better Visibility, Intelligence and Automation in Cybersecurity~ | Security Intelligence and Analytics Solution Ecosystem~ | Security Intelligence and Analytics Trends in Asia-Pacific~ | Key Considerations for Security Intelligence and Analytics~ | Analysis of Active Cyber Security Solution Providers in the Asia-Pacific Security Intelligence and Analytics Market~ | The Last Word~ | Legal Disclaimer~ | The Frost & Sullivan Story~ |
List of Charts and Figures | 1. Basic Setup of SIEM Receiving Logs from Perimeter Defense Tools, Asia-Pacific, 2017~ 2. Expansion of Correlation with Endpoint and Behavioral Detection Logs, Asia-Pacific, 2017~ 3. Creating a Predictive Model Through Threat Intelligence Feeds, Asia-Pacific, 2017~ |
Author | Niihara Tetsuya |
Industries | Information Technology |
WIP Number | P9F5-01-00-00-00 |
Is Prebook | No |
GPS Codes | 9532-C1,9702-C1,9705-C1 |