Cyber Security Improvement Insights—Security Intelligence and Analytics

Cyber Security Improvement Insights—Security Intelligence and Analytics

An Analysis of the Solution Landscape and Best Practices in Asia-Pacific

RELEASE DATE
03-Aug-2018
REGION
Asia Pacific
Research Code: P9F5-01-00-00-00
SKU: IT03715-AP-MR_22169
$3,000.00
In stock
SKU
IT03715-AP-MR_22169
$3,000.00
DownloadLink

Pay by invoice

ENQUIRE NOW

Description

Technology is increasingly advancing, so does threat landscape. Cyber attackers are attempting to breach companies' defenses every second, using increasingly sophisticated methods. Security teams are constantly challenged by the lack of skilled manpower and the right visibility of threats to their organizations’ assets.

Despite current security infrastructures offering many tools to counter cybercriminal activities, very little integration between them could be made possible, which translate to wastage of limited time and resources. This is coupled with the fact that organizations have enormous volumes of security data to review on a continuous basis, which make it impossible to achieve without the use of automation and the correlation of high volumes of intelligence through the use of analytics. By relying on the automation that security intelligence and analytics solutions offer, organizations are able to stand ahead of the ever-evolving cyber-attacks, and meanwhile rely lesser on human capital’s requirement.

The paper will introduce more details on the solutions that enable security intelligence and analytics platform, which include Threat Intelligence platform (TIP), Threat intelligence feeds (TIF), Security Information and events management (SIEM), User and Entity Behavior Analytics (UEBA) and Security Automation and Orchestration.
Security intelligence and analytics trends in Asia-Pacific, key considerations for security intelligence and analytics, analysis of active cyber security solution providers in the Asia-Pacific Security Intelligence and analytics market are also being discussed in this paper.

To conclude, the security intelligence and analytics industry is expected to evolve in the future years, as more enterprises realize how innovations such as machine learning, automation and orchestration can help them better detect and respond toward attacks.

Companies mentioned in this paper include Anomali, Bitscan, EclectricIQ, IN SEC Security, LookingGlass, ThreatConnect, Crowd Strike, FireEye, Kaspersky Lab, NSFOCUS, Saint Security, Sophos, Symantec, AlienVault, DarkTrace, Exabeam, IBM Security, Infoscience Corporation, INTEC Inc., LogRhythm, McAfee, Micro Focus, RSA, Splunk, ZOHO Japan Corporation, Demisto, Hexadite, Siemplify. The countries included in this study are Australia, New Zealand, Singapore, Malaysia, Indonesia, the Philippines, Thailand, Vietnam, China, Hong Kong, Taiwan, India, Japan, and South Korea.

Key Questions This Study Will Answer
·     How security intelligence and analytics platform (SIAP) evolves?
·     What are the solutions that enable a security intelligence and analytics platform?
·     What are the security intelligence and analytics trends in Asia Pacific?
·     What are the key considerations of security intelligence and analytics solution?
·     Who are the industry players that provide solution in the security intelligence and analytics market?

List of Figures
  • 1. Basic Setup of SIEM Receiving Logs from Perimeter Defense Tools, Asia-Pacific, 2017
  • 2. Expansion of Correlation with Endpoint and Behavioral Detection Logs, Asia-Pacific, 2017
  • 3. Creating a Predictive Model Through Threat Intelligence Feeds, Asia-Pacific, 2017
Related Research
Technology is increasingly advancing, so does threat landscape. Cyber attackers are attempting to breach companies' defenses every second, using increasingly sophisticated methods. Security teams are constantly challenged by the lack of skilled manpower and the right visibility of threats to their organizations’ assets. Despite current security infrastructures offering many tools to counter cybercriminal activities, very little integration between them could be made possible, which translate to wastage of limited time and resources. This is coupled with the fact that organizations have enormous volumes of security data to review on a continuous basis, which make it impossible to achieve without the use of automation and the correlation of high volumes of intelligence through the use of analytics. By relying on the automation that security intelligence and analytics solutions offer, organizations are able to stand ahead of the ever-evolving cyber-attacks, and meanwhile rely lesser on human capital’s requirement. The paper will introduce more details on the solutions that enable security intelligence and analytics platform, which include Threat Intelligence platform (TIP), Threat intelligence feeds (TIF), Security Information and events management (SIEM), User and Entity Behavior Analytics (UEBA) and Security Automation and Orchestration. Security intelligence and analytics trends in Asia-Pacific, key considerations for security intelligence and analytics, analysis of active cyber security solution providers in the Asia-Pacific Security Intelligence and analytics market are also being discussed in this paper. To conclude, the security intelligence and analytics industry is expected to evolve in the future years, as more enterprises realize how innovations such as machine learning, automation and orchestration can help them better detect and respond toward attacks. Companies mentioned in this paper include Anomali, Bitscan, EclectricIQ, IN SEC Security, LookingGla
More Information
No Index No
Podcast No
Table of Contents | The Need of Better Visibility, Intelligence and Automation in Cybersecurity~ | Security Intelligence and Analytics Solution Ecosystem~ | Security Intelligence and Analytics Trends in Asia-Pacific~ | Key Considerations for Security Intelligence and Analytics~ | Analysis of Active Cyber Security Solution Providers in the Asia-Pacific Security Intelligence and Analytics Market~ | The Last Word~ | Legal Disclaimer~ | The Frost & Sullivan Story~
List of Charts and Figures 1. Basic Setup of SIEM Receiving Logs from Perimeter Defense Tools, Asia-Pacific, 2017~ 2. Expansion of Correlation with Endpoint and Behavioral Detection Logs, Asia-Pacific, 2017~ 3. Creating a Predictive Model Through Threat Intelligence Feeds, Asia-Pacific, 2017~
Author Niihara Tetsuya
Industries Information Technology
WIP Number P9F5-01-00-00-00
Is Prebook No
GPS Codes 9532-C1,9702-C1,9705-C1