Like the previous years, 2019 also witnessed the surge in data breaches and cyber-attacks. However, organizations having SIEM or/and SOAR system in place were better than those using traditional security tools. The cyber-attacks in 2019 were mostly related to financial crimes, supply chain attacks, phishing exploits, state-sponsored attacks, Grid attacks, health sector attacks, and attacks on IoT devices. Cybersecurity skills shortage was also one of the major concerns in 2019.
In this first part of the article, we will take a look at how SIEM and SOAR tools were helping organizations in 2019 to get rid of cyber-attacks.
According to the 2019 SIEM Survey report, published by the Alien Vault, the Security Information and Event Management (SIEM was a powerful tool that allowed security professionals to collect, correlate, and analyze log data from various systems within IT infrastructure to find out and report cybersecurity threats and malicious activities.
In addition, the survey also unveiled that three-quarters of security practitioners confirmed that SIEM was very essential to their enterprises’ cybersecurity postures (76 percent). Moreover, a commendable 8 out of 10 SIEM users were satisfied with the effectiveness of their SIEM solution (86 percent). According to them, the SIEM:
By keeping the performance of SOAR in mind, Garter in its report, “2019 Market Guide for Security Orchestration, Automation, and Response (SOAR)” projected that by the end of 2020, almost 30 percent of enterprises with a security team larger than five security personnel would deploy SOAR solutions in their security operations.
Furthermore, 2019 was also not bad for most of the organizations using a SIEM platform. The survey revealed that more than seven (7) out of ten (10) companies had a better threat detection and a massive reduction in data breaches (76%). The respondents of the survey discovered that SIEM was very efficient for:
The SIEM was successful in providing compliance reporting (38%), monitoring server and database access (51%), and monitoring activities of users (51%).
The role of SOAR in threat detection and threat intelligence was also commendable. In fact, SOAR allowed the centralized collection, aggregation, and enrichment of existing data with threat intelligence. After that, more importantly, such threat intelligence was converted into the action.
According to the Alient Vault survey, many respondents believed that their organizations were successful in quickly detecting the security compromise with a SIEM solution. Below is the time and percentage ratio of detection:
Garter in its report, “2019 Market Guide for Security Orchestration, Automation, and Response (SOAR)” suggested that reducing the response time, including the containment and remediation of an incident, was one of the most reliable ways to control the impact of security incidents.