> IBM > IDC Intelligence-Led Security

IDC Intelligence-Led Security

Published By: IBM
IBM
Published:  Jul 26, 2017
Length:  9 pages

While there has been improvement in the amount of time an attacker spends in a network before detection decreasing from years to days in many cases the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.



Tagsdata security, threat intelligence, security operations, advanced security analysts