1
Drowning in Security Data INFOGRAPHIC Survey says: Companies collect more security data than they can process What kinds of tools and data are you using to conduct network security? How often do you get your security assessed by an independent third party? This survey was based on 233 responses from a broad cross-section of company sizes and revenues and eight industry verticals. including federal and state and local government, technology services. finance. education. manufacturing, medical and health care. legal/real estate and retail and wholesale distribution. The survey was conducted in April 2017 by C.A. Walker Research Solutions. Glendale. Calif. The results of this survey might not equal exactly 100% due to the following reasons: rounding errors during the analysis phase of research; respondents who skip a question: and respondents who provide more than one answer to a question. This research has a confidence level of+/- 3.3%. We collect but do not use We collect and use on its own We collect and integrate into an overall network management We do not collect or use Quarterly Semiannually Annually Applicaon-based log files Network flow data Data from cloud services AW_IFG_Drowning in Security Data_0120 ©2020 Arctic Wolf Networks, Inc. All rights reserved. | Public PERSONAL | PREDICTABLE | PROTECTION Network security is hard enough when you have all the right tools or data for the job. However, companies often collect overwhelming amounts of data they don't even use. So what does that mean to the overall picture of their security posture? SC Media surveyed 233 networking and data security professionals about the tools they use, the data they collect, and how they use the data. The results are lllumlnatlng. 11.6% 36.1% 30.9% 12.9% 8.2% 37.3% When the compliance team tells us we need to do it We don't have a schedule We have never had our security assessed by a third party 10.3% 15.5% 15.9% 21.5% 13.3% 34.3% 33.5% 18.9% 13.7% 24.9% 24% 37.3% arcticwolf.com

INFOGRAPHIC Drowning in Security Data€¦ · Drowning in Security Data INFOGRAPHIC Survey says: Companies collect more security data than they can process What kinds of tools and

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: INFOGRAPHIC Drowning in Security Data€¦ · Drowning in Security Data INFOGRAPHIC Survey says: Companies collect more security data than they can process What kinds of tools and

Drowning in Security DataI N F O G R A P H I C

Survey says: Companies collect more security data than they can process

What kinds of tools and data are you usingto conduct network security?

How often do you get your security assessedby an independent third party?

This survey was based on 233 responses from a broad cross-section of company sizes and revenues and eight industry verticals. including federal and state and local government, technology services. finance. education. manufacturing, medical and health care. legal/real estate and retail and wholesale distribution. The survey was conducted in April 2017 by C.A. Walker Research Solutions. Glendale. Calif. The results of this survey might not equal exactly 100% due to the following reasons: rounding errors during the analysis phase of research; respondents who skip a question: and respondents who provide more than one answer to a question. This research has a confidence level of+/- 3.3%.

We collect but do not use

We collect and use on its own

We collect and integrate into an overall network management

We do not collect or use

Quarterly

Semiannually

Annually

Application-based log files Network flow data Data from cloud services

AW_IFG_Drowning in Security Data_0120

©2020 Arctic Wolf Networks, Inc. All rights reserved. | Public

P E R S O N A L | P R E D I C T A B L E | P R O T E C T I O N

Network security is hard enough when you have all the right tools or data for the job.

However, companies often collect overwhelming amounts of data they don't even use. So

what does that mean to the overall picture of their security posture?

SC Media surveyed 233 networking and data security professionals about the tools they

use, the data they collect, and how they use the data.

The results are lllumlnatlng.

11.6%

36.1%

30.9%

12.9%

8.2%

37.3%

When the compliance team tells us we need to do it

We don't have a schedule

We have never had our security assessed by a third party

10.3%

15.5%

15.9%

21.5%

13.3%

34.3%

33.5%

18.9%

13.7%

24.9%

24%

37.3%

arcticwolf.com