LogRhythm Survey Says 75 Percent of Information Security Professionals Lack Confidence in their Ability to Address Cyber Security Threats

82 percent of organizations have a firewall installed and antivirus/anti-malware capabilities but less than 25 percent are confident that they’d recognize known indicators of a breach

BOULDER, Colo.—February 29, 2012—LogRhythm, a leader in log management and SIEM, today announced the results of an online survey of 200 IT security professionals on their organizations’ readiness to address advanced cyber security threats. Alarmingly, over 75 percent of respondents are not confident in their ability to detect activity commonly tied to breaches and cybercrime.

The good news is that corporations deploying next generation firewalls (NGFW) and Security Information & Event Management (SIEM) expressed confidence in their ability to detect advance attacks and breaches twice (2X) as often as respondents without these technologies.

Other interesting survey findings revealed:

  • Only 29 percent are confident they’ll know when a host gets compromised
  • Only 21 percent are confident they’ll know when a user’s credentials get compromised
  • Only 24 percent are confident in their ability to identify internal anomalous activity
  • Only 21 percent are confident in their ability to detect rogue processes
  • Only 22 percent are confident in their ability to recognize abnormal behavior patterns

“Cyber threats are increasing in volume and sophistication and our Cyber Threat Readiness Survey data confirms that most organizations recognize they lack the ability to detect and respond to these threats,” said Chris Petersen, CTO and Co-Founder of LogRhythm. “It’s becoming both increasingly necessary and urgent for organizations to deploy solutions like SIEM to provide the visibility, insight and response required to detect the undetectable and actively address the rapidly-evolving cyber threat landscape. “

LogRhythm delivers the visibility and insight needed to detect, defend against and respond to increasingly sophisticated cyber threats, efficiently meet compliance requirements and proactively respond to operational challenges.

Survey Methodology
LogRhythm conducted this survey by polling two hundred (200) IT security professionals. The survey was online from November 2011 through February 2012.

About LogRhythm

LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency.

With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com.

Comments are closed.