Enterprise Management Associates Releases EMA Top 3 Decision Guide for Security Analytics for Threat Detection and Breach Resolution
New EMA Top 3 report identifies 41 security analytics use cases and evaluates 32 different security analytics vendor solutions
EMA Security Analytics for Threat Detection and Breach Resolution in 2019
We are living in the age of information. Security analytics is a means for organizations to leverage the vast amount of data coming in to paint a real picture of their security posture, to identify threats earlier, and to appropriately respond to them.
BOULDER, Colo. (PRWEB) January 22, 2019
Enterprise Management Associates (EMA™), a leading IT and data management research and consulting firm, today announced it has released a new report titled “Security Analytics for Threat Detection and Breach Resolution in 2019: EMA Top 3 Report and Decision Guide” based on criteria defined by David Monahan, managing research director of risk and security management at EMA.
Security analytics were created to provide advanced data analysis using multiple analysis techniques, the most popular of which is a class of adaptive outcome algorithms called machine learning (ML), also now being dubbed artificial intelligence (AI). These algorithms and models combine logs, protocols, packet streams, network flows, and a myriad of other data sources into big data to supply individual and community behavioral analysis and risk profiling. Combined, they identify, prioritize, and aid in containing threat actors.
Security analytics also interface with other monitoring and alerting systems, like security incident and event management systems (SIEM). This amalgam of data and algorithms and the proper application thereof can produce extremely high-fidelity intelligence for rendering the context of events, providing a previously unobtained level of visibility into activities in the environment, and supplying excellent prioritization of incidents.
“We are living in the age of information. Security analytics is a means for organizations to leverage the vast amount of data coming in to paint a real picture of their security posture, to identify threats earlier, and to appropriately respond to them,” said Monahan. “Security analytics tools are showing great value and promise further improvements to defend against even the most subtle and complex attacks.”
While there is no security silver bullet, security analytics tools are a great step forward for any organization that needs to improve its ability to detect threats. When purchased without the proper research, however, these tools can create unnecessary overhead and actually impede performance by creating a false sense of security. Security analytics is the perfect operational example of prior planning preventing negative performance. When the proper tool is selected, customers see great benefits.
This EMA Top 3 report is designed to cut through the noise to help organizations select the right tool for their unique needs. It serves as a guide to organizations that have identified problematic security use cases to select analytics tools that best address those use cases. Tools from the following security vendors were evaluated:
- Bay Dynamics
- HPE Niara
- Huntsman Security
- IBM QRadar
- Palo Alto Networks (RedLock)
- Splunk Phantom
- Sumo Logic
A more detailed analysis of the use cases, vendor tools, and research findings are available in the “Security Analytics for Threat Detection and Breach Resolution in 2019: EMA Top 3 Report and Decision Guide.”
About the EMA Top 3 Enterprise Decision Guide
EMA Top 3 reports identify the leading priorities organizations face with resolving challenges and meeting enterprise requirements in particular IT management focus areas. The intent of this report is to inform and inspire influencers and decision makers in their project planning and vendor selection process.
Founded in 1996, EMA is a leading industry analyst firm that specializes in providing deep insight across the full spectrum of IT and data management technologies. EMA analysts leverage a unique combination of practical experience, insight into industry best practices, and in-depth knowledge of current and planned vendor solutions to help clients achieve their goals. Learn more about EMA research, analysis, and consulting services for enterprise line of business users, IT professionals and IT vendors at http://www.enterprisemanagement.com.