Research Report: The Impact of Security Alert Overload

CRITICALSTART conducted a survey of more than 50 Security Operations Center (SOC) professionals across enterprises, Managed Security Services Providers (MSSP) and Managed Detection & Response (MDR) providers to evaluate the state of incident response within SOCs. The survey was fielded Q2 2019.
The report and analysis are based on the responses received from this sample with comparisons drawn to the same questions asked in the company’s 2018 report.
This year’s report revealed that SOC analysts continue to face an overwhelming number of alerts each day that are taking longer to investigate, resulting in many SOC analysts believing their primary job responsibility is to “reduce the time it takes to investigate alerts.”
To cope with the onslaught of alerts, managed security providers simply try to hire more analysts or direct existing ones to ignore certain types of alerts and turn off key features that generate too many alerts – negatively impacting business models and leaving enterprises more susceptible to attacks. The most striking finding is the direct toll the alert overload problem is having on SOC analyst retention.
Stay Connected on Today’s Cyber Threat Landscape
RELATED RESOURCES
Webinar
Analyst-Led, AI-Assisted: The Future of Cybersecurity Defense
Discover how human expertise and AI innovation are transforming the way organizations combat cyber t...- Webinar
Critical Start Platform Updates
We are excited to announce the latest enhancements to Critical Start’s Cyber Operations Risk &... Datasheet
Critical Start Asset Visibility
Critical Start Asset Visibility gives you a single source of truth for your asset inventory, uncover...
RESOURCE CATEGORIES
- Buyer's Guides(1)
- Consumer Education(40)
- Consumer Stories(2)
- Cybersecurity Consulting(7)
- Data Breaches(15)
- Data Privacy(43)
- Incident Response(2)
- Interview(51)
- MDR Services(77)
- MobileSOC(9)
- News(5)
- Press Release(96)
- Research Report(11)
- Security Assessments(4)
- Thought Leadership(20)
- Threat Hunting(3)
- Video(1)
- Vulnerability Disclosure(1)