Unified Security Platform
Unified Security Platform
3 4 7 10 14 17
Executive summary The challenging Rethinking the AI’s growing How a unified Conclusion:
state of security best-of-breed presence security platform Security’s
approach improves security ideal state
posture
3
How would you characterise your organisation’s current security posture on a scale of 1-10? Confidence in current security tools to do the following
Total
More tools,
more complexity: On average, enterprises use around 14 different security tools
Rethinking the best- Number of security tools Change versus previous year
12% 47%
There are tradeoffs to this expanding ecosystem
of tools. The two biggest challenges to
improving their security posture, according to 5%
3% 18%
survey respondents: 1%
• Complexity of the current environment
• Poor visibility across the landscape
1-5 6-10 11-20 21-30 31-40 41-50 51-99
These challenges speak directly to rapidly
Average: 14.2 Median: 15.5 Increased Decreased Stayed the same
expanding IT environments and the growing set
of security tools used to protect them.
8
The pain points are particularly acute for More tools don’t equal
organisations that have adopted a best-of-
improved security
29
breed strategy. Nearly one-third (29%) of survey
Biggest challenges to achieving a successful security posture
%
respondents say they’re using a best-of-breed
approach to security, 26% a suite solution and
Weighted top three rankings indexed to 100 44% are a mix of both. Those using a best-of-
breed approach exclusively are, on average,
153 using more tools than other respondents and are
more likely to have increased the number of tools
138 over the past year.
of respondents use a best-of-breed
108 While CISOs may find it easy to justify using
approach exclusively
specific tools for specific tasks – especially when
it comes to protecting valuable digital assets –
82 Those with more tools report a
75 73 72 more tools do not lead to improved defences,
according to the survey. The reality is that a higher average number of security
best-of-breed approach may be exacerbating
incidents (15.3 incidents, versus 10.5
the cybersecurity challenge: Respondents with
a higher number of tools also reported a higher
incidents for organisations with
average number of security incidents (15.3 fewer tools)
incidents, versus 10.5 incidents for organisations
with fewer tools).
How a unified security teams close critical security gaps and streamline
their operations by improving three core
Simulated attack scenarios identify weaknesses Quickly respond to and to centralise and automate detection and Integrating exposure management tools
a bad actor could exploit, with visualisations that response is critical to limiting the attackers’ with incident data facilitates post-incident
automatically disrupt in-progress
make it easy to explore multiple paths and choke progress and minimising potential damage.” guidance to prevent repeat attacks. Advanced
points to see how potential threats might unfold. attacks hunting using query-based tools lets teams
Attack path modelling allows for more effective After disruption has been triggered, security proactively inspect events across the network
threat prioritisation and lets teams take steps to A unified platform enables SecOps teams to teams will be notified and receive a summary of to locate threat indicators and entities.
prevent attacks from reaching critical assets. coordinate defences to more quickly detect the incident with recommendations on actions Flexible access to data across the entire
and defend against attacks across identities, to take to fully remediate the threat, reduce the environment enables unconstrained hunting for
But this can’t be done in silos. Simply analysing endpoints, cloud apps, email, documents, likelihood of a similar attack in the future and both known and potential threats.
how a cloud environment could be breached networks and infrastructure with full visibility even have the option of generating a customised
may not address the full threat. The attacker across the kill chain. report that can be shared with senior leadership Creating this type of closed-loop feedback
could use an on-premises identity stolen off an or other stakeholders. mechanism allows for continuous learning and
unmanaged device to log onto the cloud service, XDR-powered capabilities such as automatic improvement, culled not only from in-house
attack disruption can detect and deter
for example. Successful attack path modelling
in-progress advanced persistent threats like
Increase resiliency by reducing incidents, but also threat intelligence from
requires integrating data from all touchpoints to solution providers such as Microsoft, which
get a full view of the digital landscape. ransomware, business email compromise and the risk of repeat attacks tracks trillions of signals to help security teams
adversary-in-the-middle attacks. Built-in and identify common vulnerabilities and better
customisable playbooks reduce MTTR rates by By using XDR capabilities to analyse an attacker’s
“Exposure management brings everyone understand adversaries and their methods.
automating established responses. Automation techniques and map them to security posture
together, centralising processes and policies
can reduce SecOps workloads even further by controls across workloads and infrastructure,
and uses real-world data to drive accurate “Proactively reducing exposure is not something
providing self-healing functions for menial tasks SecOps teams can limit their organisation’s
decision making,” says Lefferts. “This approach that many organisations, especially smaller
such as device clean-up. vulnerability to future attacks. By connecting
shines a light on the things you need to prioritise companies, can prioritise as much as they’d like,”
the dots and providing step-by-step guidance,
and the steps you need to take to improve your says DeGrippo. “The additional hygiene you get
“There’s a huge benefit in moving from highly SecOps teams will be able to be less reactive to
security posture.” from this capability can have a big impact on
manual processes that come into play during threats by proactively finding and addressing
your security posture.”
or after an attack involving security admins, vulnerabilities across the entire security kill chain.
analysts and architects,” says Lefferts. “The ability
16
The cybersecurity skills shortage has been a play a starring role in augmenting human skills, automation so they can focus on higher-value
persistent challenge for CISOs and their teams. even for organisations that aren’t experiencing a activities should serve as an incentive. 56%
But the Foundry survey shows some light at the security staffing shortage.
end of the tunnel. Most respondents (62%) say “Our goal is to help analysts spend less Training existing staff
they have no open positions, with staff resources “Security is so complex that no matter how many time manually correlating alerts so they can
allocated evenly across detection, response people you hire, they can’t possibly manage remediate more quickly,” says Lefferts. “Or even 53%
and prevention roles. the scale and velocity of the current threat better, taking what they learn from incidents
environment without AI and automation,” says and applying those learnings to improve the Improving recruitment processes
Those that are looking to hire, however, have Rob Lefferts, CVP, Modern Threat Protection at organisation’s security posture.”
an average of 6.5 open positions. Respondents Microsoft. “We simply need to reduce the overall 49%
cite high competition for talent as the number of alerts and queues the security teams
biggest challenge in filling security roles, well personally manage on a day-to-day basis.” Offering competitive compensation packages
ahead of other challenges including a lack of
qualified candidates and budget constraints. AI deployment in the security operations 46%
This indicates that even if CISOs have the budget centre won’t come without challenges.
to fill open positions, they may have trouble CISOs understand that AI represents a Outsourcing
finding suitable candidates. significant cultural shift for SecOps teams.
45%
17
Making the transition New platforms may not align with their skill
sets. Others will need training to learn how to Conclusion: The ideal state of security operations ultimately
increases confidence among security, IT and
Unified SecOps
Foundry conducted an online study to
understand the current state of threat
protection, where organisations and security
professionals are focusing with their current
practices and where they see opportunities for
The Microsoft unified security operations While other security suppliers may claim to using AI in security operations.
platform brings the foundational tools a security offer a unified security operations platform,
operations centre (SOC) needs into a single only Microsoft delivers a true SecOps platform The study, commissioned by Microsoft, was
experience, with a consistent data model, that fully integrates all the capabilities of the conducted in June 2024. The 156 respondents
unified capabilities and broad protection. This industry’s leading cloud-native SIEM, broadest comprised senior-level IT decision-makers
unification helps SOCs close critical security native XDR and unified posture management with a primary role in security management,
gaps and streamline their operations, delivering solution, all with embedded generative AI, in a at organisations with 500 or more employees.
better overall protection, reduced response single experience.
times and efficiency improvements.
© 2024 Microsoft Corporation. All rights reserved. This document is provided ’as-is’. Information and views expressed in this document, including URL and
other internet website references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any
intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.