Proof Point
More than half organizations in PwC report use intrusion detection tools and actively monitor information security intelligence to detect cyber attacks
Threat Detection Tools and Processes Used by Organizations
2016 (percentage)
Note: | Data from PwC’s 2017 Global State of Information Security Survey of more than 10,000 executives of IT and security practices across more than 133 countries |
Proof Point Findings
- Threat Detection – Security product or solution designed to discover potential network threats, fix security vulnerabilities and prevent cyber threats
- Intrusion and Risk Detection – Half of companies surveyed use intrusion detection tools (52%) as well as actively monitor and analyze threat intelligence (51%) to help detect risks and incidents
- Assessments and Tests – More than 40% also conduct assessments and tests on vulnerability (48%), threat (47%) and penetration (44%)
- Key Growth Drivers – Include increasing number and sophistication of global cyberattacks, rising organizational concern for privacy and security, heightening regulatory requirements for increased security and accelerating research and development of data security technologies
Accelerator |
|
Sector |
Information Technology
|
Source |
|
Date Last Updated |
August 31, 2017
|