Threat Detection Tools and Processes Used by Organizations

Threat Detection Tools and Processes Used by Organizations

Proof Point

More than half organizations in PwC report use intrusion detection tools and actively monitor information security intelligence to detect cyber attacks

Threat Detection Tools and Processes Used by Organizations

2016 (percentage)

Note: Data from PwC’s 2017 Global State of Information Security Survey of more than 10,000 executives of IT and security practices across more than 133 countries

Proof Point Findings

  • Threat Detection – Security product or solution designed to discover potential network threats, fix security vulnerabilities and prevent cyber threats
  • Intrusion and Risk Detection – Half of companies surveyed use intrusion detection tools (52%) as well as actively monitor and analyze threat intelligence (51%) to help detect risks and incidents
  • Assessments and Tests – More than 40% also conduct assessments and tests on vulnerability (48%), threat (47%) and penetration (44%)
  • Key Growth Drivers – Include increasing number and sophistication of global cyberattacks, rising organizational concern for privacy and security, heightening regulatory requirements for increased security and accelerating research and development of data security technologies

Accelerator

Sector

Information Technology

Source

Date Last Updated

August 31, 2017

Leave a comment