intelligence, information & services managed …...gartner market guide for managed detection...
TRANSCRIPT
There’s room for improvement with organizations when it comes to the time to identify and respond to a breach. On average, organizations took more than six months to identify a breach.
**Source: Gartner, Market Guide for Managed Detection and Response Services, 31 May 2017*Ponemon Institute's 2017 Cost of Data Breach Study: Global Overview
This document does not contain technology or Technical Data controlled under either the U.S. International Traffic in Arms Regulations or the U.S. Export Administration Regulations.
According to Ponemon Institute's 2017 Cost of Data Breach Study,* on average it also took organizations more than 66 additional days to contain a breach once discovered. However, what’s more alarming is the time to identify and the time to contain a breach were highest for malicious and criminal attacks; 214 and 77 days respectively.
© 2017, Raytheon Company. All rights reserved. Advanced Media-East_4450810 (11/17)
MAKE THE SHIFTMANAGED DETECTION & RESPONSE
INTELLIGENCE, INFORMATION & SERVICES
Managed detection and response improves threat detection monitoring and incident response capabilities via a turnkey approach to detecting threats that have bypassed other controls. Security and risk management leaders need to understand this service and its implications for their environments.“ “
Gartner Market Guide for Managed Detection and Response ServicesToby Bussa, Craig Lawson, Kelly M. Kavanagh, Sid Deshpande
May 31, 2017
ANTICIPATED MDR GROWTH
ACCORDING TO GARTNER** BY 2020
80% of worldwide managed security service providers (MSSPs) will offer MDR-type services
15% of organizations will be using services such as MDR, which is an increase from fewer than 1% today. 15% 80%
> 1% today 15% by 2020
15% 80%
80% by 2020
FOCUS: DWELL TIME REDUCTION
Initial Compromise
DETECTION MIGRATION
Containment CompleteDetection(Migration action begins)
DWELL TIME
180 214 246 291DAYS
MALICIOUS & CRIMINAL
ORGANIZATIONSIdentify Breach
Contain Breach