SHARE
Facebook X Pinterest WhatsApp

Wanted: Security Analytics Skills and Resources

Security and analytics Wanted: Security Analytics Skills and Resources A new study points to a lack of skills and dedicated resources as major obstacles to detecting and mitigating security breaches and other threats. Skills Gap 59% of respondents cite a lack of skills and dedicated resources as the main obstacles to detecting and acting on […]

Written By
thumbnail Gina Roos
Gina Roos
Dec 1, 2015
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Security and analytics

1 - Wanted: Security Analytics Skills and ResourcesWanted: Security Analytics Skills and Resources

A new study points to a lack of skills and dedicated resources as major obstacles to detecting and mitigating security breaches and other threats.

2 - Skills GapSkills Gap

59% of respondents cite a lack of skills and dedicated resources as the main obstacles to detecting and acting on cyber-security incidents and breaches. This is up from 30% in 2014.

3 - Lack of TrainingLack of Training

41% are not satisfied with the availability of training and expertise needed to operate analytics and intelligence programs. This dropped from 48% in 2014.

4 - Speedier RemediationSpeedier Remediation

In 2015, 67% were able to detect an attack in one week or less, versus only 50% in 2014. Yet 7% said their longest time to detection was more than 10 months, up from 5% in 2014.

5 - Leveraging Analytics for VisibilityLeveraging Analytics for Visibility

83% said visibility into cyber-incidents improved with more effective intelligence programs that leverage analytics capabilities.

6 - Data HurdlesData Hurdles

43% of organizations are working to increase visibility by integrating data from external threat providers, and 31% are planning to do so in the future.

7 - Centralized Control NeededCentralized Control Needed

35% cite a lack of centralized reporting and remediation controls as a barrier to identifying cyber-security incidents.

8 - Lack of AutomationLack of Automation

Only 3% of organizations think their analytics and intelligence processes for pattern recognition are fully automated, down from 9% in 2014, and another 6% report a “highly automated” intelligence and analytics environment, down from nearly 16% in 2014.

9 - Baseline BlocksBaseline Blocks

26% of respondents can’t understand and baseline “normal” cyber-security behavior. This dropped from 36% in 2014.

10 - Reusing DataReusing Data

About 44% currently collect advanced threat intelligence information internally and save it for future detection activities; 43% use external third parties to collect advanced threat information for detection and response.

11 - Future InvestmentsFuture Investments

43% said they plan to make future investments in threat intelligence products and services, up from 25% in 2014. Similarly, 34% plan to use big data and analytics products, up from 21% in 2014.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA
Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.