Research reveals growing distrust of threat detection tools
Vectra AI has announced the findings of its 2024 State of Threat Detection and Response Research Report: The Defenders’ Dilemma. The report shows that security operations centre (SOC) practitioners believe they are losing the battle detecting and prioritising real threats, due to too many siloed tools and a lack of accurate attack signal. They cite a growing distrust in vendors, believing their tools can be more of a hindrance than a help in spotting real attacks. This is at odds with growing confidence in their teams’ abilities and a sense of optimism around the promise of artificial intelligence (AI).
The hybrid attack landscape continues to expand as organisations increasingly turn to GenAI-powered tools to streamline processes and enhance their work. This creates more opportunities for attackers and challenges for security teams who are already struggling with security alert noise and false positives. Even though SOC teams are more confident in their defences than they were a year ago, many feel they do not have the right tools to help them effectively detect and prioritise real threats. Based on a global survey of 2000 security professionals, the report breaks down why this disconnect exists, how current threat detection solutions are falling short, and the role AI plays in improving the process, delivering accurate threat signal and reducing workloads.
SOC confidence is improving but many fear legacy tools are holding them back
Security practitioners are increasingly confident in their capabilities but feel they are losing ground when it comes to detecting and prioritising real threats. So, what is the disconnect?
Many SOC teams are managing too many tools and still struggle with an overwhelming number of alerts, leading to concerns about missing critical threats. This is driving a lack of confidence and trust in the current threat detection tools practitioners are using and resulting in practitioners seeking alternative solutions. For ANZ, the study found:
- More than two-thirds (69%) of ANZ SOC practitioners worry they will miss a real attack buried in a flood of alerts and 51% believe they cannot keep pace with the increasing number of security threats.
- Nearly one-third (31%) of practitioners do not trust their tools to work the way they need them to work, while (49%) say the tools they work with actually increase the SOC workload instead of reducing it.
- 60% of SOC practitioners have more than 10 tools in place and 29% have more than 20 tools.
- 60% of teams have either recently adopted or are exploring extended detection and response (XDR) solutions.
Legacy threat detection tools are creating more work for practitioners
SOC teams are increasingly frustrated with their current security tools, which are causing more challenges than they solve. Many practitioners find themselves pushing aside critical tasks to manage the overwhelming alert volume they receive, leading to dissatisfaction not only with the tools but also with the vendors providing them. Practitioners also continue to struggle with alert accuracy, with a significant number of alerts going unaddressed due to time constraints and insufficient tool support. While there are signs of improvement in areas like visibility across hybrid environments, the overwhelming volume of alerts remains a significant issue. The study also found that:
- 51% of ANZ SOC practitioners say vendors are selling threat detection tools that create too much noise and too many alerts, while 68% say vendors need to take more responsibility for failing to stop a breach.
- 81% of SOC practitioners spend more than two hours per day digging through or triaging security events.
- 41% of SOC practitioners say their security tools are more of a hindrance than help when it comes to spotting real attacks, noting that realistically, they are only able to deal with 34% of the alerts they receive, while they would classify 11% of them as real attacks.
- 54% of SOC practitioners say a lot of their security tools are bought as a “box ticking” exercise for compliance.
Adoption and trust in AI for threat detection is growing
SOCs are increasingly adopting AI to improve threat detection and response, driven by a growing trust in AI’s capabilities. While many practitioners are optimistic about AI’s potential to deliver threat signal efficacy to accurately identify and respond to threats, reduce workloads and replace legacy tools, there are still concerns about adding complexity to an already overwhelmed system.
Despite the challenges, there is a strong intent to invest more in AI-powered solutions to enhance efficiency and efficacy. However, for AI to truly gain widespread acceptance, vendors must work to rebuild trust by delivering tools that add real value without increasing the burden on SOC teams. The study found that:
- 77% of ANZ SOC practitioners say their level of investment and use of AI has increased in the last year, with 64% noting that AI has had a positive impact on their ability to identify and deal with threats.
- 69% of SOC practitioners say AI has reduced their workload in the past 12 months, and 66% of SOC practitioners say AI has reduced feelings of burnout in the past 12 months.
- 89% of SOC practitioners plan to use more AI-powered tools over the next year to replace legacy threat detection and response.
“It’s promising to see that confidence is growing among security practitioners; however, it’s clear they are becoming increasingly frustrated with their current threat detection tools that, due to a lack of integrated attack signal, often create additional work rather than streamline the process,” said Mark Wojtasiak, vice president of research and strategy at Vectra AI. “The data suggests that the tools being used for threat detection and response, along with the vendors who sell them, aren’t holding up their end of the deal.
“Teams believe AI delivers an attack signal that will help them identify and prioritise threats, accelerate response times, and reduce alert fatigue; however, trust needs to be rebuilt. AI-powered offerings are proving to have a positive impact, but to truly re-establish trust, vendors will need to show how they add value beyond just the technologies they sell.”
CrowdStrike to buy Adaptive Shield
CrowdStrike is augmenting its SaaS security capabilities through the acquisition of Israeli-based...
LockBit named nastiest malware of 2024
LockBit, a ransomware malware known to have been used to attack Australian targets, has been...
Extreme Networks launches ZTNA solution
Extreme Networks' new ExtremeCloud Universal ZTNA solution combines cloud network access...