Research reveals growing distrust for threat detection tools

Report finds 60% of SOC practitioners say security vendors flood them with pointless alerts to avoid responsibility for a breach, with 47% noting they do not trust their tools to work the way they need them to work.

  • 1 month ago Posted in

Vectra AI has published the findings of its 2024 State of Threat Detection and Response Research Report: The Defenders’ Dilemma. The report shows that security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal. They cite a growing distrust in vendors, believing their tools can be more of a hindrance than help in spotting real attacks. This is at odds with growing confidence in their teams’ abilities and a sense of optimism around the promise of artificial intelligence (AI).

The hybrid attack landscape continues to expand as organizations increasingly turn to GenA Ipowered tools to streamline processes and enhance their work. This creates more opportunities for attackers and challenges for security teams who are already struggling with security alert noise and false positives. Even though SOC teams are more confident in their defenses than they were a year ago, many feel they do not have the right tools to help them effectively detect and prioritize real threats. Based on a survey of 2,000 security professionals, the report breaks down why this disconnect exists, how current threat detection solutions are falling short, and the role AI plays in improving the process, delivering accurate threat signal and reducing workloads.

SOC Confidence is Improving but Many Fear Legacy Tools are Holding Them Back

Security practitioners are increasingly confident in their capabilities but feel they are losing ground when it comes to detecting and prioritizing real threats. So, what is the disconnect? Many SOC teams are managing too many tools and still struggle with an overwhelming number of alerts, leading to concerns about missing critical threats. This is driving a lack of confidence and trust in the current threat detection tools practitioners are using and resulting in practitioners seeking alternative solutions, such as extended detection and response (XDR) solutions. The study found:

• Nearly three-quarters (71%) of SOC practitioners worry they will miss a real attack buried in a flood of alerts and 51% believe they cannot keep pace with the increasing number of security threats.

• Nearly half (47%) of practitioners do not trust their tools to work the way they need them to work, while 54% say the tools they work with actually increase the SOC workload instead of reducing it.

• 73% of SOC practitioners have more than 10 tools in place and 45% have more than 20 tools.

• 62% of teams have either recently adopted or are exploring extended detection and response (XDR) solutions.

Legacy Threat Detection Tools are Creating More Work for Practitioners, Resulting in Growing Vendor Distrust and Tool Dissatisfaction

SOC teams are increasingly frustrated with their current security tools, which are causing more challenges than they solve. Many practitioners find themselves pushing aside critical tasks to manage the overwhelming alert volume they receive, leading to dissatisfaction not only with the tools but also with the vendors providing them. Practitioners also continue to struggle with alert accuracy, with a significant number of alerts going unaddressed due to time constraints and insufficient tool support. While there are signs of improvement in areas like visibility across hybrid environments, the overwhelming volume of alerts remains a significant issue. The study also found:

• 60% of SOC practitioners say vendors are selling threat detection tools that create too much noise and too many alerts, while 71% say vendors need to take more responsibility for failing to stop a breach

• 81% of SOC practitioners spend more than 2 hours per day digging through / triaging security events.

• 50% of SOC practitioners say their security tools are more of a hindrance than help when it comes to spotting real attacks, noting that realistically, they are only able to deal with 38% of the alerts they receive, while they would classify 16% of them as “real attacks.”

• 60% of SOC practitioners say a lot of their security tools are bought as a “box ticking” exercise for compliance.

Adoption and Trust in AI for Threat Detection is Growing, But Vendors Have Work To Do

SOCs are increasingly adopting AI to improve threat detection and response, driven by a growing trust in AI's capabilities. While many practitioners are optimistic about AI's potential to deliver threat signal efficacy to accurately identify and respond to threats, reduce workloads and replace legacy tools, there are still concerns about adding complexity to an already overwhelmed system. Despite the challenges, there is a strong intent to invest more in AI powered solutions to enhance efficiency and efficacy. However, for AI to truly gain widespread acceptance, vendors must work to rebuild trust by delivering tools that add real value without increasing the burden on SOC teams. The study found:

• 85% of SOC practitioners say their level of investment and use of AI has increased in the last year, with 67% noting that AI has had a positive impact on their ability to identify and deal with threats.

• 75% of SOC practitioners say AI has reduced their workload in the past 12 months, 73% of SOC practitioners say AI has reduced feelings of burnout in the past 12 months.

• 89% of SOC practitioners plan to use more AI-powered tools over the next year to replace legacy threat detection and response.

“It’s promising to see that confidence is growing among security practitioners; however, it’s clear they are becoming increasingly frustrated with their current threat detection tools which, due to a lack of integrated attack signal, often create additional work rather than streamline the process. The data suggests that the tools being used for threat detection and response, along with the vendors who sell them, aren’t holding up their end of the deal,” Mark Wojtasiak, vice president of research and strategy at Vectra AI. “Teams believe AI delivers an attack signal that will help them identify and prioritize threats, accelerate response times, and reduce alert fatigue, however, trust needs to be rebuilt. AI-powered offerings are proving to have a positive impact, but to truly reestablish trust, vendors will need to show how they add value beyond just the technologies they sell.”

Ransom attacks in the cloud are a perennially popular topic of discussion in the cloud security...
Talent and training partner, mthree, which supports major global tech, banking, and business...
Cloud-native organisations to gain full understanding over every identity in the cloud, secured...
MSSPs identify regulatory compliance as additional factor as organisations seek to shift...
Orange Business (Norway), a global leader in digital services, has selected ARMO’s advanced...
Gigamon and Exclusive Networks have expanded their existing distribution partnership, broadening...
Trustwave and Cybereason have announced a definitive merger agreement offering a comprehensive and...
FortiDLP’s unified approach to data protection enables enterprise organizations to anticipate and...