The exponential growth in security-relevant data coupled with a severe shortage of people skilled enough to monitor, analyze and respond to that data creates a critical and vexing problem for security organizations.
It’s Time to Leverage the Power of Autonomous Security.
The Respond Analyst™ adds 24×7 continuous monitoring capacity to your team – comprehensive, accurate and scalable.
“Good analysts keep the SOC operating at peak efficiency – but it is tough to find and retain them. Respond provides an always-on, expert-in-a-box for Network Intrusion and System Compromise.”
Izak Mutlu, former CISO, Salesforce.com
“Respond provides a unique way to scale and improve SOC capabilities by taking over decision-making in critical, but tough to staff use cases.”
Brett Wahlin, CISO, Staples
“The Respond Analyst is not a platform. No programming, no prolonged learn-mode, no unexpected gotchas. It’s an application that makes use of existing infrastructure to deliver immediate results.”
Fred Thiele, Executive, Global Financial Services Company
“We need more than yesterday’s SOC. Respond can enable capabilities that vastly increase the comprehensiveness and efficacy of our efforts.”
Kirsten Davies, CISO, Absa / Barclays Africa Group, Ltd.
Before You Hire Another Security Analyst, Read This Report
In a first of its kind study, the Cyentia Institute provides an inside perspective on Security Operations from those on the front line, the Security Analysts themselves. Discover what tasks analysts find burdensome, valuable and time-consuming—and which activities lend themselves to automation and which do not.
Table of Contents
Views from the SOC
– The Lens of Experience
Activities in the SOC
– Generalists vs Specialists
– Catching Intruders
Evaluating SOC Activities
Appendix A: Methodology