<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=3040194&amp;fmt=gif">

Automate Secops Efficiency with AI-Driven Insights

SOC INSIGHTS

Apply AI-Driven analytics to turn vast amounts of event, network, ecosystem, and DNS intelligence data into actionable insights to elevate SecOps efficiency

2024-12-03 22:26:40

|

GBI, Industry News

BARRIERS TO SECOPS EFFICIENCY
As with other functions of business or government organizations today, the modern SOC struggles to do more with available resources. According to the SANS 2023 SOC Survey1, 80% of the top 10 SOC barriers to making full use of SOC capabilities fall into three areas:

- Understanding and dealing with alerts
- Limited integration or automation between tools
- Performing key tasks with available staff and skills


But the most truly tragic statistic may be that all these barriers have been challenging the SOC for over a decade. The incremental improvements from simply auto-prioritizing incidents based on malware rankings and other basic filters have not been able to keep pace with the growth of alerts and other events that may need SOC analyst attention. So, things have only become worse. 

AI-DRIVEN SOC INSIGHTS

Modern persistent threats depend on flexible attacker infrastructure and dynamic C2 systems to host and deploy the numerous pen-test, exploit, encryption, and other tools involved in even a single attack. This makes them extremely dependent on DNS and highlights a key weakness that defenderscan exploit to detect and disrupt these threats.

DNS sees legitimate and malicious activity regardless of protocol, platform, OS,
application, or even location. With this unique visibility, a pilot program under
the Director of the Cybersecurity Directorate at the NSA revealed that securing
DNS can reduce malware attacks by 92%!

SOLVING MULTIPLE PROBLEMS WITH A RANGE OF INSIGHTS
Post-incident or -breach investigations often reveal that early indicators of malicious activity were missed due to misconfigurations, security tool integration challenges, or simple alert overload. SOC Insights applies AI-driven analytics into a vast amount of data to help address these risks.

Security Insights
The Security add-on for SOC Insights is available for BloxOne Threat Defense ‘Business Cloud’ or ‘Advanced’, uses AI to distill vast amounts of event, network, ecosystem, and DNS visibility and intelligence into a manageable set of actionable, security insights.


• Zero Day DNS™
• Persistent Threat
• Active Threat Spreading
• Major Attack
• Botnet Discovery
• Outlier Communication
• Phishing
• Malware
• Open DNS Resolver
• DNS Tunneling
• Data Loss Activity
• Targeted Attack
• Excessive DNS Errors
• Monitored Lookalike Domain


Configuration Insights
The Configuration feature of SOC Insights is included with BloxOne Threat Defense ‘Business Cloud’ and ‘Advanced’ to help users ensure they are taking full advantage of current best practices and avoiding common mistakes. Follow videos and other guides to help address mistakes and weaknesses or deactivate unnecessary warnings for allowed exceptions.

• DNS Threat Feed Missing
• VirusTotal Free Key Missing
• Security Policy needs Optimizing
• DNS Failover Check Failure
• Feed Action Mismatch
• DFP Hiding Asset Details
• Security Policy in Logging Mode
• Web Content Filers OFF
• High-risk Web Content Allowed



A POSITIVE FINANCIAL, OPERATIONAL, AND BUSINESS IMPACT
While most security tools can promise little more than ‘ease of use’ and ‘fewer breaches,’ SOC Insights can do much more, ranging from reducing analyst stress and turnover to reducing many security concerns from expansion, M&A, and other business initiatives. For example:


- The nature of DNS makes it easy to unify a new location or business partner onto a common DNS infrastructure in minutes rather than months.

- Configuration Insights are highly proactive to help mitigate breaches or data loss due to ‘misconfiguration’, one of the top 3 factors reported in error-
related breaches3.

- Autocorrelation of “Malware,” “Phishing,” “Botnet,” and other “Major” or
“Spreading’ activities empowers responders to address many threats at once,
raising their efficiency.

- Move to a more proactive security posture with the ability to monitor insight
categories such as “Outliers”, “DNS Tunneling” and “Open Resolver”, as well as BloxOne Threat Defenses unique lookalike and application visibility features.


AMAZING RESULTS
Customers report significant benefits using SOC Insights with BloxOne Threat Defense
including:

- Reduced EDR and FW Alerts by 50%

- Saved an average of 500 SOC analyst hours per month

- Realized $400k in productivity savings per year

- Intelligence integration of the security ecosystem improves the ROI of the entire security stack by offering actionable ‘insights’ instead of just raw logs and events.

- SOC Insights auto-collects relevant data and enables analysts to see and pivot around that data to reach conclusions faster and with greater confidence. This contributes to lower stress and higher retention of skilled and experienced security professionals.


UPLIFT SIEM, SOAR, AND OTHER PARTS OF THE ECOSYSTEM WITH INSIGHTS
SecOps knows the value and limitations of sharing raw data around the security ecosystem. This has made SIEM and SOAR expertise one of the most challenging skill sets for most organizations. SOC Insights takes the burden off of these other tools and can share the resulting insights across the security stack to make other tools more effective, further uplifting overall SecOps efficiency.

FACTS & FIGURES

- 60% of SOC analysts say their workloads are growing, and 65% are likely to change jobs in the next year4.

- 55% of survey respondents said that critical alerts are being missed often on a weekly and
even daily basis.

- 64% of analysts say manual work eats up more than half of their time.

- Misconfiguration is one of the top 3 factors in error-related breaches.

- 8 of the top 10 barriers preventing full SOC utilization involve alerts, tool integration, and skill shortages

- 77% of CEOs are worried about the availability of key skills.

- 92% of malware and C2 activity can be controlled at the DNS layer with the right DNS intelligence and visibility

 

1 “SANS 2023 SOC Survey”, June 2023, by Chris Crowley, Barbara Filkins, John Pescatore
2 “NSA launches pilot program to secure defense contractors”, June 18, 2020, by Lauren C. Williams, NEXTGOV/FCW
3 “Verizon 2023 DBIR Report”
4 Voice of the SOC Analyst
5 The Orca Security 2022 Cloud Security Alert Fatigue Report
6 Voice of the SOC Analyst
7 https://www.pwc.com/m1/en/publications/five-challenges-cloud-adoption-how-overcome-them.html