New EMA Research Reveals Strong Adoption of Data-Driven Security

Share Article

Lastest EMA Research Study Identifies Trend Transforming the Nature of Security

It may surprise some to see the extent to which enterprises are embracing data-driven security.

In “The Rise of Data-Driven Security,” a new study of 200 medium-sized to large enterprises worldwide, Enterprise Management Associates (EMA) has made some eye-opening discoveries about the extent to which organizations are embracing a more data-driven approach to information security:

  •     50 percent of all respondents report that they are already employing enterprise data warehouse technology in support of security efforts.
  •     This is in addition to the Security Information and Event Management (SIEM) systems in place among 79 percent of those collecting security log and event data.
  •     26 percent of all respondents report the use of NoSQL and Hadoop environments. Another 28 percent plan to evaluate Big Data environments for security data management.
  •     38 percent are currently expanding their investment in better security data management and analytic technologies – and another 40 percent plan to expand this investment in the next 1 to 3 years.
  •     32 percent are currently expanding their investment in personnel expertise in security data management and analytics – and another 44 percent plan to expand this investment in the next 1 to 3 years.

Businesses need this capability to handle an avalanche of security data. Among respondents knowledgeable about security log and event data management in their organizations:

  •     58 percent collect 50 gigabytes or more of this data each day. When measured in numbers of events (assuming 300 bytes per event), this equates to more than 166 million events daily.
  •     15 percent gather more than 1 terabyte – the equivalent of over 3 billion log events – each day.

At the same time, organizations see opportunity in large and growing volumes of security-relevant data:

  •     73 percent of all respondents would collect more security-related data, or a wider variety of data, if they could make use of it.
  •     More respondents (48 percent) expect security technology vendors to lead the expansion of data-driven security than any other entity (including enterprises and government organizations) in the next 1 to 3 years. 46 percent expect this leadership from providers of professional and managed security services.

In this report, EMA Managing Research Director Scott Crawford explores three domains of the trend:

  •     Data-driven security management and strategic initiatives that enable organizations to expand their insight into threats and malicious activity, and manage security on a more objective basis.
  •     Emerging data-driven tactics of defense among security vendors and service providers whose competitive interests and resources give them both the motivation and the means to advance the field.
  •     Examples of data sources that fuel these initiatives, and how techniques for managing and analyzing that data are evolving

“It may surprise some to see the extent to which enterprises are embracing data-driven security,” says Crawford. “Our data indicate that organizations may be farther along than many suspect, giving data-driven efforts the potential to transform information security in many ways. The motivation and ability of vendors to capitalize on data-driven techniques are expanding these initiatives as well, aligning with vendor Cloud strategies and extending the benefits to a much wider range of businesses.”

“The Rise of Data-Driven Security” will be published by EMA next week, in concert with a Wednesday, May 23 Webinar in which Crawford will discuss research highlights. To attend, register at

About Enterprise Management Associates (EMA)
Founded in 1996, Enterprise Management Associates (EMA) is a leading industry analyst firm that provides deep insight across the full spectrum of IT and data management technologies. EMA analysts leverage a unique combination of practical experience, insight into industry best practices, and in-depth knowledge of current and planned vendor solutions to help its clients achieve their goals. Learn more about EMA research, analysis, and consulting services for enterprise line of business users, IT professionals and IT vendors at or You can also follow EMA on Twitter or EMA on Facebook.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Raleigh Gould