Mid-Market's future

If it's left behind the cybersecurity curve

The threat faced by mid-market organisations is huge and growing.

Yet, they do not always have access to the same level of protection as enterprises – even though the impact of a breach is often worse for smaller businesses.

Enterprises enjoy the latest cyber security solutions, which are managed by a team of skilled and highly trained cybersecurity professionals. Unfortunately, the same cannot be said for mid-sized organisations, which often make do with unsatisfactory products or a patchwork of point products that provide an ineffective defence. Some don’t have any defences at all.

43% of mid-market owners have no cybersecurity defence plan in place

An “alarming number of small businesses in the UK and US are not prepared for a potential cyber-attack or breach”. A study published in 2020 found that 43 percent of mid-market owners have no cybersecurity defence plan in place, leaving sensitive financial, customer and business data, at “significant” risk. One-third of companies with 50 or fewer employees admitted using free, consumer-grade cybersecurity, whilst one in five companies did not employ endpoint security solutions.

Mid-Market Security Solutions

There is hope for the mid-market yet. Thanks to the advent of extended detection and response (XDR) platforms and other systems which incorporate several different services into one unified solution, the mid-market is now beginning to gain access to enterprise grade security. Gartner described XDR as a “unified security and incident response platform that collects and correlates data from multiple proprietary components”.

It continued: “The platform-level integration occurs at the point of deployment rather than being added in later. This consolidates multiple security products into one and may help provide better overall security outcomes. Organisations should consider using this technology to simplify and streamline security.”

XDR has a clear benefit for mid-size businesses because it is more cost-effective than older solutions whilst offering significant performance benefits. When analysts from ESG asked security professionals about the threat detection and response systems, most said they were using security information and event management (SIEM). However, 57 percent said they have “struggled with issues” when using their SIEM, saying it was too expensive, required specialised resources and often led to an overload of data.

1/3 of companies with 50 or fewer employees admitted using free, consumer-grade cybersecurity

However, when ESG spoke with early adopters of XDR, they said it allowed them to spot a compromise in a shorter space of time due to the greater visibility it offers. The automation XDR provides would require the equivalent of eight full-time staff, ESG found, meaning it works like “a modern SOC-in-a-box”. This should be music to the ears of mid-sized businesses, for whom a fully-fledged Security Operations Centre may be out of reach.

A SOAR Point

It’s not just SIEM that has been found lacking. That other mainstay of security, SOAR (security orchestration, automation, and response), is lacking too. “SIEMs provide visibility, but they lack the orchestration and automation required to decrease response times,” wrote Al Huger, Senior Vice President and General Manager of Cisco’s Security Platform & Response organization for Cisco Secure.

“SOARs provide automation, but correlation is not straightforward and requires a lot of expertise. Neither option provides built-in response functionality. While larger companies can afford to do the lengthy process of calibrating and maintaining these solutions over time, it’s not possible for resource and time-constrained teams.” Which means that these solutions will not give mid-market companies the protection they need. On the other hand, XDR can provide an effective security posture whilst reducing costs and offering an integrated, unified platform that removes complexity.

The elusive dream of XDR is around the corner for the mid-market. The ability to protect the largest attack surface – web and email – by incorporating cloud, web, email, data loss prevention (DLP) and identity protection into one unified solution is here. It also acts autonomously – moving security from reactive to proactive, allowing services to respond to new threats and adapt to changing circumstances.

For the mid-market the “SOC in a box” promise is in reach. It’s Autonomous Extended Detection and Response – aXDR.

 

Related Articles
Cloud Security Top trends in cybersecurity 2022: Vendor consolidation
Cloud Security Empowering the people
Empowering the people

Critical cyber security challenges.

Cloud Security Will the mid-market be left behind the cyber security curve?
Cloud Security Data in the cloud heightens the insider threat
Data in the cloud heightens the insider threat

The insider threat that caused the security vs usability conundrum.

Cloud Security Lighten your cybersecurity load
Lighten your cybersecurity load

How a consolidated approach works.

Cloud Security Platform perspective for the mid-market
Platform perspective for the mid-market

Key insights and recommendations from Gartner.

Cyber Security Why security portfolios will fail as platforms prevail
Managed Security Services Technology leaders' guide to SASE
Technology leaders' guide to SASE

The what, why and how of SASE

Cyber Security Red alert for cybersecurity
Red alert for cybersecurity

5 steps for defence

Cyber Security Cyber Security ABCDs
Cyber Security ABCDs

What they are and how to get them right

Cyber Security 7 cybersecurity challenges facing financial institutions
Managed Security Services Protecting the mid-market against ransomware
Protecting the mid-market against ransomware

"The biggest cyber threat facing the UK"

[Video] Plan smart: The future is SASE
[Video] Plan smart: The future is SASE

The perimeter is no longer “entombed in a box”

Cloud Security Censornet Platform Data Sheet
Censornet Platform Data Sheet

Freedom. Visibility. Protection.

Cloud Security Slam the door shut on cyber attacks
Slam the door shut on cyber attacks

with this all-in-one solution

⚠️ The UK Mid-Market on Code Red
⚠️ The UK Mid-Market on Code Red

The state of the UK’s cyber security response

Cloud Security Ten steps to prepare for SASE adoption
eBook
eBook

Zero Trust and Beyond

Cloud Security Webcast: Human Security and Risk Management
Webcast: Human Security and Risk Management

How to protect your users with email security

Uncovering 0365’s Security Blind Spots
The Impact of Remote Working
Zero Trust, Maximum Security
Cloud Security Russia Arrests 14 members of Top Ransomware Gang in the World
Cloud Security CISOs:  Top 5 Concerns in 2022
Cloud Security Ukraine’s Digital Minister forms Social Media Army
Cloud Security Autonomous Cyber Security
Autonomous Cyber Security

Easing alert fatigue

Cloud Security Fortify the New Perimeter
Fortify the New Perimeter

Protect your data in the cloud

Cloud Security The Dangers of Ignoring Cyber Security Needs
Cloud Security Data in the Cloud
Data in the Cloud

And the heightened insider threat

Cloud Security Is Cyber Security Complexity
Is Cyber Security Complexity

Threatening your business?

Cloud Security Hacking is a 24-hour business
Hacking is a 24-hour business

9-5 attention no longer cuts it

Cloud Security Fortifying the New Perimeter
Fortifying the New Perimeter

Protect your data in the cloud

Share this story

To find out more, speak to one of our specialist

Rate the Article

Click the link below to rate this article

Rate this article

Here’s a single security platform that seems to provide all you need to protect your business from cyber attack and, refreshingly, they don’t put it all down to AI.

Learn More

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch