DevOps and Security Glossary Terms

Glossary Terms
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Threat Detection and Response (TDR) - definition & overview

In this article
What is threat detection and response?
Five threat detection and response challenges
What threats are the focus of threat detection and response?
Sumo Logic supports threat detection in the cloud
What is threat detection and response?
Five threat detection and response challenges
What threats are the focus of threat detection and response?
Sumo Logic supports threat detection in the cloud

What is threat detection and response?

Threat detection allows a security team to quickly and accurately identify a potential threat to the network, applications or other assets within the network. Without the ability to recognize network intruders or other malicious adversaries in a timely fashion, IT security analysts have no hope of responding effectively to a security incident and effectively mitigating damage.

Key takeaways

  • Threat detection describes the ability of IT organizations to quickly and accurately identify threats to the network, applications, or other assets within the network.
  • The first step to an effective threat detection and response process is understanding what threats are present in the cyber environment.
  • Cyber security professionals face unprecedented challenges in threat detection and response: complex cloud environments, disconnected tool suites, staffing challenges.
  • There are many types of cyber security software solutions that can be deployed by enterprise IT organizations to support the timely detection of threats and help streamline or even automate the response.

Five threat detection and response challenges

With more IT organizations moving assets into the cloud, there is more opportunity than ever for a threat actor to conduct successful cyber attacks––especially those that result in a data breach. Here are the primary challenges cybersecurity professionals face:

Endpoint protection

Remote and hybrid work, bring your own device (BYOD) policies and a lack of visibility across devices connecting to networks and accessing data have made it increasingly difficult for security operations (SecOps) to maintain adequate oversight of access management, endpoint security and identity threat detection.

Network detection

Modern networks are complex and dynamic, making it difficult for the security operations center (SOC) to keep track of all the devices, applications and connections within the network. Encrypted network traffic makes detecting and analyzing malicious activity difficult for a security analyst.

Unknown threats

The advent of AI and machine learning have ushered in a new generation of cybersecurity threats that exceed the MITRE ATTCK framework. These cyber threats are designed to evade detection and can be particularly dangerous because they can exploit vulnerabilities that organizations are unaware of.

Tool sprawl

IT organizations rely on a range of cyber security tools to assist with threat detection and response. While more than one software tool is needed to support an effective threat response, a disconnected tool suite with disparate components can make it difficult and time-consuming to detect suspicious activity, whether from an advanced threat or a known threat.

Staffing challenges

The cybersecurity industry faces a skills shortage when it comes to qualified cyber security professionals. A third-party threat detection service, or managed detection, can help with overall cloud security, incident response and security threat monitoring, but providers must stay current with the latest threat intelligence and have the necessary skills and expertise to detect and respond to sophisticated attacks.

What threats are the focus of threat detection and response?

The first step to an effective threat detection and response process is understanding what threats are in the cyber environment. This shortlist covers several of the most common types, but there are more out there, and new ones appear all the time.

Malware includes any malicious software program. Malware programs include spyware, viruses, trojan horse applications and other applications that can infect your computer or network, stealing sensitive information and otherwise wreaking havoc and chaos.

Phishing attacks trick the recipient into volunteering sensitive data. They usually consist of an email that requests the recipient to provide sensitive information. They may also include a link to a web page that has been spoofed to resemble a familiar site where the visitor might enter login information or other personal details.

Ransomware is malware that locks or disables a computer and asks the user to pay to regain access.

A DDoS attack happens when a cyber attacker uses a network of remotely controlled computers to flood a website or network with traffic, usually in an attempt to disable the server.

A botnet is a network of infected computers. Some hackers realized that instead of writing a virus that makes your computer go haywire, they could write a program that makes your computer send spam emails to others with malicious attachments or participate in a DDoS attack. You may not even know that your machines are affected.

A blended threat uses multiple techniques and attack vectors simultaneously to attack a system.

Zero-day threats are new threats that nobody has seen before. They result from the arms race between IT organizations and cyber attackers. Because they are brand new, zero-day threats are unpredictable and difficult to prepare for.

Advanced persistent threat (APT) is a sophisticated cyber attack that includes long-term surveillance and intelligence gathering, punctuated by attempts to steal sensitive information or target vulnerable systems. APTs work best when the attacker remains undetected.

Sumo Logic supports threat detection in the cloud

Just as cyber attackers may deploy a range of threats to target security vulnerabilities within a cloud infrastructure, IT organizations can leverage a variety of software tools and applications for threat intelligence. These include, but are not limited to:

Sumo Logic's cloud-native platform helps IT organizations expand their threat detection and response capabilities for cloud environments. With Sumo Logic, IT organizations can:

  1. Collect and aggregate security event data from a broad range of security software solutions into a single unified system

  2. Parse security logs with data analysis driven by machine learning and pattern recognition algorithms

  3. Automate the discovery of trends and patterns that could indicate a security event while cross-referencing data with the newest threat intelligence from CrowdStrike

  4. Configure alerts to cyber security professionals when a threat is detected, ensuring a timely review and response

  5. Program automated threat responses to begin damage mitigation and system restoration immediately when a threat is discovered

  6. Quickly perform root cause analysis and patch vulnerabilities

Sumo Logic helps IT organizations execute proactive threat hunting and zero trust security with advanced threat detection, threat intel and data protection from malicious cyber attacks. Learn more in our ultimate guide to SIEM.

Complete visibility for DevSecOps

Reduce downtime and move from reactive to proactive monitoring.