Try our corporate solution for free!
(212) 419-8286

Reusing threat intelligence data in IT security analytics worldwide 2015

This statistic shows the main ways in which threat intelligence data is reused within information security worldwide, according to a 2015 survey conducted by the SANS Institute. As of 2015, 22.5 percent of respondents said their business did not correlate security event data with either internal intelligence data or external threat intelligence tools.

Use of threat intelligence data in information security worldwide in 2015*

Loading statistic...
You need to log in to download this statistic
Register for free
Already a member?
Log in
Show detailed source information?
Register for free
Already a member?
Log in

Release date

November 2015



Survey time period


Number of respondents

476 respondents

Supplementary notes

* The source does not provide information on the original wording used during the survey. Thus, the wording chosen for this statistic may differ from the one in the survey.
The original answer was phrased by the source as follows: "Have a security analytics system that handles the intake of intelligence automatically behind the scenes and correlates this against whitelisting/blacklisting and reputational information".
SIEM stands for Security Information and Event Management.

Statista Accounts: Access All Statistics. Starting from $468 / Year
Basic Account
Get to know the platform

You only have access to basic statistics.

Single Account
The ideal entry-level account for individual users
  • Instant access to 1m statistics
  • Download in XLS, PDF & PNG format
  • Detailed references
$59 $39 / Month *
in the first 12 months
Corporate Account
Full access

Corporate solution including all features.

* Prices do not include sales tax.

Statistics on "Cyber security in the Netherlands"

Statista Accounts: Access All Statistics. Starting from $468 / Year
Learn more about how Statista can support your business.