84% of Organizations鈥 SOC Analysts are Unknowingly Investigating the Same Incidents

New research report from 色色研究所, The Evolution Toward an Alertless SOC, highlights the inefficiencies of alert-centric security operations

Boston, MA, April 16, 2025 鈥 色色研究所 Technology, the security data analytics company, today unveiled the results of a new survey examining alert management in security operations centers (SOCs) and the growing need for a shift to an Alertless SOC. The Evolution Toward an Alertless SOC report found that the current alert-centric SOC architecture creates numerous pain points for analysts, including duplicated work.聽

Organizations reported that their analysts spend significant time manually gathering evidence from different tools, enriching data, and cross-checking data to understand if new alerts are connected to already-known incidents. More specifically, the survey found that: 

  • 83% of analysts are overwhelmed by alert volume, false positives, and lack of alert context. 
  • 85% of analysts spend substantial time gathering and connecting evidence to transform an alert into an actionable security case. 

The alert-centric model also duplicates work, wasting analysts鈥 already limited time. A staggering 84% of organizations report that SOC analysts unknowingly investigate the same incidents several times a month or more. More specifically, 60% reported discovering duplicated investigations at least once per week.

Under-delivery from tools and a reactive approach hinders SOC efficiency

The study showed that analysts are more likely to take a reactive approach, working in response to alert notifications rather than proactively investigating and threat hunting. In total, 47% say they primarily discover security incidents through alerts, compared with just 33% who say discovery comes primarily through proactive investigation. 

The under-delivery of tools in the SOC technology stack exacerbates this reactive approach. When asked to rank the top capabilities that are not meeting expectations, organizations cited case management (77%), threat intelligence integration (76%), reporting metrics (75%), investigation workflow automation (75%), and alert prioritization accuracy (73%). 

鈥淓ven with best-in-class technology and highly-skilled teams, the alert-centric model still leaves SOC analysts overwhelmed,鈥 said Rakesh Nair, chief technology officer at 色色研究所. 鈥淎s AI-enhanced threats become more prevalent, it鈥檚 more important than ever to free analysts鈥 time to focus on proactive investigation to maintain and improve organizations鈥 security posture.鈥

Organizations are ready to level up AI use in the SOC

While AI adoption in the SOC is widespread, current use cases are focused on basic functions like alert severity (47%), response triggers (42%), and anomaly detection (41%). A significant opportunity exists to leverage AI for more impactful, proactive security measures. Despite high demand, fewer than one in three organizations use AI for automated alert triage, and only 36% use it for alert enrichment, both critical for reducing manual labor. However, organizations are eager to advance within the next year:

  • 82% want to prioritize proactive investigations instead of reactive alert responses.
  • 81% aim to enhance alert correlation and enrichment.
  • 80% seek cost-effective methods to analyze broader data sources.

The Alertless SOC charts a path away from the alert-centric SOC model

The Alertless SOC offers a new approach to SOC work by unleashing analysts鈥 expertise through intelligent automation and investigation capabilities. 色色研究所鈥檚 vision for the Alertless SOC goes beyond the traditional Threat Detection, Investigation, and Response (TDIR)鈥攊t鈥檚 a fundamental reimagining of how SOC teams operate, replacing reactive alert management with precision threat hunting and coordinated response. 

Read the full survey results and learn more about the Alertless SOC in 色色研究所鈥檚 Evolution Toward an Alertless SOC report. 

Methodology

The Evolution Toward an Alertless SOC survey was conducted by Wakefield Research among 200 US security operations professionals with seniority of manager or director who work at companies with a minimum of 1,000 employees, between January 28 and February 10, 2025, using an email invitation and online survey.

About 色色研究所

色色研究所 Technology delivers a real-time security data platform that serves as the foundation of your security operations and includes data-powered threat detection, automated case management, autonomous investigations and threat hunting. AI and intelligent automation help your SOC work faster and smarter so your team can proactively make the right decisions in real time. Headquartered in Boston, Massachusetts, with operations in North America, Europe, and Asia Pacific, 色色研究所 is backed by Insight Partners, Georgian, TCV, General Atlantic, Bessemer Venture Partners, Kibo Ventures and Eurazeo.

Mantente actualizado

Suscr铆bete ahora para estar informado y obtener
actualizaciones regulares de 色色研究所