Do you really want to give adversaries nearly seven months, undetected, to explore your network? Unfortunately that’s the norm at the moment.

The mean time required to identify a cyber attack is 197 days, and the mean time to contain was 69, according to the Ponemon’s Institute’s 2018 Cost of a Cyber Breach Study. Ponemon also said the global average cost of a data breach is up 6.4 percent over the previous year to $3.86 million, with the average cost for each lost or stolen record containing sensitive and confidential information increasing to $148.

Perhaps the most telling Ponemon statistic: Companies that contained a breach in less than 30 days saved more than $1 million versus those that needed more than 30 days to resolve.

Every moment counts

But with security operations teams often understaffed and overwhelmed by alerts … and security sensors and tools siloed … and with too many panes of glass to monitor, it’s no surprise it takes so long to detect and contain attacks.

We must change how we tackle the problem

To change the game, we need to shift the focus from prevention to rapid detection and response—getting in front of the adversary. With an understanding of their tactics, techniques and protocols, we have the opportunity at each stage of the attack lifecycle to detect and contain them before they hurt the business.

That’s the approach we’re taking with Accenture Security’s Managed Detection and Response (MDR). A fully managed service run through our global delivery centers, Accenture MDR orchestrates and automates the detection and containment of attacks on our clients’ networks, reducing the time to detect and resolve attacks from weeks and often months to minutes and hours. In addition, Accenture MDR incorporates threat hunting based on industry-tailored intelligence to find adversaries who evade standard security controls.

With MDR, security organizations can:

  • Understand the threats: MDR offers industry specific threat intelligence based on customized threat collection capabilities and dark web scouring.
  • Accelerate responses: Organizations can condense the time from detection to response from weeks/months to minutes/hours through pre-defined MDR plays that automate alert triage and threat remediation.
  • See across the enterprise: MDR fully extends monitoring, from security controls to network infrastructure, endpoints and cloud.
  • Proactively find adversaries: Using tailored use cases for clients and their respective industry, MDR develops threat hunt campaigns to find and resolve threats lurking in the noise to minimize damage and loss.
Who can benefit from MDR?

This managed solution is for any organization that values global-scale, industry-focused security expertise without the capital expense and headache of juggling multiple tools. In fact, if you are considering security information and event management (SIEM) solutions, endpoint detection and response (EDR), security orchestration, automation and response (SOAR), or outsourcing some or all of your SOC operations, you are already starting down the path of MDR. Now is a good time to look at Accenture’s MDR playbooks that orchestrate detection and response across these toolsets.

For audit committees, business line leaders, CROs, CIOs and CISOs, the pain associated with breaches is clear. Now, thanks to Accenture MDR, the path to a solution is as well.

For more, visit Accenture Security Managed Detection and Response.


Accenture Security

Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence.  Follow us @AccentureSecure on Twitter or visit us at

Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. All materials are intended for the original recipient only. The reproduction and distribution of this material is forbidden without express written permission from Accenture. The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates. Given the inherent nature of threat intelligence, the content contained in this report is based on information gathered and understood at the time of its creation. It is subject to change. Accenture provides the information on an “as-is” basis without representation or warranty and accepts no liability for any action or failure to act taken in response to the information contained or referenced in this report.

Copyright © 2020 Accenture. All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks

Anup Ghosh

Managing Director – Platforms Lead

Subscription Center
Subscribe to Security Blog Subscribe to Security Blog