Seemplicity

63 STATS2 REPORTS

All Statistics

Fewer than 1 in 5 organizations use structured prioritization models.

VulnerabilitiesVulnerability remediation

30% cite budget limitations as their biggest barrier to adopting additional solutions.

VulnerabilitiesBudgetInvestment

Nearly 40% of organizations still rely on manual workflows for most of their vulnerability remediation processes.

VulnerabilitiesVulnerability remediation

1 in 5 organizations take four or more days to fix critical vulnerabilities.

VulnerabilitiesVulnerability remediation

85% of organizations believe their cross-team collaboration is strong.

VulnerabilitiesVulnerability remediation

49% measure success of vulnerability remediation by mean time to remediation.

VulnerabilitiesVulnerability remediationRemediation

91% of organizations experience delays in vulnerability remediation.

VulnerabilitiesVulnerability remediation

86% of organizations are increasing their security spending in 2025.

BudgetInvestment

61% of organizations still measure success of vulnerability remediation by the number of vulnerabilities resolved.

VulnerabilitiesVulnerability remediation

54% measure success of vulnerability remediation by fewer breaches.

VulnerabilitiesVulnerability remediationData breach

91% of organizations experience delays in vulnerability remediation.

VulnerabilitiesVulnerability remediation

39% of firms are using AI to solve data overload problems that stymie vulnerability and exposure management work

AIAI for Data OverloadVulnerability ManagementProblem Solving

Speed of threat detection was used to evaluate AI efficacy by 57% of respondents

AIAI Efficacy EvaluationThreat Detection SpeedMetrics

Costs were an obstacle for 46% of respondents in effective use of AI.

AIAI ChallengesCosts

Endpoint security was a current application of AI in 52% of security tech stacks

AIAI ApplicationEndpoint SecurityCurrent Use

The majority of organizations (55%) say that they’ve enabled AI in under half the tools in their environments that have it available

AIAI DeploymentTool IntegrationLimited Adoption

Endpoint security (34%), antivirus/anti-malware (31%), and malware analysis (31%) were the security tech categories where AI is thought to be the most overhyped

AIAI HypeEndpoint SecurityAntivirus/Anti-malwareMalware Analysis

Basic vulnerability scanning was a current application of AI in 47% of security tech stacks

AIAI ApplicationVulnerability ScanningCurrent Use

About 16% of security teams say their use of AI has been very beneficial and have made it a core part of their program

AIAI BenefitsProgram CorePositive Impact

Antivirus/anti-malware was a current application of AI in 40% of security tech stacks

AIAI ApplicationAntivirusAnti-malwareCurrent Use

Approximately 56% of respondents reported that at least half of their security vendors tout their AI capabilities

AIAI MarketingSecurity VendorsHype

The top five vulnerability management problems they’re actively trying to solve with AI today were: false positives (49%), overload of data (39%), reliance on manual processes (33%), disparate results from scanning tools (31%), and false negatives (31%)

AIAI for Vulnerability ManagementFalse PositivesData OverloadManual Processes

46% of security teams primarily depend on AI that is embedded in their security tools and delivered by their vendors versus building their own

AIVendor-led AISecurity ToolsDeployment Model

Just 6% of respondents say that they fully outsource their AI training

AIAI TrainingOutsourcingResource Allocation

Security and privacy risks were a reason for turning off AI functionality, cited by 55%

AIAI GovernanceSecurity RisksPrivacy RisksFeature Disabling

Vendor reliability and maturity were a reason for turning off AI functionality, cited by 50%

AIAI GovernanceVendor ReliabilityVendor MaturityFeature Disabling

A lack of transparency and explainability was the top reason for turning off AI functionality, cited by 58%

AIAI GovernanceTransparency IssuesFeature Disabling

Around 45% say that AI is moderately beneficial and they’re starting to note the benefits

AIAI BenefitsModerate ImpactPositive Perception

Incident response was the second security function where AI will provide the most value in the next 3 years, cited by 59% of respondents

AIAI ValueIncident ResponseFuture Potential

77% of respondents reported that one or more of those vendors had overhyped their AI performance or are underdelivering on their promises

AIAI HypeVendor PerformanceUnderdelivering

The No. 1 security issue respondents are most hopeful that AI will help fix is the prioritization of disparate results from scanning tools, for which 82% are hopeful for gains

AIAI for PrioritizationScanning ToolsData AnalysisOptimism

21% say they apply AI to security through a mix of vendor-led and internal AI.

AIHybrid AI DeploymentVendor-led AIInternal AI DevelopmentDeployment Model

Sophisticated threat landscape was the most commonly cited security pain point, named by 60% of respondents

AISecurity Pain PointsThreat LandscapeChallenges

A scant 6% reported that AI is detrimental to their security program

AIAI ImpactDetrimentalNegative Perception

Difficulty in tuning, training, and supervising AI was an obstacle to the effective use of AI for 39% of respondents

AIAI ChallengesTuningTrainingSupervision

The top use case where security leaders say AI will offer most value is vulnerability and risk management, named by 74% of respondents

AIAI ValueVulnerability ManagementRisk ManagementFuture Potential

Third-party and supply chain risk was a big security pain point (42%)

AISecurity Pain PointsThird-Party RiskSupply Chain Risk

Just 25% of teams use AI to power vulnerability prioritization

AIAI ApplicationVulnerability PrioritizationCurrent Use

Just 18% have utilized GenAI to speed up summarization and reporting work

AIAI ApplicationGenerative AIReportingSummarization

82% were optimistic about AI applicability to sifting through disparate results from scanning tools

AIAI OptimismScanning ToolsData AnalysisFuture Expectations

81% were optimistic about AI applicability to dealing with overload of data

AIAI OptimismData OverloadFuture Expectations

Lack of skilled personnel is the biggest obstacle to the effective use of AI in cybersecurity today, cited by 55% of respondents

AIAI ChallengesSkilled Personnel ShortageObstacles

Lack of transparency in AI decision making was an obstacle for 46% of respondents in the effective use of AI.

AIAI ChallengesTransparencyExplainability

Just a fraction of respondents said that their tools come trained and/or tuned — 5%

AIAI DeploymentPre-trained ModelsOut-of-the-box

Just over half of respondents said that they regularly disable AI functionality in some or all security tooling due to a range of considerations

AIAI GovernanceFeature DisablingControl

1 in 5 respondents reporting that 75% or more of their tool stack promotes AI capabilities

AIAI MarketingSecurity ToolsHype

Approximately 19% say they primarily apply AI to security through their own internal data science work

AIInternal AI DevelopmentData ScienceDeployment Model

Approximately 1 in 4 organizations said they’re concerned about how AI use in the enterprise will make them more attackable (AI and generative AI concerns)

AIAI RisksAttack SurfaceGenerative AIConcerns

Only 18% use AI to bolster vulnerability remediation workflows

AIAI ApplicationVulnerability RemediationCurrent Use

46% of firms say that they’re actively trying to use AI to solve false positive issues

AIAI for False PositivesVulnerability ManagementProblem Solving