Next Article in Journal
EvoContext: Evolving Contextual Examples by Genetic Algorithm for Enhanced Hyperparameter Optimization Capability in Large Language Models
Previous Article in Journal
HyADS: A Hybrid Lightweight Anomaly Detection Framework for Edge-Based Industrial Systems with Limited Data
Previous Article in Special Issue
InDepth: A Distributed Data Collection System for Modern Computer Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Review

Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review

1
Department of Mathematics, Statistics & Computer Science, University of Wisconsin-Stout, Menomonie, WI 54751, USA
2
Department of Marketing and Information Systems, Université du Québec à Trois-Rivières, Trois-Rivières, QC G9A 5H7, Canada
3
Department of Accounting, Université du Québec à Trois-Rivières, Trois-Rivières, QC G9A 5H7, Canada
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(11), 2252; https://doi.org/10.3390/electronics14112252
Submission received: 30 April 2025 / Revised: 22 May 2025 / Accepted: 29 May 2025 / Published: 31 May 2025
(This article belongs to the Special Issue Advancements in Network and Data Security)

Abstract

The escalating scale and sophistication of cyber threats compel enterprises to urgently adopt data-driven security analytics. This systematic literature review, adhering to the PRISMA protocol, rigorously synthesizes current knowledge by analyzing 65 peer-reviewed studies (2013–2023) from six major databases on enterprise-level cybersecurity analytics. Our findings reveal a significant industry-wide transition from traditional signature-based tools towards advanced cloud-enabled, big-data and artificial intelligence-powered techniques, where machine learning and graph-based models are increasingly prominent in recent works. While large organizations in finance, Information and Communication Technology, and critical utilities spearhead adoption, dedicated research focusing on small and medium-sized enterprises (SMEs) remains notably limited. Ten thematic observations encapsulate key adoption drivers, an evolving preference for proactive and predictive security strategies, the critical role of heterogeneous log and network data, and persistent implementation challenges-notably data integration, skills shortages, and cost. Furthermore, this review identifies crucial open research avenues, including the development of real-time scalable analytics, unified policy languages, and critically needed SME-oriented solutions. Collectively, these insights provide a robust evidence base to inform future research trajectories and guide the practical deployment of effective cybersecurity analytics in diverse enterprise settings.
Keywords: cybersecurity analytics; PRISMA; enterprise security; systematic literature review cybersecurity analytics; PRISMA; enterprise security; systematic literature review

Share and Cite

MDPI and ACS Style

Le, T.D.; Le-Dinh, T.; Uwizeyemungu, S. Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review. Electronics 2025, 14, 2252. https://doi.org/10.3390/electronics14112252

AMA Style

Le TD, Le-Dinh T, Uwizeyemungu S. Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review. Electronics. 2025; 14(11):2252. https://doi.org/10.3390/electronics14112252

Chicago/Turabian Style

Le, Tran Duc, Thang Le-Dinh, and Sylvestre Uwizeyemungu. 2025. "Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review" Electronics 14, no. 11: 2252. https://doi.org/10.3390/electronics14112252

APA Style

Le, T. D., Le-Dinh, T., & Uwizeyemungu, S. (2025). Cybersecurity Analytics for the Enterprise Environment: A Systematic Literature Review. Electronics, 14(11), 2252. https://doi.org/10.3390/electronics14112252

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop