
The 2025 Pulse of the AI SOC report examines the increasing pressure on Security Operations Centers (SOCs) as they face unprecedented operational challenges. Chapter 2, “Why the SOC Is Breaking,” discusses the growing issues pushing SOCs toward their breaking point. Confronted with a flood of alerts, ongoing staffing shortages, and fragmented tool ecosystems, SOCs find it hard to keep up with today’s ever-changing threat landscape. From alert fatigue and analyst burnout to critical visibility gaps in identity and cloud environments, this chapter highlights the systemic issues that weaken SOC effectiveness. It suggests a need to rethink traditional security operations approaches.
Security teams worldwide are grappling with an overwhelming surge in data, escalating alert volumes, and critical blind spots in identity and cloud security. The fragmented nature of security tools further compounds the issue, creating a disconnect between emerging threats and the capacity of human analysts to respond effectively. As a result, many SOCs are nearing a breaking point. Let’s examine the key factors driving this growing challenge.

SOCs face a growing crisis: alert fatigue. A remarkable 77% of organizations report increased alert volumes, with nearly half (46%) seeing a rise of over 25% in the past year alone. This surge is often driven by dozens of disconnected platforms that fail to properly correlate signals, resulting in alert fatigue for 76% of security leaders and leaving SOC teams overwhelmed with noise instead of actionable intelligence.
The outcome is clear: an overload of alerts lacking the context needed to identify what truly matters. SOCs are overwhelmed, and the human cost is mounting. To address this, organizations must focus on smarter alert management, automation, and analyst support to regain clarity and strength in their security efforts.

The human element within the SOC is reaching a breaking point. 73% of organizations report analyst burnout and ongoing staffing shortages. A significant 64% say their detection, triage, and investigation processes are still largely manual, adding unsustainable pressure on already overwhelmed teams working with fragmented toolsets. This makes it very hard for analysts to keep up with the demands.
Despite the overwhelming amount of data, SOCs suffer from dangerous visibility gaps. A shocking 96% of respondents report critical blind spots, most commonly in cloud infrastructure (74%) and identity and access behavior (67%). These gaps are not minor inconveniences; they directly align with three of the top four threat concerns identified: identity-based attacks (like account takeover), phishing, and cloud-specific risks. Often, these gaps arise because organizations make operational trade-offs, prioritizing affordability over complete visibility, which leads them to skip high-value data sources due to costly or complex ingestion pipelines. Consequently, critical signals from cloud, SaaS, and identity systems are frequently missed or underutilized.

The issue isn’t always a shortage of tools, but rather an overabundance of them. Only 12% of respondents use fewer than 10 tools for threat detection, investigation, and response, while 45% rely on 20 or more. Each tool gathers different signals and uses unique analytics, creating silos where an identity anomaly in one system, an endpoint alert in another, and unusual cloud activity in a third could all be part of the same incident but remain unlinked. This tool proliferation causes operational friction throughout nearly every stage of the incident lifecycle, resulting in a delayed unified response.

Even when organizations have the right tools, onboarding new data sources into the SIEM remains a significant operational bottleneck. Only 4% of respondents can fully onboard a new feed in under a day, with the largest group (41%) reporting a timeline of one to four weeks, and 32% stating it takes between one and six months. This means over 70% of organizations spend weeks or more before new telemetry becomes actionable. This delay leaves analysts “flying blind” in critical areas where visibility is most urgently needed.

The SIEM remains a foundational component of the SOC, but most current deployments are falling short. 78% of organizations are either dissatisfied, stuck with limitations, or forced to augment their current SIEM solutions to achieve broader detection goals. Many existing SIEMs were not designed for today’s dynamic, identity-driven threat landscape. While augmenting SIEMs with additional tools like UEBA and ITDR can address gaps, it also carries the risk of fueling further tool sprawl, complexity, and data silos, potentially weakening overall security without seamless integration.

While existing complexities often overshadow newer attack trends, evolving threats, including AI-powered techniques, are rising rapidly, with 55% of respondents choosing them as a top five challenge. Attackers are not abandoning known tactics; instead, they utilize AI to enhance and scale what already works, exploiting existing weaknesses more quickly and effectively. This adds another layer of sophistication that traditional detection methods, such as rules and signatures, can no longer effectively counter.
The current state of SOCs reveals an environment under immense pressure. From the overwhelming volume of alerts and the strain on human analysts to critical visibility gaps, fragmented tooling, and the limitations of legacy systems, the challenges are multifaceted and interconnected. These issues necessitate a strategic shift, prompting many organizations to view AI not just as the next innovation, but as a practical path to scaling, speeding up, and enhancing resilience in their security operations.
SOCs address alert fatigue, analyst burnout, and staffing shortages resulting from high alert volumes and false positives.Manual triage, tool sprawl, and evolving AI-driven threats further burden operations.
77% of organizations report an increase in alert volume, with 46% experiencing spikes of over 25% in the past year—contributing to widespread alert fatigue.
96% of SOCs lack complete visibility, particularly in cloud infrastructure (74%) and identity behavior (67%), resulting in critical blind spots in threat detection.
Visibility gaps arise from budget constraints, integration delays, and challenging trade-offs in data intake—especially for cloud, SaaS, and identity telemetry.
Tool sprawl across 10–30+ platforms leads to siloed data and delayed incident response, making it hard to correlate signals and act swiftly.
Over 70% of organizations spend weeks or months onboarding new feeds, which delays obtaining actionable insights from crucial sources, such as cloud and identity data.
78% are dissatisfied, citing poor fit for modern threats and dependence on auxiliary tools that add to complexity.
SIEMs must evolve into unified detection platforms that feature built-in behavioral analytics, cloud identity visibility, and real-time investigation capabilities.