{"id":190685,"date":"2017-05-02T22:58:57","date_gmt":"2017-05-03T02:58:57","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/security-automation-is-maturing-but-many-firms-not-ready-for-cso-online\/"},"modified":"2017-05-02T22:58:57","modified_gmt":"2017-05-03T02:58:57","slug":"security-automation-is-maturing-but-many-firms-not-ready-for-cso-online","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/security-automation-is-maturing-but-many-firms-not-ready-for-cso-online\/","title":{"rendered":"Security automation is maturing, but many firms not ready for &#8230; &#8211; CSO Online"},"content":{"rendered":"<p><p>    The security automation industry is still in its infancy, with    most vendors just a year or two old, but there are already some    promising technologies that enterprises can put to use -- if    they have already laid the required ground work.  <\/p>\n<p>    The main problem that security automation is designed to    address is that there are so many attack attempts coming in, so    quickly, that human beings just can't keep up.  <\/p>\n<p>    Then there's the enormous amounts of money cybercriminals are    bringing in from ransomware and other attacks that allows them    to invest in new kinds of attacks, the threats posed by    nation-states, and the massive staffing shortage.  <\/p>\n<p>    It's a perfect storm.  <\/p>\n<p>    \"Even the biggest companies can't keep up,\" said Jon Oltsik,    senior principal analyst at Enterprise    Strategy Group.  <\/p>\n<p>    According to a survey the research firm conducted last fall, 91    percent of companies said that the time and effort required for    manual processes limits their incident response effectiveness, and the    same number are actively trying to increase their staffs.  <\/p>\n<p>    And 62 percent already have automated incident response    processes in place, and another 35 percent are beginning    automation and orchestration projects or plan to do so in the    next 12 to 18 months.  <\/p>\n<p>    \"Two years ago, nobody knew about this technology,\" said    Oltsik. \"Last year, I saw it a lot more. Now we're seeing    budget line items for it, and we also see a lot of venture    capitalist investment in this space as well.\"  <\/p>\n<p>    He estimates the market size of the security automation and    orchestration sector to be between $100 million and $200    million, with several small vendors in the $10 million to $20    million in sales range.  <\/p>\n<p>    Security automation, could, in theory, allow companies to    investigate incoming threats and respond to them immediately,    without human intervention -- at least, for the most common,    labor-intensive types of attacks. Security analysts would then    be freed up to focus on the more complex types of attacks.  <\/p>\n<p>    There have been some recent signs that this may be possible.  <\/p>\n<p>    \"We've had better detection accuracy,\" said Oltsik. \"The false    positive rates are lower. And we're using the cloud more, which    is throwing more processing power at some of these things.\"  <\/p>\n<p>    Most of the progress up until now has been in preventing    attackers from entering the enterprise in the first place. Anti    malware systems, next-generation firewalls, and other systems    that spot threat and block them.  <\/p>\n<p>    Most recently, threat intelligence comes with scoring systems,    said Oltsik. That allows companies to add more automation for    threats that have a very high likelihood of being very    dangerous, and handle the questionable cases with the old    manual processes.  <\/p>\n<p>    Some of the larger companies are also deploying orchestration    platforms. These allow for automated processes that involve    multiple systems.  <\/p>\n<p>    \"But these types of incidence response platforms are limited    right now to the elite organizations, the Fortune 500    companies,\" he said.  <\/p>\n<p>    In addition, companies also write scripts to create their own    automated processes from scratch, but this requires some    technical expertise.  <\/p>\n<p>    According to the most recent SANS Institute incident response survey,    most processes are still very manual.  <\/p>\n<p>    The most automated process, with 50 percent of respondents    saying they had some degree of automation, was for remotely    deploying custom content or signatures from security vendors.  <\/p>\n<p>    In second place, at 49 percent, was blocking command and    control to malicious IP addresses, followed by removing rogue    files, at 47 percent.  <\/p>\n<p>    Processes least likely to be automated included isolating    infected machines from the network during remediation, and    shutting down systems and taking them offline.  <\/p>\n<p>    But, overall, security automation is about 10 years behind the    automation of other technology processes, said Ariel Tseitlin,    partner at Foster City, Calif.-based investment firm Scale Venture    Partners.  <\/p>\n<p>    \"But we've seen the tremendous effect of automation in IT, and    we're gong to see that in security,\" he said.  <\/p>\n<p>    The prevention part of the security puzzle is the most    automated, he said. Then, in the past two years, detection has    seen an enormous amount of investment.  <\/p>\n<p>    Now, there's a lot of work being done on the boundary between    detection and response, where companies need to figure out    which of the issues they've spotted are real problems that need    to be investigated.  <\/p>\n<p>    \"Then, on the incident response side, there's an enormous    amount of work that is being done manually today,\" he said.    \"That's where I think a lot of the value will come over the    next couple of years.\"  <\/p>\n<p>    However, all the products available today are still in their    early stages, he said, and there are no clear established    leaders in this space.  <\/p>\n<p>    It makes sense to automate detection, but fully automating the    remediation process is risky, said Jay Leek, managing director    at ClearSky Cyber Security, a cybersecurity    consulting firm.  <\/p>\n<p>    \"I would always recommend, at least today, putting a person    between these two different divisions,\" he said. \"You don't    want to have false positives here.\"  <\/p>\n<p>    The individual steps of the remediation process could be    automated, he said, just as long as there's a human being    pushing the button to get it started.  <\/p>\n<p>    \"But i don't like the idea of automating the whole end-to-end    process today,\" he said. \"It's too immature and ripe for false    positives. The last thing you want to do is create some sort of    business disruption.\"  <\/p>\n<p>    There are vendors in the market who are already promising to    automate the entire process, including automatically re-imaging    end point devices and sending users off to anti-phishing    training, said Nathan Wenzler, chief security strategist at    AsTech Consulting.  <\/p>\n<p>    \"But at the end of the day, the reality is that anyone who's    been trying to do that at scale, that hasn't really worked    well,\" he said. \"They either get so many false positives, or so    many false negatives. You get annoyed users, especially if you    do get a system that's re-imaged and there's nothing wrong, or    at bad times.\"  <\/p>\n<p>    Soon, security automation may become ever more widely available    and easier to use. Major vendors have been buying up small    orchestration companies and integrating their features into    their platforms, and SIEM vendors have been adding automation    and orchestration capabilities to their platforms.  <\/p>\n<p>    Vendors are also starting to offer pre-built routines and run    books so that companies don't have to create their remediation    processes from scratch.  <\/p>\n<p>    One positive aspect of the way automation technology is    evolving is that we don't have vendor stacks or technology    silos, where products from one group of companies don't play    well with others, according to Joseph Blankenship, analyst at    Forrester    Research.  <\/p>\n<p>    That's happened before, in other areas of IT. In security,    however, enterprise environments tend to be very heterogeneous.  <\/p>\n<p>    \"It's common for enterprises to have 20, 50 or more different    vendors,\" he said.  <\/p>\n<p>    As a result, vendors are motivated to work well together, and    limitations on interoperability aren't likely to be accepted by    customers, he said.  <\/p>\n<p>    For companies looking to deploy security automation technology,    it's not enough to establish whether the vendor's product is    ready for prime time.  <\/p>\n<p>    The company has to be ready, as well, said Blankenship.  <\/p>\n<p>    \"It's definitely not a buy it and plug it in scenario,\" he    said. \"There's definitely ground work that needs to be done. If    you plug bad data into an automated system, all you're going to    do is make bad decisions faster.\"  <\/p>\n<p>    In addition, many companies don't actually know what their    processes are, and may not yet have well-defined playbooks, he    said.  <\/p>\n<p>    \"Many have analysts that each do their own things as far as how    they handle different investigations,\" he said. \"In order to    automate these things, you have to have standardization.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.csoonline.com\/article\/3193035\/security\/security-automation-is-maturing-but-many-firms-not-ready-for-adoption.html\" title=\"Security automation is maturing, but many firms not ready for ... - CSO Online\">Security automation is maturing, but many firms not ready for ... - CSO Online<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies that enterprises can put to use -- if they have already laid the required ground work. The main problem that security automation is designed to address is that there are so many attack attempts coming in, so quickly, that human beings just can't keep up <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/security-automation-is-maturing-but-many-firms-not-ready-for-cso-online\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187732],"tags":[],"class_list":["post-190685","post","type-post","status-publish","format-standard","hentry","category-automation"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/190685"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=190685"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/190685\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=190685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=190685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=190685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}