sb-au logo
Story image

Ovum says security industry 'finally' coming round to automation

23 Jun 2017

The security market is ‘finally’ coming around to the idea of automation, according to Ovum.

Ovum analyst, Rik Turner says the industry may at last be ‘waking up’ probably due to customer demand and the fact that automation is necessary to underpin a security posture that is aware an organisation’s infrastructure is liable to be breached. Not to mention that the cards are currently stacked very much in the attackers’ favour.

“Ovum has noted that, this year, vendors are finally talking about automating the response capability in their security platforms once they have detected something,” says Turner.

“For a few years now, when asked whether they could provide automated responses such as quarantining, then removal of the offending code from wherever it has taken up residence within a corporate infrastructure, they have always replied that they could, but that clients do not want it.”

Turner says the reason for this is fear of false positives.

“Banks do not want to upset high-net-worth customers who might be shut out from their account because the system suspects that they may be bogus,” says Turner.

“Online retailers do not want to create friction by making customers jump through extra authentication hoops unless absolutely necessary. Charities do not want to put off potential online donors because the system is worried they may actually be engaged in money laundering.”

However, Turner says that too appears to be changing, as some real implementation is going beyond just the talk of the past with several vendors now talking freely about exploring their capabilities to include automated response and remediation.

“Their customers are now ready to take this step, which suggests that, as they face the tidal wave of attacks with overworked and frequently understaffed security teams, they are asking their suppliers to stop the more run-of-the-mill stuff, freeing their analysts to focus on the more sophisticated, complex, and difficult-to-detect attacks,” says Turner.

However, one of the greatest barriers to be overcome is the shortage of staff and talent in security, as Turner asserts this is clearly putting pressure to implement more automation where possible.

“Think of it like water: you expect your utility to provide it in clean, drinkable form, leaving you to worry about whether it is hard or soft in your area, and whether you need to add a softener before you turn your washing machine on,” Turner concludes.

Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More
Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
CrowdStrike acquires Preempt Security for $96m, develops zero trust security offerings
With this acquisition, the company plans to offer customers enhanced Zero Trust security capabilities and strengthen the CrowdStrike Falcon platform with conditional access technology. More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Story image
IT leaders fear increase risk of cyber attacks while working from home
More than 80% of IT leaders believe their company is at a greater risk of cyber attacks when their staff are working from home, according to new research. More
Story image
APAC organisations struggle to find balance between digital adoption and cybersecurity
Organisations in the Asia Pacific (APAC) region are significantly concerned about security threats, but nevertheless are looking to advance operations through digital adoption.More