Intelligent CIO LATAM Issue 16 - Page 55

FEATURE : CYBERSECURITY
Many solutions already exist that can provide this kind of automation , orchestration and context .
For example , if you are monitoring the DNS traffic of your network and your DNS Firewall blocks a request to a malicious site , solutions that can automatically trigger a response to the Network Access Control system to quarantine that user into a sandbox until it can be further researched by an analyst can dramatically reduce the time and effort needed to track down and isolate infected devices .
At the same time , systems that automatically send additional context about that user and the request ( Who is the user ? What kind of machine are they using ? Where was the request sent ?) to the analyst can give them a head start into researching and ultimately mitigating the threat . critical part of a robust cybersecurity platform today , one that both improves network security and extends the capabilities of the team you already have . p
Allen McNaughton , Systems Engineering Director for Infoblox Public Sector
Vulnerability scanners are also a point of note . Oftentimes , they only scan networks at a given interval ( once a day , week , or even month . Yes , monthly scans are a thing ).
Organizations can quickly , easily and automatically improve their security posture by scanning a device as soon as it connects to the network by leveraging an orchestration flow where the DHCP server automatically identifies the new machine and triggers the scan .
These and other technology solutions that leverage automation , context and the skills your team already has are not merely a bridge between now and a fullystaffed cybersecurity industry of the future . They are a

MALICIOUS ACTORS

ARE NOT GOOD SPORTS , WAITING FOR THE CYBERSECURITY

COMMUNITY TO TRANSFORM ITSELF BEFORE

LAUNCHING AN ATTACK .

www . intelligentcio . com INTELLIGENTCIO LATAM 55