Allen McNaughton , Systems Engineering Director for
Infoblox Public Sector
Malicious actors are not good sports , waiting for the cybersecurity community to transform itself before launching an attack .
Workflow prioritization can help identify and remediate the most dangerous , time-consuming threats instead of randomly remediating threats based on when they ’ re discovered .
Many solutions already exist that can provide this kind of automation , orchestration and context . For example , if you are monitoring the DNS traffic of your network and your DNS Firewall blocks a request to a malicious site , solutions that can automatically trigger a response to the Network Access Control system to quarantine that user into a sandbox until it can be further researched by an analyst can dramatically reduce the time and effort needed to track down and isolate infected devices .
Vulnerability scanners are also a point of note . Oftentimes , they only scan networks at a given interval ( once a day , week , or even month . Yes , monthly scans are a thing ).
Organizations can quickly , easily and automatically improve their security posture by scanning a device as soon as it connects to the network by leveraging an orchestration flow where the DHCP server automatically identifies the new machine and triggers the scan .
These and other technology solutions that leverage automation , context and the skills your team already has are not merely a bridge between now and a fullystaffed cybersecurity industry of the future . They are a critical part of a robust cybersecurity platform today , one that both improves network security and extends the capabilities of the team you already have . p
At the same time , systems that automatically send additional context about that user and the request ( Who is the user ? What kind of machine are they using ? Where was the request sent ?) to the analyst can give them a head start into researching and ultimately mitigating the threat .
84 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com