SlideShare a Scribd company logo
THE STATE OF
AUTOMATION IN SECURITY
THE CURRENT STATE
OF AUTOMATION
have some automation
but felt it was not
enough
have little to
no automation
of organizations
are highly
automated
15% 52% 33%
WHY DO WE NEED
AUTOMATION
SO...
Network operations staff
want automation to replace
manual tasks
Data center architects want
automation for cloud
and SDN projects
Security staff want
automation to address cyber
threats
Cyber threats and
the number of
alerts
Difficulty hiring
experienced
security staff
Too much time
spent on manual
tasks
Cloud and SDN
projects
Hackers using
automated tools,
so an automated
defense is required
1 2 3 4 5
Lack of knowledge on how
to automate processes
5
Concerns about accuracy
and false positives
16
Concerns about business
disruption
Don’t have the time to
implement automation
3
2
Difficulty driving
organizational changes
4
Lack of automation tools
FEARIS HOLDING
US BACK
Lack of automation tools
Business disruption
TOP CONCERNS FOR
SENIOR EXECUTIVES
1
2
WITHOUT
AUTOMATION
WHAT’S EVERYONE DOING
ALL DAY?
1
Ongoing security
configuration and change
management
5
Monitoring and intrusion
prevention
Vulnerability analysis
and patching
4
Large complex
deployment projects
3
6
Auditing
and compliance
7
Deploying new
security solutions
2
Incident response
and/or remediation
2.5/5
2.5 in 5 said it caused
AN APPLICATION OUTAGE
2/5
2 in 5 said it caused
A NETWORK OUTAGE
1/5
1 in 5 said it caused
A SECURITY BREACH
WHAT’S THE
IMPACT?
2/5
2 in 5 said it caused
A DECREASE IN APPLICATION
PERFORMANCE
THE AVERAGE COST OF A DATA CENTER OUTAGE
PONEMON INSTITUTE, 2016 COST OF DATA CENTER OUTAGES REPORT
$740,357in 2016
will be
>3
working days
1-3
working days
1
working day
3-6
hours
<1
hour
1-3
hours
23.4%
35.1%
22.3%
11.7%
4.9%
2.6%
HOW LONG
DOES IT TAKE TO FIX
A MANUAL ERROR?
said that the use
of automation
needs to increase
over the next 3 years
EVERYONE WANTS MORE
WHICH IS
WHY IT'S YES
TO SECURITY PROCESS
AUTOMATION
WHICH IS
WHY IT'S YES
TO SECURITY PROCESS
AUTOMATION
3.25 out of 4 believe it will
INCREASE THE OVERALL SECURITY
POSTURE OF AN ORGANIZATION 3.25/4
2 out of 4 say it will
HELP DEAL WITH THE
SKILLS SHORTAGE 2/4
3/4
3 out of 4 say that it will
REDUCE ERRORS AND PROCESS
SECURITY POLICY CHANGES FASTER
3 out of 4 agree or strongly agree that it will
ELIMINATE MISTAKES THAT CREATE
ACCESS POINTS FOR HACKERS 3/4
3 out of 4 say it will
IMPROVE APPLICATION AVAILABILITY
BY REDUCING OUTAGES 3/4
3/4
3 out of 4 say it will
REDUCE AUDIT PREPARATION TIME
AND IMPROVE COMPLIANCE
BROUGHT TO YOU BY:
www.algosec.com

More Related Content

PDF
The State of Network Security 2014
AlgoSec
 
PDF
Managing Security Policies Across Hybrid Cloud Environments
AlgoSec
 
PPTX
Top Threats Facing Organizations Cloud / SaaS Data
SysCloud
 
PPTX
Imperva ppt
Imperva
 
PDF
Security and PCI: 4 Things You Need to Know
The Internet of Things
 
PDF
Arming Officers with Mobile Devices
Resolver Inc.
 
PDF
Flipping the Script & Changing the Game in Cyber
scoopnewsgroup
 
PDF
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
VMware
 
The State of Network Security 2014
AlgoSec
 
Managing Security Policies Across Hybrid Cloud Environments
AlgoSec
 
Top Threats Facing Organizations Cloud / SaaS Data
SysCloud
 
Imperva ppt
Imperva
 
Security and PCI: 4 Things You Need to Know
The Internet of Things
 
Arming Officers with Mobile Devices
Resolver Inc.
 
Flipping the Script & Changing the Game in Cyber
scoopnewsgroup
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
VMware
 

What's hot (20)

PPTX
Community IT - Crafting Nonprofit IT Security Policy
Community IT Innovators
 
PDF
Most expensive IT Security Incidents
ARP
 
PDF
ISO 27001 INFORMATION TECHNOLOGY MANAGEMENT SYSTEM
Rozil Anwar
 
PPTX
Erkan kahraman Security, Trust, Assurance - 20131106 - nordic it security s...
Erkan Kahraman
 
PPTX
Simplifying Security Management in the Virtual Data Center
AlgoSec
 
PPTX
3 Reasons It's Time for a New Remote Access Model
Akamai Technologies
 
PPTX
Should You Be Automating
Siemplify
 
PDF
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Fujitsu Middle East
 
PPTX
Rise of Ransomware
Imperva
 
PDF
Transform Your Security Operations with Security Automation and Orchestration
Enterprise Management Associates
 
PPTX
Flaws in Identity Management and How to Avoid Them
NetIQ
 
PPTX
Open Source Security - It can be done easily.
Flexera
 
PDF
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
Enterprise Management Associates
 
PPTX
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Innovators
 
PDF
SOC Services- Enhancing Organization's Cyber & Digital Security Posture
manoharparakh
 
PDF
Keep Your Guard: Stay Compliant and Be Secure
Tripwire
 
PPTX
Reasoning About Enterprise Application Security in a Cloudy World
Elastica Inc.
 
PPTX
Data Privacy, Security, and Sovereignty in a Cloudy World
Netskope
 
PPTX
Courion Survey Findings: Access Risk Attitudes
Courion Corporation
 
PPTX
IT security
Steven Aiello
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT Innovators
 
Most expensive IT Security Incidents
ARP
 
ISO 27001 INFORMATION TECHNOLOGY MANAGEMENT SYSTEM
Rozil Anwar
 
Erkan kahraman Security, Trust, Assurance - 20131106 - nordic it security s...
Erkan Kahraman
 
Simplifying Security Management in the Virtual Data Center
AlgoSec
 
3 Reasons It's Time for a New Remote Access Model
Akamai Technologies
 
Should You Be Automating
Siemplify
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Fujitsu Middle East
 
Rise of Ransomware
Imperva
 
Transform Your Security Operations with Security Automation and Orchestration
Enterprise Management Associates
 
Flaws in Identity Management and How to Avoid Them
NetIQ
 
Open Source Security - It can be done easily.
Flexera
 
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
Enterprise Management Associates
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Innovators
 
SOC Services- Enhancing Organization's Cyber & Digital Security Posture
manoharparakh
 
Keep Your Guard: Stay Compliant and Be Secure
Tripwire
 
Reasoning About Enterprise Application Security in a Cloudy World
Elastica Inc.
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Netskope
 
Courion Survey Findings: Access Risk Attitudes
Courion Corporation
 
IT security
Steven Aiello
 
Ad

Viewers also liked (12)

PDF
Security is from Mars, Application Delivery is from Venus
AlgoSec
 
PDF
Examining the Impact of Security Management on the Business (Infographic)
AlgoSec
 
PPTX
Migrating Application Connectivity and Network Security to AWS
AlgoSec
 
PPTX
AWS Security Fundamentals: Dos and Don’ts
AlgoSec
 
PPTX
Dos and Don’ts for Managing External Connectivity to/from Your Network
AlgoSec
 
PDF
Avoid outages-from-misconfigured-devices-webinar-slides
AlgoSec
 
PPTX
Shift Happens: Eliminating the Risks of Network Security Policy Changes
AlgoSec
 
PDF
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
AlgoSec
 
PPTX
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
 
PPTX
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
AlgoSec
 
PPTX
A business driven approach to security policy management a technical perspec...
AlgoSec
 
PPTX
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
AlgoSec
 
Security is from Mars, Application Delivery is from Venus
AlgoSec
 
Examining the Impact of Security Management on the Business (Infographic)
AlgoSec
 
Migrating Application Connectivity and Network Security to AWS
AlgoSec
 
AWS Security Fundamentals: Dos and Don’ts
AlgoSec
 
Dos and Don’ts for Managing External Connectivity to/from Your Network
AlgoSec
 
Avoid outages-from-misconfigured-devices-webinar-slides
AlgoSec
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
AlgoSec
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
AlgoSec
 
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
AlgoSec
 
A business driven approach to security policy management a technical perspec...
AlgoSec
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
AlgoSec
 
Ad

Similar to The State of Automation in Security (20)

PPTX
Virtualization Facts and Benefits
Lefteris Karafilis
 
PDF
The 2018 Enterprise Cloud Trends Report
ibossCyber
 
PDF
Legal_IT_Landscapes_2015
John Davies
 
PPTX
SolarWinds Application Performance End User Survey (Singapore)
SolarWinds
 
PPTX
International Technology Adoption & Workforce Issues Study - Middle East Summary
CompTIA
 
PDF
Virtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Softchoice Corporation
 
PDF
R if security_priorities_03.08.22
IDG
 
PPT
7 information management trends
Vander Loto
 
PDF
Real-world incident response, management, and prevention
Enterprise Management Associates
 
PDF
To Catch a Phish, or: Why You Must Automate Email Security
Catherine Arizan
 
PDF
Building a Security Operations Center (SOC).pdf
TapOffice
 
PPTX
CompTIA IT Skills Gap 2017
CompTIA
 
PDF
The Future of Data Center Network Automation
Enterprise Management Associates
 
PPTX
Car Cybersecurity: What do Automakers Really Think?
Security Innovation
 
PDF
Car cybersecurity: What do automakers really think?
OnBoard Security, Inc. - a Qualcomm Company
 
PDF
The Connors Group Cyber Security Infographic
The Connors Group
 
PDF
Use the Right Tools to Avoid the DevOps Culture Clash
Enterprise Management Associates
 
PDF
Unlocking High Fidelity Security
Enterprise Management Associates
 
PDF
Online examination
farouq umar
 
PDF
EMA Megatrends in Cyber-Security
Enterprise Management Associates
 
Virtualization Facts and Benefits
Lefteris Karafilis
 
The 2018 Enterprise Cloud Trends Report
ibossCyber
 
Legal_IT_Landscapes_2015
John Davies
 
SolarWinds Application Performance End User Survey (Singapore)
SolarWinds
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
CompTIA
 
Virtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Softchoice Corporation
 
R if security_priorities_03.08.22
IDG
 
7 information management trends
Vander Loto
 
Real-world incident response, management, and prevention
Enterprise Management Associates
 
To Catch a Phish, or: Why You Must Automate Email Security
Catherine Arizan
 
Building a Security Operations Center (SOC).pdf
TapOffice
 
CompTIA IT Skills Gap 2017
CompTIA
 
The Future of Data Center Network Automation
Enterprise Management Associates
 
Car Cybersecurity: What do Automakers Really Think?
Security Innovation
 
Car cybersecurity: What do automakers really think?
OnBoard Security, Inc. - a Qualcomm Company
 
The Connors Group Cyber Security Infographic
The Connors Group
 
Use the Right Tools to Avoid the DevOps Culture Clash
Enterprise Management Associates
 
Unlocking High Fidelity Security
Enterprise Management Associates
 
Online examination
farouq umar
 
EMA Megatrends in Cyber-Security
Enterprise Management Associates
 

More from AlgoSec (20)

PDF
best practices-managing_security_in_the hybrid cloud
AlgoSec
 
PDF
compliance made easy. pass your audits stress-free webinar
AlgoSec
 
PDF
The state of the cloud csa survey webinar
AlgoSec
 
PDF
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
AlgoSec
 
PDF
2021 01-27 reducing risk of ransomware webinar
AlgoSec
 
PDF
Compliance made easy. Pass your audits stress-free.
AlgoSec
 
PDF
2021 01-13 reducing risk-of_ransomware
AlgoSec
 
PDF
Cloud migrations made simpler safe secure and successful migrations
AlgoSec
 
PDF
Microsegmentation from strategy to execution
AlgoSec
 
PDF
Build and enforce defense in depth - an algo sec-cisco tetration webinar
AlgoSec
 
PDF
Radically reduce firewall rules with application-driven rule recertification
AlgoSec
 
PDF
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
AlgoSec
 
PDF
2020 04-07 webinar slides -turning network security alerts into action change...
AlgoSec
 
PPT
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
AlgoSec
 
PPTX
Put out audit security fires, pass audits -every time
AlgoSec
 
PPTX
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
AlgoSec
 
PPTX
2019 08-13 selecting the right security policy management solution
AlgoSec
 
PPTX
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
 
PPTX
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
AlgoSec
 
PPTX
2019 02-20 micro-segmentation based network security strategies (yoni geva)
AlgoSec
 
best practices-managing_security_in_the hybrid cloud
AlgoSec
 
compliance made easy. pass your audits stress-free webinar
AlgoSec
 
The state of the cloud csa survey webinar
AlgoSec
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
AlgoSec
 
2021 01-27 reducing risk of ransomware webinar
AlgoSec
 
Compliance made easy. Pass your audits stress-free.
AlgoSec
 
2021 01-13 reducing risk-of_ransomware
AlgoSec
 
Cloud migrations made simpler safe secure and successful migrations
AlgoSec
 
Microsegmentation from strategy to execution
AlgoSec
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
AlgoSec
 
Radically reduce firewall rules with application-driven rule recertification
AlgoSec
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
AlgoSec
 
2020 04-07 webinar slides -turning network security alerts into action change...
AlgoSec
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
AlgoSec
 
Put out audit security fires, pass audits -every time
AlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
AlgoSec
 
2019 08-13 selecting the right security policy management solution
AlgoSec
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
AlgoSec
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
AlgoSec
 

Recently uploaded (20)

PDF
Doc9.....................................
SofiaCollazos
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Doc9.....................................
SofiaCollazos
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
The Future of Artificial Intelligence (AI)
Mukul
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 

The State of Automation in Security

  • 1. THE STATE OF AUTOMATION IN SECURITY THE CURRENT STATE OF AUTOMATION have some automation but felt it was not enough have little to no automation of organizations are highly automated 15% 52% 33% WHY DO WE NEED AUTOMATION SO... Network operations staff want automation to replace manual tasks Data center architects want automation for cloud and SDN projects Security staff want automation to address cyber threats Cyber threats and the number of alerts Difficulty hiring experienced security staff Too much time spent on manual tasks Cloud and SDN projects Hackers using automated tools, so an automated defense is required 1 2 3 4 5 Lack of knowledge on how to automate processes 5 Concerns about accuracy and false positives 16 Concerns about business disruption Don’t have the time to implement automation 3 2 Difficulty driving organizational changes 4 Lack of automation tools FEARIS HOLDING US BACK Lack of automation tools Business disruption TOP CONCERNS FOR SENIOR EXECUTIVES 1 2 WITHOUT AUTOMATION WHAT’S EVERYONE DOING ALL DAY? 1 Ongoing security configuration and change management 5 Monitoring and intrusion prevention Vulnerability analysis and patching 4 Large complex deployment projects 3 6 Auditing and compliance 7 Deploying new security solutions 2 Incident response and/or remediation 2.5/5 2.5 in 5 said it caused AN APPLICATION OUTAGE 2/5 2 in 5 said it caused A NETWORK OUTAGE 1/5 1 in 5 said it caused A SECURITY BREACH WHAT’S THE IMPACT? 2/5 2 in 5 said it caused A DECREASE IN APPLICATION PERFORMANCE THE AVERAGE COST OF A DATA CENTER OUTAGE PONEMON INSTITUTE, 2016 COST OF DATA CENTER OUTAGES REPORT $740,357in 2016 will be >3 working days 1-3 working days 1 working day 3-6 hours <1 hour 1-3 hours 23.4% 35.1% 22.3% 11.7% 4.9% 2.6% HOW LONG DOES IT TAKE TO FIX A MANUAL ERROR? said that the use of automation needs to increase over the next 3 years EVERYONE WANTS MORE WHICH IS WHY IT'S YES TO SECURITY PROCESS AUTOMATION WHICH IS WHY IT'S YES TO SECURITY PROCESS AUTOMATION 3.25 out of 4 believe it will INCREASE THE OVERALL SECURITY POSTURE OF AN ORGANIZATION 3.25/4 2 out of 4 say it will HELP DEAL WITH THE SKILLS SHORTAGE 2/4 3/4 3 out of 4 say that it will REDUCE ERRORS AND PROCESS SECURITY POLICY CHANGES FASTER 3 out of 4 agree or strongly agree that it will ELIMINATE MISTAKES THAT CREATE ACCESS POINTS FOR HACKERS 3/4 3 out of 4 say it will IMPROVE APPLICATION AVAILABILITY BY REDUCING OUTAGES 3/4 3/4 3 out of 4 say it will REDUCE AUDIT PREPARATION TIME AND IMPROVE COMPLIANCE BROUGHT TO YOU BY: www.algosec.com