{"id":99320,"date":"2019-06-03T13:00:52","date_gmt":"2019-06-03T20:00:52","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=99320"},"modified":"2019-06-03T11:23:45","modified_gmt":"2019-06-03T18:23:45","slug":"automate-orchestrate-transform-cybersecurity","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2019\/06\/automate-orchestrate-transform-cybersecurity\/","title":{"rendered":"Automate and Orchestrate to Transform Cybersecurity"},"content":{"rendered":"<p><em>NTT will be presenting at <a href=\"https:\/\/ignite.paloaltonetworks.com\/usa\/usa_home.html\">Ignite \u201919 USA<\/a> on Wednesday, June 5 at 1:00 PM. Join Guido Crucq, Group SVP \u2013 Cybersecurity and Greg Garten, SVP Research &amp; Development, NTT Communications\/NTT Security\/Dimension Data, for our session<\/em><em> <strong>Securing Smart Enterprises \u2013 The Cybersecurity Corporate Survival Handbook<\/strong> to learn more about the new corporate security challenges and solutions.<\/em><\/p>\n<p>Automation and orchestration are transforming how cybersecurity teams operate on a day-to-day basis, as well as supporting business innovation.<\/p>\n<p>Digitalization allows increased agility in organizations, and thanks to this, cybersecurity plays a significant role in an organization\u2019s success. Given the potential financial and reputational impact of a breach (56% of businesses say their customers would lose confidence in them following a security breach, according to NTT Security\u2019s Risk:Value research), organizations must prioritize cybersecurity.<\/p>\n<p>While this is good news for cybersecurity practitioners, it increases the high demands already on them. An expanding digital footprint, alongside a growing list of regulatory requirements and growing volumes and sophistication of attacks, mean it is harder to keep a business secure. A company\u2019s digital presence has become its largest attack vector.<\/p>\n<p>While not new in the technology industry, orchestration and automation in security have tremendous potential to lighten the load for cybersecurity teams, helping to focus efforts on higher-value activities.<\/p>\n<p>Security automation creates an effective, integrated technology ecosystem by automating a task that would otherwise require human intervention or the use of multiple security tools. Examples include automatically provisioning\/de-provisioning users, investigation and evidence collection, and event correlation and the respective decision-making processes.<\/p>\n<p>Security orchestration is the automation of processes and workflows across multiple cybersecurity systems; previously-fragmented sets of technologies and products are integrated, enabling better cyber intelligence sharing and improved threat detection and response.<\/p>\n<p>Together, these take time-consuming tasks away from practitioners, making security and operational teams more productive, cost-effective and consistent, allowing them to reduce wasted efforts and redirect their focus towards developing a culture of SecDevOps and knowledge transfer to drive innovation.<\/p>\n<p>There are four key areas for applying cybersecurity automation and orchestration:<\/p>\n<ul>\n<li><strong>Threat Monitoring<\/strong> \u2013 maintaining visibility across the threat landscape to detect, contextualize and prioritize key events in real-time.<\/li>\n<\/ul>\n<ul>\n<li><strong>Incident Response<\/strong> \u2013 following up on cyber incidents to contain, investigate and remediate a breach.<\/li>\n<\/ul>\n<ul>\n<li><strong>Security Lifecycle Management<\/strong> \u2013 harnessing machines to offload daily tasks such as patching, software management and reporting.<\/li>\n<\/ul>\n<ul>\n<li><strong>Operational Efficiency<\/strong> \u2013 using automation to drive operational efficiency: processes become repeatable and measurable so continuous improvement can be demonstrated.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Together with Palo Alto Networks, NTT offers an end-to-end technology services and takes a proactive approach to cybersecurity. Based on our global delivery capabilities for Consulting, Technical Services and Managed Services we enable clients to accelerate their digital agenda, securely!<\/p>\n<p>Our Managed Security Services and Threat Detection deliver insights and a response to threats and use comprehensive threat intelligence, machine learning, behaviour analysis and event-driven threat hunting. With the Proactive response option, our security analysts perform blocking actions to disrupt or contain identified threats by leveraging the capabilities of Palo Alto Networks.<\/p>\n<p><em>For more information on NTT services and solutions, visit us at <a href=\"https:\/\/ignite.paloaltonetworks.com\/usa\/usa_home.html\">Ignite \u201919 USA<\/a> in Austin, TX. <\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this guest post, read more about how automation and orchestration are transforming how cybersecurity teams operate on a day-to-day basis, as well as supporting business innovation.<\/p>\n","protected":false},"author":648,"featured_media":99193,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133],"tags":[5933,938,1556],"coauthors":[6794],"class_list":["post-99320","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-ignite-19-usa","tag-security-automation","tag-security-orchestration"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/ignite-19-us-blog-600x382.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/648"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=99320"}],"version-history":[{"count":6,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99320\/revisions"}],"predecessor-version":[{"id":99339,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99320\/revisions\/99339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/99193"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=99320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=99320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=99320"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=99320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}