Managing the Dynamic Datacenter

Datacenter Automation

Subscribe to Datacenter Automation: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Datacenter Automation: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Datacenter Automation Authors: Elizabeth White, Yeshim Deniz, Pat Romanski, Liz McMillan, Glenn Rossman

Related Topics: Enterprise IT: Moving CapEx to OpEx , Datacenter Automation, Government Cyber Assurance

Blog Feed Post

Our Views On Automating Cyber Defense Including Malware Removal and Return to a Known Good State

By

automatingmalwareremovalThreat actors are increasingly automating their attacks, making defense harder and overwhelming incident response teams. Defenders have long looked to automated discovery as a means to mitigate this threat, but until recently, mass automation and response/threat removal hasn’t been a viable option.

With changes in technology, enterprise cyber security professionals can now leverage automated in-line response and recovery to enhance security. This approach has been proven to significantly improve enterprise defenses. We believe this is the only way to reduce the impact of malware and breaches in a cost effective way.

This paper Automating Removal Of Advanced Threats (468 downloads) captures the results of a review of industry technology trends, community standards for information exchange, CISO lessons learned in the domain of automation, and enterprise IT mission needs to produce a draft list of requirements which can be a starting point to accelerate the modernization of your cyber defense enterprise.

Download “Automating Removal Of Advanced Threats” Automating-Removal-of-Malware.pdf – Downloaded 468 times – 918 kB

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com