Managing the Dynamic Datacenter

Datacenter Automation

Subscribe to Datacenter Automation: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Datacenter Automation: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Datacenter Automation Authors: Shelly Palmer, Automic Blog, Pat Romanski, Elizabeth White, Liz McMillan

Related Topics: Enterprise IT: Moving CapEx to OpEx , Datacenter Automation, Government Cyber Assurance

Blog Feed Post

Video Shows What To Do When Your Cyber Adversaries Are Automating

By

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response.

The bottom line of this research: Your online adversaries are automating. You must automate your response, including automating the removal of malware and return to a known good state.

Additional context into this topic is available in our research report downloadable here: 

Download “Automating Removal Of Advanced Threats” Automating-Removal-of-Malware.pdf – Downloaded 529 times – 918 kB


This paper Automating Removal Of Advanced Threats (529 downloads) captures the results of a review of industry technology trends, community standards for information exchange, CISO lessons learned in the domain of automation, and enterprise IT mission needs to produce a draft list of requirements which can be a starting point to accelerate the modernization of your cyber defense enterprise.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com