IT automation started out with administrators making simple tools that would help them accomplish the same task again and again. Today, IT automation has grown into its own industry, as there has been an increasing need to meet the growth of IT itself. Security automation isn’t far behind.
As any environment grows, the need for security, and security automation also expands. Eventually, an environment can get so large and complex that it becomes virtually impossible, not to mention tedious and time-consuming to manually harden and patch every asset. If the company wants to think about implementing more security automation in its environment, here are five important considerations:
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.