Security Automation: Time to Take a Fresh Look

WH IT E PA P E R
Security Automation:
Time to Take a Fresh Look
The defenses are in place, but the war is not yet being won.
Market
Pulse
Security automation has made great strides over the
Indeed, the barriers that organizations have erected to
years, and companies should take a fresh look at the
combat data security breaches are proving inadequate as
potential benefits. Whereas companies once were uneasy
companies are, in many cases, either losing ground in the
about automation for fear of inadvertently denying access
security battle or simply standing still, according to a new
to legitimate users—with the ultimate example being
survey from IDG Research. Among companies surveyed,
the CEO—today such technology can be effective at an
61 percent are seeking to strengthen their defenses. The
enterprise scale. Additionally, the cost benefits of deploying
survey points to a way forward: the automation of security
automation have not been well understood. They include
workflows and processes to enable faster, more effective
making better use of security expert’s time, which is a
responses to potential breaches, helping companies reduce
scarce and expensive resource, to minimizing the financial
risk and turn the tide in the security conflict.
impacts of data loss and damage to the corporate brand.
The survey, conducted in December 2013 and January
Of course, rapidly achieving maximum benefits means
2014, shows most companies dedicate the majority of
choosing the right solution, one that has been proven in
their IT security resources—60 percent—to protecting the
the largest, most demanding environments. CSG Interna-
network layer, which seems logical given most attacks
tional’s Invotas fits that description. CSG Invotas has long
come in through the network in some fashion.
been bringing its automation solutions to telecommunica-
But the current approach appears to be of limited effectiveness, as the vast majority of respondents report that
tions carriers and is now ready to tackle the enterprise
automation.
neither the number nor severity of security breaches is
going down. What’s more, attacks often take a long time
BREACHES BY THE NUMBERS
to detect—46 percent of respondents report an average
The need for a new approach is clear. The IDG Research
detection time of hours or days. Attacks take even longer
survey shows most companies are not gaining ground
to resolve, with 54 percent reporting average resolution
against the security problem. For just over half the respon-
times of days or months.
dents, both the number and severity of security incidents
A majority of companies surveyed are looking for ways
remained flat in 2013 as compared with 2012. But 28
to reduce response times to security events in an effort to
percent of respondents say the number of security events
mitigate risk, preserve corporate reputations, and protect
or breaches increased in 2013 while 24 percent report that
customer data, among other goals. Some have already
the severity of incidents increased. For only a small minority
adopted security automation as a way to help address the
of respondents did the number or severity of incidents
issue, but many remain uncomfortable with the idea of
decline last year.
enabling automated responses to security threats.
If current security defenses were truly effective, it would
be logical to expect both the number and severity of security events and breaches would be going down.
To further exacerbate the problem, breaches are taking
too long to detect. A combined 39 percent of respondents
say they can detect a security breach within seconds or
Market
Pulse
2 SECURITY AUTOM AT IO N: T IM E TO TA KE A F RE S H L O O K
are essentially flawed. Ultimately, we
Time Spent on Each Process Ensuing a Security Event
50
are in a world of hurt when it comes
to being able to respond logically to
hacking events or denial-of-service
48%
attacks. We don’t always make the
right mental connections.”
40
37%
% of respondents
35%
30%
29%
30
Detection
Diagnosis
Resolution
for Phenix, which is in the process
America to carry oil from the Atlantic
20
coast to the Pacific. He has about
2%
1%
Seconds
Minutes
Hours
40 years of IT experience, including
13%
11%
11%
9%
10%
3%
0
network and security architecture
of building a pipeline across Central
25%
10
Perrin is currently designing the
Days
4%
Weeks
6%
many years as a consultant for clients
3% 4%
Months
Elapsed time
such as the State of Minnesota and
the U.S. Navy.
In terms of barriers to automation,
he sees satisfaction with the status
SOURCE: IDG RESEARCH SERVICES, FEBRUARY 2014
quo as a top contender. “Even some of
the best clients I’ve had over the years
will say, ‘This thing has worked well for
minutes. That leaves a whopping 61 percent who say it
a long time, we don’t want to change it,’” Perrin says. But
takes them days, weeks or months to detect a breach—or
today’s security operations are all about anticipating new
they simply don’t know how long it takes.
problems, not just dealing with old ones.
It’s a similar story with respect to diagnosis of security
“Those guys have nothing better to do and all the time in
breaches and resolution, with only 10 percent of respon-
the world to dig into my system and beat it to a pulp,”
dents reporting they’re able to resolve issues in seconds
he says. “We need to be preemptive.”
or minutes; 54 percent say it takes days, weeks or months.
The top barrier cited by survey respondents (56 percent)
is cost. But other barriers cited speak more to respondents’
RELIEF WANTED
own insecurities and lack of security knowledge than any
Given such performance, it’s not surprising that respon-
technical issue with respect to security automation.
dents are seeking ways to reduce response times to
Consider the second-largest barrier: difficulty in tiering
security events, for reasons including risk mitigation and to
security processes or determining what ought to be
preserve their corporate reputation. (See chart above.)
automated, cited by 37 percent of respondents as at least
A good number of respondents, 25 percent, say they’re
somewhat of a barrier. This barrier reflects a lack of internal
very comfortable with the idea of automating some security
insight and expertise about an organization’s own security
workflows and processes and do so as much as possible.
processes, which is understandable, given security opera-
Another 57 percent say they’re somewhat comfortable with
tions today is a complex discipline with potentially dire
automation for low-level and a few high-level processes,
consequences for failure.
but they want a human involved at some point.
Survey respondent Bruce Perrin, COO and acting CIO for
Phenix Energy Group, in Palm Harbor, Fla., is in the comfort-
Likewise, the next three most-frequently cited barriers in
the survey are not technical in nature:
■ Insecurity over current security processes and proto-
able camp when it comes to security automation. “I think
cols (35 percent): indicating a need for expert review and
it’s absolutely necessary,” he says. “We as human beings
guidance on how best to standardize processes and proce-
3
Market
Pulse
SECURITY AUTO M AT IO N: T IM E TO TA KE A F RES H L O O K
14 percent have automated more than 50 percent.
Percent of Security Workflows
Currently Automated
25
23%
20
% of respondents
A NEW APPROACH TO SECURITY
AUTOMATION
19%
To do better, many enterprises will need some
help. CSG Invotas is in a position to provide it.
< 30%
> 30%
CSG Invotas takes a new approach to security
18%
automation, focusing on the orchestration of
14%
15
security responses required to quickly and accurately get to the root of a security issue. Using
CSG Invotas software and accompanying services
11%
10
9%
expertise, companies can gain the ability to
automatically manage, coordinate and configure
actions in response to security events in their
5
networks.
2%
0
CSG Invotas enables customers to automate
0%
1-10%
11-20% 21-30%
31-40%
41-50%
>50%
as few or as many security tasks as they like,
depending on their requirements and level of
% of automation
SOURCE: IDG RESEARCH SERVICES, FEBRUARY 2014
comfort with automation. Some may opt for a
fully automated response where, for example, a
firewall event triggers an intrusion detection/intru-
dures for effective security automation.
■ Lack of coordination and communication typically
sion prevention system (IDS/IPS) to block a given port for a
certain IP address; the system then sends a trouble ticket
triggered by a security event (35 percent): indicating a need
to alert security personnel of the incident. Others may
for greater orchestration among a multitude of human and
want more human interaction, such as the same series of
network resources during the detection, diagnosis and
events is triggered only after a security professional gives
response stages of an event.
the green light. Still others may want to be presented with
■ No personal accountability (32 percent): indicating
a series of options for actions they might want to take in
a fear that it would be unclear who “owns” automated
the face of a specific security incident. With CSG Invotas,
security responses.
any mix of the above is possible, and responses can vary
These responses indicate that implementing security
depending on the type of incident in question.
automation is less about technical issues than it is about
Customers can also map out a series of preplanned
educating an organization’s security staff on the best way
actions to take should certain security events occur, and
to approach it, including which processes are best candi-
then either implement them automatically or with human
dates for automation and what proven processes and
intervention.
protocols to apply.
Perhaps that’s why there appears to be some optimism
Another differentiator of the CSG Invotas solution is its
scale. CSG Invotas Security Orchestrator Solution has been
that effectively deploying security automation to realize
proven in the telecommunications industry, among the
tangible benefits in cost, efficiency and response times is
largest and most demanding networks in terms of reli-
finally an attainable goal.
ability requirements. That means CSG Invotas solutions are
That optimism will be needed as there is much work
carrier grade, having been thoroughly tested and proven
to be done. A significant majority—62 percent—of
to be reliable. They are highly scalable, able to process
organizations have automated less than 30 percent
billions of events daily. The solutions are also architected for
of their security workflows. (See chart above.) Only
interoperability, able to deal with the heterogeneous mix of
4
Market
Pulse
SECURITY AUTO M AT IO N: T IM E TO TA KE A F RES H L O O K
security tools customers already have in place.
Such attributes are crucial for security automation in
Moreover, automation reduces security costs in a
number of ways. For one, it offloads mundane tasks from
large or growing enterprises. The systems must be available
security professionals, enabling them to focus on more
at all times because, as Perrin suggests, attackers seem-
vexing problems.
ingly never sleep; you simply never know when an attack
Security requires attention 24/7, Perrin notes. “If I can
may occur, so organizations must be always vigilant.
cut that in half, we’re talking a staggering amount of
Performance is crucial because as networks grow ever
money,” he says. “Seventy percent of what security profes-
larger, the system must be able to effectively and accu-
sionals do could be done completely automatically, giving
rately process an increasing number of events. And
them more time to do things that are more important.”
interoperability is a must if the security platform is to
And if you can reduce the number of security breaches
provide unified, consistent control across a series of point
through automation, you reduce the risk of data loss, which
security solutions, from firewalls and IDS/IPS to antivirus
again can amount to staggering amounts of money given
and security information and event management (SIEM)
the potential cost of a single breach.
tools and more.
TAKE A FRESH LOOK AT AUTOMATION
BENEFITS OF SECURITY AUTOMATION
CSG Invotas has a team of experienced security specialists
The increasing complexity of IT environments, coupled
who will work with you to implement a security automation
with the growing frequency of security threats, demands
plan that makes sense for your company. They will assess
that companies automate more functions to keep up.
your current security operations and infrastructure and
And the benefits they will gain by doing so are significant.
identify the opportunities for automation that deliver the
Automation provides the ability to respond far more
greatest immediate benefits in shortening defense times
rapidly to security alerts, no matter whether it takes the
and reducing effort on the part of your security staff. By
form of allowing the system to respond on its own to
working with the tools you already have in place, they will
security incidents or suggesting a course of action for a
also allow you to maximize the return on investment you’ve
human to take. The technology will reduce response
already made in your security infrastructure and staff.
times to seconds or minutes—enabling far more compa-
In so doing, CSG Invotas allows enterprises to overcome
nies to join the 39 percent of survey respondents who can
many of the traditional stumbling blocks to security automa-
already respond that quickly. The faster companies can
tion, including the number one factor cited by IDG survey
respond and shut the door on attackers, the less risk they
respondents: cost. Offloading mundane security tasks
face of compromised system and data confidentiality,
from experienced security personnel will actually save
integrity and availability.
you money by allowing them to focus on more important
Enterprises can also become less predictable targets
through automation. Security orchestration solutions
security issues.
What’s more, you can implement as little or as much
enable organizations to apply deceptive defensive tech-
automation as you’re comfortable with. Start small if you
niques at scale and in near real time. Such tactics serve to
like, and automate more as the system proves itself and
disrupt an attacker and significantly increase their efforts
you gain confidence.
required to attack. CSG Invotas software can also be used
And don’t worry about scale, as CSG Invotas software is
to deploy a honey pot to distract and trap the attacker,
proven to be reliable and effective even in the largest, most
keeping him away from your assets.
demanding telco networks worldwide. ■
To learn more about how CSG Invotas can bring
automation to your security infrastructure, visit
WWW.CSGINVOTAS.COM