Post Profile

Automated mitigation on endpoint devices and networks can be tricky

Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and endpoint devices has been a tougher nut to crack. That includes actions such as automatically re-imaging endpoint devices, isolating devices from corporate networks, or shutting down particular network processes in … The post Automated mitigation on endpoint devices and networks can be tricky appeared first on McAfee Blogs.
read more


Related Posts

Automating Complexity : The Opportunity in the Challenge for Network Automation

Technology / Internet : SiliconANGLE

Network Automation is helping companies bridge the IT complexity gap with the latest iteration of its flagship business process automation suite, which was first launched in 2004. The foundation of the product family, AutoMate 10, i...

Microsoft snaps up Israeli security firm Hexadite for a neat $100M

Technology / Internet : SiliconANGLE

Microsoft Corp. has acquired Israeli security firm Hexadite, a company that offers automated incident response solutions to cyberattacks. While the price of the acquisition was not officially disclosed, TechCrunch, citing sources, s...

What WannaCry Means for the SOC

Technology / Security : McAfee Avert Labs

In addition to the endpoint and network operational efforts for WannaCry, this outbreak presents great learning and response opportunities for analysts in the security operations center (SOC). Understanding and automating these best...

Expanding Automated Threat Hunting and Response with Open DXL

Technology / Security : McAfee Avert Labs

Today everyone is talking about security automation. However, what are the right processes and actions to automate safely? What are the right processes and actions to automate that will actually achieve some security outcome, such a...

Scott Roberts on intelligence-driven incident response

Technology : O'Reilly Radar

The O’Reilly Security Podcast: The open-ended nature of incident response, and how threat intelligence and incident response are two pieces of one process. In this episode of the Security Podcast, I talk with Scott Roberts, security...


Copyright © 2016 Regator, LLC