The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.
Detect and deter threats faster with security automation
When a mobile game platform loosened security procedures to accommodate more users, it exposed players to a theft of US$615 million in cryptocurrency. Ransomware that gained entry to an oil pipeline’s digital systems via an unprotected password led to widespread fuel shortages, panic buying and multimillion-dollar losses. Again and again, cybercriminals exploit vulnerabilities in people and systems, causing damage to finances, reputations and everyone connected to the targets.
With human error accounting for 95% of security breaches and costs associated with cybercrime predicted to reach US$8 trillion globally in 2023 according to Cybersecurity Ventures, manual detection and responses aren’t enough. The threat landscape has grown too complex; having to process and prioritize potentially thousands of security data points at any given moment can overwhelm even the most capable IT teams. According to a 2022 IBM report, it takes nine months on average “to identify and contain a breach.”
Security automation—the use of technology, tools and processes to automate security tasks—offers greater protection against increasingly sophisticated strikes and can reduce response times from days to hours. The IBM report notes that breaches for "organizations using AI and automation” were 74 days shorter and an average of US$3 million less costly.
Technologies like Red Hat Ansible Automation Platform (recently made available on Google Cloud) provide rapid intelligence and defense. But effectively implementing systemwide security automation also requires a shift in strategy, skills and mindset.
IT leaders seem to be making that shift. Red Hat’s 2023 Global Tech Outlook survey identifies security automation as the top automation priority. E.G. Nadhan, Global Chief Architect Leader at Red Hat, says “forward-thinking enterprises who have a laser focus on proactive remediation will bring automation … into enterprise security to further reduce risk.”
In this issue of Red Hat Shares, learn about why you should consider security automation; tips for thinking through cost, design and implementation; how Emory University mitigated a security threat with a Red Hat automation solution and more. Plus, get links to a few ways to test out Ansible Automation Platform at no cost.
First, see why now is the time to prioritize security automation:
Security automation: What does it mean, and how do I get there?
Securing system architecture through automation requires new skills and new ways of thinking.
You may also be interested in “Security automation: 3 key benefits.”
Security automation: 4 factors to consider
Before you talk strategy, you need to talk numbers. The cost conversation dictates how organizations use automation—or whether they use it at all.
You may also be interested in “Security automation: 3 priorities for CIOs.”
5 ways to improve security automation
Consider these tips when designing security solutions to make them as effective and painless as possible.
IT solutions and security integration in changing environments
Fully deploying security automation can reduce the average cost of a security breach by 95%. In this on-demand webinar, learn how Ansible Automation Platform can contribute to investigation enrichment, threat hunting and incident response.
Build a foundation of security with Zero Trust and automation
With growing threats and attack vectors, implementing Zero Trust across your organization is a must. But that’s only the beginning—especially in large organizations with multiple sites and a mix of on-premise, cloud and edge systems. Scaling Zero Trust architecture requires enterprise-level automation.
Emory University mitigates sudo threat with Red Hat
Find out how, after discovering a security vulnerability that needed to be addressed quickly, the university used Ansible Automation Platform to remediate across more than 500 servers in four hours instead of up to two weeks.
Experiment with Red Hat Ansible Automation Platform at no cost
Did you miss our special end-of-year edition? Check it out. Or browse all past issues of Red Hat Shares.
Über den Autor
The Red Hat Shares team comprises content strategists who work with lots of smart subject matter experts. Together, we curate content on emerging tech topics your enterprise needs to learn about to stay competitive.
Nach Thema durchsuchen
Automatisierung
Das Neueste zum Thema IT-Automatisierung für Technologien, Teams und Umgebungen
Künstliche Intelligenz
Erfahren Sie das Neueste von den Plattformen, die es Kunden ermöglichen, KI-Workloads beliebig auszuführen
Open Hybrid Cloud
Erfahren Sie, wie wir eine flexiblere Zukunft mit Hybrid Clouds schaffen.
Sicherheit
Erfahren Sie, wie wir Risiken in verschiedenen Umgebungen und Technologien reduzieren
Edge Computing
Erfahren Sie das Neueste von den Plattformen, die die Operations am Edge vereinfachen
Infrastruktur
Erfahren Sie das Neueste von der weltweit führenden Linux-Plattform für Unternehmen
Anwendungen
Entdecken Sie unsere Lösungen für komplexe Herausforderungen bei Anwendungen
Original Shows
Interessantes von den Experten, die die Technologien in Unternehmen mitgestalten
Produkte
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Cloud-Services
- Alle Produkte anzeigen
Tools
- Training & Zertifizierung
- Eigenes Konto
- Kundensupport
- Für Entwickler
- Partner finden
- Red Hat Ecosystem Catalog
- Mehrwert von Red Hat berechnen
- Dokumentation
Testen, kaufen und verkaufen
Kommunizieren
Über Red Hat
Als weltweit größter Anbieter von Open-Source-Software-Lösungen für Unternehmen stellen wir Linux-, Cloud-, Container- und Kubernetes-Technologien bereit. Wir bieten robuste Lösungen, die es Unternehmen erleichtern, plattform- und umgebungsübergreifend zu arbeiten – vom Rechenzentrum bis zum Netzwerkrand.
Wählen Sie eine Sprache
Red Hat legal and privacy links
- Über Red Hat
- Jobs bei Red Hat
- Veranstaltungen
- Standorte
- Red Hat kontaktieren
- Red Hat Blog
- Diversität, Gleichberechtigung und Inklusion
- Cool Stuff Store
- Red Hat Summit