Industry insights

3 cybersecurity automation tools that your IT department needs now

Drew Robb
January 3, 2023 by
Drew Robb

In the current IT hiring crunch, skilled security workers are becoming increasingly overwhelmed with more work than can be handled. More skilled workers should take up the slack to the degree necessary to free up their colleagues' workloads.

This is according to a study by Mark Leary, an analyst at IDC. The study found that understaffed IT teams struggle to manage network operations and deliver high-quality digital experiences.

  • 58 percent of organizations believe their most well-trained staff spend too much time on tactical responsibilities
  • 63 percent want their organizations to find ways to enable lower-skilled IT staff to find and fix issues

Should you pay the ransom?

Should you pay the ransom?

Download The Ransomware Paper for real-world ransomware examples, mistakes and lessons learned.

Standing in the way of optimal IT efficiency, however, are chronic shortages of well-trained technical staff and a general need for more tools to ease the workload.

The tools most in demand by those in the trenches concern cybersecurity automation and the centralization of data from multiple sources.

Here are a few ways technology can relieve IT overwork, particularly in the security arena.

1. Unified IT observation tools

54 percent of organizations surveyed by IDC admitted using six or more IT monitoring and measurement tools. Many of these tools have a narrow focus, hampering productivity and collaboration, restricting IT’s ability to meet business requirements and making everyone’s jobs more difficult.

And as a result, they fail to provide a unified view of their organization’s operating conditions or security posture.

Personnel is instead forced to skip from console to console and manually combine data from multiple sources to gain an accurate understanding of a company's security condition.

Tools such as Alluvio Unified Observability, Splunk Observability Cloud and LogicMonitor LM Envision are designed to reduce reliance on such discrete data silos to give a more comprehensive view across the enterprise.

These tools facilitate IT automation that brings less-experienced personnel up to speed and reduces the workload on veteran security and technical personnel.

2. Meet new regulatory compliance standards

Compliance has become a major issue since the EU (as well as states such as California) passed stringent data protection and privacy regulations like the General Data Protection Regulation (GDPR).

For example, a recent decision by the Austrian data protection authority DSB found that U.S. cloud-based analytics services such as Google Analytics violated EU regulations regarding international data transfers.

“U.S. big tech is struggling with GDPR compliance,” said Maciej Zawadziński, CEO of Polish data tech company Piwik PRO. “Data Privacy Agreements (DPAs) in France, Spain and Ireland have imposed gigantic fines on many U.S. tech organizations.”

Anyone collecting the personal details of EU residents must ensure that they keep the data in Europe, where strong privacy regulations apply. Piwik PRO, as an example, offers an Analytics Suite that uses analytics and automation to enable enterprises to obtain all the data they need and comply with applicable laws while minimally relying on IT personnel.

ChatGPT training built for everyone

ChatGPT training built for everyone

We've created a training video and supplemental resources to educate every employee on how to use AI tools securely. Meet with a member of our team to get started.

3. Better manage insider risk

Insider risk is another area benefiting from cybersecurity automation — and it's about time. According to the Annual Data Exposure Report:

  • 96% of companies experience challenges in protecting corporate data from insider threats
  • 73% report insider risk as a big problem
  • A 37% chance exists that a company will lose intellectual property when an employee quits

These numbers highlight that very little within current cybersecurity budgets addresses these types of threats.

“With employee turnover and the shift to remote and collaborative work, security teams are struggling to protect IP, source code and customer information,” said Joe Payne, Code42 President and CEO.

“Companies must fundamentally shift to a modern data protection approach — insider risk management (IRM) — that aligns with today’s cloud-based, hybrid-remote work environment and can protect the data that fuels their innovation, market differentiation and growth.”

Tools are emerging to automate the tracking and movement of data. Most notable among their features is the ability to assess the risk of exfiltration from departing employees. Code42 Incydr is just one example. It detects data losses, leaks and thefts and speeds up incident response, resulting in increased efficiency of IT departments.

It's past time to embrace cybersecurity automation

While these are some examples of specific areas badly in need of automation, the cybersecurity industry is embracing automation across industries.

“With the volume of threats rising so sharply, IT departments need consolidated tools that provide a high level of automation,” said Ashley Leonard, CEO of Syxsense. His company offers a platform that unifies automated patch management, vulnerability management, IT management and mobile device management (MDM).

Further examples of this trend include:

  • Cynomi with an automated application that assesses risk, recommends cybersecurity strategy and ensures compliance with various rules, regulations, policies and standards
  • Falconstor has added a large amount of automation to processes centered around data protection, disaster recovery and backup operations for the hybrid cloud
  • Cynet has automated threat investigation and remediation actions as part of its extended detection and response (XDR) package

Phishing simulations & training

Phishing simulations & training

Build the knowledge and skills to stay cyber secure at work and home with 2,000+ security awareness resources. Unlock the right subscription plan for you.

There are many more examples. The point is that in this age of IT and security staffing shortages, automation plays an increasingly vital role in staying afloat.

“With skilled cybersecurity personnel being in such short supply and the threat landscape being so volatile, smart organizations are using automation to handle routine threats, enabling skilled staff to focus on exceptions and new attacks,” said Greg Schulz, an analyst with StorageIO Group. “It is becoming a case of automate or die.”

Drew Robb
Drew Robb

Drew Robb has been writing about IT, engineering and cybersecurity for more than 25 years. He's been published in numerous outlets and resides in Florida.