Cyber attacks by criminals have become automated through the use of a host of computers infected with malicious software. Attempts to fight such attacks manually will result in human actors quickly becoming overwhelmed. Cyber security automation is the only effective way to overcome such attacks by reducing their number, responding to them more quickly and identifying new types of threats.
Automation techniques enable the collection of vast amounts of threat data that can be correlated (from both internal and external sources) to identify attack vectors. Effective protection techniques are then automatically deployed to counter them as quickly as they impact the system. Through automation, these protections can be propagated through a system quickly enough that the attack is disrupted. Automation techniques can also be used to conduct scans of a network to identify markers of malicious software already present in the system.