1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Automating incident response lets IDT take battle to the enemy

Discussion in 'CSO' started by RSS, May 5, 2015.

  1. RSS

    RSS New Member Member

    Two years ago, attackers had Newark-based telecom and payments provider IDT Corp. pinned down.

    Security staffers had their hands full dealing with a constant inflow of attacks against the company's infrastructure.

    Sorting out real attacks from false positives, cleaning up malware, and ensuring that infections didn't spread could take hours -- or longer -- for a single incident. Meanwhile, every additional minute that an infected machine stayed on the network was that much more opportunity for the attackers to bury themselves deep or to make lateral jumps to other machines.

    MORE ON CSO: 10 mistakes companies make after a data breach

    By automating the incident response process, IDT was able to reduce the time before the infection was quarantined, shorten the remediation cycle, reduce investigation time, and free up security staff to go after the bad guys themselves.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page