Over the past few years, the security industry has made significant investments and improvements in cyber threat detection, but containment – time from threat detection to remediation – is still a very manual, costly, and drawn-out process. Now the focus has shifted towards automated threat response and shortening of containment time without relying on error-prone manual intervention.

During the critical days or even weeks once a breach is identified, highly priced and scarcely available security experts must traverse IT domains, sift through and correlate silos of disparate information and logs to uncover, trace and contain a threat’s electronic footprint. While this fragmented, lengthy, and manual process that often relies on intuition continues, the breach being investigated can potentially tarnish a company’s brand or cause other significant harm.