Red Hat Drives Security Orchestration and Automation with New Ansible Capabilities | VCE Exams Files
Red Hat previews Ansible Automation for enterprise security solutions, including Check Point, Splunk and Snort
Red Hat, Inc., the world's leading provider of open source solutions, released new Ansible Automation integrations to help customers automate and orchestrate enterprise security solutions, further extending Red Hat’s leadership across the IT security landscape. By automating security capabilities like enterprise firewalls, intrusion detection systems (IDS) and security information and event management (SIEM), organizations can better unify responses to cyberattacks through the coordination of multiple, disparate security solutions, helping these technologies to act as one in the face of an IT security event.
Automation is an important component of digital transformation, helping to drive efficiency, deliver value faster, and solve IT and business workflow challenges. Starting with networks, Red Hat has been driving Ansible Automation into IT domains beyond operations, enabling users to more easily automate more tasks in more ways, including security tasks. Beyond the intent to enable security solution automation, Red Hat also announced certified content to help improve the reliability, consistency and veracity of content.
As IT environments become more complex, so do the security events facing enterprise IT teams. To help organizations better assess risks, remediate issues and develop compliance workflows, Ansible security automation will offer new modules to integrate and orchestrate security tasks and processes. These capabilities are designed to enable IT security teams to innovate and implement better controls that can encompass security technologies that enterprises are using with Red Hat Ansible Automation.
According to Gartner, "Security teams are suffering from staff shortages, an increase in the volume of alerts and threats, and the ever-present need to do more with less. Existing tools, such as firewalls, endpoint protection platforms (EPPs), security information and event management (SIEM), secure web gateways (SWGs) and identity proofing services (IDPSs), have not been improving the breadth and depth of their APIs. This hinders security teams from getting their tools working in concert with each other to solve problems. The "tool silo" problem is still the norm for most security teams. Threat intelligence (TI) has matured significantly and is now a front-and-center requirement to improve the context security practitioners need. It is also making many tools and processes smarter and more efficient."
Detection and triage of suspicious activities - Ansible can automatically configure logging across enterprise firewalls and IDS to enrich the alerts received by a SIEM solution for easier event triage; for example, enabling logging or increasing log verbosity.
Threat hunting - Ansible can automatically create new IDS rules to investigate the origin of a firewall rule violation and whitelist those IP addresses recognized as non-threats.
Incident response - Ansible can automatically validate a threat by verifying an IDS rule, trigger a remediation from the SIEM solution and create new enterprise firewall rules to blacklist the source of an attack.
As part of this preview, Red Hat's Ansible security automation platform provides support for:
- Check Point – Next Generation Firewall (NGFW);
- Splunk – Splunk Enterprise Security (ES);
- Snort
Availability
Support for automating enterprise security solutions in Ansible is currently in tech preview and is slated to be generally available via Ansible Galaxy in early 2019.
Supporting Quote
“Since Red Hat acquired Ansible in 2015, we have been working to make the automated enterprise a reality by driving Ansible into new domains and expanding automation use cases. With the new Ansible security automation capabilities, we’re making it easier to manage one of enterprise IT’s most complex tasks: systems security. These new modules can help users take an automation-centric approach to IT security, integrating solutions that otherwise would not work together and helping to manage and orchestrate entire security operations with a single, familiar tool.”
Red Hat new security automation and launches certification for Ansible
Red Hat Ansible security automation will offer new modules to integrate and orchestrate security tasks and processes. If you really want to Red Hat Ansible Automation Certificatied than you are the right place. You're in luck, because we provide you different types of Red Hat Certification study material that will help you pass Red Hat certification exam in your first attempt. We have compiled real exam questions with their answers so that you can prepare and pass Red Hat Ansible Automation certification exam in your first attempt. Get most updated Red Hat Automation braindumps with 100% accurate answers. VCEEXAMTEST offering you two types of VCE products, PDF format and Practice Exam Software. Both these VCE products are different in their specifications but their features are shared. VCEEXAMTEST is considered one of the best website where you can practice or prepare your exam with real scenarios and save extra money by getting three-Months of free updates after buying the VCE exam products. Hence, you will just pick any of VCE products and begin preparing with best resource for Red Hat Ansible Automation exam preparation.
No comments:
Post a Comment