* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate/) * [Service Providers](https://www.paloaltonetworks.com.au/blog/category/service-providers/) * Understanding the Automat... # Understanding the Automator's Dilemma in Security [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2017%2F12%2Fsp-understanding-automators-dilemma-security%2F) [](https://twitter.com/share?text=Understanding+the+Automator%E2%80%99s+Dilemma+in+Security&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2017%2F12%2Fsp-understanding-automators-dilemma-security%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2017%2F12%2Fsp-understanding-automators-dilemma-security%2F&title=Understanding+the+Automator%E2%80%99s+Dilemma+in+Security&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com.au/blog/2017/12/sp-understanding-automators-dilemma-security/&ts=markdown) \[\](mailto:?subject=Understanding the Automator’s Dilemma in Security) Link copied By [Stuart Borgman](https://www.paloaltonetworks.com/blog/author/stuart-borgman/?ts=markdown "Posts by Stuart Borgman") Dec 07, 2017 4 minutes [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [cybersecurity](https://www.paloaltonetworks.com/blog/tag/cybersecurity/?ts=markdown) [MSSP](https://www.paloaltonetworks.com/blog/tag/mssp/?ts=markdown) [prevention](https://www.paloaltonetworks.com/blog/tag/prevention/?ts=markdown) [strategy](https://www.paloaltonetworks.com/blog/tag/strategy/?ts=markdown) It was not my typical reading material while sitting next to the swimming pool on holiday, but the cybersecurity book [@War by Shane Harris](https://www.paloaltonetworks.com/blog/2015/08/the-cybersecurity-canon-war-the-rise-of-the-military-internet-complex/) turned out to be a fascinating and easy read. It's a recommended read in the Palo Alto Networks-sponsored [Cybersecurity Canon book list](https://cybercanon.paloaltonetworks.com/), and provides insight into the evolving role of cybersecurity in warfare. The book highlighted how cybersecurity changed government and private sector policy over a 10-year period, through 2014. Harris discusses the challenges national governments face when building a cyber defence strategy and the role vendors, service providers and enterprises must play. What's true now, as then, is that the private sector will continue to draw the top talent as governments are unable to compete with the salaries of commercial companies. Many enterprises have moved quickly to develop their cyber defence strategies. Financial institutions have a lot to lose in the event of a successful breach, so they have allocated large budgets to build robust and sophisticated cyber defences. Many of these companies are hiring from government agencies where knowledge and skills have been well-honed. With the right investment and skills, strong prevention strategies are being established. But for smaller organisations, this is typically an investment they cannot afford to prioritise. Without the skills or knowledge, their risk from cybercrime is often poorly understood or left to chance. Cyber insurance attempts to fill a void and mitigate the risk, but cybercrime is unlike other forms of theft, in that you can't simply reclaim stolen property. This is where service providers need to fill the void both in education and in delivering cybersecurity defence strategies. For this to be effective, education needs to be simple but effective. The solution needs to comprehensive, but not complex to consume. Those organisations who want to build their own effective cybersecurity prevention strategy or deliver a comprehensive Managed Security Service Provider (MSSP) offering have recruitment and retention of talented cybersecurity resources high on their priority list. But having talented resources solves only part of the problem when working in a rapidly changing environment. With all of that in mind, here are some suggestions: * Look to other more established industries for guidance, no matter how good your workforce. Machine control and automation ultimately become critical to managing scale and change. * The more dynamic the environment, the more important automation becomes. Closed loop control systems that allow critical systems to be dynamically controlled are used in most manufacturing and engineering processes. The rapidly changing cybersecurity landscape also needs automation and the benefits of closed loop control systems to be able to maintain pace with the rate of change. * Scaling with human talent alone can no longer keep pace. The [Heavy Reading](https://get.info.paloaltonetworks.com/webApp/evolution-of-security-en) white paper - The Evolution of Security: Harnessing the Power of Automated visibility - highlights this point. Shane Harris in [@War](https://www.paloaltonetworks.com/blog/2015/08/the-cybersecurity-canon-war-the-rise-of-the-military-internet-complex/)writes about the scale of Zero day threats stockpiled throughout the globe. These are held by governmental organisations, service providers and enterprises. The recent [WannaCry](https://www.paloaltonetworks.com/blog/2017/10/threat-brief-understanding-kernel-apc-attacks/) malware was allegedly leaked from a government organisation and quickly used globally with malicious intent. It caused significant damage and quickly morphed to other malware such a [Petya/NotPetya Ransomware](https://www.paloaltonetworks.com/blog/2017/06/unit42-threat-brief-petya-ransomware/). The speed of infection and rate of change made containment via manual intervention difficult. The [Heavy Reading](https://get.info.paloaltonetworks.com/webApp/evolution-of-security-en) paper highlights how quickly malware can spread. A single malware instance can spiral to more than 45,000 instances in only 30 minutes. The principle of a closed loop system is to detect and automate change. While this sounds simple, it is not without risk. Inaccurate information, such as false positives can cause critical data or applications to be blocked. But other industries have been through these issues, and made progress toward solving them. The oil industry moved from manual to automated processes. The risks for this industry were high: incorrect control of highly combustible materials could easily result in a catastrophic outcome. But these issues were solved through accurate detection and measurement, granular controls, process visibility via human management systems and safety systems. All industries affected by cyber threats -- meaning, everyone -- require accurate detection of malware, flexible platforms that can respond to change, human interfaces to both inspect and measure, and safety through high availability systems. This is where Palo Alto Networks is investing. Our [Application Framework](https://www.paloaltonetworks.com/products/innovations/application-framework) is the next evolution in building a scalable and automated security posture. Automation should no longer be aspirational, it needs to become a standard component of any APT \[Advanced Persistent Threat\] prevention strategy for both large and small organisations. *** ** * ** *** [**Connect with us in Barcelona at Mobile World Congress 2018**](http://go.paloaltonetworks.com/mwc2018) *** ** * ** *** ## Related Blogs ### [Partner Integrations](https://www.paloaltonetworks.com/blog/sase/category/partner-integrations/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### 5 Reasons Why You Should Consider Cloud-delivered Managed Security](https://www.paloaltonetworks.com.au/blog/2020/06/cloud-delivered-managed-security/) ### [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Cooperation and Collaborative Partnerships are Key to Protect Businesses](https://www.paloaltonetworks.com.au/blog/2020/05/network-cooperation/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### The Right Approach to Securing 5G](https://www.paloaltonetworks.com.au/blog/2020/05/network-securing-5g/) ### [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Do MSSPs Have What it Takes to Win Today's Cybersecurity War?](https://www.paloaltonetworks.com.au/blog/2020/03/network-mssps/) ### [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### All the Small Things: Why Service Provider Security Must Go Small](https://www.paloaltonetworks.com.au/blog/2017/10/sp-small-things-service-provider-security-must-go-small/) ### [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Cybersecurity Automation Squared: Security Automation × Network Automation](https://www.paloaltonetworks.com.au/blog/2017/06/sp-cybersecurity-automation-squared-security-automation-x-network-automation/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language