Learn how one organization automated phishing investigations to build a business case for security automation and orchestration. Credit: Thinkstock In only a few years, security automation and orchestration (SA&O) has become a cornerstone technology for the modern SOC (security operations center). Investing in a security automation and orchestration platform is often seen as a highly strategic decision as the technology will become a central part of the security infrastructure, effectively acting as the operating system for the SOC.Security automation and orchestration platforms produce a number of economic benefits in addition to helping your SOC team work more efficiently. This article aims to quantify those benefits by sharing a case study from an actual deployment.Though industry leading platforms support a wide range of uses cases, many customers begin with incident response when deploying security automation and orchestration. Automating the investigation of suspected phishing emails is a common scenario—the investigations are highly repetitive, follow a known process, and consume valuable analyst time when performed manually.It’s common for SOC analysts to spend upwards of 90 minutes manually investigating suspected phishing emails, and in one specific SA&O deployment the team handles around 45 suspected phishing emails on an average day. The standard operating procedure (SOP) for this type of event includes acknowledging receipt from the employee who received the suspected phishing email, analyzing the email for malicious indicators, and taking steps to remediate the threat if the email is confirmed to be part of a phishing campaign.Using actual data from this deployment and estimated salary rates for a Tier-1 SOC analyst, we can compute the cost of processing suspected phishing emails manually: CP Morey1. Source of figure: Glassdoor.com. 2. Five-day work week assumed.With automation, a manual process taking 90 minutes or more to complete now finishes in under a minute, freeing the SOC team to focus time on less routine investigations that require a human’s insight. This 98 percent reduction in the time required to process suspected phishing emails equates to savings of over $690,000 per year.While the savings possible from automatically processing phishing emails on a routine day alone can justify the acquisition of a Security Automation & Orchestration platform, the expected return on investment is even greater in this deployment.Routine days for this SOC team bring 45 suspected phishing emails to process, but they also occasionally see burst attacks with up to 300 suspected phishing emails in a single day. With similar analysis, we can also estimate the return associated with handing burst attacks: CP Morey1. Source of figures: Glassdoor.com. 3. Two burst attacks per month assumed. 4. From Table 1.With the same 98 percent reduction in the time required to process a suspected phishing email, the total savings equates to more than $1 million per year. Since additional analysts cannot be staffed to handle burst attacks on demand and the current team lacks the capacity to address them, most of the suspected phishing emails received during a burst attack are simply ignored. The true cost of the phishing problem could be much higher after considering the potential breach costs stemming from an incident that has gone unchecked.Though phishing email investigation is a common use case for SA&O, industry-leading platforms are open and extensible for other use cases. This flexibility gives SOC teams the ability to easily automate a wide range of SOPs.Teams often focus initially on use cases that represent their greatest pain points. The processes for these use cases often contain many manual tasks and require working across multiple products and departments to complete a single playbook. While the acquisition of a SA&O platform can often be justified by a single use case such as investigating phishing emails, it’s still important to consider other potential use cases including enrichment, containment, and remediation and more. Developing comprehensive security use cases is important to help ensure that the platform you choose today will also support your needs in the future and maximize your ROI.Security automation and orchestration platforms produce strong economic returns while helping organizations to work smarter. By automating repetitive tasks, teams can respond faster and reduce dwell times with automated detection, investigation, and response. They can also strengthen their defenses by integrating the entire security infrastructure together so that each part is actively participating in the defense strategy. Related content opinion The security operations platform: automation, orchestration and more As the security automation and orchestration market matures, features like collaboration, event & case management, plus reporting and metrics are growing in importance. Learn how burgeoning security operations platforms are finding a place in mod By CP Morey Mar 14, 2018 5 mins Technology Industry Access Control Cloud Security opinion How collaboration and community fit into the security industry Security automation and orchestration requires collaboration and community for success. By CP Morey Dec 04, 2017 4 mins Unified Communications Security opinion 5 security automation playbooks that pack a powerful punch Can these five simple "utility playbooks" for security automation provide as much value as their larger, more complex counterparts? By CP Morey Oct 18, 2017 4 mins Technology Industry Machine Learning Data and Information Security opinion AI, ML – is it all just BS? Though we’re easily enamored with new technologies like artificial intelligence and machine learning, do they actually help us solve real problems in the SOC like reducing Mean Time to Resolution (MTTR)? By CP Morey Sep 12, 2017 4 mins Technology Industry Machine Learning Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe