The automated security incident response space is still in its infancy, but several companies are working on the problem of collecting all the security alert data, analyzing it, and triggering automatic remediation processes when appropriate. The automated security incident response space is still in its infancy, but several companies are working on the problem of collecting all the security alert data, analyzing it, and triggering automatic remediation processes when appropriate.RELATED: Automating incident response lets IDT take battle to the enemyCSG InvotasThe Invotas Security Orchestrator platform allows companies to build playbooks of threats and responses, and then respond with either a fully automated response or through human executed automation.CyberSponse, Inc.“We either help organizations deal with an incident, automatically respond to events or do a hybrid of the two,” said founder and CEO Joe Loomis. “The only way to respond to an automated attack is to defend with an automated solution.” EnCase Cybersecurity from Guidance Software“If you have high certainty in the efficacy of the events of a particular integrated technology, our technology can also automate remediation,” said spokeswoman Brigitte Engel. “It can wipe malicious files, kill running process, and reset affected registry keys, returning the machine to a trusted state.”FIDO from NetflixA do-it-yourself, open source alternative just released by Netflix. HexaditeAutomates incident response analysis to determine whether a security alert is a real threat, then automates the response to that alert.HexisUses a big data platform, analytics, scanning, and a library of threats to identify, validate and remove advanced threats automatically at machine speeds – before damage is done.Phantom CyberA new startup, just received a $2.7 million seed round from a group of very experienced security company CEOs and other tech investors to build automated security response systems. The company is currently looking for beta customers.Proofpoint Threat ResponseProofpoint Threat Response automates incident response by surrounding security alerts with rich contextual data to create actionable intelligence, confirming system infections, and enforcing protections automatically or with the push of a button.Resilient SystemsThe Action Module enables advanced incident response for any type of attack by connecting with all cybersecurity systems, supporting automatic execution of custom actions, and providing tools to orchestrate rapid and effective response.Resolution1 SecurityOffers a platform that arms security operations teams with the ability to quickly identify malicious behavior, validate threats based on multiple criteria, and automate remediation and deep analysis workflows. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe