How ServiceNow uses Security Operations to Deliver 6X Faster Processing via Automation and Integration

At security conferences, technologies like artificial intelligence and machine learning are often in the spotlight. But for security operations teams, a very pragmatic topic is even hotter: integration. Because no security product or company can do everything, security environments often consist of dozens of disparate tools. These tools are typically focused on protection and detection, with security teams manually collecting alert data from the various sources. The challenge is to bring all the data from these tools together in one location where analysts can access information quickly and manage the appropriate response actions. ServiceNow® Security Operations was designed to do precisely that, and our own experience is a good example.

ServiceNow’s own security operations team has been using the Now PlatformTM from the beginning but has enhanced it steadily over time. We started with incident management, then built custom security applications and workflows for tasks like event management and alerts. Once ServiceNow created an official Security Operations product, we immediately transitioned to it in order to improve efficiencies and enhance our capabilities around incident and vulnerability management.

An integral aspect of ServiceNow’s environment includes third-party security information and event management (SIEM), endpoint security and threat intelligence tools. All of these products are tightly integrated into Security Operations, which has allowed us to automate several manual processes. For example, when one of our security tools detects a threat, Security Operations immediately creates a security incident. For each type of security incident, Security Operations has a set of workflows that drives our response. Processes like analyzing a hash or IP address, which would normally require logging into multiple security tools to do research, are all automated. Thus, our analysts can quickly drive blocking or remediation from within Security Operations. These automations have allowed us to accelerate both investigation and resolution of threats. And we’ll continue to automate other processes, both large and small, as we see the value.

The benefits of using ServiceNow Security Operations have been significant:

  • 8,700 hours saved annually from Security Operations Center (SOC) automation
  • 6X faster alert and event processing via automation and third-party security product integration
  • 50% increase in number of incidents handled per staff through operational efficiencies
  • $420,000 savings in security operations staffing costs

We have also realized value in three strategic areas:

  • Increased Velocity – Because Security Operations is integrated on the Now Platform, our analysts have instant access to IT configuration data in real time. This enables the security operations team to accelerate investigation and reduce the burden on the IT department. Having data in Security Operations rather than in spreadsheets or other tools enables analysts spend more time on other efforts, such as refining alerts and creating knowledge base articles.
  • Actionable Insight – Analysts make faster, better-informed decisions by having a single, consolidated view of the environment and accurate, comprehensive data at their fingertips (see dashboard).

Automated reporting using Performance Analytics helps us stay well informed, track progress over time to pinpoint areas for improvement, and demonstrate security compliance to audit teams.

  • User Experience – Automating administrative tasks enables analysts to spend more time on value-added work. Having a central location where activities can be monitored and prioritized reduces fatigue and improves job satisfaction. Well-qualified alerts, usually with a knowledge base article attached, allow analysts to be productive quickly.

According to Yuval Cohen, ServiceNow Chief Information Security Officer, “When our analysts investigate a security incident, they have all the data they need in one place. Our platform provides the relevant vulnerabilities and patching cycles, problems (PRBs) and remediation projects, CMDB data, threat intel and many other types of valuable data that now all tie together to give us a full picture.”

I look forward to sharing more Now on Now examples of how we’re “drinking our own champagne” and using the Now Platform to streamline and accelerate every corner of the enterprise.

You can identify, prioritize and respond to incidents and vulnerabilities faster.

mm
Chris Bedi
Chris Bedi joined ServiceNow in September 2015 and currently serves as ServiceNow’s Chief Information Officer. Prior to joining ServiceNow, Bedi served as CIO of JDSU from August 2011 to March 2015 where he was responsible for IT, Facilities, and Indirect Procurement. Prior to JDSU, Bedi held various positions at VeriSign from April 2002 until August 2011, including CIO, VP Corporate Development, and VP HR Operations. Bedi began his career at KPMG Consulting from June 1996 to April 2002. He holds a Bachelor’s degree in Computer Engineering from the University of Michigan.

Leave a Reply Text

Your email address will not be published.

Shares