Comprehensive Software Reviews to make better IT decisions
Ayehu Bridges Gap Between IT Ops and Sec Ops
Ayehu is working to bridge the gap between IT Operations and Security Operations. We expect to see more vendor product offerings follow suit.
A key element of Ayehu’s value proposition is to bridge the gap between the Network Operations Center (NOC) and the Security Operations Center (SOC) with a single solution.
Traditional security operations relies on a number of manual hand-offs between various systems. A tier one analyst sits looking at a dashboard and evaluating alerts, then opens a ticket in the ITSM tool whenever they perceive an anomaly.
SOCs have traditionally relied on using a combination of various tools along with skilled personnel to provide the visibility and remediation necessary for security operations.
Security Ops usually consist of the following elements:
For security, Ayehu handles everything except aggregation. For aggregation, it integrates with the organization’s security information and event management (SIEM) tool.
But Ayehu’s focus isn’t solely on security. It also integrates with common IT and business tools such as ServiceNow, Salesforce, SolarWinds, VMware, and AWS services.
By sitting in the middle of the IT operations tools, Ayehu aims to provide an end-to-end solution that can stretch across IT Ops and Sec Ops.
Ayehu's workflow designer. Source: Ayehu.
As enterprise IT environments become more complex, especially with the move to hybrid and multi-cloud, IT Ops and Sec Ops will be deluged with an ever-increasing stream of data.
The natural next step for DevSecOps is end-to-end integration of IT Ops and Sec Ops. NOC and SOC functions will both be essential, but the barrier between the two will break down over time.
Info-Tech expects that other automation vendors will follow suit in attempting to provide solutions that effectively integrate IT Ops with Sec Ops.
Want to Know More?
Ayehu announced that it will be collaborating with Automation Anywhere, a robotic process automation (RPA) solution provider. This collaboration is a complementary marriage of opposites with the potential to benefit both vendors.
A Citrix vulnerability first discovered on December 17, 2019 is being continually exploited by ransomware attackers despite patching attempts by Citrix.
Project Zero is changing its vulnerability disclosure policy to give software developers more time to patch vulnerabilities. The policy is now shifted to a stringent 90-day policy.
Cybersecurity firm Bishop Fox identified eight vulnerabilities in ConnectWise’s remote control and remote access software.
Tenable Chosen as the Successor for BeyondTrust’s Vulnerability Management Suite; BeyondTrust Steps Aside
Announced on December 31, 2019, BeyondTrust named Tenable as the successor to its Vulnerability Management suite.
On January 15, 2020, the Department of Defense (DoD) issued an open call to vendors to fulfill a contract to help improve their technology and inventory management.
Microsoft has announced self-service purchasing, the ability for any O365 user to buy Power Platform products directly through their corporate O365 tenant. This raises numerous concerns with IT leaders and O365 administrators.
Ansible from RedHat has steadily gained market share since its introduction and has now surpassed its two main rivals (underscoring how quickly things change in DevOps). Will Ansible push Chef and Puppet out of the open-source configuration management tool market?
ServiceNow version New York has entered General Availability. These features should delight high-maturity IT departments but are mostly worthless for low-maturity groups.