{"id":22397,"date":"2022-06-22T22:10:27","date_gmt":"2022-06-22T22:10:27","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22397"},"modified":"2022-07-25T19:30:51","modified_gmt":"2022-07-25T19:30:51","slug":"cybersecurity-hyperautomation","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/","title":{"rendered":"Hyperautomation and the Future of Cybersecurity"},"content":{"rendered":"\n<p>Next-gen AI systems are now baked into just about every category of software\u2014but Gartner believes we can automate even further. For the last few years, Gartner has predicted that hyperautomation would become a global, if not necessary, business trend. And in cybersecurity, hyperautomation could be the thing that makes the constant onslaught of alerts and cyber incidents manageable.<\/p>\n\n\n\n<p>Hyperautomation in managed security services was also the subject of a presentation at Gartner&#8217;s Security &amp; Risk Management Summit earlier this month by Gartner Analyst Mark Wah, who noted that advanced automation in the fast-growing managed detection and response (MDR) market could increase the analyst-to-user ratio by a factor of as much 20 and massively boost MDR services profitability.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-mdr-solutions\/\">Top MDR Services and Solutions<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Hyperautomation?<\/h2>\n\n\n\n<p>A blend of robotic process automation, machine learning technology, and artificial intelligence, <a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/hyperautomation\" target=\"_blank\" rel=\"noreferrer noopener\">hyperautomation<\/a> seeks to refine and improve business and technology processes that previously required a human decision-maker.<\/p>\n\n\n\n<p>Due to the lightning-fast proliferation of low-code\/no-code development tools and agile DevOps processes, many enterprises have already automated every mundane and routine task. Hyperautomation takes robotic automation and quality assurance to the next level, incorporating ML\/AI technology to replicate the human decision-making process.<\/p>\n\n\n\n<p>Imagine intelligent systems making incredibly quick decisions based on impossibly intricate sets of data\u2014that\u2019s hyperautomation. Today, hyperautomation can be used to improve upon business process management, iPaaS solutions, and (critically) security systems. Tomorrow, it will become even more advanced.<\/p>\n\n\n\n<p>The major advantages of hyperautomation:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Streamlines and improves the automation of work and processes<\/li><li>Improves business agility and DevOps strategies<\/li><li>Augments low-code\/no-code security<\/li><\/ul>\n\n\n\n<p>The major disadvantages of hyperautomation:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Requires a next-gen technology infrastructure<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Hyperautomation vs. Automation<\/h2>\n\n\n\n<p>What is the difference between hyperautomation and routine automation, such as robotic process automation?<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><\/td><td><strong>Automation<\/strong><\/td><td><strong>Hyperautomation<\/strong><\/td><\/tr><tr><td>Structure<\/td><td>Automation tools<\/td><td>Machine learning, hyperautomation software<\/td><\/tr><tr><td>Scope<\/td><td>Single platform<\/td><td>Multi-platform, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/\">mesh<\/a><\/td><\/tr><tr><td>Complexity<\/td><td>Task-based<\/td><td>Process-based, procedure-based<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Hyperautomation is still built on a foundation of automation. Hyperautomation incorporates artificial intelligence with automation tools, to increase scope and complexity.<\/p>\n\n\n\n<p>Read also: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\">Automating Security Risk Assessments for Better Protection<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are Examples of Hyperautomated Security Systems?<\/h2>\n\n\n\n<p>Some possible uses of hyperautomation in security include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>An artificial intelligence system reviews emails with Natural Language Processing to identify <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">phishing attempts<\/a>.<\/li><li>A document security system reads scanned documents with Optical Character Recognition to identify personally identifiable information.<\/li><li>A machine learning security solution identifies a potentially suspicious log-in context, and engages for further credentials.<\/li><\/ul>\n\n\n\n<p>Wah encouraged Gartner security conference attendees to look for projects that have high feasibility and business value (see graphic below). Some possibilities he identified include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Transaction fraud detection<\/li><li>File-based malware detection<\/li><li>Process behavior analysis<\/li><li>Abnormal system <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">behavior detection<\/a><\/li><li>Web domain and reputation assessment<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-it-asset-management-tools-for-security\/\">Asset inventory<\/a> and dependency mapping optimization<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/06\/security-hyperautomation-gartner-1024x564.jpg\" alt=\"\" class=\"wp-image-22399\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner-1024x564.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner-300x165.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner-768x423.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner-1536x846.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner-150x83.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner-696x383.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner-1068x588.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner-1920x1057.jpg 1920w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg 1961w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">As SaaS grows, So Do Enterprise Security Concerns<\/h2>\n\n\n\n<p>It\u2019s inarguable that SaaS solutions have substantially improved the efficiency and productivity of the modern enterprise. But, due to their extraordinary ease of use, SaaS solutions have also introduced some <a href=\"https:\/\/www.techrepublic.com\/article\/business-teams-increase-cybersecurity-risk-due-to-poor-saas-management\/?\" target=\"_blank\" rel=\"noreferrer noopener\">major security concerns<\/a>. When everyone can make modifications to a system, everyone does.<\/p>\n\n\n\n<p>Configuration issues are an excellent example\u2014most configuration changes must be manually checked and, therefore, they are not. When low-code\/no-code systems are combined with SaaS, configuration issues run rampant.<\/p>\n\n\n\n<p>Previously, automated systems were limited to routine, mundane tasks. Hyperautomation leverages ML decision-making for more complex actions. In SaaS, hyperautomation can be used to perform routine configuration checks. Hyperautomation can even check for more complex issues, such as security creep.<\/p>\n\n\n\n<p>Gartner has predicted that organizations that adopt hyperautomation will lower their <a href=\"https:\/\/www.gartner.com\/en\/conferences\/na\/symposium-us\/conference-resources\/top-strategic-trends?\" target=\"_blank\" rel=\"noreferrer noopener\">operational costs by 30%<\/a>, largely through automating business processes. But the cost-savings of automating security issues\u2014and facilitating large-scale, complex, multi-cloud infrastructures\u2014may be even more substantial.&nbsp;<\/p>\n\n\n\n<p>For security professionals, the landscape doesn\u2019t change that significantly. Hyperautomation is already being baked into many next-gen, AI-enabled solutions. But understanding the principles of hyperautomation may soon become as important as understanding the principles of robotic process automation and testing.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/top-code-debugging-and-code-security-tools\/\">Top Code Debugging and Code Security Tools<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fighting a Growing Attack Landscape With Intelligence<\/h2>\n\n\n\n<p>Fundamentally, the nature of security is changing. Gartner highlighted seven major security trends for businesses in 2022\u2014with a major issue being the continued expansion of the <a href=\"https:\/\/www.gartner.com\/en\/articles\/7-top-trends-in-cybersecurity-for-2022\" target=\"_blank\" rel=\"noreferrer noopener\">enterprise attack surface<\/a>.<\/p>\n\n\n\n<p>An increasing push toward remote work, IoT devices, and multi-cloud architectures now have organizations scrambling to protect their most important assets. Gartner\u2019s report highlights a new trend toward cybersecurity mesh architecture\u2014an architecture of asset-first protection.<\/p>\n\n\n\n<p>Most security solutions already incorporate next-generation AI; they need to. Human administrators cannot keep up with their swiftly growing enterprise tech stacks. Hyperautomation increases the utility of these AI-driven systems, affording them the ability to make humanized and time-sensitive decisions.<\/p>\n\n\n\n<p>Further, cybercriminals are becoming savvy about how AI\/ML cybersecurity solutions work. Advanced hyperautomation systems will make more sophisticated decisions faster, thereby increasing the complexity of an organization\u2019s defense strategies. More advanced AI\/ML solutions are inherently less predictable and more defensible.<\/p>\n\n\n\n<p>Read also: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ai-ml-cybersecurity\/\">AI &amp; ML Cybersecurity: The Latest Battleground for Attackers &amp; Defenders<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Gen Z More Likely to Embrace Hyperautomation<\/h2>\n\n\n\n<p>Interestingly, hyperautomation may also have a generational influence. Gen Z is more likely to embrace hyperautomation, which may also lead adoption in the years to come.<\/p>\n\n\n\n<p>\u201cBorn between 1997 and 2012, the oldest Gen Zers have just started their careers. In 10 years, they\u2019ll be supply chain managers,\u201d said Pierfrancesco Manenti, Distinguished VP Analyst with Gartner. \u201cThis generation has grown up with digital technologies, so today\u2019s supply chain leaders expect them to be innovators that accelerate supply chain digitalization and pave the way towards hyperautomation.\u201d<\/p>\n\n\n\n<p>While Manenti discussed supply chain management, this extends to all aspects of hyperautomation and automated digital transformation. Gen Z tech professionals may find themselves adapting to a hyperautomated world with a swiftness, increasing their competitiveness within the market.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">An Even Harder Push Toward Hyperautomation Approaches<\/h2>\n\n\n\n<p>Gartner\u2019s <a href=\"https:\/\/www.gartner.com\/en\/webinars\/4000987\/the-executive-guide-to-hyperautomation\" target=\"_blank\" rel=\"noreferrer noopener\">Executive Guide to Hyperautomation<\/a> notes that the COVID-19 pandemic significantly accelerated a push toward automation. Recession-related fears, cutbacks, and the increased need for resiliency will further push organizations toward automated, resilient systems.<\/p>\n\n\n\n<p>With tech stocks plummeting and a possible recession looming on the horizon, companies are trying to do more with less. Hyperautomation will become a driving force behind security in an increasingly complex world.<\/p>\n\n\n\n<p>Likewise, security professionals may need to engage in hyperautomation to protect and preserve their own time. As security professionals contract with larger companies (and <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\">MSSPs<\/a> expand to larger client bases), hyperautomation will reduce work hours.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp-tools-services\/\">Becoming an MSSP: Tools, Services &amp; Tips for Managed Security Services<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Automated Systems Will Change Security Faster Than You Think<\/h2>\n\n\n\n<p>Most industry professionals are already aware that automation is rapidly picking up pace. A combination of new technologies, economic pressures, and a dearth of affordable, accessible talent has fueled innovation throughout the automation industry. Hyperautomation\u2014building upon automated, optimized processes with stronger, real-time decision-making\u2014is the natural next step.<\/p>\n\n\n\n<p>For security professionals, hyperautomation puts the focus on developing resilient, big-picture architectures to stay on top of never-ending threats.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/ai-cybersecurity\/\">How AI is Advancing Cybersecurity<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d651a7fa8-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d651a7fa8\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d651a7fa8\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d651a7fa8\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d651a7fa8\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d651a7fa8\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d651a7fa8\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Next-gen AI systems are now baked into just about every category of software\u2014but Gartner believes we can automate even further. For the last few years, Gartner has predicted that hyperautomation would become a global, if not necessary, business trend. And in cybersecurity, hyperautomation could be the thing that makes the constant onslaught of alerts and [&hellip;]<\/p>\n","protected":false},"author":282,"featured_media":22399,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[2369,3790,9651,1146,31514,3414,730,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[377,448,389,375,376],"class_list":["post-22397","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-cloud-security","tag-cybersecurity","tag-faq","tag-malware","tag-mdr","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-gateway-and-network-security","b2b_product-hosted-and-managed-services","b2b_product-managed-security-services","b2b_product-security-management","b2b_product-security-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hyperautomation and the Future of Cybersecurity | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Hyperautomation addresses cybersecurity complexity by elevating AI from routine automation to decision-making.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hyperautomation and the Future of Cybersecurity | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Hyperautomation addresses cybersecurity complexity by elevating AI from routine automation to decision-making.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T22:10:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-25T19:30:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1961\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jenna Inouye\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Inouye\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/\"},\"author\":{\"name\":\"Jenna Inouye\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3e587fc16bf8bd7d57b2f2783f89f321\"},\"headline\":\"Hyperautomation and the Future of Cybersecurity\",\"datePublished\":\"2022-06-22T22:10:27+00:00\",\"dateModified\":\"2022-07-25T19:30:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/\"},\"wordCount\":1171,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"FAQ\",\"malware\",\"mdr\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/\",\"name\":\"Hyperautomation and the Future of Cybersecurity | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg\",\"datePublished\":\"2022-06-22T22:10:27+00:00\",\"dateModified\":\"2022-07-25T19:30:51+00:00\",\"description\":\"Hyperautomation addresses cybersecurity complexity by elevating AI from routine automation to decision-making.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg\",\"width\":1961,\"height\":1080,\"caption\":\"security hyperautomation gartner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hyperautomation and the Future of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3e587fc16bf8bd7d57b2f2783f89f321\",\"name\":\"Jenna Inouye\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Profile-Pic-Jenna-1-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Profile-Pic-Jenna-1-150x150.jpg\",\"caption\":\"Jenna Inouye\"},\"description\":\"Full-stack developer and technology writer with bylines in Hackr.io, Udemy, and SVG. Technology writer at First Page Sage, a leading SEO firm.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jinouye\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hyperautomation and the Future of Cybersecurity | eSecurity Planet","description":"Hyperautomation addresses cybersecurity complexity by elevating AI from routine automation to decision-making.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/","og_locale":"en_US","og_type":"article","og_title":"Hyperautomation and the Future of Cybersecurity | eSecurity Planet","og_description":"Hyperautomation addresses cybersecurity complexity by elevating AI from routine automation to decision-making.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/","og_site_name":"eSecurity Planet","article_published_time":"2022-06-22T22:10:27+00:00","article_modified_time":"2022-07-25T19:30:51+00:00","og_image":[{"width":1961,"height":1080,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg","type":"image\/jpeg"}],"author":"Jenna Inouye","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Inouye","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/"},"author":{"name":"Jenna Inouye","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3e587fc16bf8bd7d57b2f2783f89f321"},"headline":"Hyperautomation and the Future of Cybersecurity","datePublished":"2022-06-22T22:10:27+00:00","dateModified":"2022-07-25T19:30:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/"},"wordCount":1171,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg","keywords":["cloud security","cybersecurity","FAQ","malware","mdr","network security","security","Web security"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/","url":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/","name":"Hyperautomation and the Future of Cybersecurity | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg","datePublished":"2022-06-22T22:10:27+00:00","dateModified":"2022-07-25T19:30:51+00:00","description":"Hyperautomation addresses cybersecurity complexity by elevating AI from routine automation to decision-making.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/security-hyperautomation-gartner.jpg","width":1961,"height":1080,"caption":"security hyperautomation gartner"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Hyperautomation and the Future of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3e587fc16bf8bd7d57b2f2783f89f321","name":"Jenna Inouye","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Profile-Pic-Jenna-1-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Profile-Pic-Jenna-1-150x150.jpg","caption":"Jenna Inouye"},"description":"Full-stack developer and technology writer with bylines in Hackr.io, Udemy, and SVG. Technology writer at First Page Sage, a leading SEO firm.","url":"https:\/\/www.esecurityplanet.com\/author\/jinouye\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22397"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/282"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22397"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22397\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22399"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22397"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22397"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22397"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}