{"id":52876,"date":"2016-09-26T20:08:48","date_gmt":"2016-09-27T03:08:48","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52876"},"modified":"2025-04-28T01:56:25","modified_gmt":"2025-04-28T08:56:25","slug":"threat-defense-lifecycle-automation-que-significa","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/","title":{"rendered":"Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa?"},"content":{"rendered":"<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">When we presented our strategy at FOCUS &#8217;15, there was a simple concept at its core: creating integrated security systems to automate the threat defense lifecycle, so you can address <\/span><\/span><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">more threats, faster, and with fewer resources<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> . With the recent announcement of our strategic partnership with TPG, we wanted to further define our strategy and show how we are uniquely leading the market by making IT security as dynamic and responsive as the most dangerous threats.<\/span><\/span><a name=\"_ftnref1\"><\/a><a href=\"https:\/\/securingtomorrow.mcafee.com\/executive-perspectives\/automating-threat-defense-2016\/#_ftn1\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">[1]<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> .<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">To summarize: the results of these security systems will be <\/span><\/span><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">measurable<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u2014a simple but incredibly important conclusion. We define success not only through satisfaction, but also through the impact on key CISO-level metrics. When compared to disconnected architectures, we expect these systems to be able to:<\/span><\/span><\/p>\n<ul>\n<li><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Reduce the total protection time from more than four hours to one minute.<\/span><\/span><\/li>\n<li><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Increase incident response capacity up to 30 times<\/span><\/span><\/li>\n<li><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Improve response time from over 24 hours to less than 7 minutes<\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">We understand that if we can&#8217;t improve your metrics, we have nothing to offer but a new widget &#8211; and you already have enough of those!<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Fundamentally, we are creating these integrated and automated security systems because we believe that:<\/span><\/span><\/p>\n<ol>\n<li><u><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Protect, detect, and remediate are better processes when they work together.<\/span><\/span><\/u><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> The virtuous cycle of integrated security generates the best possible protection technology, seeks out and contains advanced threats and quickly remediates them\u2026 while adapting protection technologies to better block future threats. Organizations with integrated security platforms are 30% better protected.<\/span><\/span><a name=\"_ftnref2\"><\/a><a href=\"https:\/\/securingtomorrow.mcafee.com\/executive-perspectives\/automating-threat-defense-2016\/#_ftn2\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">[2]<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , and we want you to be part of that statistic.<\/span><\/span><\/li>\n<li><u><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Only automation can overcome staffing issues.<\/span><\/span><\/u><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> You are clearly facing a mismatch between your staffing allocation (talent and volume) and the growing number and sophistication of threats.<\/span><\/span><a name=\"_ftnref3\"><\/a><a href=\"https:\/\/securingtomorrow.mcafee.com\/executive-perspectives\/automating-threat-defense-2016\/#_ftn3\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">[3]<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> . That gap is exacerbated by disconnected tools, which force analysts to integrate them manually, which takes more time and effort. Automated security systems are critical to helping solve this problem: eliminating routine tasks, enabling the onboarding of new hires, and freeing up your best talent to solve your toughest problems. We expect automation to reduce manual effort by up to 70%.<\/span><\/span><\/li>\n<li><u><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">No vendor can do it alone.<\/span><\/span><\/u><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> The security industry is one of the most fragmented, and no single vendor offers the entire threat defense lifecycle. You need a practical way to integrate new features into a comprehensive platform approach. Only true <\/span><\/span><a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/partners\/security-innovation-alliance\/directory.html\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">partnerships<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> between industry leaders can create true security systems that protect, detect, and remediate.<\/span><\/span><\/li>\n<\/ol>\n<h2><u><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Four Security Systems<\/span><\/span><\/u><\/h2>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">With that conviction fueling our strategy, we are building a platform-based architecture with four security systems: Endpoint, Cloud, Hybrid Data Centers, and Threat Management. Each system combines multiple technologies into a single, integrated security approach, allowing us to break new ground: combining the best technology on the market with broad integration across common platforms. We hope this will drive the top-notch results you deserve, along with low operational complexity, to manage an operating cost structure that&#8217;s accessible to you.<\/span><\/span><\/p>\n<h2><u><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Connection of these Security Systems<\/span><\/span><\/u><\/h2>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Each of these systems helps you address more threats, faster, and with fewer resources. However, because they&#8217;re built on platforms, they&#8217;ll work together to solve even bigger security problems. Choose just a few examples:<\/span><\/span><\/p>\n<ul>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Closed-loop threat defense:<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> All four systems work together to share threat intelligence and automate protection, improving security and lowering costs. Using the example of a potential attack starting at the endpoint, our security systems automate detection and response from start to finish (although a threat entering through the cloud or data center would follow the same flow):<\/span><\/span><\/li>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Mobile Off-the-Grid Security:<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> Due to the rise of SaaS applications, mobile workers may complete much of their work using only email, SaaS applications, and local computing. The combination of converged endpoint and cloud-delivered data security systems is designed to create a &#8220;mobile clean zone&#8221; to protect these workers&#8217; mobile devices, but also to keep organizations&#8217; data secure while they are away from the corporate network by allowing them to more securely connect to that network when needed. This includes technology from McAfee, but also from our partners such as VMware\u00ae AirWatch\u00ae and MobileIron.<\/span><\/span><\/li>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Security for Infrastructure as a Service:<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> Securing workloads and access to IaaS platforms like Amazon Web Services or Microsoft Azure relies on the interconnectivity of public cloud, data, users, and the security operations center to successfully defend:<\/span><\/span><\/li>\n<\/ul>\n<h2><u><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">A Single Point of View<\/span><\/span><\/u><\/h2>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">A common pitfall in the security industry is that vendors start describing their strategies with catchphrases, and it doesn&#8217;t take long for them all to sound the same. To help you avoid buzzwords, here are some of the areas where we believe our approach is truly unique in the market:<\/span><\/span><\/p>\n<ul>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Integration:<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> We&#8217;re combining point tools and functionality, using common platforms, into integrated security systems. You can see this in all four security systems: Each combines the capabilities of three or more point products into a single system. We offer this integration and management layer with ePO\u2122 and threat intelligence layer through DXL.<\/span><\/span><\/li>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Automation:<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> With integration as our foundation, we subsequently build on closed-loop automation. This automation provides more accurate detection, faster remediation, and closed-loop protection. These benefits are directly enhanced by the range of products and technologies we integrate (our own or with other security providers).<\/span><\/span><\/li>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Orchestration:<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> With your organization liberated through automation, we&#8217;ll move on to orchestration. While automation is at the tool level, orchestration is at the systems level, not only generating actions but also coordinating teams and accelerating investigations. The benefits, both through security effectiveness and team efficiency, are the most dramatic here, so the ultimate goal is for integration and automation to build together.<\/span><\/span><\/li>\n<\/ul>\n<h2><u><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Really?<\/span><\/span><\/u><\/h2>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">This may generally surprise some of you, but it&#8217;s a reality today. You may wonder if we can really do this, and I appreciate the skepticism. I&#8217;m not asking you to trust us blindly\u2014instead, I invite you to join us at <\/span><\/span><a href=\"https:\/\/mpower.mcafee.com\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">FOCUS16<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> in Las Vegas this fall. There, we&#8217;ll share with you the delivery of technology based on this strategy. I&#8217;m sure you&#8217;ll be pleasantly surprised!<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Sincerely<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Brian<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we presented our strategy at FOCUS &#8217;15, there was a simple concept at its core: creating integrated security systems&#8230;<\/p>\n","protected":false},"author":838,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11866],"tags":[],"coauthors":[4687],"class_list":["post-52876","post","type-post","status-publish","format-standard","hentry","category-executive-perspectives"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa? | Blog de McAfee<\/title>\n<meta name=\"description\" content=\"When we presented our strategy at FOCUS &#039;15, there was a simple concept at its core: creating integrated security systems to automate the threat defense\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa? | Blog de McAfee\" \/>\n<meta property=\"og:description\" content=\"When we presented our strategy at FOCUS &#039;15, there was a simple concept at its core: creating integrated security systems to automate the threat defense\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog de McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-27T03:08:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-28T08:56:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/slide1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"346\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee LTAM\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee LTAM\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/\"},\"author\":{\"name\":\"McAfee LTAM\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc\"},\"headline\":\"Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa?\",\"datePublished\":\"2016-09-27T03:08:48+00:00\",\"dateModified\":\"2025-04-28T08:56:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/\"},\"wordCount\":1002,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"articleSection\":[\"Perspectivas ejecutivas\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/\",\"name\":\"Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa? | Blog de McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\"},\"datePublished\":\"2016-09-27T03:08:48+00:00\",\"dateModified\":\"2025-04-28T08:56:25+00:00\",\"description\":\"When we presented our strategy at FOCUS '15, there was a simple concept at its core: creating integrated security systems to automate the threat defense\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Perspectivas ejecutivas\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"name\":\"Blog de McAfee\",\"description\":\"Noticias sobre seguridad en Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc\",\"name\":\"McAfee LTAM\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/138881b47da8f70f6daacc26e1ea0963\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg\",\"caption\":\"McAfee LTAM\"},\"description\":\"Conozca nuestra visi\u00f3n global en espa\u00f1ol y portugu\u00e9s, sobre tendencias y ejes de pensamiento en temas de ciber-seguridad, enfocada en el ciclo de vida de la amenazas y mostrando como protegerlas, detectarlas y corregirlas utilizando intercambio de inteligencia, frente a los desaf\u00edos de la actualidad | Learn about our global vision in Spanish and Portuguese, trends and thought leadership topics oriented to cyber security, and the threat defense life-cycle to protect, detect and correct them, using threat intelligence and driving today\u00b4s challenges.\",\"sameAs\":[\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/intel-security-ltam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa? | Blog de McAfee","description":"When we presented our strategy at FOCUS '15, there was a simple concept at its core: creating integrated security systems to automate the threat defense","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa? | Blog de McAfee","og_description":"When we presented our strategy at FOCUS '15, there was a simple concept at its core: creating integrated security systems to automate the threat defense","og_url":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/","og_site_name":"Blog de McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-09-27T03:08:48+00:00","article_modified_time":"2025-04-28T08:56:25+00:00","og_image":[{"width":770,"height":346,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/slide1.png","type":"image\/png"}],"author":"McAfee LTAM","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee LTAM","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/"},"author":{"name":"McAfee LTAM","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc"},"headline":"Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa?","datePublished":"2016-09-27T03:08:48+00:00","dateModified":"2025-04-28T08:56:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/"},"wordCount":1002,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"articleSection":["Perspectivas ejecutivas"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/","name":"Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa? | Blog de McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website"},"datePublished":"2016-09-27T03:08:48+00:00","dateModified":"2025-04-28T08:56:25+00:00","description":"When we presented our strategy at FOCUS '15, there was a simple concept at its core: creating integrated security systems to automate the threat defense","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/threat-defense-lifecycle-automation-que-significa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"Perspectivas ejecutivas","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/executive-perspectives\/"},{"@type":"ListItem","position":4,"name":"Threat Defense Lifecycle Automation: \u00bfqu\u00e9 significa?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","name":"Blog de McAfee","description":"Noticias sobre seguridad en Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc","name":"McAfee LTAM","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/138881b47da8f70f6daacc26e1ea0963","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg","caption":"McAfee LTAM"},"description":"Conozca nuestra visi\u00f3n global en espa\u00f1ol y portugu\u00e9s, sobre tendencias y ejes de pensamiento en temas de ciber-seguridad, enfocada en el ciclo de vida de la amenazas y mostrando como protegerlas, detectarlas y corregirlas utilizando intercambio de inteligencia, frente a los desaf\u00edos de la actualidad | Learn about our global vision in Spanish and Portuguese, trends and thought leadership topics oriented to cyber security, and the threat defense life-cycle to protect, detect and correct them, using threat intelligence and driving today\u00b4s challenges.","sameAs":["https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/intel-security-ltam\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/52876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/users\/838"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/comments?post=52876"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/52876\/revisions"}],"predecessor-version":[{"id":212435,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/52876\/revisions\/212435"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/media?parent=52876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/categories?post=52876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/tags?post=52876"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/coauthors?post=52876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}