© Copyright 2025 S & P Global. All Rights Reserved.
Commissioned by
July 2025
LATEST INTELLIGENCE
HYPERAUTOMATION COMBINES AUTOMATION WITH AI, PROMISING A NEW ERA OF SECURITY OPERATIONS PRODUCTIVITY
Introduction
451 Research Vanguard Report
Hyperautomation combines automation with AI, promising a new era of security operations productivity
Today’ s cybersecurity teams are overloaded, understaffed and unable to address a large percentage of alerts generated by their security tools. Respondents to a recent 451 Research study indicated on average they are unable to investigate 43 % of alerts in a typical day, and about one in five( 19 %) are unable to investigate more than 75 % of alerts. The reasons for this include high volumes of low-fidelity security signals; inadequate, siloed analytical tools; and inefficient, time-consuming response processes.
Improved analytics and early benefits from coupling generative AI with classic AI / ML have resulted in some improvement, while further gains from automation could reduce the burden on security staff by streamlining repetitive tasks. More recently, GenAI and agentic AI have introduced greater flexibility in applying technology to security workflows through the modeling of reasoning, decision-making and task execution.
Today, these technologies are converging in hyperautomation – a set of approaches that aim to reduce burdens on security analysts and minimize risks of overlooked activity, freeing security teams to focus on high-priority, strategic tasks appropriate to their level of expertise.
C
M
Average percentage of alerts that SecOps teams are unable to investigate in a typical day
2020 37 % 2021 41 % 2022 48 % 2023 54 % 2024 43 %
Y
CM
MY
CY
CMY
K
The Take
While earlier iterations of security orchestration, automation and response( SOAR) platforms provided a leap forward in security automation, they failed to fully deliver on their promise for several reasons. First, high acquisition and maintenance costs limited their use mostly to large organizations, and technological constraints limited their effectiveness to mostly deterministic inputs and outputs. •
PRESENTED BY 22
INTELLIGENT CIO MIDDLE EAST www. intelligentcio. com