By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
Teleskope secures your data in ChatGPT. Read more

Yes, remediation is the bottleneck. But automation starts upstream

Yes, remediation is the bottleneck. But automation starts upstream.

By Amy Ryu, Founding Product Manager, Teleskope

Last week Teleskope partnered with GDS Group for a CISO roundtable on the automation imperative in data security. Six security leaders joined me and Lock Langdon, VP and CISO at Aprio. The session was Chatham House on the substance, and revealing on the shape of the problem.

I'm usually the only vendor in the room at these conversations, which is the part I look forward to. CISOs talk differently when they're talking to each other. I went in expecting to learn what people are struggling with. I came out with a thesis I want to push back on.

{{banner-large="/banners"}}

The straw poll

The host asked everyone a single question. Where is your biggest bottleneck, detecting data risk or remediating it?

Five of seven said remediation. Two said both.

Nobody said detection.

Derek Stevenson, CISO and VP of IT at Mural, put the shape of it plainly. "No issue detecting it. Remediating it is probably the biggest bottleneck, balancing risk acceptance with the business." Joel Koshy, Senior Director of Data and Analytics and Enterprise AI Strategy and Governance at E2open, said the same thing from a different angle. Remediation, but proactively. The challenge is preventing exposure from accumulating, not finding it faster.

Jan Mast, Director of Global Cybersecurity at AeroVironment, put a sharper edge on it. With a lean team and a defense-industry risk appetite, the volume of signals isn't the issue. The constraint is what you can do about them.

Kenton McDaniel, CISO at Henry Schein, named the operational cost. "That remediation part is largely around communication to the business and the sentiment that comes with it. That's the real toll on my team."

This is the consensus. It's the part I want to push back on.

{{cs-1="/banners"}}

Remediation is the bottleneck because classification is

Here's the part the consensus misses. You cannot safely deploy automated remediation on top of a classifier that doesn't understand your business.

This is the hidden constraint behind every "we want automated remediation but" conversation I have with security leaders. The reason teams stall at automation isn't that they don't trust automation. It's that they don't trust the input. A platform that confuses a marketing one-pager with a customer contract is a platform you cannot allow to revoke access, redact a fragment, or delete a file.

What I heard underneath the bottleneck framing was this: my classifier produces too many false positives to safely automate, so I keep the human in the loop on everything, so my queue grows faster than I can clear it.

That's not a remediation problem. It's a classification problem with a remediation symptom.

The platforms that can actually automate at scale are the ones that built a context-aware truth layer first. Regex and flat ML classifiers can't carry remediation safely. Drop the threshold to catch the long tail and false positives spike. Raise it to suppress false positives and you miss what matters. There's no setting on a bad classifier that makes automated remediation safe.

The way out is classification that understands what data actually means inside a specific business. Document type. Access context. Business intent. The 1099 that's expected to contain an SSN. The marketing deck that contains no regulated field but is board-level sensitive. The contractor's stale share that was useful twelve months ago, but is a risk today.

Lock's "better together" story is the proof

Lock Langdon explained how this plays out in production. Aprio is a financial services CPA firm with a heavy Microsoft footprint. They use Microsoft Purview for DLP enforcement and Teleskope as the classifier that feeds it.

"We are a very large Microsoft organization, so we leverage Teleskope to actually do our labeling for us. It has a very high-efficacy auto-detection of the document type. It has context that can say, 'oh, well, obviously this is a 1099,' and in that 1099 there's these types of metadata. So it'll actually tag that information using the Microsoft Information Protection labels, which then allow us to leverage the more robust DLP engine that Microsoft Purview brings to the table. We're kind of building this 'better together' capability."

Read that quote again with the classification thesis in mind. Lock isn't bolting Teleskope on for just the remediation. In the case of Purview labels, it already does enforcement. He's using Teleskope because the labels Purview applies on its own are not good enough to safely automate against. The reason their Purview deployment performs is that the input layer is right. Read more about how the "better together" approach works in practice.

Lock added another point that lands the same argument. "We leverage it for identifying secrets much more quickly than we do through Purview. If someone puts an API key or has passwords.txt sitting in their OneDrive."

Same lesson. Native enforcement was never the problem in their stack. Native classification was.

{{cs-2="/banners"}}

The two levers, in the right order

Later in the conversation we talked about what makes automated remediation safe enough to deploy. I named two levers. Confidence in the classification, often expressed as a threshold above which the system acts on its own. And the reversibility of the action.

Lock framed reversibility well. "It's not 'do we trust the automation' as a binary choice. It's 'what actions within scope are we okay with maybe failing on.' Understanding the reversibility, how quickly you can revert, always gives the technical team a little more comfort."

Both levers matter. But they're not equal. Reversibility is the safety net. Classification confidence is what determines how often you need it.

A platform with low-confidence classification and high-reversibility actions will run, but slowly. Every action requires a human to confirm. Every false positive degrades trust. The queue gets shorter than the alert-only model, but not by much.

A platform with high-confidence classification and high-reversibility actions is what real automated remediation looks like. The system acts on its own when it's confident. The reversible action lets the user correct edge cases in one click. The human reviews only what the system flagged as ambiguous.

That's the playbook. Detection is fine. Remediation is where the work happens. But the work doesn't start at remediation. It starts one step upstream.

Get the truth layer right. The rest gets dramatically easier.

FAQ

What does "context-aware classification" actually mean in practice?

It means the classifier understands what a document is and what it means inside your specific business: not just whether it contains a pattern that matches a regex. A 1099 is expected to contain an SSN. A board-level strategy deck contains no regulated fields but is highly sensitive. A contractor's shared folder was useful last year and is a risk today. Flat pattern-matching can't make those distinctions. Context-aware classification can, and that's what makes it safe to automate against.

How does Teleskope work alongside Microsoft Purview?

Purview is a strong enforcement engine, but its native classification often isn't precise enough to safely automate against at scale. Teleskope acts as the classification layer that feeds it: applying high-fidelity, context-aware labels using Microsoft Information Protection, which Purview then enforces. The result is a "better together" architecture where each tool does what it does best: Teleskope handles the truth layer, Purview handles the enforcement plane. The combination is what makes automated remediation practical rather than risky.

What's the right way to measure whether automated remediation is working?

Alert volume is the wrong metric. The right ones are: how much of your exposure is being closed automatically versus manually, what your false positive rate looks like over time, and how quickly the system acts from detection to action. If your queue is still growing despite automation being turned on, the classifier confidence is the first thing to examine, not the remediation workflows.

Is automated remediation safe to deploy without a security team reviewing every action?

It can be, but only with the right guardrails in place. The key is starting with actions that are reversible and low-blast-radius: revoking a stale public share is a very different risk profile from deleting a file. Most teams deploy automation in tiers: high-confidence findings with reversible actions run automatically, lower-confidence or higher-impact actions still route to a human. The goal isn't full autonomy from day one. It's shrinking the queue to only what genuinely needs a human decision.

How is automated remediation different from just setting up alerts in a SOAR or ticketing system?

A SOAR workflow or a ServiceNow ticket is a handoff, not a remediation. The exposure stays open while the ticket sits in a queue waiting for someone to action it. Automated remediation means the platform that classified the risk is also the platform that closes it (revoking the link, redacting the fragment, quarantining the file) in the same session, with a full audit trail. The distinction matters because mean time to remediation in a ticketing model is measured in days. In a native remediation model it's measured in seconds.

Read more articles
from our blog

DLP is dead. Long live the data control plane

DLP is dead. Long live the data control plane

Classification engine identifies personal and sensitive information with unparalleled accuracy, and contextually distinguishes between.

Sensitive Data Discovery: A Practical Guide for Security Leaders

Sensitive Data Discovery: A Practical Guide for Security Leaders

Classification engine identifies personal and sensitive information with unparalleled accuracy, and contextually distinguishes between.