IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Network Security Policy Automation: Enterprise Use Cases and Methodologies

Network Security Policy Automation: Enterprise Use Cases and Methodologies
View Sample PDF
Author(s): Myo Zarny (vArmour Networks, USA), Meng Xu (vArmour Networks, USA)and Yi Sun (vArmour Networks, USA)
Copyright: 2022
Pages: 30
Source title: Research Anthology on Cross-Disciplinary Designs and Applications of Automation
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-6684-3694-3.ch006

Purchase

View Network Security Policy Automation: Enterprise Use Cases and Methodologies on the publisher's website for pricing and purchasing information.

Abstract

Network security policy automation enables enterprise security teams to keep pace with increasingly dynamic changes in on-premises and public/hybrid cloud environments. This chapter discusses the most common use cases for policy automation in the enterprise, and new automation methodologies to address them by taking the reader step-by-step through sample use cases. It also looks into how emerging automation solutions are using big data, artificial intelligence, and machine learning technologies to further accelerate network security policy automation and improve application and network security in the process.

Related Content

Hamed Nozari, Agnieszka Szmelter-Jarosz. © 2024. 15 pages.
Paria Samadi Parviznejad. © 2024. 22 pages.
Masoud Vaseei, Mohammadreza Nasiri Jan Agha, Milad Abolghasemian, Adel Pourghader Chobar. © 2024. 14 pages.
Melisa Ozbiltekin-Pala. © 2024. 21 pages.
Hesamoddin Motevalli. © 2024. 16 pages.
Esmael Najafi, Iman Atighi. © 2024. 14 pages.
Alireza Aliahmadi, Aminmasoud Bakhshi Movahed, Hamed Nozari. © 2024. 20 pages.
Body Bottom