O'Reilly logo

End-to-End Network Security: Defense-in-Depth by Omar Santos

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Proactive Security Framework

This chapter covers the following topics:

SAVE Versus ITU-T X.805

Identity and Trust

Visibility

Correlation

Instrumentation and Management

Isolation and Virtualization

Policy Enforcement

Visualization Techniques

Many network security frameworks are in the marketplace and most of them have the common goal of providing a methodical and efficient approach to network security. No framework is perfect, you should choose an approach that can help reduce the time, cost, and resources needed to plan and deploy your security strategy. This chapter highlights best practices and benefits of different security frameworks.

A framework can help you establish a view of your entire security landscape, identify ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required