Intelligent CISO Issue 22 | Page 69

decrypting myths opportunity for a fresh look and an optimisation of their processes, with automation ‘baked in’ from the outset. For example, one common manual step at the beginning of the network change workflow is a triaging of different requests, so that more urgent or risky ones are dealt with first. This should be handled automatically by the risk analysis element of your solution. Ultimately, the goal should be to move towards zero-touch network change management. Also, the information within the NSPM solution can be opened up to other stakeholders by introducing automated chatbot technology. These can translate technical information into simple language to enable non-technical users to access the information they need about network security and connectivity, enabling faster decision-making and problem solving. Managing hybrid environments Using the best of existing processes: Combine with new automation techniques While cloud and SDN technologies offer new opportunities to the business, the learning curve can be steep. An effective NSPM solution should, ultimately, offer capabilities to smooth this curve and speed up adoption and enable seamless management of these critical technologies. It should allow you to take the best from your existing workflows and blend that with its own functionality. Another area to bear in mind when choosing an NPSM solution is how it integrates with existing network change processes, which involve manual steps and decision-making. Injecting these practices into a modern NSPM solution can often slow deployment. Instead, organisations should take the Ultimately, your chosen NSPM solution needs to offer you a single pane of glass view across your entire hybrid environment – cloud, SDN and on- premise. That visibility is the foundation for a streamlined, automated and ultimately intelligent approach to network security policy management. u and security managers to work together to ensure that the applications that power the business stay secure and run efficiently. Kyle Wickert, Worldwide Strategic Architect at AlgoSec www.intelligentciso.com | Issue 22 69