decrypting myths
opportunity for a
fresh look and
an optimisation of
their processes, with
automation ‘baked in’ from
the outset.
For example, one common
manual step at the beginning of
the network change workflow is a
triaging of different requests, so
that more urgent or risky ones are
dealt with first. This should be
handled automatically by the risk
analysis element of your solution.
Ultimately, the goal should be to
move towards zero-touch network
change management.
Also, the information within the NSPM
solution can be opened up to other
stakeholders by introducing
automated chatbot technology. These
can translate technical information
into simple language to enable
non-technical users to access
the information they need about
network security and connectivity,
enabling faster decision-making and
problem solving.
Managing hybrid
environments
Using the best of existing
processes: Combine with new
automation techniques While cloud and SDN technologies
offer new opportunities to the
business, the learning curve
can be steep. An effective NSPM
solution should, ultimately, offer
capabilities to smooth this curve
and speed up adoption and enable
seamless management of these critical
technologies. It should allow you to take
the best from your existing workflows
and blend that with its own functionality.
Another area to bear in mind when
choosing an NPSM solution is how it
integrates with existing network change
processes, which involve manual
steps and decision-making. Injecting
these practices into a modern NSPM
solution can often slow deployment.
Instead, organisations should take the Ultimately, your chosen NSPM solution
needs to offer you a single pane of
glass view across your entire hybrid
environment – cloud, SDN and on-
premise. That visibility is the foundation
for a streamlined, automated and
ultimately intelligent approach to network
security policy management. u
and security managers to work together
to ensure that the applications that
power the business stay secure and
run efficiently.
Kyle Wickert, Worldwide Strategic Architect
at AlgoSec
www.intelligentciso.com
|
Issue 22
69