Zero Trust Networks with VMware NSX Build Highly Secure Network Architectures for Your Data Centers /

Secure your VMware infrastructure against distrusted networks using VMware NSX. This book shows you why current security firewall architecture cannot protect against new threats to your network and how to build a secure architecture for your data center. Author Sreerjith Keeriyattil teaches you how...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Keeriyattil, Sreejith (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03323nam a2200469 4500
001 978-1-4842-5431-8
003 DE-He213
005 20191130095724.0
007 cr nn 008mamaa
008 191130s2019 xxu| s |||| 0|eng d
020 |a 9781484254318  |9 978-1-4842-5431-8 
024 7 |a 10.1007/978-1-4842-5431-8  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Keeriyattil, Sreejith.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Zero Trust Networks with VMware NSX  |h [electronic resource] :  |b Build Highly Secure Network Architectures for Your Data Centers /  |c by Sreejith Keeriyattil. 
250 |a 1st ed. 2019. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2019. 
300 |a XVIII, 183 p. 150 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1: Network Defense Architecture -- Chapter 2: Microsegmentation and Zero Trust: Introduction -- Chapter 3: Zero Trust Networks with VMware NSX: Getting Started -- Chapter 4: NSX Service Composer and Third-Party Integration -- Chapter 5: Bird's-Eye View of a Zero Trust Network -- Chapter 6: NSX REST API and Power NSX -- Chapter 7: NSX Log Insight and Network Insight -- Chapter 8: VMware NSX/Airwatch and Conclusion. 
520 |a Secure your VMware infrastructure against distrusted networks using VMware NSX. This book shows you why current security firewall architecture cannot protect against new threats to your network and how to build a secure architecture for your data center. Author Sreerjith Keeriyattil teaches you how micro-segmentation can be used to protect east-west traffic. Insight is provided into working with Service Composer and using NSX REST API to automate firewalls. You will analyze flow and security threats to monitor firewalls using VMware Log and see how Packet Flow works with VMware NSX micro-segmentation. The information presented in Zero Trust Networks with VMware NSX allows you to study numerous attack scenarios and strategies to stop these attacks, and know how VMware Air Watch can further improve your architecture. You will: Know how micro-segmentation works and its benefits Implement VMware-distributed firewalls Automate security policies Integrate IPS/IDS with VMware NSX Analyze your firewall's configurations, rules, and policies. 
650 0 |a Data protection. 
650 0 |a Application software. 
650 0 |a Management information systems. 
650 1 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
650 2 4 |a Computer Applications.  |0 http://scigraph.springernature.com/things/product-market-codes/I23001 
650 2 4 |a Enterprise Architecture.  |0 http://scigraph.springernature.com/things/product-market-codes/522010 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781484254301 
776 0 8 |i Printed edition:  |z 9781484254325 
856 4 0 |u https://doi.org/10.1007/978-1-4842-5431-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-CWD 
950 |a Professional and Applied Computing (Springer-12059)