Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Intelligent Automation with VMware

You're reading from   Intelligent Automation with VMware Apply machine learning techniques to VMware virtualization and networking

Arrow left icon
Product type Paperback
Published in Mar 2019
Publisher Packt
ISBN-13 9781789802160
Length 344 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ajit Pratap Kundan Ajit Pratap Kundan
Author Profile Icon Ajit Pratap Kundan
Ajit Pratap Kundan
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface Section 1: VMware Approach with ML Technology FREE CHAPTER
Machine Learning Capabilities with vSphere 6.7 Proactive Measures with vSAN Advanced Analytics Security with Workspace ONE Intelligence Proactive Operations with VMware vRealize Suite Intent-Based Manifest with AppDefense Section 2: ML Use Cases with VMware Solutions
ML-Based Intelligent Log Management ML as a Service in the Cloud ML-Based Rule Engine with Skyline DevOps with vRealize Code Stream Transforming VMware IT Operations Using ML Section 3: Dealing with Big Data, HPC , IoT, and Coud Application Scalability through ML
Network Transformation with IoT Virtualizing Big Data on vSphere Cloud Application Scaling High-Performance Computing Other Books You May Enjoy

VMware innovation for application security

The problem lies in the existing security strategies that customers are employing to protect data center endpoints. We are specifically referring to the endpoints within the data center where applications are hosted, not end user endpoints, like laptops or phones.

The legacy approach to protecting applications is to monitor endpoints for known threat signatures. Think of antivirus software. AV software has a massive database of known malware signatures, which it uses to identify threats on an endpoint.

The problem with this approach is that if the security solution hasn't seen the threat before, there is no signature to match, and therefore, the threat will be missed. This means that any brand new (or zero-day) threats will go undetected.

ML approaches to endpoint threat detection have become more prominent in recent years, in order...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime