Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Intelligent Automation with VMware

You're reading from   Intelligent Automation with VMware Apply machine learning techniques to VMware virtualization and networking

Arrow left icon
Product type Paperback
Published in Mar 2019
Publisher Packt
ISBN-13 9781789802160
Length 344 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ajit Pratap Kundan Ajit Pratap Kundan
Author Profile Icon Ajit Pratap Kundan
Ajit Pratap Kundan
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface Section 1: VMware Approach with ML Technology FREE CHAPTER
Machine Learning Capabilities with vSphere 6.7 Proactive Measures with vSAN Advanced Analytics Security with Workspace ONE Intelligence Proactive Operations with VMware vRealize Suite Intent-Based Manifest with AppDefense Section 2: ML Use Cases with VMware Solutions
ML-Based Intelligent Log Management ML as a Service in the Cloud ML-Based Rule Engine with Skyline DevOps with vRealize Code Stream Transforming VMware IT Operations Using ML Section 3: Dealing with Big Data, HPC , IoT, and Coud Application Scalability through ML
Network Transformation with IoT Virtualizing Big Data on vSphere Cloud Application Scaling High-Performance Computing Other Books You May Enjoy

Application-centric alerting for the SOC

AppDefense raises a smart alarm, which is significant for the environment. Only trusted alerts with an automated response allow the security team to concentrate on finding and destroying threats from their environment as compared to searching for threats from incorrect data. SOC can use this tool to detect with trust and to automate responses to threats. The Chief Information Security Officer (CISOorganization is split into security architects and security operations. Security architects are responsible for devising the policies that are used to secure a given application, and security operations are responsible for actually monitoring and identifying threats in the environment.

Security architects review new applications and determine how they should be secured. Today, they have very little insight into how apps are composed...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime