03441nam 22005535 450 991035783590332120200704131103.01-4842-5431-710.1007/978-1-4842-5431-8(CKB)4100000009939806(MiAaPQ)EBC5987647(DE-He213)978-1-4842-5431-8(CaSebORM)9781484254318(EXLCZ)99410000000993980620191130d2019 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierZero Trust Networks with VMware NSX[electronic resource] Build Highly Secure Network Architectures for Your Data Centers /by Sreejith Keeriyattil1st ed. 2019.Berkeley, CA :Apress :Imprint: Apress,2019.1 online resource (193 pages) illustrationsIncludes index.1-4842-5430-9 Chapter 1: Network Defense Architecture -- Chapter 2: Microsegmentation and Zero Trust: Introduction -- Chapter 3: Zero Trust Networks with VMware NSX: Getting Started -- Chapter 4: NSX Service Composer and Third-Party Integration -- Chapter 5: Bird's-Eye View of a Zero Trust Network -- Chapter 6: NSX REST API and Power NSX -- Chapter 7: NSX Log Insight and Network Insight -- Chapter 8: VMware NSX/Airwatch and Conclusion.Secure your VMware infrastructure against distrusted networks using VMware NSX. This book shows you why current security firewall architecture cannot protect against new threats to your network and how to build a secure architecture for your data center. Author Sreerjith Keeriyattil teaches you how micro-segmentation can be used to protect east-west traffic. Insight is provided into working with Service Composer and using NSX REST API to automate firewalls. You will analyze flow and security threats to monitor firewalls using VMware Log and see how Packet Flow works with VMware NSX micro-segmentation. The information presented in Zero Trust Networks with VMware NSX allows you to study numerous attack scenarios and strategies to stop these attacks, and know how VMware Air Watch can further improve your architecture. You will: Know how micro-segmentation works and its benefits Implement VMware-distributed firewalls Automate security policies Integrate IPS/IDS with VMware NSX Analyze your firewall's configurations, rules, and policies.Data protectionApplication softwareManagement information systemsSecurityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Computer Applicationshttps://scigraph.springernature.com/ontologies/product-market-codes/I23001Enterprise Architecturehttps://scigraph.springernature.com/ontologies/product-market-codes/522010Data protection.Application software.Management information systems.Security.Computer Applications.Enterprise Architecture.005.43Keeriyattil Sreejithauthttp://id.loc.gov/vocabulary/relators/aut1064207MiAaPQMiAaPQMiAaPQBOOK9910357835903321Zero Trust Networks with VMware NSX2536869UNINA