The old approach to network security doesn’t work anymore, and organizations are realizing that every day.
Business models (and needs) shift all the time. Current state doesn’t stay current. New platforms and capabilities are coming online constantly. You can, quite likely, program your toaster as you’re on your way home from the airport.
So can a cyber-villain, though.
It’s time to return to the foundation of data protection: security intent.
Intent-based network security (IBNS) decouples intent from implementation. In this model, intent becomes the bedrock of policies and controls, and implementation serves as the device-specific enforcement of the declared security goal.
In this white paper, we’ll explore the principle components of an intent-based security program and show you how to use intent for a desired-state security system.
The process will look like this: