December 2018
Intermediate to advanced
800 pages
27h 7m
English
Today’s enterprises have thousands of applications on their networks, with hundreds of applications hiding within encrypted flows. Many of these applications directly contribute to business objectives; however, many more do not.
As such, few network operators are even aware of how much traffic is traversing their infrastructure by application, let alone how well these applications are being treated across their network. Even fewer operators have aligned their business objectives with end-to-end application policies deployed across their networks. This is primarily due to the intrinsic complexity of implementing such policies across various places in the network, as tools, mechanisms, and syntax often vary ...
Read now
Unlock full access