image
Chapter 9
Conclusion
 
Throughout this book, we have provided the essential information needed for a security practitioner to better understand the general data exchange models that make up today’s security automation solutions. There are certainly those who would prefer and could provide a more technical and detailed description, and many express that they are unfamiliar with all of the acronyms and protocols and have difficulty navigating the multiple specifications. We hope that these security practitioners will be helped by this introduction to this aspect of the security automation community.
The work of building security automation is ...

Get Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.