image
Chapter 9
Conclusion
 
Throughout this book, we have provided the essential information needed for a security practitioner to better understand the general data exchange models that make up today’s security automation solutions. There are certainly those who would prefer and could provide a more technical and detailed description, and many express that they are unfamiliar with all of the acronyms and protocols and have difficulty navigating the multiple specifications. We hope that these security practitioners will be helped by this introduction to this aspect of the security automation community.
The work of building security automation is ...

Get Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.