Analysis
![automation](https://i0.wp.com/opinnate.com/wp-content/uploads/2023/04/Vector-20.png?fit=76%2C74&ssl=1)
![automation](https://i0.wp.com/opinnate.com/wp-content/uploads/2023/04/Vector-25.png?fit=172%2C169&ssl=1)
Visualize network security topology in full and get a thorough analysis.
The first phase of any meaningful activity requires analysis of what is in hand, so is for policy change automation. With the aid of our all-in-one security automation platform, you will be able to:
- create firewall topology map and update automatically
- detect unused rules
- detect duplicate objects
- conduct shadow rule analysis
- conduct permissive rule analysis
- conduct expired and disabled rules analysis
![firewall rule analysis](https://i0.wp.com/opinnate.com/wp-content/uploads/2023/05/firewall-rule-analysis-e1679316621386.jpg?fit=500%2C500&ssl=1)