Optimization


Analysis what is in hand and apply corrective actions for optimizing policies and hardening security.
As network operations professionals know, a large number of policies on firewall and other security devices become obsolete in a couple of years after deployment. Obsolete rules turn policy tables into a chaotic mess and may lead to sensitive data being compromised. OpInnate addresses this major problem with a large function set that help build a permanent solution. Some of these functions are:
- Cleaning up unused rules
- Cleaning up shadowed
- Cleaning up expired rules
- Cleaning up disabled rules
- Decommision
- Object management
