Abstract
Organizations typically focus on building applications and data-driven software to harvest the value from thier data. An enterprise segmentation strategy helps technical teams create isolation across networks, applications, and identity-management systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Lad, S. (2023). Network Security Patterns. In: Azure Security For Critical Workloads . Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-8936-5_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-8936-5_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-8935-8
Online ISBN: 978-1-4842-8936-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)