Case Study
Network Automation Maturity Model
AD-HOC This level is characterized by reactive firefighting. All network device provisioning, configuration, and updates are completed manually, box by box, and often under duress. Vulnerability remediation is manual, without regard to SLA. Network inventory data is practically nonexistent or, where available, routinely outdated, as they rely upon manual updates. Responding to compliance audits is complicated by information that is incomplete, inconsistent, and in silos, sometimes leading to audit failures which require even more follow-up. Reporting is limited and not standardized. As organizations quickly realize, they cannot stay here long and hope for Network Operations to enable business agility. INITIAL Necessity often drives enterprises quickly to Level 2. Here, golden config