<s>
Real-time	B-Application
Adaptive	I-Application
Security	I-Application
is	O
the	O
network	O
security	O
model	O
necessary	O
to	O
accommodate	O
the	O
emergence	O
of	O
multiple	O
perimeters	O
and	O
moving	O
parts	O
on	O
the	O
network	O
,	O
and	O
increasingly	O
advanced	O
threats	O
targeting	O
enterprises	O
.	O
</s>
<s>
A	O
major	O
change	O
with	O
this	O
model	O
of	O
real-time	B-Application
adaptive	I-Application
security	I-Application
is	O
shifting	O
authorization	O
management	O
and	O
policy	O
to	O
an	O
on-demand	O
service	O
that	O
contains	O
details	O
and	O
policy	O
enforcement	O
that	O
matches	O
compliance	O
and	O
can	O
adapt	O
to	O
the	O
user	O
's	O
situation	O
when	O
he	O
or	O
she	O
is	O
trying	O
to	O
access	O
an	O
application	O
,	O
for	O
instance	O
.	O
</s>
<s>
Recent	O
advents	O
in	O
machine	O
learning	O
offers	O
a	O
brighter	O
prospect	O
in	O
artificial	B-Application
intelligence	I-Application
integration	O
to	O
real	O
time	O
adaptation	O
.	O
</s>
