Hi [[ session.user.profile.firstName ]]

AlgoSec

  • Date
  • Rating
  • Views
  • Movin' On Up to the Cloud: How to Migrate your Application Connectivity
    Movin' On Up to the Cloud: How to Migrate your Application Connectivity Avivi Siman-Tov, Product Manager Recorded: Feb 6 2018 30 mins
    Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.

    If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.

    Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.

    In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, will explore how to simplify and accelerate large-scale complex application migration projects, while making security a priority.

    Attend this webinar to discover best practices to:

    - Automatically discover applications and their existing connectivity flows

    - Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups

    - Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows

    - Assess the risk and ensure compliance throughout the migration process

    - Deliver unified security policy management across the hybrid enterprise cloud environment
  • APAC Movin' On Up to the Cloud: How to Migrate your Application Connectivity
    APAC Movin' On Up to the Cloud: How to Migrate your Application Connectivity Avivi Siman-Tov, Product Manager Recorded: Feb 6 2018 24 mins
    Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.

    If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.

    Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.

    In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, will explore how to simplify and accelerate large-scale complex application migration projects, while making security a priority.

    Attend this webinar to discover best practices to:

    - Automatically discover applications and their existing connectivity flows

    - Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups

    - Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows

    - Assess the risk and ensure compliance throughout the migration process

    - Deliver unified security policy management across the hybrid enterprise cloud environment
  • DevSecOps: Putting the Sec into the DevOps
    DevSecOps: Putting the Sec into the DevOps Prof. Avishai Wool Recorded: Jan 30 2018 51 mins
    DevOps enables companies to deliver innovations faster to market. But with multiple functional teams collaborating on development, and so many moving parts, security is often left out of the DevOps process and then tacked on at the end - delaying deployment into production and negating many of the benefits of DevOps.

    Presented by renowned industry expert Prof. Avishai Wool, this new technical webinar will cover best practices for incorporating security into the DevOps lifecycle. This insight will help ensure better collaboration between security and the development teams right from the start and reduce the time, cost and risk of deploying applications into production.

    In this webinar Professor Wool will cover how to:
    •Identify and map existing applications and their connectivity flows to establish a baseline
    •Adjust application connectivity for each stage of the DevOps lifecycle – without coding
    •Automatically deploy connectivity throughout the development lifecycle using templates
    •Proactively assess risk and compliance throughout the DevOps process
    •Manage and maintain security in the production environment
  • Network Security Policy Management - Automation for Transformation
    Network Security Policy Management - Automation for Transformation Yonatan Klein - Director of Product Management Recorded: Jan 9 2018 41 mins
    Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!

    In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.

    Join the webinar to learn how you can use automation to:

    • Discover and map application connectivity to centralize and optimize security policy management
    • Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
    • Ensure your disaster recovery processes for firewalls are secure and up-to-date
    • Take an application-centric approach to simplifying firewall rule recertification processes

    Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
  • [APAC] Network Security Policy Management - Automation for Transformation
    [APAC] Network Security Policy Management - Automation for Transformation Yonatan Klein - Director of Product Management Recorded: Jan 9 2018 37 mins
    Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!

    In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.

    Join the webinar to learn how you can use automation to:

    • Discover and map application connectivity to centralize and optimize security policy management
    • Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
    • Ensure your disaster recovery processes for firewalls are secure and up-to-date
    • Take an application-centric approach to simplifying firewall rule recertification processes

    Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
  • Migrating and Managing Security Policies in a Segmented Data Center
    Migrating and Managing Security Policies in a Segmented Data Center Prof. Avishai Wool Recorded: Dec 7 2017 48 mins
    Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX and Cisco ACI now a reality it's far simpler to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.

    Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.

    In this webinar, Prof. Wool will discuss how to:

    •Identify and securely migrate legacy applications to a micro-segmented data center
    •Effectively define and enforce security policies for East-West traffic
    •Manage the micro-segmented data center alongside traditional on-premise security devices
    •Identify risk and manage compliance in a micro-segmented data center
    •Use network segmentation to reduce the scope of regulatory audits
    •Identify and avoid common network segmentation mistakes
  • Managing application connectivity securely through a Merger or Acquisition-US/UK
    Managing application connectivity securely through a Merger or Acquisition-US/UK Edy Almer, VP Product at AlgoSec Recorded: Nov 14 2017 38 mins
    When going through a merger/acquisition or a divesture process, companies typically need to move some of their applications to a different data center or to the cloud, merge duplicate applications, or replicate applications to new entities, and decommission the unnecessary ones in order to streamline operations and costs.

    In practice, firewall policies will need to be changed or migrated to support the new connectivity, applications, servers and often new firewalls – without creating security risks, outages or compliance violations. This is a very complex project that, if not planned and implemented properly, can have a very serious impact on business operations.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will discuss best practices and a real-life use case, which will demonstrate how companies can successfully manage application connectivity through an M&A or divestiture process.

    Key topics include how to:

    - Automatically discover and map existing application connectivity flows prior to making any changes
    - Proactively assess the impact of every change to ensure it does not break connectivity, affect compliance or create a security hole
    - Define and execute the necessary security policy changes for traditional firewalls and cloud security controls
    - Deliver unified security policy management across the new enterprise environment
  • Managing application connectivity securely through a Merger or Acquisition[APAC]
    Managing application connectivity securely through a Merger or Acquisition[APAC] Edy Almer, VP Product at AlgoSec Recorded: Nov 14 2017 40 mins
    When going through a merger/acquisition or a divesture process, companies typically need to move some of their applications to a different data center or to the cloud, merge duplicate applications, or replicate applications to new entities, and decommission the unnecessary ones in order to streamline operations and costs.

    In practice, firewall policies will need to be changed or migrated to support the new connectivity, applications, servers and often new firewalls – without creating security risks, outages or compliance violations. This is a very complex project that, if not planned and implemented properly, can have a very serious impact on business operations.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will discuss best practices and a real-life use case, which will demonstrate how companies can successfully manage application connectivity through an M&A or divestiture process.

    Key topics include how to:

    - Automatically discover and map existing application connectivity flows prior to making any changes
    - Proactively assess the impact of every change to ensure it does not break connectivity, affect compliance or create a security hole
    - Define and execute the necessary security policy changes for traditional firewalls and cloud security controls
    - Deliver unified security policy management across the new enterprise environment
  • Firewall Rule Recertification - An Application-Centric Approach [US/UK]
    Firewall Rule Recertification - An Application-Centric Approach [US/UK] Asher Benbinisty, Director of Product Marketing Recorded: Oct 31 2017 27 mins
    As part of your organization’s security policy management best practices, firewall rules must be reviewed and recertified regularly to ensure security, compliance and optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and impacts firewall performance.
    Manual firewall rule recertification, however, is an error-prone and time-consuming process.

    Please join our webinar by Asher Benbenisty, AlgoSec’s Director of Product Marketing, who will introduce an application-centric approach to firewall recertification, bringing a new, efficient, effective and automated method of recertifying firewall rules.

    Join the webinar and discover:

    •Why it is important to regularly review and recertify your firewall rules
    •The application-centric approach to firewall rule recertification
    •How to automatically manage the rule-recertification process

    Want to find out more about the importance of ruleset hygiene?
    Register for the webinar today!
  • Firewall Rule Recertification - An Application-Centric Approach [APAC]
    Firewall Rule Recertification - An Application-Centric Approach [APAC] Asher Benbinisty, Director of Product Marketing Recorded: Oct 31 2017 26 mins
    As part of your organization’s security policy management best practices, firewall rules must be reviewed and recertified regularly to ensure security, compliance and optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and impacts firewall performance.
    Manual firewall rule recertification, however, is an error-prone and time-consuming process.

    Please join our webinar by Asher Benbenisty, AlgoSec’s Director of Product Marketing, who will introduce an application-centric approach to firewall recertification, bringing a new, efficient, effective and automated method of recertifying firewall rules.

    Join the webinar and discover:

    •Why it is important to regularly review and recertify your firewall rules
    •The application-centric approach to firewall rule recertification
    •How to automatically manage the rule-recertification process

    Want to find out more about the importance of ruleset hygiene?

    Register for the webinar today!

Embed in website or blog