Hi [[ session.user.profile.firstName ]]

AlgoSec

  • Date
  • Rating
  • Views
  • 5 Dinge, die Sie mit einer Security Policy Management Lösung machen können
    5 Dinge, die Sie mit einer Security Policy Management Lösung machen können Dietmar Wyhs, Regional Sales Manager DACH Recorded: Oct 9 2017 35 mins
    Die heutigen Unternehmen entwickeln sich kontinuierlich weiter, um neue Anwendungen, Transformationsinitiativen wie Cloud und SDN zu unterstützen und täglich neue und anspruchsvollere Cyber-Attacken abzuwehren. Aber die Sicherheits- und Netzwerk-Mitarbeiter haben Schwierigkeiten mitzuhalten. Dies wirkt sich nicht nur auf die Business-Agilität aus, sondern setzt Ihr Unternehmen Risiken aus und behindert dessen Fähigkeit, sich der modernen Bedrohungslandschaft zu stellen.

    Viele Fachleute sind der Meinung, dass sie die neuesten Anwendungen brauchen, um diese Herausforderungen zu bewältigen. Aber was, wenn Sie bereits haben, was Sie brauchen und diese Anwendung in Ihrem Unternehmen genutzt wird: Ihre Security Policy Management Lösung?

    Die heutigen Sicherheitsrichtlinien-Management-Lösungen machen weit mehr als die Automatisierung von traditionellen Änderungsmanagement Aufgaben. In diesem technischen Webinar zeigt Ihnen Dietmar Wyhs fünf wichtige Sicherheitsmanagement-Herausforderungen, denen Unternehmensorganisationen sich heutzutage stellen. Gleichzeitig erklärt er, wie die Lösung von AlgoSec Ihnen helfen kann, Sicherheitsbedrohungen zu bewältigen, Risiken zu verringern, und schnell auf Ausfällen zu reagieren, bei gleichzeitiger Maximierung der Geschäftsagibilität und Sicherstellung der Compliance in den unterschiedlichen, sich ständig verändernden Hybridnetzwerken.

    Dieses technische Webinar konzentriert sich auf:

    •Verwalten von Sicherheitsrichtlinien von End-to-End-Lösungen öffentlicher und privater Clouds einschließlich Microsoft Azure, Amazon Web Services AWS, Cisco ACI und VMWare NSX
    •Zuordnung von Sicherheitslücken zu Anwendungen, zur Bewertung und Priorisierung des Risikos
    •Möglichkeit Cyber-Attacken mit Geschäftsprozesse zu korrelieren
    •Migration von Firewall-Richtlinien zwischen Firewall-Herstellern
    •Durchführung einer vollautomatischen, Zero-Touch-Sicherheitsregelwerksänderung
  • Best Practices to Manage Security Across a Software Defined Network
    Best Practices to Manage Security Across a Software Defined Network Edy Almer, VP Product at AlgoSec Recorded: Oct 3 2017 35 mins
    Software defined networks (SDNs) help drive scalability and business agility, while enabling a more secure, segmented data center. Yet despite its rising popularity, SDN can strike fear into the hearts of the security and network operations teams who have little to no physical visibility into the SDN yet must secure and manage it.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will provide best practices to help manage security across an SDN environment.

    Key topics include:

    - How to securely discover and migrate application connectivity to the SDN
    - Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass
    - Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN
    - Best practices for managing security policies across Cisco ACI, VMware NSX and OpenStack
    - Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • [APAC] Best Practices to Manage Security Across a Software Defined Network
    [APAC] Best Practices to Manage Security Across a Software Defined Network Edy Almer, VP Product at AlgoSec Recorded: Oct 3 2017 44 mins
    Software defined networks (SDNs) help drive scalability and business agility, while enabling a more secure, segmented data center. Yet despite its rising popularity, SDN can strike fear into the hearts of the security and network operations teams who have little to no physical visibility into the SDN yet must secure and manage it.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will provide best practices to help manage security across an SDN environment.

    Key topics include:

    - How to securely discover and migrate application connectivity to the SDN
    - Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass
    - Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN
    - Best practices for managing security policies across Cisco ACI, VMware NSX and OpenStack
    - Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • 5 things you can do with a security policy management solution
    5 things you can do with a security policy management solution Jeffrey Starr, CMO & Edy Almer, VP Product Recorded: Sep 26 2017 51 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • 5 things you can do with a security policy management solution [APAC]
    5 things you can do with a security policy management solution [APAC] Jeffrey Starr, CMO & Edy Almer, VP Product Recorded: Sep 26 2017 45 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • Security a Revenue Center: How Security Can Drive Your Business
    Security a Revenue Center: How Security Can Drive Your Business Joe DiPietro Recorded: Jul 27 2017 57 mins
    Traditionally Security was viewed as necessary cost center or an insurance policy you hoped you’d never have to cash in. Yet by automating security policy management you can actually save your organization both time and money and even enable and support the revenue generation processes.

    Presented by Joe DiPietro, SE Director, this technical webinar will provide an overview of how automated security policy management goes beyond providing ROI and cost savings, to directly impacting business productivity and agility.

    This webinar will:

    * Highlight the security policy processes that can be automated, including challenges, benefits, planning and prioritization considerations.
    * Provide an overview of the security management maturity model and highlight opportunities for automation and optimization for each stage of the model.
    * Dissect and assess cost saving and revenue generation opportunities for specific key challenges including security change management, risk management, application migration, and auditing and compliance.
  • Aligner votre sécurité avec vos processus métiers
    Aligner votre sécurité avec vos processus métiers Adam Vizogrod, AlgoSec Recorded: Jun 22 2017 36 mins
    L’évolution en taille et en complexité de vos applications et de votre infrastructure réseau a une répercussion directe sur votre politique de sécurité. Cependant, une gestion manuelle de politiques de sécurité complexes peut se traduire souvent par des risques inutiles, des coûts plus élevés et une incapacité à suivre le rythme de votre activité.


    Au cours de cette session, nous vous présenterons une approche de la gestion de la politique de sécurité centrée sur les applications, qui vous permettra de gérer facilement et automatiquement des politiques complexes sur plusieurs Firewalls. La solution présentée vous aidera à améliorer votre positionnement en termes de sécurité et d’agilité opérationnelle, à garantir une conformité continue et à réduire le risque, tout en réconciliant les lacunes de communication entre les équipes applicatives et réseau.
  • Security Change Management: Agility vs. Control
    Security Change Management: Agility vs. Control Anner Kushnir, VP Technology Recorded: Jun 20 2017 45 mins
    Today's fast paced business application deployments and changes require IT, networking and security to be more agile than ever before. Yet this agility often comes at the expense of security, control and accuracy. When facing a barrage of cyber-attacks this is not an option.
    In this new technical webinar, Anner Kushnir, VP of Technology at AlgoSec will explain how to address these contradicting requirements, and eliminate the tension between the two, through a unique zero-touch approach to security policy management.

    In this webinar Anner will present:

    • The challenges and requirements for zero-touch security policy automation
    • How automation can support business agility while maintaining checks and balances
    • Defining a policy for pre-approved "more of the same" low risk changes
    • Handling exceptions, risks and escalation
    • Maintaining a full audit trail for compliance audits
    • Tracking SLAs and further fine-tuning business agility
  • Best practices to proactively prevent, contain & respond to ransomware attack
    Best practices to proactively prevent, contain & respond to ransomware attack Prof. Avishai Wool Recorded: Jun 13 2017 55 mins
    One of the biggest concerns for info security professionals and business executives right now is ransomware attacks. It has prompted many organizations urgently assess what they need to do to contain and limit their exposure to this threat.

    Presented by renowned industry expert Prof. Avishai Wool, this new technical webinar will provide some best practices and tips to help organizations prevent, contain and respond to a ransomware attack.

    In this webinar Professor Wool will discuss:

    • The different methods used by cyber criminals to penetrate the network security perimeter
    • Best practices for reducing cyber criminals’ lateral movements across the network
    • How to augment incident triage with critical business context to assess the severity, risk and potential business impact of an attack
    • Prioritizing incident remediation efforts based on business risk, and neutralizing impacted systems through zero-touch automation
    • The impact of a ransomware on regulatory compliance
  • Security Policy Management for Financial Institutions
    Security Policy Management for Financial Institutions Asher Benbenisty, Director of Product Management Recorded: Jun 6 2017 26 mins
    Financial institutions are constantly seeking to better serve their customers and maintain a competitive edge through new technology innovations and digital transformation initiatives, yet they often fall behind on delivering these new innovations into production.

    Network and security operations teams are often hampered by manual, slow and error-prone security policy change management processes, and the ever-increasing demands of industry regulations.

    Geared towards the specific challenges of financial institutions, this webinar will provide technical best practices for managing network security policy changes while reducing risk and enforcing compliance and will cover:

    •Key industry metrics that compare security environments in and outside the finance industry.
    •Network security and management challenges
    •How to overcome security management complexity with automation
    •How to address the ever-increasing demands of financial industry regulations

Embed in website or blog