Hi [[ session.user.profile.firstName ]]

AlgoSec

  • Date
  • Rating
  • Views
  • Securely Managing External Network Connections — Tips & Tricks
    Securely Managing External Network Connections — Tips & Tricks Prof. Avishai Wool, CTO Recorded: Jun 12 2018 52 mins
    In today’s global business environment companies need to connect to external networks, such as suppliers, credit card processing companies, business partners, and data feeds, in order to function. While these connections are crucial, the very act of enabling access to or from your network is risky and can expose your organization to cyberattacks and compliance violations.

    Join renowned industry expert Professor Avishai Wool for this technical webinar as he covers best practices for managing external connectivity to and from your network, including:

    •Defining the right infrastructure, network segmentation, security controls and additional security protections
    •Managing changes to connectivity for third party applications or data feeds
    •Routing partner traffic through your network
    •Auditing and compliance challenges for you and your external connections
    •Technical considerations for managing the business and legal aspects of third party connectivity
  • [US/UK] Application Visibility Across the Security Estate–The Value & the Vision
    [US/UK] Application Visibility Across the Security Estate–The Value & the Vision Yonatan Klein, Director Product Management Recorded: Jun 5 2018 50 mins
    Security policy management solutions enable security and operations teams to manage and optimize firewall policy, automate security policy changes and mitigate network security risk – all while avoiding misconfigurations, staying compliant and saving time and resources.

    While this provides unprecedented value for network security visibility and management, these teams often lack the business context; the ability to assess the impact of network and firewall rule changes on the company’s business applications, application availability and business processes.

    Join Yonatan Klein, Director Product Management at AlgoSec, as he explores why a security policy management solution should also offer application discovery and visibility to enable a truly business-driven approach to security policy management.

    The webinar will cover:

    Business-driven management of connectivity change requests while avoiding misconfigurations and miscommunications
    Pro-active visibility of the security impact of application changes before applying them
    How visibility into the applications associated with every firewall rule enhances auditing, compliance and policy cleanup
    Clear visibility into the impact of new vulnerabilities and maintenance taskson business processes
    Different ways to discover network connectivity for existing applications
  • [APAC] Application Visibility Across the Security Estate–The Value & the Vision
    [APAC] Application Visibility Across the Security Estate–The Value & the Vision Yonatan Klein, Director Product Management Recorded: Jun 5 2018 56 mins
    Security policy management solutions enable security and operations teams to manage and optimize firewall policy, automate security policy changes and mitigate network security risk, while avoiding misconfigurations, staying compliant and saving time and resources.

    While this provides unprecedented value for network security visibility and management, these teams often lack the business context; the ability to assess the impact of network and firewall rule changes on the company’s business applications, application availability and business processes, which would take their visibility to the next level.

    Join Yonatan Klein, Director Product Management at AlgoSec, as he explores why a security policy management solution should also offer application discovery and visibility to enable a business-driven approach to security policy management.
    The webinar will cover:

    •Business-driven management of connectivity change requests while avoiding misconfigurations and miscommunications
    •Pro-active visibility of the security impact of application changes before applying them
    •How visibility into the supported applications of every rule enhances auditing, compliance and policy cleanup
    •Clear visibility into the business-impact of new vulnerabilities and maintenance tasks
    •Different ways to discover network connectivity for existing applications
  • SDNs: Managing Security across the Virtual Network
    SDNs: Managing Security across the Virtual Network Omer Ganot, Product Manager Recorded: May 22 2018 31 mins
    Software defined networks (SDNs) offer an agile and scalable network option, yet the lack of visibility presents a huge challenge for the security and network operations teams who need to secure and manage it.

    Join Omer Ganot, Product Manager at AlgoSec, for this technical webinar on best practices for managing security across the SDN environment.

    Key topics include:

    • How to securely discover, map and migrate application connectivity to the SDN

    • Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass

    • Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN

    • Best practices for managing security policies across Cisco ACI and VMware NSX

    • Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • [US/UK] Agility vs. Control: The Security Policy Management Balancing Act
    [US/UK] Agility vs. Control: The Security Policy Management Balancing Act Anner Kushnir, VP Technology Recorded: May 15 2018 43 mins
    In today’s world of technological innovation, business application deployments and changes require IT, networking and security teams to be more agile than ever before.

    Unfortunately, this agility can come at the expense of security and compliance and enable network breaches and cyber-attacks.
    In this new technical webinar, Anner Kushnir, VP of Technology at AlgoSec will explain how to address the balancing act of agility vs. control using a unique zero-touch approach to security policy management.

    In this webinar Anner will present:
    • The challenges and requirements for zero-touch security policy automation
    • How automation can support business agility while maintaining checks and balances
    • Defining a policy for pre-approved "more of the same"low-risk changes
    • Handling exceptions, risks and escalation
    • Maintaining a full audit trail for compliance audits
    • Tracking SLAs and further fine-tuning business agility
  • [APAC] Agility vs. Control: The Security Policy Management Balancing Act
    [APAC] Agility vs. Control: The Security Policy Management Balancing Act Anner Kushnir, VP Technology Recorded: May 15 2018 43 mins
    In today’s world of technological innovation, business application deployments and changes require IT, networking and security teams to be more agile than ever before.

    Unfortunately, this agility can come at the expense of security and compliance and enable network breaches and cyber-attacks.
    In this new technical webinar, Anner Kushnir, VP of Technology at AlgoSec will explain how to address the balancing act of agility vs. control using a unique zero-touch approach to security policy management.

    In this webinar Anner will present:
    • The challenges and requirements for zero-touch security policy automation
    • How automation can support business agility while maintaining checks and balances
    • Defining a policy for pre-approved "more of the same"low-risk changes
    • Handling exceptions, risks and escalation
    • Maintaining a full audit trail for compliance audits
    • Tracking SLAs and further fine-tuning business agility
  • [US/UK] Intent-Based Networking in Security Policy Management
    [US/UK] Intent-Based Networking in Security Policy Management Edy Almer, VP Product Recorded: Apr 24 2018 35 mins
    The next big thing in networking, intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.

    Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.

    In this webinar, Edy will explain how:

    •Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security

    •AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)

    •AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
  • [APAC] Intent-Based Networking in Security Policy Management
    [APAC] Intent-Based Networking in Security Policy Management Edy Almer, VP Product Recorded: Apr 24 2018 42 mins
    The next big thing in networking, intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.

    Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.

    In this webinar, Edy will explain how:

    • Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security

    • AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)

    • AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
  • From antiquity to the cloud: 25 years of firewalls and network filtering
    From antiquity to the cloud: 25 years of firewalls and network filtering Prof. Avishai Wool Recorded: Apr 10 2018 65 mins
    The first commercial firewall shipped in 1992. 25 years later the firewall is still the core building block of enterprises’ security infrastructures.
    Please join Prof. Avishai Wool, AlgoSec’s CTO, on Tuesday, April 10 at 10am ET for an educational webinar on the history of the firewall. He will take you through a riveting 25-year journey of the evolution of the firewall - from the ancient world of the host-based firewalls of the 90s, to today’s cloud-based firewalls, and will explain how each type of firewall works, its advantages and limitations, and provide some tips and best practices for effective network filtering.

    In this highly informational, and entertaining webinar Professor Wool will cover:

    • The Early 90s: Host vs. Network
    • Late 90s: Keeping State
    • 2003: Zone-Based firewalls
    • 2010: Next-Gen firewalls
    • 2015: Virtualized and cloud firewalls
  • [US/ UK] Migrating and Managing Security in an AWS Environment- Best Practices
    [US/ UK] Migrating and Managing Security in an AWS Environment- Best Practices Edy Almer, VP Product Recorded: Mar 27 2018 42 mins
    Today, most enterprises are moving at least some of their business applications to the cloud. Yet while the cloud is extremely agile, it also adds a new level of complexity when it comes to network security.

    The cloud introduces a software-defined security architecture that is fundamentally different from the organization’s existing on-premise network, and as a result, many enterprises now struggle with migrating application connectivity to the cloud, and managing the cloud security controls alongside their traditional firewalls in a secure and compliant way.

    In this webinar, Edy Almer, VP Product at AlgoSec, provides technical insight and security best practices for migrating and managing security across the hybrid AWS environment.

    This webinar will cover:

    · Understanding network security before, during and after migrating your applications to AWS

    · How to identify and migrate the relevant application connectivity flows to AWS

    · Managing AWS Security Groups alongside your traditional firewalls – uniformly and securely

    · Making the most of AWS Network ACLs – to enhance traffic filtering and maximize capacity

Embed in website or blog