Hi [[ session.user.profile.firstName ]]

AlgoSec

  • Date
  • Rating
  • Views
  • How to migrate and manage security policies in a segmented data center How to migrate and manage security policies in a segmented data center Professor Avishai Wool, AlgoSec CTO Recorded: Aug 23 2016 53 mins
    Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX, now a reality it's now far easier and quicker to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.
    Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.
    During the webinar Professor Wool will cover how to:
    · Identify and securely migrate legacy applications to a micro-segmented data center
    · Effectively define and enforce security policies for East-West traffic
    · Manage the micro-segmented data center alongside traditional on-premise security devices
    ·Identify risk and manage compliance in a micro-segmented data center
    · Use network segmentation to reduce the scope of regulatory audits
    · Identify and avoid common network segmentation mistakes
  • Learn how an app-centric approach will improve security & operational efficiency Learn how an app-centric approach will improve security & operational efficiency Joe DiPietro, SE Director at AlgoSec Recorded: Jul 26 2016 51 mins
    The constant barrage of application connectivity and security policy change requests, not to mention the relentless battle against cyber-attacks have made the traditional approach to managing security untenable. In order keep your business both agile and secure – across today’s highly complex and diverse enterprise networks – you must focus your security management efforts on what matters most – the applications that power your business.

    Join Joe DiPietro, SE Director at AlgoSec on Tuesday, July 26 at 11am EDT for a technical webinar, where he will discuss an application-centric, lifecycle approach to security policy management – from automatically discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning – that will help you improve your security maturity and business agility. During the webinar, Joe will explain how to:
    • Understand the security policy management lifecycle and its impact on application availability, security and compliance
    • Auto-discover and map business applications and their connectivity flows – and why it’s important
    • Securely migrate business application connectivity and security devices to a new data center
    •Get a single pane of glass that aligns application connectivity with your security device estate
    • Identify risk and vulnerabilities and prioritize them based on business criticality
  • Best Practics for Automating Next Generation Firewall Change Processes Best Practics for Automating Next Generation Firewall Change Processes Mosh Itah, Product Line Manager at Palo Alto Networks and Edy Almer, VP Product at AlgoSec Recorded: May 18 2016 45 mins
    Palo Alto Networks’ next generation firewalls (NGFW) enable security to be managed with extensive policy granularity. However, replacing or migrating traditional firewall policies to next-generation firewall policies is a complex task that often involves thousands of rules and definitions.

    AlgoSec seamlessly integrates with Palo Alto Networks NGFWs to simply and intelligently automate App-ID and User-ID security policy change workflows, business application connectivity mapping and compliance reporting across on-premise and cloud environments.

    Hear Mosh Itah, Product Line Manager at Palo Alto Networks and Edy Almer, VP Product at AlgoSec discuss how to:


    •Centrally manage security policies across multiple devices through Palo Alto Networks Panorama
    •Automate policy changes, including hands-free policy push directly to Palo Alto Networks' devices
    •View and manage your security policies holistically across a mix of traditional and Next Gen firewalls and cloud security controls
    •Allow large geographically-dispersed teams to cooperatively manage security policy changes
  • Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance Professor Avishai Wool, AlgoSec CTO Recorded: Apr 19 2016 48 mins
    PCI-DSS audits are typically a point-in-time “fire drill”, yet the PCI-DSS standards body expects a continuous state of compliance. Unfortunately poor change management processes are often the Achilles Heel in reaching and maintaining this nirvana.

    Presented by the renowned industry expert Professor Avishai Wool, this technical webinar will provide best practices and demonstrate specific techniques to help you ensure both a successful audit and maintain a state of continuous compliance with the upcoming PCI-DSS 3.2 standards.

    During the webinar Professor Wool will cover:
    * What you need to know about the upcoming PCI-DSS version 3.2
    * How to ensure your network is compliant now, and maintains continuous compliance
    * Identifying the latest vulnerabilities and assessing risk before the auditor does
    * How to reduce the scope of your audit, and instantly generate audit-ready reports
    * PCI and the cloud – some do’s and don’t’s
  • Why Security Policy Management Must be Application-Centric Why Security Policy Management Must be Application-Centric Mark Bouchard, Founder of AimPoint Group & Nimmy Reichenber, VP Strategy at AlgoSec Recorded: Mar 28 2016 58 mins
    In this webcast AlgoSec and Mark Bouchard of AimPoint Group examine the impact of taking an application-centric approach to security policy management, with tips for improving the visibility, management and security related to complex business application connectivity needs.
  • How to Help Security Keep Up with the Pace of Business Changes How to Help Security Keep Up with the Pace of Business Changes Joe DiPietro, Director America's SE at AlgoSec Recorded: Mar 15 2016 46 mins
    Do security changes take days or even weeks to process? Are you being bombarded with requests for connectivity changes for new business applications? Are misconfigurations causing costly business outages or creating dangerous holes in your security perimeter?

    Currently many Security professionals struggle with manual security changes processes as they sift through hundreds and often thousands of firewall rules and access lists. The result: slow response to business requests, and costly mistakes that cause outages and introduce risk.

    This technical webinar will provide best practices and tips to help you eliminate the risks of network security policy changes. You’ll learn:
    * Common risks to avoid when making changes to your network security devices
    * How to better understand business requirements from the network security perspective
    * How to easily discover existing application connectivity flows and easily and automatically change them
    * How to accelerate change requests and ensure security and compliance through automation

    Attend this webinar and say goodbye to complexity, manual processes and misconfigurations… and hello to security, agility and business productivity.
  • How to Avoid Business Outages from Misconfigured Network Devices How to Avoid Business Outages from Misconfigured Network Devices Joe DiPietro, Director America's SE at AlgoSec Recorded: Jan 13 2016 42 mins
    A single change to a network device can have a far reaching effect on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news!
    This technical webinar will walk you a variety of use cases where device misconfigurations typically occur, including a basic device change, business application connectivity changes, and data center migrations. It will provide both best practices and demonstrate specific techniques to help you understand and avoid misconfigurations and ultimately prevent damage to your business, including how to:
    * Understand and map your enterprise infrastructure topology before you make a change
    * Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    * Common mistakes to avoid when making changes to your network security devices
    * How to better understand business requirements from the network security perspective
  • Reduce Your Attack Surface by Getting Back to Basics Reduce Your Attack Surface by Getting Back to Basics Professor Avishai Wool, AlgoSec Recorded: Dec 17 2015 57 mins
    Most firewall breaches are caused by firewall misconfigurations and a lack of segmentation across their networks. In fact only a handful of attacks truly use sophisticated techniques. So getting security basics right will deliver far better protection against cyberattacks compared with many of the latest shiny new security technologies.

    Presented by the renowned industry expert Professor Avishai Wool, this technical webinar will walk you through a typical cyber threat scenario faced by millions of business every single day. It will provide both best practices and demonstrate specific techniques to help you reduce your attack surface and limit and even prevent damage to your business.

    During the webinar Professor Wool will:
    * Present the different methods used by cyber criminals to penetrate your network security
    * Trace and analyze the anatomy of a typical advanced persistent threat (APT)
    * Discuss best practices for reducing cyber criminals’ lateral movements with your network
    * Provide tips and demonstrate techniques for reducing your attack surface using existing security solutions
  • A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment Rich Mogull, Analyst & CEO, Securosis; Nimmy Reichenberg, VP Strategy, AlgoSec Recorded: Nov 17 2015 63 mins
    How we think about and architect network security has stayed fairly constant for quite some time.

    Until we moved to the cloud.

    Things may look the same on the surface, but dig a little deeper and you quickly realize that network security for cloud computing and hybrid networks requires a different mindset, different tools, and a new approach. Hybrid networks complicate management, both in your data center and in the cloud. Each side uses a different basic configuration and security controls, so the challenge is to maintain consistency across both, even though the tools you use – such as your nifty next generation firewall – might not work the same (if at all) in both environments.

    Presented by AlgoSec and Rich Mogull, Analyst and CEO at Securosis, this webinar explains how cloud network security is different, and how to pragmatically manage it for both pure cloud and hybrid cloud networks. We will start with some background material and Cloud Networking 101, then move into cloud network security controls, and specific recommendations on how to use and manage them in a hybrid environment.
  • How to Accelerate Migrations and Security Management in the Virtual Data Center How to Accelerate Migrations and Security Management in the Virtual Data Center Rick Holland, Principal Analyst, Forrester Research & Nimmy Reichenberg VP Strategy, AlgoSec Recorded: Aug 24 2015 53 mins
    In this webcast, Forrester Research Analyst Rick Holland and AlgoSec’s Nimmy Reichenberg examine:
    - Virtualization and consolidation in the data center
    - The concept of zero trust and what it means to you
    - Security policy orchestration
    - An overview of the AlgoSec Suite and how it simplifies migrations and ongoing data center operations

Embed in website or blog