Hi [[ session.user.profile.firstName ]]

AlgoSec

  • Date
  • Rating
  • Views
  • Firewall Rule Recertification with Application Connectivity
    Firewall Rule Recertification with Application Connectivity
    Asher Benbenisty, Director of Product Marketing Recorded: Apr 24 2019 20 mins
    Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.

    However, manual firewall rule recertification is complex, time-consuming and prone to errors.

    Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.

    In this webinar Asher will cover:
    • Why it is important to regularly review and recertify your firewall rules
    • How to use application connectivity for firewall rule recertification
    • How to automatically manage the rule-recertification process
  • Boosting Network Security with ChatOps
    Boosting Network Security with ChatOps
    Dania Ben Peretz, Product Manager (AlgoSec) Recorded: Apr 17 2019 30 mins
    The way we consume content has greatly evolved throughout the years - from text-only collateral to using applications that centralize the content and make it easier to access. However, the number of business applications is rapidly growing, ultimately causing organizations to suffer from “app fatigue”.

    Network security stakeholders can benefit from such a shift in content consumption by taking a conversational approach with ChatOps.

    In this webinar, Dania Ben Peretz, Product Manager at AlgoSec covers how ChatOps helps network security and operational staff to:
    • Shorten resolution time of critical security incidents
    • Manage security more efficiently through collaboration and transparency between IT, Security, Network and DevOps teams
    • Ensure ongoing security and compliance
  • Taming the storm clouds: managing network security across hybrid and multi-cloud
    Taming the storm clouds: managing network security across hybrid and multi-cloud
    Yonatan Klein, Director of Product Management (AlgoSec) Recorded: Mar 27 2019 46 mins
    Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.

    Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.

    Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.

    Yonatan will cover how to:
    •Easily and automatically identify security risks and misconfigurations in your cloud
    •Centrally manage security controls across accounts, regions and VPCs/VNETs
    •Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs
    •Obtain a cross-network-estate risk analysis
  • Panel: Network Security and Compliance best practices for Financial Institutions
    Panel: Network Security and Compliance best practices for Financial Institutions
    Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) Recorded: Mar 20 2019 24 mins
    Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.

    There’s a better way to manage your network security!

    Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.

    Topics include:

    •How to overcome security management complexities with automation
    •How to pass compliance audits in the face of demanding regulations
    •Key industry metrics that compare security environments within and beyond the finance industry
    •Real financial customers case studies
  • Cyber Security Battles: How to Prepare and Win
    Cyber Security Battles: How to Prepare and Win
    Shahrokh Shahidzadeh (Acceptto), George McGregor (Imperva), Avishai Wool (Algosec), Chris Morales (Vectra) Recorded: Mar 6 2019 45 mins
    What is the future of cyber warfare and how does it impact enterprise security? While the world has yet to see a cyber battle between AI systems, experts predict this might be on the horizon in the next three to five years.

    Join this interactive Q&A panel with security experts to learn more about:
    - The current state of cybersecurity and AI
    - How to deploy AI to detect malware
    - What is adversarial AI (or offensive AI) and how to protect against cyber attacks
    - Preparing for battle
    - What's needed to build an AI system and how to build one that can be used to bypass other AI systems
    - How to fight adversaries that have better resources
    - Protecting against nation state attacks
    - Lessons and recommendations for a more resilient enterprise
  • Micro-Segmentation based Network Security Strategies
    Micro-Segmentation based Network Security Strategies
    Yoni Geva, Product Manager Recorded: Feb 20 2019 42 mins
    As cyber threats become more sophisticated, companies of all sizes are struggling to stay secure. Regardless of how many different firewalls you use, it’s merely a matter of time until a threat gets through. To prevent serious breaches, networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to build a micro-segmentation strategy that truly protect your organization’s valuables.

    In this webinar, Yoni Geva, Product Manager at AlgoSec will cover:

    • Segmentation challenges
    • Micro-segmentation explained
    • Micro-segmentation strategy benefits
    • Micro-segmentation strategy development – first steps
    • Implementation Do’s and Don’ts
  • Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
    Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
    Tal Dayan, Product Manager Recorded: Jan 30 2019 40 mins
    The growing body of regulations and standards forces enterprises to put considerable emphasis on compliance verified by ad hoc and regular auditing of security policies and controls. While regulatory and internal audits entail a wide range of security checks, network firewalls are featured prominently as they are the first line of defense of the enterprise network.

    Typical networks might include tens or hundreds of firewalls from multiple vendors running thousands of rules. Auditing firewalls for compliance is becoming more complex and demanding all the time.

    •Documentation of current rules and their evolution of changes is lacking
    •Time and resources required to find, organize and inspect all the firewall rules to determine the level of compliance is exorbitant and growing

    It’s time to adopt auditing’s best practices to maintain continuous compliance. Join us in this webinar to discover the Firewall Audit Checklist, the 6 best practices that will ensure successful audits and full compliance. By adopting these best practices, security teams will significantly improve their network’s security posture and reduce the pain of ensuring compliance with regulations, industry standards and corporate policies.
  • More Things You Can Do with a Security Policy Management Solution
    More Things You Can Do with a Security Policy Management Solution
    Dania Ben Peretz, Product Manager Recorded: Dec 17 2018 38 mins
    Are you getting the most out of your Security Policy Management Solution?

    Today’s security policy management solutions do much more than automate traditional change management tasks. And yet, managing processes is becoming increasingly complex, time consuming and riddled with errors.

    Many professionals believe they need additional sophisticated tools to address these challenges. However, you may already have what you need, up and running in your organization.

    Join us in this webinar to learn how AlgoSec’s solution simplifies and automates security policy management to make the enterprise more agile, more secure and more compliant across your ever-changing network:

    •Gaining visibility of unsecured traffic used by your business applications
    •Closing the gaps in your network map to get your automation in place faster
    •Tying cyberattacks to business impact
    •Being audit-ready all the time
  • Extending Network Security Visibility and Control into AWS
    Extending Network Security Visibility and Control into AWS
    Avishai Wool, CTO (AlgoSec) & Scott Ward, Principal Solutions Architect (Amazon Web Services) Recorded: Dec 11 2018 60 mins
    Enterprises are taking advantage of the vast capabilities Cloud Computing offers, rapidly migrating data and applications to Public Cloud, such as Amazon Web Services (AWS). However, great new capabilities also expose organizations to new security risks.

    In order to maintain an effective security posture while deploying applications across complex and hybrid network environments, security professionals need holistic visibility and control from a single source.

    In this special panel discussion, Prof. Avishai Wool (AlgoSec CTO) and Scott Ward (AWS Principle Solutions Architect) will cover best practices for maintaining corporate security governance as enterprises extend business applications into the cloud.

    Join us to learn how to:

    • Extend full visibility from the on-premise network into AWS with a single pane of glass view
    • Proactively uncover gaps in security and compliance
    • Quickly apply on-premise network security policy to AWS
    • Automatically optimize security policy change management across the complex network
  • Have it All: Achieving Agility and Security with Automation
    Have it All: Achieving Agility and Security with Automation
    Yoni Geva, Product Manager Recorded: Nov 19 2018 37 mins
    Are you still implementing firewall changes manually? Are you still trying to keep track of all the changes and their ramifications with spreadsheets?
    Network security policy automation gives you quick, accurate change management across even the most complex hybrid networks, avoiding security holes, compliance issues and costly outages. With automation, you don’t have to choose between agility and security. You can have both.
    In this webinar, Yoni Geva, Product Manager at AlgoSec, explains how security policies can be updated automatically and accurately.
    Join our webinar to learn how to take advantage of:
    •Automated security policy automation with zero touch
    •Security policy management that keeps up with business requirements
    •Automatic identification of risk
    •Enhanced compliance with quick audit reports on demand

Embed in website or blog