Hi [[ session.user.profile.firstName ]]

AlgoSec

  • Date
  • Rating
  • Views
  • Aligning Security With Your Business Processes – a Technical Perspective Aligning Security With Your Business Processes – a Technical Perspective Joe DiPietro, SE Director at AlgoSec Recorded: Dec 8 2016 46 mins
    In this era of digital transformation, globalization, and relentless cyber-attacks, security can no longer remain a technology issue that simply focuses on defending networks and data. It must become a strategic, business driver that transforms the next generation datacenter to both protect and power the agile enterprise. Security teams are therefore now looking to implement intelligent automation that injects business context into their security management.

    Join Joe DiPietro, SE Director at AlgoSec on Thursday, December 8 at 11am EST for a technical webinar, where he will discuss a business-driven approach to security policy management – from automatically discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning – that will help make your organizations more agile, more secure and more compliant.

    During the webinar, Joe will explain how to:
    * Get holistic visibly of security risk and compliance across the enterprise network
    * How to reduce risk and avoid application outages
    * Tie cyber threats to business processes
    * Enhance and automate security processes with business context, including impact analysis and risk approval
    * Accelerate and ensure secure business transformation to the cloud
  • Migrating application connectivity and network security to AWS Migrating application connectivity and network security to AWS Prof. Avishai Wool Recorded: Nov 10 2016 48 mins
    It’s now a given – most enterprises are moving at least some of their business applications to the cloud. Yet while the cloud is an extremely agile platform, it also adds a new level of complexity. Because, when it comes to network security, the cloud introduces a software-defined security architecture that is fundamentally different from the organization’s existing on-prem network. As a result, many enterprises are now struggling to migrate application connectivity to the cloud, and then manage cloud security controls alongside their traditional firewalls in a way that ensures security and compliance across their entire hybrid architecture.

    Presented by renowned industry expert Prof. Avishai Wool, this new webinar will provide technical insight and security best practices for migrating and managing security across a hybrid on-premise - Amazon Web Services (AWS) environment:

    This webinar will cover:
    •Understanding network security before, during and after migrating your applications to AWS
    •How to identify and migrate the relevant application connectivity flows to AWS
    •Managing AWS Security Groups alongside your traditional firewalls – uniformly and securely
    •Making the most of AWS Network ACLs – to enhance traffic filtering and maximize capacity
  • Dos and Don’ts for Managing External Connectivity to/from Your Network Dos and Don’ts for Managing External Connectivity to/from Your Network Professor Avishai Wool - CTO and Co-Founder AlgoSec Recorded: Oct 6 2016 46 mins
    In today’s global market place your organization needs network connectivity with external entities – suppliers, credit card processing companies, business partners, data feeds etc. But are you really sure these connections are secure and compliant, and that they are not inadvertently creating holes in your network and exposing your organization to cyber criminals?

    Join renowned industry expert Professor Avishai Wool for this technical webinar which will cover best practices for managing external connectivity to and from your network, including:
    •Defining the right infrastructure, network segmentation, security controls and additional security protections
    •Managing changes to connectivity for third party applications or data feeds
    •Routing partner traffic through your network
    •Auditing and compliance challenges for both you and your partner
    •Technical considerations for managing the business and legal aspects of third party connectivity
  • How to migrate and manage security policies in a segmented data center How to migrate and manage security policies in a segmented data center Professor Avishai Wool, AlgoSec CTO Recorded: Aug 23 2016 53 mins
    Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX, now a reality it's now far easier and quicker to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.
    Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.
    During the webinar Professor Wool will cover how to:
    · Identify and securely migrate legacy applications to a micro-segmented data center
    · Effectively define and enforce security policies for East-West traffic
    · Manage the micro-segmented data center alongside traditional on-premise security devices
    ·Identify risk and manage compliance in a micro-segmented data center
    · Use network segmentation to reduce the scope of regulatory audits
    · Identify and avoid common network segmentation mistakes
  • Learn how an app-centric approach will improve security & operational efficiency Learn how an app-centric approach will improve security & operational efficiency Joe DiPietro, SE Director at AlgoSec Recorded: Jul 26 2016 51 mins
    The constant barrage of application connectivity and security policy change requests, not to mention the relentless battle against cyber-attacks have made the traditional approach to managing security untenable. In order keep your business both agile and secure – across today’s highly complex and diverse enterprise networks – you must focus your security management efforts on what matters most – the applications that power your business.

    Join Joe DiPietro, SE Director at AlgoSec on Tuesday, July 26 at 11am EDT for a technical webinar, where he will discuss an application-centric, lifecycle approach to security policy management – from automatically discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning – that will help you improve your security maturity and business agility. During the webinar, Joe will explain how to:
    • Understand the security policy management lifecycle and its impact on application availability, security and compliance
    • Auto-discover and map business applications and their connectivity flows – and why it’s important
    • Securely migrate business application connectivity and security devices to a new data center
    •Get a single pane of glass that aligns application connectivity with your security device estate
    • Identify risk and vulnerabilities and prioritize them based on business criticality
  • Best Practics for Automating Next Generation Firewall Change Processes Best Practics for Automating Next Generation Firewall Change Processes Mosh Itah, Product Line Manager at Palo Alto Networks and Edy Almer, VP Product at AlgoSec Recorded: May 18 2016 45 mins
    Palo Alto Networks’ next generation firewalls (NGFW) enable security to be managed with extensive policy granularity. However, replacing or migrating traditional firewall policies to next-generation firewall policies is a complex task that often involves thousands of rules and definitions.

    AlgoSec seamlessly integrates with Palo Alto Networks NGFWs to simply and intelligently automate App-ID and User-ID security policy change workflows, business application connectivity mapping and compliance reporting across on-premise and cloud environments.

    Hear Mosh Itah, Product Line Manager at Palo Alto Networks and Edy Almer, VP Product at AlgoSec discuss how to:


    •Centrally manage security policies across multiple devices through Palo Alto Networks Panorama
    •Automate policy changes, including hands-free policy push directly to Palo Alto Networks' devices
    •View and manage your security policies holistically across a mix of traditional and Next Gen firewalls and cloud security controls
    •Allow large geographically-dispersed teams to cooperatively manage security policy changes
  • Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance Professor Avishai Wool, AlgoSec CTO Recorded: Apr 19 2016 48 mins
    PCI-DSS audits are typically a point-in-time “fire drill”, yet the PCI-DSS standards body expects a continuous state of compliance. Unfortunately poor change management processes are often the Achilles Heel in reaching and maintaining this nirvana.

    Presented by the renowned industry expert Professor Avishai Wool, this technical webinar will provide best practices and demonstrate specific techniques to help you ensure both a successful audit and maintain a state of continuous compliance with the upcoming PCI-DSS 3.2 standards.

    During the webinar Professor Wool will cover:
    * What you need to know about the upcoming PCI-DSS version 3.2
    * How to ensure your network is compliant now, and maintains continuous compliance
    * Identifying the latest vulnerabilities and assessing risk before the auditor does
    * How to reduce the scope of your audit, and instantly generate audit-ready reports
    * PCI and the cloud – some do’s and don’t’s
  • Why Security Policy Management Must be Application-Centric Why Security Policy Management Must be Application-Centric Mark Bouchard, Founder of AimPoint Group & Nimmy Reichenber, VP Strategy at AlgoSec Recorded: Mar 28 2016 58 mins
    In this webcast AlgoSec and Mark Bouchard of AimPoint Group examine the impact of taking an application-centric approach to security policy management, with tips for improving the visibility, management and security related to complex business application connectivity needs.
  • How to Help Security Keep Up with the Pace of Business Changes How to Help Security Keep Up with the Pace of Business Changes Joe DiPietro, Director America's SE at AlgoSec Recorded: Mar 15 2016 46 mins
    Do security changes take days or even weeks to process? Are you being bombarded with requests for connectivity changes for new business applications? Are misconfigurations causing costly business outages or creating dangerous holes in your security perimeter?

    Currently many Security professionals struggle with manual security changes processes as they sift through hundreds and often thousands of firewall rules and access lists. The result: slow response to business requests, and costly mistakes that cause outages and introduce risk.

    This technical webinar will provide best practices and tips to help you eliminate the risks of network security policy changes. You’ll learn:
    * Common risks to avoid when making changes to your network security devices
    * How to better understand business requirements from the network security perspective
    * How to easily discover existing application connectivity flows and easily and automatically change them
    * How to accelerate change requests and ensure security and compliance through automation

    Attend this webinar and say goodbye to complexity, manual processes and misconfigurations… and hello to security, agility and business productivity.
  • How to Avoid Business Outages from Misconfigured Network Devices How to Avoid Business Outages from Misconfigured Network Devices Joe DiPietro, Director America's SE at AlgoSec Recorded: Jan 13 2016 42 mins
    A single change to a network device can have a far reaching effect on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news!
    This technical webinar will walk you a variety of use cases where device misconfigurations typically occur, including a basic device change, business application connectivity changes, and data center migrations. It will provide both best practices and demonstrate specific techniques to help you understand and avoid misconfigurations and ultimately prevent damage to your business, including how to:
    * Understand and map your enterprise infrastructure topology before you make a change
    * Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    * Common mistakes to avoid when making changes to your network security devices
    * How to better understand business requirements from the network security perspective