Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • A Zero Trust Approach to Decoupling Intent from Implementation
    A Zero Trust Approach to Decoupling Intent from Implementation Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon Recorded: Sep 20 2018 60 mins
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • 3 Steps to Gain Control of Cloud Security
    3 Steps to Gain Control of Cloud Security Tim Woods - Vice President, Technology Alliances, FireMon Recorded: Sep 19 2018 61 mins
    The cloud is a notable business advantage, but it does bring numerous security concerns. Among them:

    - Lack of visibility across cloud or between on-premises and cloud environments
    - Monitoring security controls and changes within cloud and multi-cloud environments
    - Maintaining compliance by monitoring cloud traffic for suspicious and non-compliant behavior

    It becomes increasingly complex in hybrid environments because now you’re managing security for on-premise, cloud, virtual, container environments, and more. The time commitment can feel staggering.

    It doesn’t have to, however.

    In this webinar we will show you the path to more effective cloud security in hybrid enterprises through a mix of:

    1. Vulnerability management: See how an attacker could exploit and prioritize your patches
    2. Continuous compliance: Define your own cloud security controls and reduce the time spent on audit prep by making your cloud continuously audit-ready
    3. Automation and orchestration: Ingest behavior details from your cloud, then command security controls to cloud systems from a single console. The idea is instant, worry-reducing cloud control.
  • Migrating to the Cloud? Don’t Forget Your Firewalls
    Migrating to the Cloud? Don’t Forget Your Firewalls Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon Recorded: Sep 12 2018 103 mins
    When we start using the cloud, it’s up to us to address these risks:

    Direct attacks from the Internet on resources in the cloud
    Infiltration of on-prem network from compromised resources in the cloud
    Attacks on cloud-based workloads from compromised endpoints in the on-prem network

    Cloud and firewall providers have been quick to identify this as a market and there is a plethora of virtual network security gear you can deploy including:

    Built-in network security controls (e.g. Network Security Groups in Azure virtual networks)
    Cloud firewalls (e.g. Azure Firewall)
    Network virtual appliances from well-known Next-Gen Firewall vendors offered in cloud marketplaces. This lets you quickly spin-up a traditional NGFW product on a pre-configured VM and you can potentially use the same firewall vendor in the cloud and on-prem.
    Firewall Infrastructure-as-a-Service offerings like CheckPoint CloudGuard which are delivered and run as part of the cloud infrastructure rather than as a VM

    In this webinar, we explore the expanding requirements for network controls (i.e. firewalls) as more workloads are spun up in the cloud and your network infrastructure becomes more dispersed. Here’s a few questions answer:

    Is cloud network security just a matter of more firewalls or are there nuances specific to cloud workloads?
    How to spot potential and unintended - Pathways to vulnerable cloud resources, Cross-premise pathways, “worm-holes” into highly secure on-prem resources, Ways to by-pass perimeter boundaries
    When should you implement multiple tiers to security cloud workloads?
    When are built-in security features (like Azure Network Security Groups) enough and when do you need more?

    We will also discuss the need to keep all this straight, understood, consistent and the configuration accurately reflecting your security intent. Managing all your on-prem firewalls is challenging enough, let alone the cloud.
  • GDPR: 4 Key Principles for Success
    GDPR: 4 Key Principles for Success Keith Brennan Director, Field Engineering FireMon Recorded: Aug 22 2018 60 mins
    In this webinar replay, we'll discuss 4 key principles your organization needs to be successful with the EU's demand for tighter data protection, along with the penalties for the violation. GDPR provides an example of how countless security professionals can be led to anxiety and dread with a looming stack of regulations on fast approach. Put the fears to rest.

    In this webinar, we’ll show you the principles needed for GDPR success:

    -Risk-based data protection
    -Measuring security effectiveness
    -Monitoring data protection
    -Orchestrating persistent compliance

    GDPR is a special instance of government regulations; you’ve seen this for decades. There is nothing to fear. Nothing.

Embed in website or blog