Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Managing Security for the Multi-Cloud
    Managing Security for the Multi-Cloud
    Dave Klein (Guardicore), Tim Woods (FireMon), Tom McAndrew (Coalfire), Praveen Jain (Cavirin) Recorded: Mar 6 2019 46 mins
    "Enterprises today are leveraging multiple clouds and thousands of applications. What are the security and compliance risks associated with a multi-cloud strategy?

    Join cloud and security leaders in an interactive discussion to learn about:
    - The current state of cloud
    - Security risks and recommendations
    - Managing and automating security across multiple clouds and applications
    - What to expect in 2019
    - Recommendations for improving enterprise cloud security"
  • 5 Steps to Comprehensively Mapping Your Attack Surface
    5 Steps to Comprehensively Mapping Your Attack Surface
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com | Scott Custer, Senior Solutions Architect, FireMon Recorded: Feb 28 2019 88 mins
    You need to understand all the potential pathways malicious traffic could possibly take through your network – including obscure and indirect paths that don’t immediately look risky or valuable to an attacker. Moreover, you need to be able to juxtapose that network topology and path analysis with your host level security vulnerabilities.

    In this real training for free session, we will examine 5 steps for accomplishing this:

    Validate address space
    Quantify edges of network
    Perform path analysis
    Conduct host/device census
    Identify device/host level vulnerabilities
    Join us to explore all of these steps and then how to juxtapose and overlay all of this information into a comprehensive, multi-dimensional attack surface.

    FireMon is the perfect sponsor for this event and Scott Custer will show you how their unique technology, Lumeta, provides real-time visibility, vulnerability indicators, and risk identification enabling cloud, network, and security teams to find and secure unknown, rogue and shadow IT, network infrastructure, and endpoints.
  • Secure Your Journey to the Hybrid Cloud
    Secure Your Journey to the Hybrid Cloud
    Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product Marketing Recorded: Feb 22 2019 56 mins
    Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.

    Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:

    • Steps you need to take to gain full visibility and control to secure your hybrid environment
    • How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
    • How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
  • Consistency is Key with Cloud Security
    Consistency is Key with Cloud Security
    Elisa Lippincott, Director of Product Marketing Recorded: Jan 17 2019 38 mins
    When it comes to cloud security, consistency is everything – your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

    Cloud security breaches have not been the result of brilliant criminal masterminds. Rather, they have been the result of self-inflicted errors that are often caused by faulty migration and deployment practices – particularly when the right security personnel are excluded from the process.

    Attend this webinar to learn how to:
    •Avoid misconfiguring your own security controls
    •Ensure consistency in your cloud security implementation
    •Optimize your vulnerability management
  • Achieve NERC CIP Compliance with FireMon
    Achieve NERC CIP Compliance with FireMon
    Robert Rodriguez, Senior Sales Engineer | Brian Dixon, Sales Engineer | Elisa Lippincott, Director of Product Marketing Recorded: Dec 10 2018 12 mins
    Utilities need scalable solutions to help them adapt and comply with the constantly changing NERC CIP requirements. FireMon can partner with utilities to automate their security policy workflows, optimize their vulnerability management efforts, and get their networks under control with complete visibility, real-time monitoring and continuous compliance checks.
  • AWS Network Security Deep Dive: Providing Network Protection for AWS Cloud
    AWS Network Security Deep Dive: Providing Network Protection for AWS Cloud
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com | Tim Woods, FireMon | Sanjay Raja, Lumeta Recorded: Nov 6 2018 97 mins
    Running workloads in the cloud makes provisioning and setup easier—just spin up a VM. But you might be surprised by how many firewalls you’ll end up with in the cloud if you follow best practices. Cloud providers are clear on this point. Amazon says, “Security and Compliance is a shared responsibility between AWS and the customer… The customer assumes responsibility and management of the guest operating system (including updates and security patches), other associated application software as well as the configuration of the AWS provided security group firewall.” In short, cloud security is in your court.
    In this deep dive into network security in the AWS cloud, some of the security features we’ll explore are:
    •Security groups — Act as a firewall for associated Amazon EC2 instances, controlling both inbound and outbound traffic at the instance level
    •Network access control lists — Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the subnet level
    •Flow logs — Capture information about the IP traffic going to and from network interfaces in your VPC
    •AWS WAF — Provides firewall protection for web applications (Web Application Firewall)
    •AWS Firewall Manager — Provides centralized management of AWS WAF
    •VPC Peering Connections — Enables networking connection between two VPCs so that you can route traffic between them
    •VPC Endpoints — Enables users to connect with AWS services that are outside the VPC through a private link
    •AWS VPN Connections — Allows you to connect your Amazon VPC to remote networks via VPN
    •AWS Direct Connect — Serves as a dedicated, private connection from a remote network to your VPC
    We will help you understand how networking security works within the Amazon cloud and with connections to the outside world. We will also discuss the need to keep all this straight, understood, consistent and configure to reflect your security intent accurately.
  • SCdemocast: Continuous Security for the Hybrid Enterprise
    SCdemocast: Continuous Security for the Hybrid Enterprise
    Tim Woods - Vice President, Technology Alliances, FireMon Recorded: Oct 25 2018 30 mins
    The cloud is a notable business advantage, but it does bring numerous security concerns including: a lack of visibility across cloud or between on-premises and cloud environments, monitoring security controls and changes within cloud and multi-cloud environments, and maintaining compliance by monitoring cloud traffic for suspicious and non-compliant behavior. It becomes increasingly complex in hybrid environments because now you're managing security for on-premise, cloud, virtual, container environments, and more. The time commitment can feel staggering.

    It doesn't have to, however.

    Register for this webcast where we will show you the path to more effective cloud security in hybrid enterprises through a mix of:

    Vulnerability management: See how an attacker could exploit and prioritize your patches;
    Continuous compliance: Define your own cloud security controls and reduce the time spent on audit prep by making your cloud continuously audit-ready and adherent to the intentions and goals of the enterprise;
    Automation and orchestration: Ingest behavior details from your cloud, then command security controls to cloud systems from a single console. The idea is instant, worry-reducing cloud control.
  • Improve Visibility to Reduce Vulnerabilities and Protect Patient Data
    Improve Visibility to Reduce Vulnerabilities and Protect Patient Data
    Sanjay Raja, CMO, Lumeta Recorded: Oct 11 2018 47 mins
    Cybercriminals target the data-rich healthcare industry disproportionately. Healthcare IT organizations, already burdened with budget constraints and the scarcity of technically proficient staff, must also contend with significant blind spots within their own networks. These blind spots occur everywhere, from endpoints into the cloud, and every blind spot increases the opportunity for attacks such as ransomware to be successful. Eliminating those blind spots requires healthcare organizations to identify all of their wired, wireless, mobile and medical devices in real-time. With comprehensive context available, organizations can help prevent breaches before, during and after an attack. Lumeta has been deployed at some of the largest enterprises and government agencies based on our ability to eliminate 100% of your IP network and connected device visibility gaps, improve your overall security posture, and reduce the risk of patient data theft.
  • Immediate Insight App Available on the Palo Alto Networks Application Framework
    Immediate Insight App Available on the Palo Alto Networks Application Framework
    Jeff Barker, Vice President, Product Management - Immediate Insight Recorded: Oct 8 2018 18 mins
    Optimized for the Palo Alto Networks Application Framework, Immediate Insight is an analytics-enabled app that enables security teams to seamlessly combine and analyze cloud-resident and private infrastructure data to accelerate discovery and response to security threats.
  • A Zero Trust Approach to Decoupling Intent from Implementation
    A Zero Trust Approach to Decoupling Intent from Implementation
    Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon Recorded: Sep 20 2018 60 mins
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.

Embed in website or blog