The only constant is change. Product deployments come and go and get moved as a result of data center reorganizations, mergers & acquisitions and migration to the cloud – and even retromigrations from cloud to on-prem.
Every time this happens it’s very easy for new risk to be created in your network.
If you want to avoid the fate of companies like Equifax, Target and many others, one of the crucial steps is proper network segmentation on the inside of your network – let alone connection to public clouds and virtual networks in the cloud.
But a properly segmented, global network security policy is difficult. And keeping that policy up-to-date is even more difficult. In this webinar, we’ll explore how to address this risky burden.
Whenever you deploy or move a technology, product or workload here’s what you need to do:
1. Identify new network connections required
2. Understand the actual traffic requirements – especially in terms of protocols
3. Determine who needs to communicate with the workload and in which directions. By who, we mean sets of users, regions, datacenters, segments, application servers, etc.
4. What are the security differentials between the communicating entities?
5. Are additional enforcement points required?
We will drill down into each of these steps and then Tim Woods and Josh Williams from FireMon will show you how the Global Policy Controller gives you a birds-eye view of your entire hybrid network by bringing every enforcement point and its arcane configuration onto a single pane of glass, driven by your actual intent.