Hi [[ session.user.profile.firstName ]]

Demystifying Network Security in Hybrid Cloud Environments

Enterprises are expanding their next generation data centers into the public cloud, to increase business agility and reduce costs. But many organizations are struggling to understand how to effectively extend their corporate security policy across a hybrid environment.

Join Mike Rothman, President of Securosis, a leading information security research and advisory firm, and Nimmy Reichenberg, VP of Strategy at AlgoSec for an educational webinar where they will demystify some of the challenges organizations face when deploying business applications in the public cloud. During the webinar we will cover:

• What you don’t know: How network security works in the public cloud vs. on-premise data centers.
• What you need to do: Tips to help you prepare for deploying business applications across hybrid cloud environments.
• What you need to think about: Key strategies and best practices to help you ensure a smooth transition to a hybrid environment over the next 12-24 months.
Recorded Oct 23 2014 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Rothman, President of Securosis and Nimmy Reichenberg VP Strategy AlgoSec
Presentation preview: Demystifying Network Security in Hybrid Cloud Environments
  • Channel
  • Channel profile
  • Aligning Security With Your Business Processes – a Technical Perspective Recorded: Dec 8 2016 46 mins
    Joe DiPietro, SE Director at AlgoSec
    In this era of digital transformation, globalization, and relentless cyber-attacks, security can no longer remain a technology issue that simply focuses on defending networks and data. It must become a strategic, business driver that transforms the next generation datacenter to both protect and power the agile enterprise. Security teams are therefore now looking to implement intelligent automation that injects business context into their security management.

    Join Joe DiPietro, SE Director at AlgoSec on Thursday, December 8 at 11am EST for a technical webinar, where he will discuss a business-driven approach to security policy management – from automatically discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning – that will help make your organizations more agile, more secure and more compliant.

    During the webinar, Joe will explain how to:
    * Get holistic visibly of security risk and compliance across the enterprise network
    * How to reduce risk and avoid application outages
    * Tie cyber threats to business processes
    * Enhance and automate security processes with business context, including impact analysis and risk approval
    * Accelerate and ensure secure business transformation to the cloud
  • Migrating application connectivity and network security to AWS Recorded: Nov 10 2016 48 mins
    Prof. Avishai Wool
    It’s now a given – most enterprises are moving at least some of their business applications to the cloud. Yet while the cloud is an extremely agile platform, it also adds a new level of complexity. Because, when it comes to network security, the cloud introduces a software-defined security architecture that is fundamentally different from the organization’s existing on-prem network. As a result, many enterprises are now struggling to migrate application connectivity to the cloud, and then manage cloud security controls alongside their traditional firewalls in a way that ensures security and compliance across their entire hybrid architecture.

    Presented by renowned industry expert Prof. Avishai Wool, this new webinar will provide technical insight and security best practices for migrating and managing security across a hybrid on-premise - Amazon Web Services (AWS) environment:

    This webinar will cover:
    •Understanding network security before, during and after migrating your applications to AWS
    •How to identify and migrate the relevant application connectivity flows to AWS
    •Managing AWS Security Groups alongside your traditional firewalls – uniformly and securely
    •Making the most of AWS Network ACLs – to enhance traffic filtering and maximize capacity
  • Dos and Don’ts for Managing External Connectivity to/from Your Network Recorded: Oct 6 2016 46 mins
    Professor Avishai Wool - CTO and Co-Founder AlgoSec
    In today’s global market place your organization needs network connectivity with external entities – suppliers, credit card processing companies, business partners, data feeds etc. But are you really sure these connections are secure and compliant, and that they are not inadvertently creating holes in your network and exposing your organization to cyber criminals?

    Join renowned industry expert Professor Avishai Wool for this technical webinar which will cover best practices for managing external connectivity to and from your network, including:
    •Defining the right infrastructure, network segmentation, security controls and additional security protections
    •Managing changes to connectivity for third party applications or data feeds
    •Routing partner traffic through your network
    •Auditing and compliance challenges for both you and your partner
    •Technical considerations for managing the business and legal aspects of third party connectivity
  • How to migrate and manage security policies in a segmented data center Recorded: Aug 23 2016 53 mins
    Professor Avishai Wool, AlgoSec CTO
    Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX, now a reality it's now far easier and quicker to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.
    Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.
    During the webinar Professor Wool will cover how to:
    · Identify and securely migrate legacy applications to a micro-segmented data center
    · Effectively define and enforce security policies for East-West traffic
    · Manage the micro-segmented data center alongside traditional on-premise security devices
    ·Identify risk and manage compliance in a micro-segmented data center
    · Use network segmentation to reduce the scope of regulatory audits
    · Identify and avoid common network segmentation mistakes
  • Learn how an app-centric approach will improve security & operational efficiency Recorded: Jul 26 2016 51 mins
    Joe DiPietro, SE Director at AlgoSec
    The constant barrage of application connectivity and security policy change requests, not to mention the relentless battle against cyber-attacks have made the traditional approach to managing security untenable. In order keep your business both agile and secure – across today’s highly complex and diverse enterprise networks – you must focus your security management efforts on what matters most – the applications that power your business.

    Join Joe DiPietro, SE Director at AlgoSec on Tuesday, July 26 at 11am EDT for a technical webinar, where he will discuss an application-centric, lifecycle approach to security policy management – from automatically discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning – that will help you improve your security maturity and business agility. During the webinar, Joe will explain how to:
    • Understand the security policy management lifecycle and its impact on application availability, security and compliance
    • Auto-discover and map business applications and their connectivity flows – and why it’s important
    • Securely migrate business application connectivity and security devices to a new data center
    •Get a single pane of glass that aligns application connectivity with your security device estate
    • Identify risk and vulnerabilities and prioritize them based on business criticality
  • Best Practics for Automating Next Generation Firewall Change Processes Recorded: May 18 2016 45 mins
    Mosh Itah, Product Line Manager at Palo Alto Networks and Edy Almer, VP Product at AlgoSec
    Palo Alto Networks’ next generation firewalls (NGFW) enable security to be managed with extensive policy granularity. However, replacing or migrating traditional firewall policies to next-generation firewall policies is a complex task that often involves thousands of rules and definitions.

    AlgoSec seamlessly integrates with Palo Alto Networks NGFWs to simply and intelligently automate App-ID and User-ID security policy change workflows, business application connectivity mapping and compliance reporting across on-premise and cloud environments.

    Hear Mosh Itah, Product Line Manager at Palo Alto Networks and Edy Almer, VP Product at AlgoSec discuss how to:


    •Centrally manage security policies across multiple devices through Palo Alto Networks Panorama
    •Automate policy changes, including hands-free policy push directly to Palo Alto Networks' devices
    •View and manage your security policies holistically across a mix of traditional and Next Gen firewalls and cloud security controls
    •Allow large geographically-dispersed teams to cooperatively manage security policy changes
  • Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance Recorded: Apr 19 2016 48 mins
    Professor Avishai Wool, AlgoSec CTO
    PCI-DSS audits are typically a point-in-time “fire drill”, yet the PCI-DSS standards body expects a continuous state of compliance. Unfortunately poor change management processes are often the Achilles Heel in reaching and maintaining this nirvana.

    Presented by the renowned industry expert Professor Avishai Wool, this technical webinar will provide best practices and demonstrate specific techniques to help you ensure both a successful audit and maintain a state of continuous compliance with the upcoming PCI-DSS 3.2 standards.

    During the webinar Professor Wool will cover:
    * What you need to know about the upcoming PCI-DSS version 3.2
    * How to ensure your network is compliant now, and maintains continuous compliance
    * Identifying the latest vulnerabilities and assessing risk before the auditor does
    * How to reduce the scope of your audit, and instantly generate audit-ready reports
    * PCI and the cloud – some do’s and don’t’s
  • Why Security Policy Management Must be Application-Centric Recorded: Mar 28 2016 58 mins
    Mark Bouchard, Founder of AimPoint Group & Nimmy Reichenber, VP Strategy at AlgoSec
    In this webcast AlgoSec and Mark Bouchard of AimPoint Group examine the impact of taking an application-centric approach to security policy management, with tips for improving the visibility, management and security related to complex business application connectivity needs.
  • How to Help Security Keep Up with the Pace of Business Changes Recorded: Mar 15 2016 46 mins
    Joe DiPietro, Director America's SE at AlgoSec
    Do security changes take days or even weeks to process? Are you being bombarded with requests for connectivity changes for new business applications? Are misconfigurations causing costly business outages or creating dangerous holes in your security perimeter?

    Currently many Security professionals struggle with manual security changes processes as they sift through hundreds and often thousands of firewall rules and access lists. The result: slow response to business requests, and costly mistakes that cause outages and introduce risk.

    This technical webinar will provide best practices and tips to help you eliminate the risks of network security policy changes. You’ll learn:
    * Common risks to avoid when making changes to your network security devices
    * How to better understand business requirements from the network security perspective
    * How to easily discover existing application connectivity flows and easily and automatically change them
    * How to accelerate change requests and ensure security and compliance through automation

    Attend this webinar and say goodbye to complexity, manual processes and misconfigurations… and hello to security, agility and business productivity.
  • How to Avoid Business Outages from Misconfigured Network Devices Recorded: Jan 13 2016 42 mins
    Joe DiPietro, Director America's SE at AlgoSec
    A single change to a network device can have a far reaching effect on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news!
    This technical webinar will walk you a variety of use cases where device misconfigurations typically occur, including a basic device change, business application connectivity changes, and data center migrations. It will provide both best practices and demonstrate specific techniques to help you understand and avoid misconfigurations and ultimately prevent damage to your business, including how to:
    * Understand and map your enterprise infrastructure topology before you make a change
    * Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    * Common mistakes to avoid when making changes to your network security devices
    * How to better understand business requirements from the network security perspective
  • Reduce Your Attack Surface by Getting Back to Basics Recorded: Dec 17 2015 57 mins
    Professor Avishai Wool, AlgoSec
    Most firewall breaches are caused by firewall misconfigurations and a lack of segmentation across their networks. In fact only a handful of attacks truly use sophisticated techniques. So getting security basics right will deliver far better protection against cyberattacks compared with many of the latest shiny new security technologies.

    Presented by the renowned industry expert Professor Avishai Wool, this technical webinar will walk you through a typical cyber threat scenario faced by millions of business every single day. It will provide both best practices and demonstrate specific techniques to help you reduce your attack surface and limit and even prevent damage to your business.

    During the webinar Professor Wool will:
    * Present the different methods used by cyber criminals to penetrate your network security
    * Trace and analyze the anatomy of a typical advanced persistent threat (APT)
    * Discuss best practices for reducing cyber criminals’ lateral movements with your network
    * Provide tips and demonstrate techniques for reducing your attack surface using existing security solutions
  • A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment Recorded: Nov 17 2015 63 mins
    Rich Mogull, Analyst & CEO, Securosis; Nimmy Reichenberg, VP Strategy, AlgoSec
    How we think about and architect network security has stayed fairly constant for quite some time.

    Until we moved to the cloud.

    Things may look the same on the surface, but dig a little deeper and you quickly realize that network security for cloud computing and hybrid networks requires a different mindset, different tools, and a new approach. Hybrid networks complicate management, both in your data center and in the cloud. Each side uses a different basic configuration and security controls, so the challenge is to maintain consistency across both, even though the tools you use – such as your nifty next generation firewall – might not work the same (if at all) in both environments.

    Presented by AlgoSec and Rich Mogull, Analyst and CEO at Securosis, this webinar explains how cloud network security is different, and how to pragmatically manage it for both pure cloud and hybrid cloud networks. We will start with some background material and Cloud Networking 101, then move into cloud network security controls, and specific recommendations on how to use and manage them in a hybrid environment.
  • How to Accelerate Migrations and Security Management in the Virtual Data Center Recorded: Aug 24 2015 53 mins
    Rick Holland, Principal Analyst, Forrester Research & Nimmy Reichenberg VP Strategy, AlgoSec
    In this webcast, Forrester Research Analyst Rick Holland and AlgoSec’s Nimmy Reichenberg examine:
    - Virtualization and consolidation in the data center
    - The concept of zero trust and what it means to you
    - Security policy orchestration
    - An overview of the AlgoSec Suite and how it simplifies migrations and ongoing data center operations
  • Dos and Don’ts for Managing External Connectivity to/from Your Network Recorded: Aug 4 2015 44 mins
    Professor Avishai Wool - CTO and Co-Founder AlgoSec
    In today’s global market place your organization needs network connectivity with external entities – suppliers, credit card processing companies, business partners, data feeds etc. But are you really sure these connections are secure and compliant? Are you really sure they are not inadvertently creating holes in your network and exposing your organization to cyber criminals? The Target breach – and many others like it – should at least make you double check your practices.

    Presented by the renowned industry expert Professor Avishai Wool, this technical webinar will cover best practices for managing external connectivity lifecycle to and from your network, including:

    • Defining the right infrastructure, network segmentation, security controls and additional security protections
    • Managing changes to connectivity for third party applications or data feeds
    • Routing partner traffic through your network
    • Auditing and compliance challenges for both you and your partner
    • Technical considerations for managing the business and ownership aspects of third party connectivity
  • Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective Recorded: May 28 2015 60 mins
    Adam Gaydosh,QSA and Director of Professional Services at Anitian and Nimmy Reichenberg, VP of Strategy at AlgoSec
    Ever wish you could get inside your QSA’s head before your next PCI audit?
    Join QSA Adam Gaydosh of Anitian, and Nimmy Reichenberg, VP of Strategy at AlgoSec to get the inside scoop on what QSAs are looking for when they audit you. Aimed at security and networking professionals, this webinar will provide insider tips and tricks to help you prepare for and pass your audit – wherever your credit card data is stored – and remain continuously compliant even if you’re breached.

    Don’t miss the chance to hear about the pitfalls your colleagues have already faced, and how to make the audit experience less stressful, including:
    - Less is more: demystifying the scope of a PCI audit
    - What’s in and what’s out: Segmenting your network for compliance
    - Best practices for configuring your security infrastructure
    - PCI in the public cloud – it’s not an oxymoron
  • The Security Policy Management Maturity Model Recorded: Apr 2 2015 58 mins
    Eric Ogren of the Ogren Group & Nimmy Reichenberg VP Strategy at AlgoSec
    The Security policy management maturity model can help you better understand your current network environment and provide you with a roadmap for improving both your security AND agility. In this webcast, Eric Ogren of the Ogren Group and AlgoSec’s VP Strategy and Marketing, Nimmy Reichenberg, examine:
    - The four stages of the maturity model
    - How to compare your environment to the different stages
    - Tips for orchestrating security policy management
    - Examples of benefits achieved by "moving up the curve"
  • Five Steps to a Zero Trust Network - From Theory to Practice Recorded: Mar 17 2015 53 mins
    Guest Speaker: John Kindervag, VP & Principal Analyst at Forrester Research, and Nimmy Reichenberg, VP of Strategy at AlgoSec
    A Zero Trust network abolishes the quaint idea of a “trusted” internal network demarcated by a corporate perimeter. Instead it advocates microperimeters of control and visibility around the enterprise’s most sensitive data assets and the ways in which the enterprise uses its data to achieve its business objectives.
    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester Research, and Nimmy Reichenberg, VP of Strategy at AlgoSec will explain why a Zero Trust network should be the foundation of your security strategy, and present best practices to help companies achieve a Zero Trust state.

    The webinar will cover:
    • What is a Zero Trust network, and why it should be a core component of your threat detection and response strategy
    • Turning theory into practice: Five steps to achieve Zero Trust information security
    • How security policy management can help you define and enforce a Zero Trust network
  • How to Take the Fire Drill out of Making Firewall Changes Recorded: Mar 3 2015 57 mins
    Nimmy Reichenberg, VP Strategy, AlgoSec
    This webcast examines the critical steps for an ideal security change workflow and offers ways to automate the entire firewall change management process. It includes a demonstration of the AlgoSec Security Management Suite, using a real-life firewall change request.
  • AWS Security Fundamentals: Dos and Don’ts Recorded: Feb 24 2015 61 mins
    Dr. Avishai Wool, CTO & Co-Founder, AlgoSec
    Enterprise-sanctioned application deployments on Infrastructure as a Service (IaaS) cloud platforms are fast becoming a reality. But while IaaS’s flexibility and cost-savings benefits are important, its success as a business solution hinges on its security.

    Presented by the renowned industry expert Dr. Avishai Wool, this technical webinar will cover security best practices for the Amazon Web Services (AWS) IaaS, including:

    • The AWS firewall: what is it, how it differs from traditional firewalls, how it works, and tips for how to use it based on your business and technical needs
    • AWS Security Groups: understanding them, recommendations for how to structure Security Groups to gain visibility and control of security polices effectively
    • Integrating AWS into your enterprise data center: recommendations for setup, organization and configuration considerations on AWS
    • Auditing and compliance: tools and techniques for tracking security policies across the hybrid data center
  • Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers Recorded: Jan 27 2015 31 mins
    Avishai Wool, CTO & Co-Founbder, AlgoSec
    The PCI standard has a direct impact on an organization’s network security architecture and security policies. And it requires organizations to be in continuous compliance.

    In this 30-minute webcast you will learn:
    - The main additions and changes to the standard
    - The impact of cloud on a PCI environment
    - How to automate the PCI-DSS audit process
    - How to ensure continuous compliance
Security Policy Management
AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1,500 of the world’s leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Demystifying Network Security in Hybrid Cloud Environments
  • Live at: Oct 23 2014 4:00 pm
  • Presented by: Mike Rothman, President of Securosis and Nimmy Reichenberg VP Strategy AlgoSec
  • From:
Your email has been sent.
or close