Hi [[ session.user.profile.firstName ]]

Segmenting your Network for Security - The Good, the Bad and the Ugly

Segmenting your network is one of the foundations of a sound security strategy. It limits the movements of an attacker, and therefore limits the overall impact of a security breach.
So why is it that most organizations struggle when it comes to defining, implementing and enforcing effective network segmentation?

Listen to expert penetration tester Mark Wolfgang and AlgoSec, to learn:

- How poor network segmentation allowed complete control of a major metropolitan's sensitive systems
- Common network segmentation mistakes organizations make every day
- How to strategically segment your network for security
- How to enforce network segmentation using automated security policy management
Recorded Dec 16 2014 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark Wolfgang, President/CEO Shorebreak Security and Nimmy Reichenberg VP Strategy, AlgoSec
Presentation preview: Segmenting your Network for Security - The Good, the Bad and the Ugly
  • Channel
  • Channel profile
  • Tightening security posture with micro-segmentation Jan 27 2021 10:00 am UTC 60 mins
    Jan Heijdra, Cisco Security Specialist . Yitzy Tannenbaum, Product Marketing Manager
    Micro-segmentation protects your network by limiting the lateral movement of ransomware and other threats in your network. Yet successfully implementing a defense-in-depth strategy using micro-segmentation may be complicated.
    In this second webinar in a series of two webinars about ransomware, Yitzy Tannenbaum, Product Marketing Manager from AlgoSec and Jan Heijdra, Cisco Security Specialist, will provide a blueprint to implementing micro-segmentation using Cisco Secure Workload (formerly Cisco Tetration) and AlgoSec Network Security Policy Management.

    Join our live webinar to learn:
    • Why micro-segmentation is critical to fighting ransomware
    • Understand your business applications to create your micro-segmentation policy
    • Validate your micro-segmentation policy is accurate
    • Enforce these granular policies on workloads and summarized policies across your infrastructure
    • Use risk and vulnerability analysis to tighten your workload and network security
    • Identify and manage security risk and compliance in your micro-segmented environment
  • Reducing Risk of Ransomware Attacks - Back to Basics Jan 13 2021 10:00 am UTC 60 mins
    Jan Heijdra, Cisco Security Specialist. Yitzy Tannenbaum, Product Marketing Manager
    Did you know that 50% of organizations were hit by ransomware attacks in 2020? These attacks have become more sophisticated, as attackers change tactics from “spray and pray” to more targeted server-based attacks. So how do you protect your network from such attacks?
    We invite you to join our series of webinars about ransomware with AlgoSec and Cisco, to learn practical methods to reduce your network attack surface and protect your organization from ransomware and other cyber-attacks.
    In our first webinar in the series, Yitzy Tannenbaum, Product Marketing Manager from AlgoSec and Jan Heijdra, Cisco Security Specialist , will take you back to the basics. They will discuss:
    • Popular methods used to infect your network with ransomware
    • The importance of a layered defense-in-depth strategy
    • Best practices for managing your security devices
    • How to build a security wall with Cisco Secure and AlgoSec Network Security Policy Management to block ransomware
  • Case Study: The NCR journey to effective and agile network security Dec 17 2020 3:00 pm UTC 72 mins
    Yitzy Tannenbaum, Product Marketing Manager (AlgoSec), Scott Theriault, Global Manager, Network Perimeter Security (NCR Corp)
    Managing security in a multi-billion-dollar enterprise poses many challenges, as well as opportunities. Go inside an S&P 500 company and hear how they manage their network security.

    Join Scott Theriault, Global Manager, Network Perimeter Security at NCR Corporation as he shares his real-world experience managing security in a global organization with Yitzy Tannenbaum, Product Marketing Manager at AlgoSec. Get insights on:
    - Key factors managing network security in complex organizations
    - The benefits of network policy optimization
    - Importance of maintaining and demonstrating compliance
    - Change management and automation in large, complex networks
    - Driving alignment of cloud and on-premises security
  • [Panel] How Financial Institutions Can Achieve Network Security and Compliance Recorded: Nov 26 2020 22 mins
    Asher Benbenisty, Director of Product Marketing and Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Financial institutions have strict network security requirements, which sometimes hinder innovation and digital transformation. Security and regulatory requirements act as a barrier to innovation. However, financial institutions can enable business innovation, while still achieving network security and compliance.
    Watch AlgoSec’s panel discussion, as Asher Benbenisty, Director of Product Marketing, and Yitzy Tannenbaum, Product Marketing Manager, discuss how financial institutions can simplify the network security management, reduce risk and ensure continuous compliance.
    They will discuss:
    • How intelligent automation helps overcome security management intricacy
    • How to make sure network changes meet compliance requirements and pass regulatory audits the first time
    • Industry metrics so you can benchmark your own organization as well as see how the finance sector compares to other industries
    • Case studies from other financial institutions
  • MSSP Cloud Server Migration: Onboarding Your Customer Recorded: Nov 18 2020 32 mins
    Tim Bloomer, MSSP Sales Engineer and Jason Weller, MSSP Sales Director
    Using the firewall policies to guide the data center migration can let the network security team lead the migration process. Even in the most poorly documented data centers, the firewall rules can provide crucial clues to other IT teams as to which applications will be affected by migrating a server, and which groups of servers will benefit from being migrated simultaneously.
    Join Tim Bloomer, MSSP Sales Engineer at AlgoSec, and Jason Weller, MSSP Sales Director at AlgoSec, as they show you why to migrate your customer’s physical data center (or at least some critical applications within the data center) to a virtual data center:
    • Improving disaster-recovery capabilities
    • Addressing regulatory requirements for keeping certain customers’ personal data in-country rather than offshore
    • Reducing operating costs
  • CTO Round Table: Fighting Ransomware with Micro-segmentation Recorded: Nov 17 2020 58 mins
    Ariel Zeitlin, CTO (Guardicore) | Avishai Wool, CTO & Co-founder (AlgoSec)
    In the past few months, we’ve witnessed a steep rise in ransomware attacks targeting anyone from small companies to large, global enterprises. It seems like no organization is immune to ransomware. So how do you protect your network from such attacks?

    Join our discussion with AlgoSec CTO Prof. Avishai Wool and Guardicore CTO Ariel Zeitlin, and discover how micro-segmentation can help you reduce your network attack surface and protect your organization from cyber-attacks.


    Learn:
    • Why micro-segmentation is critical to fighting ransomware and other cyber threats.
    • Common pitfalls organizations face when implementing a micro-segmentation project
    • How to discover applications and their connectivity requirements across complex network environments.
    • How to write micro-segmentation filtering policy within and outside the data center
  • Cloud migrations made simpler: Safe, Secure and Successful Migrations Recorded: Oct 28 2020 36 mins
    Avivi Siman-Tov, Director of Product (AlgoSec)
    Migrating applications to the cloud – without creating security holes, application outages or violating compliance – is within reach!

    In this webinar, Avivi Siman-Tov, Director of Product at AlgoSec, will guide you how to simplify and accelerate large-scale complex application migration projects.

    The webinar will cover:
    • Why organizations choose to migrate their applications to the cloud
    • What is required in order to move the security portion of your application and how long it may take
    • Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved
    • How to deliver unified security policy management across the hybrid cloud environment
  • Implement a Zero-Trust Network - in 5 steps Recorded: Oct 21 2020 58 mins
    Chase Cunningham, Principal Analyst (Forrester Research), Prof. Avishai Wool, Co-founder & CTO (AlgoSec)
    A zero-trust architecture mitigates risk by only providing the minimally required access to your network resources. But implementing zero-trust is easier said than done.

    Get practical tips to successfully implement zero-trust architecture in this webinar featuring Chase Cunningham of Forrester Research and Prof. Avishai Wool, AlgoSec’s co-founder and CTO.

    In this session, they will discuss why zero-trust architecture is the blueprint for an effective security strategy, challenges implementing zero-trust architecture, as well as provide the five practical steps to successfully implementing zero-trust architecture:

    • Taking an inventory of your sensitive data and deciding how to segment it
    • Mapping the traffic flows of your sensitive data and associate them to your business applications
    • Designing and enforcing your network’s micro-perimeters
    • Ensuring all your security ecosystem integrates so you can holistically monitor and adjust your network if threats are detected
    • Embracing security automation and orchestration for long-term success
  • Radically Reduce Firewall Rules with Application-Driven Rule Recertification Recorded: Oct 14 2020 41 mins
    Asher Benbenisty, Director of Product Marketing (AlgoSec)
    Does your network still have obsolete firewall rules? Do you often feel overwhelmed with the number of firewall rules in your network?

    To make sure your network is secure and compliant, you need to regularly review and recertify firewall rules. However, manual firewall rule recertification is complex, time-consuming and error-prone, and mistakes may cause application outages.

    Discover a better way to recertify your firewall rules with Asher Benbenisty, AlgoSec’s Director of Product Marketing, as he discusses how associating application connectivity with your firewall rules can radically reduce the number of firewall rules on your network as well as the efforts involved in rule recertification.

    In this webinar, we will discuss:
    * The importance of regularly reviewing and recertifying your firewall rules
    * Integrating application connectivity into your firewall rule recertification process
    * Automatically managing the rule-recertification process using an application-centric approach
  • Overcoming the Challenges of Managing a Hybrid Environment Recorded: Sep 30 2020 56 mins
    Omer Ganot, Cloud Security Product Manager (AlgoSec), Stuti Deshpande, Partner Solution Architect (AWS)
    Public clouds such as Amazon Web Services (AWS) are a critical part of your hybrid network. It is important to keep out the bad guys (including untrusted insiders) and proactively secure your entire hybrid network.

    Securing your network is both the responsibility of the cloud providers, as well as your organization’s IT and CISOs – the shared responsibility model. As a result, your organization needs visibility into what needs to be protected, as well as an understanding of the tools that are available to keep them secure.

    In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande's, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment, including how to:

    • Securely migrate workloads from on-prem to public cloud
    • Gain unified visibility into your network topology and traffic flows, including both public cloud and on-premises assets, from a single console.
    • Manage/orchestrate multiple layers of security controls and proactively detect misconfigurations
    • Protect your data, accounts, and workloads from misconfiguration risks
    • Protect web applications in AWS by filtering traffic and blocking common attack patterns, such as SQL injection or cross-site scripting
    • Gain a unified view of your compliance status and achieve continuous compliance
  • [Panel] How Financial Institutions Can Achieve Network Security and Compliance Recorded: Sep 8 2020 23 mins
    Asher Benbenisty, Director of Product Marketing and Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Financial institutions have strict network security requirements, which sometimes hinder innovation and digital transformation. Security and regulatory requirements act as a barrier to innovation. However, financial institutions can enable business innovation, while still achieving network security and compliance.
    Watch AlgoSec’s panel discussion, as Asher Benbenisty, Director of Product Marketing, and Yitzy Tannenbaum, Product Marketing Manager, discuss how financial institutions can simplify the network security management, reduce risk and ensure continuous compliance.
    They will discuss:
    • How intelligent automation helps overcome security management intricacy
    • How to make sure network changes meet compliance requirements and pass regulatory audits the first time
    • Industry metrics so you can benchmark your own organization as well as see how the finance sector compares to other industries
    • Case studies from other financial institutions
  • Network Security Vision with Application Visibility Recorded: Aug 30 2020 52 mins
    Avishai Wool, CTO & Co-founder (AlgoSec) & Yoni Geva, Product Manager (AlgoSec)
    You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.

    But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?

    Stop running blind. Expand your vision with application visibility.

    With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.

    In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate how to overcome these challenges and ensure business continuity through application visibility.

    Join the webinar and learn how to:
    • Associate your business applications with your security policy rules.
    • Identify the network traffic relevant for each application.
    • Identify hidden risks and vulnerabilities in your applications.
    • Associate compliance violations with the relevant business applications.
    • Improve troubleshooting by identifying affected applications.
    • Better document the applications on your network.
  • Firewall Rule Recertification with Application Connectivity Recorded: Aug 20 2020 19 mins
    Asher Benbenisty, Director of Product Marketing (AlgoSec)
    Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.

    However, manual firewall rule recertification is complex, time-consuming and prone to errors.

    Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.

    In this webinar Asher will cover:
    • Why it is important to regularly review and recertify your firewall rules
    • How to use application connectivity for firewall rule recertification
    • How to automatically manage the rule-recertification process
  • Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar Recorded: Jul 22 2020 61 mins
    Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec)
    Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.

    They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.

    Join our live webinar to learn how to:
    • Understand your business applications to create your microsegmentation policy
    • Validate your micro-segmentation policy is accurate
    • Enforce these granular policies on workloads and summarized policies across your infrastructure
    • Use risk and vulnerability analysis to tighten your workload and network security
    • Identify and manage security risk and compliance in your micro-segmented environment

    Save your seat!
  • Automate Firewall Compliance and Remediation Reporting for MSSP Customers Recorded: Jul 14 2020 34 mins
    Tim Bloomer, MSSP Sales Engineer and Jason Weller, MSSP Sales Director
    The highly competitive nature of the MSSP market has service providers evaluating new methods to increase their margins and minimize their customer’s churn. Managing complex customer networks requires significant hands-on, manual efforts. Managed service offerings such as policy change requests have become a commodity.

    Join Tim Bloomer, MSSP Sales Engineer at AlgoSec, and Jason Weller, MSSP Sales Director at AlgoSec, as they show you how MSSPs integrate AlgoSec’s intelligent network security policy automation into their operations to deliver security policy changes in minutes instead of days. MSSPs can reduce their average cost and while cutting the time needed to make firewall change requests and increase their customer satisfaction at the same time. Join in and learn how to make this a reality.
  • Micro-segmentation – from Strategy to Execution Recorded: Jul 7 2020 60 mins
    Avishai Wool, CTO & Co-founder (AlgoSec)
    Organizations heavily invest in security solutions to keep their networks safe, but still struggle to close the security gaps. Micro-segmentation helps protect against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren’t sure where to begin or what approach to take.

    In this practical webinar, Prof. Avishai Wool, AlgoSec’s CTO and co-founder will guide you through each stage of a micro-segmentation project – from developing the correct micro-segmentation strategy to effectively implementing it and continually maintaining your micro-segmented network.

    Register now for this live webinar and get a practical blueprint to creating your micro-segmentation policy:

    • What is micro-segmentation.
    • Common pitfalls in micro-segmentation projects and how to avoid them.
    • The stages of a successful micro-segmentation project.
    • The role of policy change management and automation in micro-segmentation.

    Don't forget to also click on the links in the Attachments tab.
  • 5 Practical Steps to Implementing a Zero-Trust Network - with Forrester Research Recorded: Jun 30 2020 59 mins
    Chase Cunningham, Principal Analyst (Forrester Research), Prof. Avishai Wool, Co-founder & CTO (AlgoSec)
    A zero-trust architecture mitigates risk by only providing the minimally required access to your network resources. But implementing zero-trust is easier said than done.

    Get practical tips to successfully implement zero-trust architecture in this webinar featuring Chase Cunningham of Forrester Research and Prof. Avishai Wool, AlgoSec’s co-founder and CTO.

    In this session, they will discuss why zero-trust architecture is the blueprint for an effective security strategy, challenges implementing zero-trust architecture, as well as provide the five practical steps to successfully implementing zero-trust architecture:

    • Taking an inventory of your sensitive data and deciding how to segment it
    • Mapping the traffic flows of your sensitive data and associate them to your business applications
    • Designing and enforcing your network’s micro-perimeters
    • Ensuring all your security ecosystem integrates so you can holistically monitor and adjust your network if threats are detected
    • Embracing security automation and orchestration for long-term success
  • Cisco & AlgoSec Achieving application-driven security across your hybrid network Recorded: Jun 10 2020 63 mins
    Roxana Diaz, Worldwide Technical Solutions Architect (Cisco), Yonatan Klein, Director of Product (AlgoSec)
    Your network extends into hybrid environments and may include private clouds running Cisco ACI, and on-premises devices. Managing network security policies in your multi-vendor estate is complex.

    Because your network is made up of multiple vendors and each part of your network estate is managed in its own silo, it is tough to get centralized management of your entire network. Making changes is a chore and validating security is difficult.

    Learn how to unify, consolidate, and automate your entire network security policy management across your Cisco and multi-vendor estate.

    In this session Roxana Diaz, Worldwide Technical Solutions Architect at Cisco, and Yonatan Klein, AlgoSec’s Director of Product, will discuss how to manage the Cisco and multi-cloud estate and how to:
    • Capitalize on your Cisco ACI investment to take advantage of its full capabilities
    • Bring centralized visibility, automation, and compliance monitoring into your Cisco and multi-vendor network ecosystem
    • Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it, including Cisco firewalls and routers, as well as multi-vendor devices.
    • Take advantage of Cisco Tetration Analytics and AlgoSec’s intelligent discovery to get a full picture of your network and application traffic and to design and provision a micro-segmentation network policy design.
    • Unify, consolidate, and automate your network security policy management
    • Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations

    Be sure to check out the Attachments tab for more resources.
  • Panel: Network Security and Compliance best practices for Financial Institutions Recorded: Jun 4 2020 23 mins
    Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.

    There’s a better way to manage your network security!

    Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.

    Topics include:

    • How to overcome security management complexities with automation
    • How to pass compliance audits in the face of demanding regulations
    • Key industry metrics that compare security environments within and beyond the finance industry
    • Real financial customers case studies
  • Cut the Clutter with ChatOps & Improve Network Security Recorded: May 13 2020 26 mins
    Dania Ben Peretz, Product Manager (AlgoSec)
    IT teams’ alerts are overflowing with questions about network status from coworkers. Say no to overwhelming alerts in multiple applications. There is a better way to get critical answers about the state of your network: ChatOps.

    ChatOps, using your existing chat tools such as Slack or Microsoft Teams, can get the crucial questions answered, and not have to track multiple apps separately.

    In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, will demonstrate the latest in AlgoBot and show how to:
    • Get immediate answers to pressing network traffic questions
    • Get immediate answers about whether your business applications are secure
    • Decrease the time it takes to resolve critical security incidents
    • Empower your business and application teams to drive innovation
    • Ensure that your network and security teams are focusing on the most critical issues
    • Efficiently manage security by transparently collaborating with IT, Security, Network and DevOps teams

    All while saving time, reducing resources, and cutting the clutter.
Business-Driven Network Security Policy Management
The leading provider of business-driven security management solutions, AlgoSec helps the world’s largest organizations align security with their business processes. With AlgoSec users can discover, map and migrate business application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate network security changes with zero touch - across their cloud, SDN and on-premise networks. Over 1,800 leading organizations, including 20 of the Fortune 50, have utilized AlgoSec’s solutions to make their organizations more agile, more secure and more compliant - all the time. Since its inception, AlgoSec has provided the industry’s only money-back guarantee.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Segmenting your Network for Security - The Good, the Bad and the Ugly
  • Live at: Dec 16 2014 8:00 pm
  • Presented by: Mark Wolfgang, President/CEO Shorebreak Security and Nimmy Reichenberg VP Strategy, AlgoSec
  • From:
Your email has been sent.
or close