Hi [[ session.user.profile.firstName ]]

Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective

Ever wish you could get inside your QSA’s head before your next PCI audit?
Join QSA Adam Gaydosh of Anitian, and Nimmy Reichenberg, VP of Strategy at AlgoSec to get the inside scoop on what QSAs are looking for when they audit you. Aimed at security and networking professionals, this webinar will provide insider tips and tricks to help you prepare for and pass your audit – wherever your credit card data is stored – and remain continuously compliant even if you’re breached.

Don’t miss the chance to hear about the pitfalls your colleagues have already faced, and how to make the audit experience less stressful, including:
- Less is more: demystifying the scope of a PCI audit
- What’s in and what’s out: Segmenting your network for compliance
- Best practices for configuring your security infrastructure
- PCI in the public cloud – it’s not an oxymoron
Recorded May 28 2015 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adam Gaydosh,QSA and Director of Professional Services at Anitian and Nimmy Reichenberg, VP of Strategy at AlgoSec
Presentation preview: Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
  • Channel
  • Channel profile
  • SDNs: Managing Security across the Virtual Network May 22 2018 2:00 pm UTC 60 mins
    Omer Ganot, Product Manager
    Software defined networks (SDNs) offer an agile and scalable network option, yet the lack of visibility presents a huge challenge for the security and network operations teams who need to secure and manage it.

    Join Omer Ganot, Product Manager at AlgoSec, for this technical webinar on best practices for managing security across the SDN environment.

    Key topics include:

    •How to securely discover, map and migrate application connectivity to the SDN

    •Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass

    •Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN

    •Best practices for managing security policies across Cisco ACI, VMware NSX and OpenStack

    •Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • [US/UK] Agility vs. Control: The Security Policy Management Balancing Act May 15 2018 3:00 pm UTC 45 mins
    Anner Kushnir, VP Technology
    In today’s world of technological innovation, business application deployments and changes require IT, networking and security teams to be more agile than ever before.

    Unfortunately, this agility can come at the expense of security and compliance and enable network breaches and cyber-attacks.
    In this new technical webinar, Anner Kushnir, VP of Technology at AlgoSec will explain how to address the balancing act of agility vs. control using a unique zero-touch approach to security policy management.

    In this webinar Anner will present:
    • The challenges and requirements for zero-touch security policy automation
    • How automation can support business agility while maintaining checks and balances
    • Defining a policy for pre-approved "more of the same"low-risk changes
    • Handling exceptions, risks and escalation
    • Maintaining a full audit trail for compliance audits
    • Tracking SLAs and further fine-tuning business agility
  • [APAC] Agility vs. Control: The Security Policy Management Balancing Act May 15 2018 5:00 am UTC 45 mins
    Anner Kushnir, VP Technology
    In today’s world of technological innovation, business application deployments and changes require IT, networking and security teams to be more agile than ever before.

    Unfortunately, this agility can come at the expense of security and compliance and enable network breaches and cyber-attacks.
    In this new technical webinar, Anner Kushnir, VP of Technology at AlgoSec will explain how to address the balancing act of agility vs. control using a unique zero-touch approach to security policy management.

    In this webinar Anner will present:
    • The challenges and requirements for zero-touch security policy automation
    • How automation can support business agility while maintaining checks and balances
    • Defining a policy for pre-approved "more of the same"low-risk changes
    • Handling exceptions, risks and escalation
    • Maintaining a full audit trail for compliance audits
    • Tracking SLAs and further fine-tuning business agility
  • [US/UK] Intent-Based Networking in Security Policy Management Apr 24 2018 2:00 pm UTC 45 mins
    Edy Almer, VP Product
    The next big thing in networking, intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.

    Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.

    In this webinar, Edy will explain how:

    •Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security

    •AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)

    •AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
  • [APAC] Intent-Based Networking in Security Policy Management Apr 24 2018 5:00 am UTC 45 mins
    Edy Almer, VP Product
    The next big thing in networking, intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.

    Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.

    In this webinar, Edy will explain how:

    • Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security

    • AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)

    • AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
  • From antiquity to the cloud: 25 years of firewalls and network filtering Recorded: Apr 10 2018 65 mins
    Prof. Avishai Wool
    The first commercial firewall shipped in 1992. 25 years later the firewall is still the core building block of enterprises’ security infrastructures.
    Please join Prof. Avishai Wool, AlgoSec’s CTO, on Tuesday, April 10 at 10am ET for an educational webinar on the history of the firewall. He will take you through a riveting 25-year journey of the evolution of the firewall - from the ancient world of the host-based firewalls of the 90s, to today’s cloud-based firewalls, and will explain how each type of firewall works, its advantages and limitations, and provide some tips and best practices for effective network filtering.

    In this highly informational, and entertaining webinar Professor Wool will cover:

    • The Early 90s: Host vs. Network
    • Late 90s: Keeping State
    • 2003: Zone-Based firewalls
    • 2010: Next-Gen firewalls
    • 2015: Virtualized and cloud firewalls
  • [US/ UK] Migrating and Managing Security in an AWS Environment- Best Practices Recorded: Mar 27 2018 42 mins
    Edy Almer, VP Product
    Today, most enterprises are moving at least some of their business applications to the cloud. Yet while the cloud is extremely agile, it also adds a new level of complexity when it comes to network security.

    The cloud introduces a software-defined security architecture that is fundamentally different from the organization’s existing on-premise network, and as a result, many enterprises now struggle with migrating application connectivity to the cloud, and managing the cloud security controls alongside their traditional firewalls in a secure and compliant way.

    In this webinar, Edy Almer, VP Product at AlgoSec, provides technical insight and security best practices for migrating and managing security across the hybrid AWS environment.

    This webinar will cover:

    · Understanding network security before, during and after migrating your applications to AWS

    · How to identify and migrate the relevant application connectivity flows to AWS

    · Managing AWS Security Groups alongside your traditional firewalls – uniformly and securely

    · Making the most of AWS Network ACLs – to enhance traffic filtering and maximize capacity
  • [APAC] Migrating and Managing Security in an AWS Environment- Best Practices Recorded: Mar 27 2018 48 mins
    Edy Almer, VP Product
    Today, most enterprises are moving at least some of their business applications to the cloud. Yet while the cloud is extremely agile, it also adds a new level of complexity when it comes to network security.

    The cloud introduces a software-defined security architecture that is fundamentally different from the organization’s existing on-premise network, and as a result, many enterprises now struggle with migrating application connectivity to the cloud, and managing the cloud security controls alongside their traditional firewalls in a secure and compliant way.

    In this webinar, Edy Almer, VP Product at AlgoSec, provides technical insight and security best practices for migrating and managing security across the hybrid AWS environment.

    This webinar will cover:

    · Understanding network security before, during and after migrating your applications to AWS

    · How to identify and migrate the relevant application connectivity flows to AWS

    · Managing AWS Security Groups alongside your traditional firewalls – uniformly and securely

    · Making the most of AWS Network ACLs – to enhance traffic filtering and maximize capacity
  • [US] Simple Misconfiguration = Network Vulnerability! Recorded: Mar 6 2018 48 mins
    Anner Kushnir, VP Technology
    A single change to a network device can have far reaching effects on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill!

    In this technical webinar, Anner Kushnir, VP Technology at AlgoSec, will present several examples of common misconfigurations; including a basic device change, business application connectivity changes, and data center migrations. The webinar will cover best practices and demonstrate specific techniques to help you understand and avoid misconfigurations, and ultimately protect your business from attack.

    Join the webinar to discover how to:

    •Understand and map your enterprise infrastructure topology before you make a change
    •Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    •Avoid common mistakes when making changes to your network security devices
    •Understand business requirements from the network security perspective
  • Managing Application Connectivity in the World of Network Security Recorded: Feb 27 2018 37 mins
    Asher Benbenisty, Director Product Marketing
    The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.

    During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, will discuss how taking an application-centric approach to security policy management will improve both your security and operational efficiency.

    In the webinar, you will learn how to:

    •Gain insight into your company’s security policy management maturity level
    •Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows
    •Identify security risks across your enterprise network and prioritize them based on business criticality
    •Securely migrate business application connectivity and security devices to a new data center
  • Movin' On Up to the Cloud: How to Migrate your Application Connectivity Recorded: Feb 6 2018 30 mins
    Avivi Siman-Tov, Product Manager
    Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.

    If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.

    Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.

    In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, will explore how to simplify and accelerate large-scale complex application migration projects, while making security a priority.

    Attend this webinar to discover best practices to:

    - Automatically discover applications and their existing connectivity flows

    - Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups

    - Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows

    - Assess the risk and ensure compliance throughout the migration process

    - Deliver unified security policy management across the hybrid enterprise cloud environment
  • APAC Movin' On Up to the Cloud: How to Migrate your Application Connectivity Recorded: Feb 6 2018 24 mins
    Avivi Siman-Tov, Product Manager
    Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.

    If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.

    Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.

    In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, will explore how to simplify and accelerate large-scale complex application migration projects, while making security a priority.

    Attend this webinar to discover best practices to:

    - Automatically discover applications and their existing connectivity flows

    - Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups

    - Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows

    - Assess the risk and ensure compliance throughout the migration process

    - Deliver unified security policy management across the hybrid enterprise cloud environment
  • DevSecOps: Putting the Sec into the DevOps Recorded: Jan 30 2018 51 mins
    Prof. Avishai Wool
    DevOps enables companies to deliver innovations faster to market. But with multiple functional teams collaborating on development, and so many moving parts, security is often left out of the DevOps process and then tacked on at the end - delaying deployment into production and negating many of the benefits of DevOps.

    Presented by renowned industry expert Prof. Avishai Wool, this new technical webinar will cover best practices for incorporating security into the DevOps lifecycle. This insight will help ensure better collaboration between security and the development teams right from the start and reduce the time, cost and risk of deploying applications into production.

    In this webinar Professor Wool will cover how to:
    •Identify and map existing applications and their connectivity flows to establish a baseline
    •Adjust application connectivity for each stage of the DevOps lifecycle – without coding
    •Automatically deploy connectivity throughout the development lifecycle using templates
    •Proactively assess risk and compliance throughout the DevOps process
    •Manage and maintain security in the production environment
  • Network Security Policy Management - Automation for Transformation Recorded: Jan 9 2018 41 mins
    Yonatan Klein - Director of Product Management
    Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!

    In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.

    Join the webinar to learn how you can use automation to:

    • Discover and map application connectivity to centralize and optimize security policy management
    • Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
    • Ensure your disaster recovery processes for firewalls are secure and up-to-date
    • Take an application-centric approach to simplifying firewall rule recertification processes

    Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
  • [APAC] Network Security Policy Management - Automation for Transformation Recorded: Jan 9 2018 37 mins
    Yonatan Klein - Director of Product Management
    Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!

    In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.

    Join the webinar to learn how you can use automation to:

    • Discover and map application connectivity to centralize and optimize security policy management
    • Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
    • Ensure your disaster recovery processes for firewalls are secure and up-to-date
    • Take an application-centric approach to simplifying firewall rule recertification processes

    Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
  • Migrating and Managing Security Policies in a Segmented Data Center Recorded: Dec 7 2017 48 mins
    Prof. Avishai Wool
    Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX and Cisco ACI now a reality it's far simpler to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.

    Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.

    In this webinar, Prof. Wool will discuss how to:

    •Identify and securely migrate legacy applications to a micro-segmented data center
    •Effectively define and enforce security policies for East-West traffic
    •Manage the micro-segmented data center alongside traditional on-premise security devices
    •Identify risk and manage compliance in a micro-segmented data center
    •Use network segmentation to reduce the scope of regulatory audits
    •Identify and avoid common network segmentation mistakes
  • Managing application connectivity securely through a Merger or Acquisition-US/UK Recorded: Nov 14 2017 38 mins
    Edy Almer, VP Product at AlgoSec
    When going through a merger/acquisition or a divesture process, companies typically need to move some of their applications to a different data center or to the cloud, merge duplicate applications, or replicate applications to new entities, and decommission the unnecessary ones in order to streamline operations and costs.

    In practice, firewall policies will need to be changed or migrated to support the new connectivity, applications, servers and often new firewalls – without creating security risks, outages or compliance violations. This is a very complex project that, if not planned and implemented properly, can have a very serious impact on business operations.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will discuss best practices and a real-life use case, which will demonstrate how companies can successfully manage application connectivity through an M&A or divestiture process.

    Key topics include how to:

    - Automatically discover and map existing application connectivity flows prior to making any changes
    - Proactively assess the impact of every change to ensure it does not break connectivity, affect compliance or create a security hole
    - Define and execute the necessary security policy changes for traditional firewalls and cloud security controls
    - Deliver unified security policy management across the new enterprise environment
  • Managing application connectivity securely through a Merger or Acquisition[APAC] Recorded: Nov 14 2017 40 mins
    Edy Almer, VP Product at AlgoSec
    When going through a merger/acquisition or a divesture process, companies typically need to move some of their applications to a different data center or to the cloud, merge duplicate applications, or replicate applications to new entities, and decommission the unnecessary ones in order to streamline operations and costs.

    In practice, firewall policies will need to be changed or migrated to support the new connectivity, applications, servers and often new firewalls – without creating security risks, outages or compliance violations. This is a very complex project that, if not planned and implemented properly, can have a very serious impact on business operations.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will discuss best practices and a real-life use case, which will demonstrate how companies can successfully manage application connectivity through an M&A or divestiture process.

    Key topics include how to:

    - Automatically discover and map existing application connectivity flows prior to making any changes
    - Proactively assess the impact of every change to ensure it does not break connectivity, affect compliance or create a security hole
    - Define and execute the necessary security policy changes for traditional firewalls and cloud security controls
    - Deliver unified security policy management across the new enterprise environment
  • Firewall Rule Recertification - An Application-Centric Approach [US/UK] Recorded: Oct 31 2017 27 mins
    Asher Benbinisty, Director of Product Marketing
    As part of your organization’s security policy management best practices, firewall rules must be reviewed and recertified regularly to ensure security, compliance and optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and impacts firewall performance.
    Manual firewall rule recertification, however, is an error-prone and time-consuming process.

    Please join our webinar by Asher Benbenisty, AlgoSec’s Director of Product Marketing, who will introduce an application-centric approach to firewall recertification, bringing a new, efficient, effective and automated method of recertifying firewall rules.

    Join the webinar and discover:

    •Why it is important to regularly review and recertify your firewall rules
    •The application-centric approach to firewall rule recertification
    •How to automatically manage the rule-recertification process

    Want to find out more about the importance of ruleset hygiene?
    Register for the webinar today!
  • Firewall Rule Recertification - An Application-Centric Approach [APAC] Recorded: Oct 31 2017 26 mins
    Asher Benbinisty, Director of Product Marketing
    As part of your organization’s security policy management best practices, firewall rules must be reviewed and recertified regularly to ensure security, compliance and optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and impacts firewall performance.
    Manual firewall rule recertification, however, is an error-prone and time-consuming process.

    Please join our webinar by Asher Benbenisty, AlgoSec’s Director of Product Marketing, who will introduce an application-centric approach to firewall recertification, bringing a new, efficient, effective and automated method of recertifying firewall rules.

    Join the webinar and discover:

    •Why it is important to regularly review and recertify your firewall rules
    •The application-centric approach to firewall rule recertification
    •How to automatically manage the rule-recertification process

    Want to find out more about the importance of ruleset hygiene?

    Register for the webinar today!
Security Policy Management
AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1,500 of the world’s leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
  • Live at: May 28 2015 3:00 pm
  • Presented by: Adam Gaydosh,QSA and Director of Professional Services at Anitian and Nimmy Reichenberg, VP of Strategy at AlgoSec
  • From:
Your email has been sent.
or close