Hi [[ session.user.profile.firstName ]]

How to Avoid Business Outages from Misconfigured Network Devices

A single change to a network device can have far reaching effects on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news!

This technical webinar will walk you through a variety of scenarios that can cause device misconfigurations, including a basic device change, business application connectivity changes, and data center migrations. It will provide both best practices and demonstrate specific techniques to help you understand and avoid misconfigurations and ultimately prevent damage to your business, including how to:

* Understand and map your enterprise infrastructure topology before you make a change
* Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
* Common mistakes to avoid when making changes to your network security devices
* How to better understand business requirements from the network security perspective
Recorded Apr 25 2017 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joe DiPietro, SE Director at AlgoSec
Presentation preview: How to Avoid Business Outages from Misconfigured Network Devices
  • Channel
  • Channel profile
  • [US] Simple Misconfiguration = Network Vulnerability! Mar 6 2018 4:00 pm UTC 45 mins
    Anner Kushnir, VP Technology
    A single change to a network device can have far reaching effects on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill!

    In this technical webinar, Anner Kushnir, VP Technology at AlgoSec, will present several examples of common misconfigurations; including a basic device change, business application connectivity changes, and data center migrations. The webinar will cover best practices and demonstrate specific techniques to help you understand and avoid misconfigurations, and ultimately protect your business from attack.

    Join the webinar to discover how to:

    •Understand and map your enterprise infrastructure topology before you make a change
    •Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    •Avoid common mistakes when making changes to your network security devices
    •Understand business requirements from the network security perspective
  • Managing Application Connectivity in the World of Network Security Feb 27 2018 3:00 pm UTC 45 mins
    Asher Benbenisty, Director Product Marketing
    The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.

    During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, will discuss how taking an application-centric approach to security policy management will improve both your security and operational efficiency.

    In the webinar, you will learn how to:

    •Gain insight into your company’s security policy management maturity level
    •Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows
    •Identify security risks across your enterprise network and prioritize them based on business criticality
    •Securely migrate business application connectivity and security devices to a new data center
  • Movin' On Up to the Cloud: How to Migrate your Application Connectivity Recorded: Feb 6 2018 30 mins
    Avivi Siman-Tov, Product Manager
    Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.

    If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.

    Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.

    In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, will explore how to simplify and accelerate large-scale complex application migration projects, while making security a priority.

    Attend this webinar to discover best practices to:

    - Automatically discover applications and their existing connectivity flows

    - Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups

    - Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows

    - Assess the risk and ensure compliance throughout the migration process

    - Deliver unified security policy management across the hybrid enterprise cloud environment
  • APAC Movin' On Up to the Cloud: How to Migrate your Application Connectivity Recorded: Feb 6 2018 24 mins
    Avivi Siman-Tov, Product Manager
    Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.

    If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.

    Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.

    In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, will explore how to simplify and accelerate large-scale complex application migration projects, while making security a priority.

    Attend this webinar to discover best practices to:

    - Automatically discover applications and their existing connectivity flows

    - Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups

    - Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows

    - Assess the risk and ensure compliance throughout the migration process

    - Deliver unified security policy management across the hybrid enterprise cloud environment
  • DevSecOps: Putting the Sec into the DevOps Recorded: Jan 30 2018 51 mins
    Prof. Avishai Wool
    DevOps enables companies to deliver innovations faster to market. But with multiple functional teams collaborating on development, and so many moving parts, security is often left out of the DevOps process and then tacked on at the end - delaying deployment into production and negating many of the benefits of DevOps.

    Presented by renowned industry expert Prof. Avishai Wool, this new technical webinar will cover best practices for incorporating security into the DevOps lifecycle. This insight will help ensure better collaboration between security and the development teams right from the start and reduce the time, cost and risk of deploying applications into production.

    In this webinar Professor Wool will cover how to:
    •Identify and map existing applications and their connectivity flows to establish a baseline
    •Adjust application connectivity for each stage of the DevOps lifecycle – without coding
    •Automatically deploy connectivity throughout the development lifecycle using templates
    •Proactively assess risk and compliance throughout the DevOps process
    •Manage and maintain security in the production environment
  • Network Security Policy Management - Automation for Transformation Recorded: Jan 9 2018 41 mins
    Yonatan Klein - Director of Product Management
    Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!

    In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.

    Join the webinar to learn how you can use automation to:

    • Discover and map application connectivity to centralize and optimize security policy management
    • Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
    • Ensure your disaster recovery processes for firewalls are secure and up-to-date
    • Take an application-centric approach to simplifying firewall rule recertification processes

    Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
  • [APAC] Network Security Policy Management - Automation for Transformation Recorded: Jan 9 2018 37 mins
    Yonatan Klein - Director of Product Management
    Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task!

    In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, will discuss how automation can take your security policy management to the next level; delivering the most stringent security change management and control processes, while providing visibility and helping to maximize business agility across your disparate, ever-changing, hybrid cloud enterprise network.

    Join the webinar to learn how you can use automation to:

    • Discover and map application connectivity to centralize and optimize security policy management
    • Migrate application connectivity across data centers, to the cloud, and throughout the DevOps lifecycle
    • Ensure your disaster recovery processes for firewalls are secure and up-to-date
    • Take an application-centric approach to simplifying firewall rule recertification processes

    Attend this webinar to discover how you can reduce the time and effort you spend on managing security, while keeping your all your stakeholders happy – network and security operations teams, application owners, and even C-level executives.
  • Migrating and Managing Security Policies in a Segmented Data Center Recorded: Dec 7 2017 48 mins
    Prof. Avishai Wool
    Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX and Cisco ACI now a reality it's far simpler to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.

    Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.

    In this webinar, Prof. Wool will discuss how to:

    •Identify and securely migrate legacy applications to a micro-segmented data center
    •Effectively define and enforce security policies for East-West traffic
    •Manage the micro-segmented data center alongside traditional on-premise security devices
    •Identify risk and manage compliance in a micro-segmented data center
    •Use network segmentation to reduce the scope of regulatory audits
    •Identify and avoid common network segmentation mistakes
  • Managing application connectivity securely through a Merger or Acquisition-US/UK Recorded: Nov 14 2017 38 mins
    Edy Almer, VP Product at AlgoSec
    When going through a merger/acquisition or a divesture process, companies typically need to move some of their applications to a different data center or to the cloud, merge duplicate applications, or replicate applications to new entities, and decommission the unnecessary ones in order to streamline operations and costs.

    In practice, firewall policies will need to be changed or migrated to support the new connectivity, applications, servers and often new firewalls – without creating security risks, outages or compliance violations. This is a very complex project that, if not planned and implemented properly, can have a very serious impact on business operations.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will discuss best practices and a real-life use case, which will demonstrate how companies can successfully manage application connectivity through an M&A or divestiture process.

    Key topics include how to:

    - Automatically discover and map existing application connectivity flows prior to making any changes
    - Proactively assess the impact of every change to ensure it does not break connectivity, affect compliance or create a security hole
    - Define and execute the necessary security policy changes for traditional firewalls and cloud security controls
    - Deliver unified security policy management across the new enterprise environment
  • Managing application connectivity securely through a Merger or Acquisition[APAC] Recorded: Nov 14 2017 40 mins
    Edy Almer, VP Product at AlgoSec
    When going through a merger/acquisition or a divesture process, companies typically need to move some of their applications to a different data center or to the cloud, merge duplicate applications, or replicate applications to new entities, and decommission the unnecessary ones in order to streamline operations and costs.

    In practice, firewall policies will need to be changed or migrated to support the new connectivity, applications, servers and often new firewalls – without creating security risks, outages or compliance violations. This is a very complex project that, if not planned and implemented properly, can have a very serious impact on business operations.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will discuss best practices and a real-life use case, which will demonstrate how companies can successfully manage application connectivity through an M&A or divestiture process.

    Key topics include how to:

    - Automatically discover and map existing application connectivity flows prior to making any changes
    - Proactively assess the impact of every change to ensure it does not break connectivity, affect compliance or create a security hole
    - Define and execute the necessary security policy changes for traditional firewalls and cloud security controls
    - Deliver unified security policy management across the new enterprise environment
  • Firewall Rule Recertification - An Application-Centric Approach [US/UK] Recorded: Oct 31 2017 27 mins
    Asher Benbinisty, Director of Product Marketing
    As part of your organization’s security policy management best practices, firewall rules must be reviewed and recertified regularly to ensure security, compliance and optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and impacts firewall performance.
    Manual firewall rule recertification, however, is an error-prone and time-consuming process.

    Please join our webinar by Asher Benbenisty, AlgoSec’s Director of Product Marketing, who will introduce an application-centric approach to firewall recertification, bringing a new, efficient, effective and automated method of recertifying firewall rules.

    Join the webinar and discover:

    •Why it is important to regularly review and recertify your firewall rules
    •The application-centric approach to firewall rule recertification
    •How to automatically manage the rule-recertification process

    Want to find out more about the importance of ruleset hygiene?
    Register for the webinar today!
  • Firewall Rule Recertification - An Application-Centric Approach [APAC] Recorded: Oct 31 2017 26 mins
    Asher Benbinisty, Director of Product Marketing
    As part of your organization’s security policy management best practices, firewall rules must be reviewed and recertified regularly to ensure security, compliance and optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and impacts firewall performance.
    Manual firewall rule recertification, however, is an error-prone and time-consuming process.

    Please join our webinar by Asher Benbenisty, AlgoSec’s Director of Product Marketing, who will introduce an application-centric approach to firewall recertification, bringing a new, efficient, effective and automated method of recertifying firewall rules.

    Join the webinar and discover:

    •Why it is important to regularly review and recertify your firewall rules
    •The application-centric approach to firewall rule recertification
    •How to automatically manage the rule-recertification process

    Want to find out more about the importance of ruleset hygiene?

    Register for the webinar today!
  • 5 Dinge, die Sie mit einer Security Policy Management Lösung machen können Recorded: Oct 9 2017 35 mins
    Dietmar Wyhs, Regional Sales Manager DACH
    Die heutigen Unternehmen entwickeln sich kontinuierlich weiter, um neue Anwendungen, Transformationsinitiativen wie Cloud und SDN zu unterstützen und täglich neue und anspruchsvollere Cyber-Attacken abzuwehren. Aber die Sicherheits- und Netzwerk-Mitarbeiter haben Schwierigkeiten mitzuhalten. Dies wirkt sich nicht nur auf die Business-Agilität aus, sondern setzt Ihr Unternehmen Risiken aus und behindert dessen Fähigkeit, sich der modernen Bedrohungslandschaft zu stellen.

    Viele Fachleute sind der Meinung, dass sie die neuesten Anwendungen brauchen, um diese Herausforderungen zu bewältigen. Aber was, wenn Sie bereits haben, was Sie brauchen und diese Anwendung in Ihrem Unternehmen genutzt wird: Ihre Security Policy Management Lösung?

    Die heutigen Sicherheitsrichtlinien-Management-Lösungen machen weit mehr als die Automatisierung von traditionellen Änderungsmanagement Aufgaben. In diesem technischen Webinar zeigt Ihnen Dietmar Wyhs fünf wichtige Sicherheitsmanagement-Herausforderungen, denen Unternehmensorganisationen sich heutzutage stellen. Gleichzeitig erklärt er, wie die Lösung von AlgoSec Ihnen helfen kann, Sicherheitsbedrohungen zu bewältigen, Risiken zu verringern, und schnell auf Ausfällen zu reagieren, bei gleichzeitiger Maximierung der Geschäftsagibilität und Sicherstellung der Compliance in den unterschiedlichen, sich ständig verändernden Hybridnetzwerken.

    Dieses technische Webinar konzentriert sich auf:

    •Verwalten von Sicherheitsrichtlinien von End-to-End-Lösungen öffentlicher und privater Clouds einschließlich Microsoft Azure, Amazon Web Services AWS, Cisco ACI und VMWare NSX
    •Zuordnung von Sicherheitslücken zu Anwendungen, zur Bewertung und Priorisierung des Risikos
    •Möglichkeit Cyber-Attacken mit Geschäftsprozesse zu korrelieren
    •Migration von Firewall-Richtlinien zwischen Firewall-Herstellern
    •Durchführung einer vollautomatischen, Zero-Touch-Sicherheitsregelwerksänderung
  • Best Practices to Manage Security Across a Software Defined Network Recorded: Oct 3 2017 35 mins
    Edy Almer, VP Product at AlgoSec
    Software defined networks (SDNs) help drive scalability and business agility, while enabling a more secure, segmented data center. Yet despite its rising popularity, SDN can strike fear into the hearts of the security and network operations teams who have little to no physical visibility into the SDN yet must secure and manage it.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will provide best practices to help manage security across an SDN environment.

    Key topics include:

    - How to securely discover and migrate application connectivity to the SDN
    - Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass
    - Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN
    - Best practices for managing security policies across Cisco ACI, VMware NSX and OpenStack
    - Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • [APAC] Best Practices to Manage Security Across a Software Defined Network Recorded: Oct 3 2017 44 mins
    Edy Almer, VP Product at AlgoSec
    Software defined networks (SDNs) help drive scalability and business agility, while enabling a more secure, segmented data center. Yet despite its rising popularity, SDN can strike fear into the hearts of the security and network operations teams who have little to no physical visibility into the SDN yet must secure and manage it.

    Presented by Edy Almer, AlgoSec’s VP of Products, this new technical webinar will provide best practices to help manage security across an SDN environment.

    Key topics include:

    - How to securely discover and migrate application connectivity to the SDN
    - Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass
    - Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN
    - Best practices for managing security policies across Cisco ACI, VMware NSX and OpenStack
    - Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • 5 things you can do with a security policy management solution Recorded: Sep 26 2017 51 mins
    Jeffrey Starr, CMO & Edy Almer, VP Product
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • 5 things you can do with a security policy management solution [APAC] Recorded: Sep 26 2017 45 mins
    Jeffrey Starr, CMO & Edy Almer, VP Product
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • Security a Revenue Center: How Security Can Drive Your Business Recorded: Jul 27 2017 57 mins
    Joe DiPietro
    Traditionally Security was viewed as necessary cost center or an insurance policy you hoped you’d never have to cash in. Yet by automating security policy management you can actually save your organization both time and money and even enable and support the revenue generation processes.

    Presented by Joe DiPietro, SE Director, this technical webinar will provide an overview of how automated security policy management goes beyond providing ROI and cost savings, to directly impacting business productivity and agility.

    This webinar will:

    * Highlight the security policy processes that can be automated, including challenges, benefits, planning and prioritization considerations.
    * Provide an overview of the security management maturity model and highlight opportunities for automation and optimization for each stage of the model.
    * Dissect and assess cost saving and revenue generation opportunities for specific key challenges including security change management, risk management, application migration, and auditing and compliance.
  • Aligner votre sécurité avec vos processus métiers Recorded: Jun 22 2017 36 mins
    Adam Vizogrod, AlgoSec
    L’évolution en taille et en complexité de vos applications et de votre infrastructure réseau a une répercussion directe sur votre politique de sécurité. Cependant, une gestion manuelle de politiques de sécurité complexes peut se traduire souvent par des risques inutiles, des coûts plus élevés et une incapacité à suivre le rythme de votre activité.


    Au cours de cette session, nous vous présenterons une approche de la gestion de la politique de sécurité centrée sur les applications, qui vous permettra de gérer facilement et automatiquement des politiques complexes sur plusieurs Firewalls. La solution présentée vous aidera à améliorer votre positionnement en termes de sécurité et d’agilité opérationnelle, à garantir une conformité continue et à réduire le risque, tout en réconciliant les lacunes de communication entre les équipes applicatives et réseau.
  • Security Change Management: Agility vs. Control Recorded: Jun 20 2017 45 mins
    Anner Kushnir, VP Technology
    Today's fast paced business application deployments and changes require IT, networking and security to be more agile than ever before. Yet this agility often comes at the expense of security, control and accuracy. When facing a barrage of cyber-attacks this is not an option.
    In this new technical webinar, Anner Kushnir, VP of Technology at AlgoSec will explain how to address these contradicting requirements, and eliminate the tension between the two, through a unique zero-touch approach to security policy management.

    In this webinar Anner will present:

    • The challenges and requirements for zero-touch security policy automation
    • How automation can support business agility while maintaining checks and balances
    • Defining a policy for pre-approved "more of the same" low risk changes
    • Handling exceptions, risks and escalation
    • Maintaining a full audit trail for compliance audits
    • Tracking SLAs and further fine-tuning business agility
Security Policy Management
AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1,500 of the world’s leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Avoid Business Outages from Misconfigured Network Devices
  • Live at: Apr 25 2017 2:00 pm
  • Presented by: Joe DiPietro, SE Director at AlgoSec
  • From:
Your email has been sent.
or close