Hi [[ session.user.profile.firstName ]]

Automated Security Policy Allows Financial Institutions to make the Triple Play

Financial institutions must contend with the big three challenges of digital transformation, cyberthreats and regulations.

Always seeking a competitive edge, financials invest heavily in digital transformation, especially customer-facing technology innovations, but delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, hampered by manual and error-prone change-management processes.

Errors in network security management procedures also expose institutions to unreasonable levels of cyber risk.

The growing body of demanding regulations burdens financial institutions with severe compliance requirements and never-ending audits.

There must be a better way!

Our latest webinar shows financial institutions how to make the triple play by automating network security policy management changes, at once enabling the business, reducing risk and enforcing compliance.

In this webinar you will learn about:

• Key industry metrics that compare security environments within and beyond the finance industry
• Network security policy management challenges that hamper digital transformation
• Overcoming security management complexity with automation for speed and accuracy
• Passing compliance audits in the face of demanding regulations
Recorded Oct 11 2018 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Asher Benbenisty, Director of Product Marketing
Presentation preview: Automated Security Policy Allows Financial Institutions to make the Triple Play
  • Channel
  • Channel profile
  • Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment Oct 25 2018 2:00 pm UTC 45 mins
    Yitzy Tannenbaum, Product Marketing Manager
    Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.

    In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.

    In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, will illuminate security-policy issues in multi-cloud and hybrid environments and show you how to achieve:
    •Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture
    •Uniform security policy across complex multi-cloud and hybrid environments
    •Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and
    assess risk and to avoid compliance violations
    •Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments
    •Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments
  • Secure Cloud Migration: Automated! Oct 23 2018 4:00 pm UTC 60 mins
    Jonathan Gold-Shalev, Senior Product Manager
    As their first big move into the Age of the Cloud, enterprises are rapidly migrating applications from on-premise data centers to the cloud to take advantage of agility, segmentation, scalability, flexibility, cost and other benefits. While migrating the storage and compute is pretty straightforward, migrating the SECURITY presents unique challenges that cause enterprises to struggle with application connectivity and management of the cloud security controls alongside their traditional firewalls in a secure and compliant way – and quickly.

    In this webinar, Omer Ganot,Product Manager at AlgoSec, provides technical insight and best practices for discovering, mapping and updating network security policies to provide a smooth application migration that assures proper operation and security.

    This webinar will cover:
    • Automatic discovery of existing application-connectivity requirements
    • Automated analysis of changes necessary for migrating application-connectivity to the cloud
    • Automatic execution of the required changes of all the security constructs – on-premise and in the cloud
    • Maintaining complete and ongoing visibility across the entire network topology and security constructs, including:
    o On-premise firewalls and routers
    o Cloud security controls
    o Virtual traditional firewalls deployed in the cloud
  • Cloud Security Trends and Best Practices for 2019 Oct 23 2018 3:00 pm UTC 60 mins
    Dave Klein (GuardiCore) | Prof Avishai Wool (Algosec) | Fred Streefland (Palo Alto Networks)
    As more corporate data moves to the cloud, the new challenge is to efficiently manage security in both the cloud and on premises. How are organizations coping and what are the solutions they should be employing?

    Join this keynote panel of security and cloud experts as they discuss:
    - Cloud security challenges today
    - Extending network security to the cloud
    - Security policy management in the cloud
    - Security automation
    - Best practices and recommendations for improving your enterprise security posture
    - Future trends in cloud security

    Speakers:
    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Prof Avishai Wool, CTO & Co-founder, Algosec
    - Fred Streefland, Chief Security Officer North & East-Europe (NEEUR), Palo Alto Networks
  • Migrating to the Cloud with Automation Oct 23 2018 1:00 pm UTC 60 mins
    Omer Ganot, Product Manager, AlgoSec
    83% of enterprise workloads will be in the cloud by 2020. Migrating the storage and compute is the easy part. Migrating the SECURITY is the part that you have to get right – unless you don’t care about outages and cyberattacks. Don’t struggle with application connectivity and management of cloud security controls. Automate the entire process and get it right.

    In this webinar, Omer Ganot, Product Manager at AlgoSec, provides technical insight and best practices for discovering, mapping and updating network security policies to provide a smooth application migration that assures proper operation and security.

    This webinar will cover:
    • Automatic discovery of existing application-connectivity requirements
    • Automated analysis of changes necessary for migrating application-connectivity to the cloud
    • Automatic execution of the required changes of all the security constructs – on-premise and in the cloud
    • Maintaining complete and ongoing visibility across the entire network topology and security constructs, including:
    o On-premise firewalls and routers
    o Cloud security controls
    o Virtual traditional firewalls deployed in the cloud
  • Cloud Strategy & Improving Your Enterprise Security Posture in 2019 Oct 22 2018 5:00 pm UTC 60 mins
    Sushila Nair (NTT DATA Services) | Yonatan Klein (AlgoSec) | Diana Kelley (Microsoft)
    This keynote panel is part of Cloud Month on BrightTALK.

    Join this keynote panel of security and cloud experts as they discuss:
    - The most prevalent security risks and challenges and how to contend with them
    - Your cloud strategy and how it affects your overall security posture
    - How to extend network security to the cloud
    - Areas for automation
    - Best practices on how to secure your enterprise in 2019

    Speakers:
    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Yonatan Klein, Sr. Product Manager, Algosec
  • Automated Security Policy Allows Financial Institutions to make the Triple Play Recorded: Oct 11 2018 38 mins
    Asher Benbenisty, Director of Product Marketing
    Financial institutions must contend with the big three challenges of digital transformation, cyberthreats and regulations.

    Always seeking a competitive edge, financials invest heavily in digital transformation, especially customer-facing technology innovations, but delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, hampered by manual and error-prone change-management processes.

    Errors in network security management procedures also expose institutions to unreasonable levels of cyber risk.

    The growing body of demanding regulations burdens financial institutions with severe compliance requirements and never-ending audits.

    There must be a better way!

    Our latest webinar shows financial institutions how to make the triple play by automating network security policy management changes, at once enabling the business, reducing risk and enforcing compliance.

    In this webinar you will learn about:

    • Key industry metrics that compare security environments within and beyond the finance industry
    • Network security policy management challenges that hamper digital transformation
    • Overcoming security management complexity with automation for speed and accuracy
    • Passing compliance audits in the face of demanding regulations
  • Selecting the right security policy management solution for your organization Recorded: Sep 17 2018 41 mins
    Kyle Wickert, Worldwide Strategic Architect
    IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.

    In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.

    Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.

    Key topics include:
    - Intelligent automation is more than just adding policies
    - Letting a business-centric approach take the lead
    - Extracting the best from existing automation processes and creating new ones
    - Managing it all together: cloud, SDN and on-premise
  • Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewalls Recorded: Sep 12 2018 49 mins
    Jonathan Gold-Shalev, Senior Product Manager
    Deployment of business applications is becoming more agile by the day. Organizations are rapidly adopting SDN solutions, such as Cisco ACI, to reduce provisioning time.

    Learn how you can seamlessly integrate and extend network and security policy automation for Cisco ACI to all security devices across the enterprise network, inside the data center, at its edges and in the cloud.

    Join Jonathan Gold Shalev, Senior Product Manager, to understand how to harness the power of Cisco ACI with a holistic, business-driven, security-management approach covering all the organization's network security controls.

    Join this webinar to understand how you can:
    •Gain visibility into the Cisco ACI security environment as part of the overall network security posture
    •Deliver applications fast by automating network-wide changes including changes to the ACI Fabric, and taking care of security controls with a zero-touch workflow
    •Assess and continuously assure the compliance of your ACI Fabric
    •Generate audit-ready regulatory compliance reports for the entire Cisco ACI Fabric along with the rest of your network
  • Network Security Audit? Passing Your Next One with Flying Colors Recorded: Sep 6 2018 57 mins
    Prof. Avishai Wool, CTO
    Enterprises are required to maintain an unfailing state of compliance with laws and regulations.

    Do you know about the upcoming PCI-DSS 3.2.1 standard and what it means for your operation? Are you ready to be audited?

    Like fire drills, audits can catch us unprepared and expose inadequacies. What should we do now to make sure we pass the next audit with ease?

    Presented by renowned industry expert, Professor Avishai Wool, this technical webinar imparts best practices and reveals specific techniques to help you make sure that your compliance posture stands up to any audit.

    In this webinar, Professor Wool shows you how to:

    • Know if your network is compliant with the new PCI standard
    • Upgrade to the secure alternative to SSL to safeguard your payment data
    • Prepare for the next audit
    • Assure continuous compliance
  • Automated Network Security Policy Changes for Speed and Compliance Recorded: Aug 7 2018 39 mins
    Asher Benbenisty, Director of Product Marketing, Miki Weiser, Director of Digital Marketing
    When it comes to updating network security policies, you don’t have to face the tradeoff between speed and agility vs. safety and security. Network security policy automation delivers prompt and accurate change across complex networks while avoiding security holes, compliance problems and costly outages.

    In this webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, will show how even the most complex security policies can be updated automatically and coherently across the network without introducing new problems. Webinar participants will learn how to achieve:
    •Powerful and convenient policy automation without human intervention
    •Rapid application delivery that improves business agility
    •Reduced risk while updating network security policies
    •Full traceability and auditing capabilities while maintaining compliance posture
  • [US/UK] Network security at the speed of DevOps Recorded: Jul 24 2018 56 mins
    Anner Kushnir, VP Technology
    DevOps methodologies have become extremely popular to enable agile application development and delivery.
    Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.

    In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.

    Attend this webinar to learn how to:
    •Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery
    •Avoid external out-of-band network connectivity problems that require separate and manual handling
    •Ensure continuous compliance and auditability throughout the application delivery process
    •Get clearly documented application connectivity requirements which help prevent disruptions to the business
    •Bridge the gap between application developers and network security throughout the entire application lifecycle
  • Create and Manage a Micro-Segmented Data Center – Best Practices Recorded: Jul 10 2018 30 mins
    Avivi Siman-Tov, Product Manager
    What links the Antwerp Diamond Heist, one of the world’s largest jewelry thefts and data center security? The famous heist was possible because there was no security within the safe deposit vault, enabling the criminals to stay inside undetected for days and steal items worth $100M.

    Similarly, to help prevent serious breaches, data center networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to create and manage a micro-segmented data center environment that truly protects your organization’s valuables.

    In this webinar, Avivi-Siman-Tov, Product Manager at AlgoSec will cover:
    •How to securely migrate applications to a micro-segmented data center
    •Identifying and avoiding common network segmentation pitfalls
    •Defining and enforcing effective security policies for the micro-segmented data center
    •Managing micro-segmented data centers alongside traditional networks and devices
    •Identifying and managing security risk and compliance in a micro-segmented data center
  • Securely Managing External Network Connections — Tips & Tricks Recorded: Jun 12 2018 52 mins
    Prof. Avishai Wool, CTO
    In today’s global business environment companies need to connect to external networks, such as suppliers, credit card processing companies, business partners, and data feeds, in order to function. While these connections are crucial, the very act of enabling access to or from your network is risky and can expose your organization to cyberattacks and compliance violations.

    Join renowned industry expert Professor Avishai Wool for this technical webinar as he covers best practices for managing external connectivity to and from your network, including:

    •Defining the right infrastructure, network segmentation, security controls and additional security protections
    •Managing changes to connectivity for third party applications or data feeds
    •Routing partner traffic through your network
    •Auditing and compliance challenges for you and your external connections
    •Technical considerations for managing the business and legal aspects of third party connectivity
  • [US/UK] Application Visibility Across the Security Estate–The Value & the Vision Recorded: Jun 5 2018 50 mins
    Yonatan Klein, Director Product Management
    Security policy management solutions enable security and operations teams to manage and optimize firewall policy, automate security policy changes and mitigate network security risk – all while avoiding misconfigurations, staying compliant and saving time and resources.

    While this provides unprecedented value for network security visibility and management, these teams often lack the business context; the ability to assess the impact of network and firewall rule changes on the company’s business applications, application availability and business processes.

    Join Yonatan Klein, Director Product Management at AlgoSec, as he explores why a security policy management solution should also offer application discovery and visibility to enable a truly business-driven approach to security policy management.

    The webinar will cover:

    Business-driven management of connectivity change requests while avoiding misconfigurations and miscommunications
    Pro-active visibility of the security impact of application changes before applying them
    How visibility into the applications associated with every firewall rule enhances auditing, compliance and policy cleanup
    Clear visibility into the impact of new vulnerabilities and maintenance taskson business processes
    Different ways to discover network connectivity for existing applications
  • SDNs: Managing Security across the Virtual Network Recorded: May 22 2018 31 mins
    Omer Ganot, Product Manager
    Software defined networks (SDNs) offer an agile and scalable network option, yet the lack of visibility presents a huge challenge for the security and network operations teams who need to secure and manage it.

    Join Omer Ganot, Product Manager at AlgoSec, for this technical webinar on best practices for managing security across the SDN environment.

    Key topics include:

    • How to securely discover, map and migrate application connectivity to the SDN

    • Holistically managing the entire hybrid SDN, cloud and on-premise enterprise network through a single pane of glass

    • Assessing risk and compliance cohesively for the entire end-to-end enterprise environment, including SDN

    • Best practices for managing security policies across Cisco ACI and VMware NSX

    • Tips and tricks to avoid the pitfalls when managing east-west and north-south security policies
  • [US/UK] Agility vs. Control: The Security Policy Management Balancing Act Recorded: May 15 2018 43 mins
    Anner Kushnir, VP Technology
    In today’s world of technological innovation, business application deployments and changes require IT, networking and security teams to be more agile than ever before.

    Unfortunately, this agility can come at the expense of security and compliance and enable network breaches and cyber-attacks.
    In this new technical webinar, Anner Kushnir, VP of Technology at AlgoSec will explain how to address the balancing act of agility vs. control using a unique zero-touch approach to security policy management.

    In this webinar Anner will present:
    • The challenges and requirements for zero-touch security policy automation
    • How automation can support business agility while maintaining checks and balances
    • Defining a policy for pre-approved "more of the same"low-risk changes
    • Handling exceptions, risks and escalation
    • Maintaining a full audit trail for compliance audits
    • Tracking SLAs and further fine-tuning business agility
  • [US/UK] Intent-Based Networking in Security Policy Management Recorded: Apr 24 2018 35 mins
    Edy Almer, VP Product
    The next big thing in networking, intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.

    Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.

    In this webinar, Edy will explain how:

    •Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security

    •AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)

    •AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
  • From antiquity to the cloud: 25 years of firewalls and network filtering Recorded: Apr 10 2018 65 mins
    Prof. Avishai Wool
    The first commercial firewall shipped in 1992. 25 years later the firewall is still the core building block of enterprises’ security infrastructures.
    Please join Prof. Avishai Wool, AlgoSec’s CTO, on Tuesday, April 10 at 10am ET for an educational webinar on the history of the firewall. He will take you through a riveting 25-year journey of the evolution of the firewall - from the ancient world of the host-based firewalls of the 90s, to today’s cloud-based firewalls, and will explain how each type of firewall works, its advantages and limitations, and provide some tips and best practices for effective network filtering.

    In this highly informational, and entertaining webinar Professor Wool will cover:

    • The Early 90s: Host vs. Network
    • Late 90s: Keeping State
    • 2003: Zone-Based firewalls
    • 2010: Next-Gen firewalls
    • 2015: Virtualized and cloud firewalls
  • [US/ UK] Migrating and Managing Security in an AWS Environment- Best Practices Recorded: Mar 27 2018 42 mins
    Edy Almer, VP Product
    Today, most enterprises are moving at least some of their business applications to the cloud. Yet while the cloud is extremely agile, it also adds a new level of complexity when it comes to network security.

    The cloud introduces a software-defined security architecture that is fundamentally different from the organization’s existing on-premise network, and as a result, many enterprises now struggle with migrating application connectivity to the cloud, and managing the cloud security controls alongside their traditional firewalls in a secure and compliant way.

    In this webinar, Edy Almer, VP Product at AlgoSec, provides technical insight and security best practices for migrating and managing security across the hybrid AWS environment.

    This webinar will cover:

    · Understanding network security before, during and after migrating your applications to AWS

    · How to identify and migrate the relevant application connectivity flows to AWS

    · Managing AWS Security Groups alongside your traditional firewalls – uniformly and securely

    · Making the most of AWS Network ACLs – to enhance traffic filtering and maximize capacity
  • [US] Simple Misconfiguration = Network Vulnerability! Recorded: Mar 6 2018 48 mins
    Anner Kushnir, VP Technology
    A single change to a network device can have far reaching effects on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill!

    In this technical webinar, Anner Kushnir, VP Technology at AlgoSec, will present several examples of common misconfigurations; including a basic device change, business application connectivity changes, and data center migrations. The webinar will cover best practices and demonstrate specific techniques to help you understand and avoid misconfigurations, and ultimately protect your business from attack.

    Join the webinar to discover how to:

    •Understand and map your enterprise infrastructure topology before you make a change
    •Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    •Avoid common mistakes when making changes to your network security devices
    •Understand business requirements from the network security perspective
Security Policy Management
AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1,500 of the world’s leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Automated Security Policy Allows Financial Institutions to make the Triple Play
  • Live at: Oct 11 2018 2:00 pm
  • Presented by: Asher Benbenisty, Director of Product Marketing
  • From:
Your email has been sent.
or close