Hi [[ session.user.profile.firstName ]]

Taming the storm clouds: managing network security across hybrid and multi-cloud

Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.

Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.

Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.

Yonatan will cover how to:
•Easily and automatically identify security risks and misconfigurations in your cloud
•Centrally manage security controls across accounts, regions and VPCs/VNETs
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs
•Obtain a cross-network-estate risk analysis
Recorded Mar 27 2019 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Yonatan Klein, Director of Product Management (AlgoSec)
Presentation preview: Taming the storm clouds: managing network security across hybrid and multi-cloud
  • Channel
  • Channel profile
  • Network Security Management: Insights from the Field Recorded: Nov 26 2019 36 mins
    Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) and Kyle Wickert, Worldwide Solution Architect (AlgoSec)
    Every organization manages security differently and changes at a different pace. But how does your organization compare to others? Are there practices from other organizations that you can adopt?
    Join the conversation with Yitzy Tannenbaum, Product Marketing Manager, and Kyle Wickert, Worldwide Strategic Architect, as Kyle shares his insights from visiting hundreds of companies in the field.
    Learn about:
    •Managing multi-vendors and multi-technologies within large enterprise hybrid networks.
    •Accelerating troubleshooting and cumbersome processes, such as rule recertification and application connectivity.
    •Ensuring continuous compliance while adopting new regulations.
    •Utilizing a network security management to achieve Zero Trust.
    •Understanding business applications and the potential related security risks
    •How organizations are handing internal struggles between teams and stakeholders in a complex hybrid environment.
    Join us for an insightful webcast.
  • Zero-Touch Network Security Automation Recorded: Nov 19 2019 36 mins
    Dania Ben Peretz, Product Manager (AlgoSec)
    Complex networks take significant resources to get projects from A to B. There’s a lot of hands-on, manual effort required to manage networks and keep them secure. Network management is demandingly ‘high-touch.’

    There is a better way. ‘Zero-touch’ solutions can accelerate change requests, with request generation to implementation taking just minutes. But, preparing for zero-touch network automation isn’t a zero-touch process. Preparation is needed, especially if you have a complex hybrid network: on-premise, in the cloud, and/or using an SDN.

    In this webinar, Dania Ben Peretz, AlgoSec Product Manager, will reveal technical tips and tricks and the steps needed to get zero-touch network automation up and running.

    Learn how to:
    • Get a comprehensive view of your network
    • Automate each step in the change process
    o Discover which security devices are in the path and blocking traffic
    o Define the allowed connectivity between zones
    o Plan changes, naming conventions, and change policies
    o Push changes to devices
    o Validate changes and detect out-of-band changes
    • Accelerate application changes and have application owners and IT managers speak the same language
  • Stop putting out fires. Pass network security audits – every time Recorded: Nov 12 2019 37 mins
    Tal Dayan, Product Manager (AlgoSec)
    Compliance with network and data security regulations and internal
    standards is vital and mission-critical. But with increasing global
    regulations and network complexities, it’s harder than ever to keep
    up.

    Firewall management and network security policies are critical
    components in achieving compliance. Firewall audits are complex and
    demanding and documentation of current rules is lacking. There’s no
    time and resources to find, organize, and inspect all your firewall
    rules. Instead of being proactive and preventative, network security
    teams are constantly putting out fires.

    In this webinar, you will learn:

    • The golden rules for passing a network security audit
    • Best practices to maintain continuous compliance
    • How to conduct a risk assessment and fix issues

    Learn how to prevent fires and pass network security audits every
    time.

    Tal Dayan, AlgoSec’s product manager, will reveal the Firewall Audit
    Checklist, the six best practices to ensure successful audits.

    By adopting these best practices, security teams will significantly
    improve their network’s security posture and reduce the pain of
    ensuring compliance with regulations, industry standards and corporate
    policies.
  • Micro-Segmentation Implementation - Taking the Leap from Strategy to Execution Recorded: Nov 5 2019 53 mins
    Avishai Wool, CTO & Co-founder (AlgoSec)
    Micro-segmentation helps protect the enterprise network against the
    lateral movement of malware and insider threats. Maybe you’re in the
    process of developing a micro-segmentation strategy or just about to
    start a micro-segmentation project, but don’t know where to begin and
    concerned about mistakes along the way.

    In this practical webinar, Professor Avishai Wool, AlgoSec CTO and
    co-founder will walk you through each step of your micro-segmentation
    project – from developing the right micro-segmentation strategy to
    successfully implementing and maintaining your micro-segmented
    network.

    Learn:

    - Why micro-segmentation is a critical part of your network security
    posture.
    - Common pitfalls in micro-segmentation projects and how to avoid
    them.
    - The stages of a successful micro-segmentation project.
    - How to monitor and maintain your micro-segmented network.
    - The role of policy management, change management, and automation in
    micro-segmentation.
  • Stop putting out fires. Pass network security audits – every time Recorded: Oct 29 2019 38 mins
    Tal Dayan, Product Manager (AlgoSec)
    Compliance with network and data security regulations and internal
    standards is vital and mission-critical. But with increasing global
    regulations and network complexities, it’s harder than ever to keep
    up.

    Firewall management and network security policies are critical
    components in achieving compliance. Firewall audits are complex and
    demanding and documentation of current rules is lacking. There’s no
    time and resources to find, organize, and inspect all your firewall
    rules. Instead of being proactive and preventative, network security
    teams are constantly putting out fires.

    In this webinar, you will learn:

    • The golden rules for passing a network security audit
    • Best practices to maintain continuous compliance
    • How to conduct a risk assessment and fix issues

    Learn how to prevent fires and pass network security audits every
    time.

    Tal Dayan, AlgoSec’s product manager, will reveal the Firewall Audit
    Checklist, the six best practices to ensure successful audits.

    By adopting these best practices, security teams will significantly
    improve their network’s security posture and reduce the pain of
    ensuring compliance with regulations, industry standards and corporate
    policies.
  • Micro-Segmentation Implementation - Taking the Leap from Strategy to Execution Recorded: Sep 26 2019 54 mins
    Avishai Wool, CTO & Co-founder (AlgoSec)
    Micro-segmentation helps protect the enterprise network against the
    lateral movement of malware and insider threats. Maybe you’re in the
    process of developing a micro-segmentation strategy or just about to
    start a micro-segmentation project, but don’t know where to begin and
    concerned about mistakes along the way.

    In this practical webinar, Professor Avishai Wool, AlgoSec CTO and
    co-founder will walk you through each step of your micro-segmentation
    project – from developing the right micro-segmentation strategy to
    successfully implementing and maintaining your micro-segmented
    network.

    Learn:

    - Why micro-segmentation is a critical part of your network security
    posture.
    - Common pitfalls in micro-segmentation projects and how to avoid
    them.
    - The stages of a successful micro-segmentation project.
    - How to monitor and maintain your micro-segmented network.
    - The role of policy management, change management, and automation in
    micro-segmentation.
  • Simple Network Misconfigurations Equals Big Vulnerabilities - How to Avoid It Recorded: Aug 20 2019 34 mins
    Avivi Siman-Tov, Director of Product, AlgoSec
    Misconfigurations aren’t simply inconvenient errors but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s latest list of Top 10 most critical web application security risks.

    A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your regulatory audit, and even cause costly outages that bring your business to a standstill! This is true whether on-premise or in the cloud.

    In this webinar, Avivi will present several examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid misconfigurations.

    Watch the webinar to learn how to:

    •Monitor cloud services to take a proactive stance against misconfigurations
    •Understand and map your entire network before you make a change
    •Understand the impact of changes to your entire hybrid network
    •Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    •Use network management automation to avoid common misconfigurations
    •Avoid common mistakes when making changes to your network security devices
  • What to ask when choosing a network security policy management solution Recorded: Aug 13 2019 40 mins
    Kyle Wickert, Worldwide Strategic Architect (AlgoSec)
    IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity. In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.

    In this technical webinar, Kyle Wickert, the Worldwide Strategic Architect at AlgoSec, shares tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.

    Key topics include:
    - Intelligent automation is more than just adding policies
    - Letting a business-centric approach take the lead
    - Extracting the best from existing automation processes and creating new ones
    - Managing it all together: cloud, SDN and on-premise
  • Empowering DevOps with Network Security and Application Connectivity Automation Recorded: Aug 6 2019 36 mins
    Omer Ganot, Product Manager at AlgoSec
    DevOps methodologies enable agile application development and rapid delivery. However, sometimes network security is an afterthought, leading to bottlenecks before release and security breaches after.

    When it comes to network connectivity, such as whenever a new application needs to connect to an external resource, the continuous delivery process grinds to a halt. Approving and implementing network changes could stall the application provisioning for weeks. The application developer needs to open change requests and wait for approvals, breaking the continuous delivery cycle. As a result, security is in the uncomfortable position of being a bottleneck and an impediment to innovation.

    In this webinar, Omer Ganot, AlgoSec’s Product Manager will describe how to seamlessly integrate network security into DevOps, and how the ‘Connectivity as Code’ approach can be implemented to overcome these challenges.

    This webinar will teach you how to:
    • Weave network security changes into the existing CI/CD pipeline to fully automate the application
    delivery process
    • Seamlessly manage network connectivity as part of the DevOps process for secure, faster, more
    agile and problem-free application delivery
    • Ensure continuous compliance and auditability throughout the application delivery process
    • Get clearly documented application connectivity requirements which help ensure business
    continuity
    • Bridge the gap between application developers and network security throughout the entire
    application lifecycle
  • Avoiding the Security/Agility Tradeoff with Network Security Policy Automation Recorded: Jul 10 2019 44 mins
    Yitzy Tannenbaum, Product Marketing Manager at AlgoSec
    Business application deployments and changes require IT, networking and security teams to be more agile than ever before.
    But frequently, this agility comes at the expense of security and compliance and enables network breaches and cyber-attacks.

    In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, will cover how network security policy automation helps you avoid this conflict.

    Join the webinar to learn how to:
    •Plan for the entire network security lifecycle
    •Discover your network topology and traffic flows
    •Ensure continuous compliance and identify risks and compliance violations
    •Easily implement changes across your hybrid network environment
    •Mandate a consistent and unified change process
  • Effective Multi-Vendor Management | Fortinet & AlgoSec Joint Webinar Recorded: Jun 26 2019 56 mins
    Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec)
    In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.

    In this webinar, Satish Veerapuneni, Director of Products and Solutions at Fortinet and Yoav Karnibad, Product Manager at AlgoSec will discuss how joint customers benefit from AlgoSec’s multi-vendor security policy management capabilities while leveraging Fortinet’s industry-leading Security Fabric’s FortiManager & FortiAnalyzer.

    Join this live webinar to learn how to:
    • Automate policy optimization and risk assessment across all your security devices.
    • Enhance visibility and exercise greater control over your hybrid / heterogeneous network
    • Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation
    • Assess risk and ensure regulatory compliance across the entire enterprise environment
    • Realize single pane of glass management with advanced analysis and management of policy modifications through Fortinet Security Fabric’s FortiManager/FortiAnalyzer
    and AlgoSec’s Firewall Analyzer, FireFlow and BusinessFlow
  • Securely Managing Application Connectivity – Best Practices Recorded: Jun 12 2019 19 mins
    Yoni Geva, Product Manager (AlgoSec)
    New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.

    In this webinar, Yoni Geva, Product Manager at AlgoSec will present:

    • Innovative application-discovery technologies
    • Application-centric use cases, including policy cleanup and documentation
    • How to simplify and accelerate rule recertification through automation
    • How to prevent breaches by associating vulnerabilities to business applications and
    firewall rules
    • How to ensure ongoing compliance and audit-readiness
  • CSA Study: Cloud Security Complexity Recorded: Jun 4 2019 52 mins
    Yitzy Tannenbaum, Product Marketing Manager at AlgoSec
    Cloud computing provides improved security, agility and flexibility. However, integrating this new service into legacy IT environments comes with great concern.

    The Cloud Security Alliance has recently surveyed over 700 IT and network security professionals from around the globe on security challenges in cloud environments. In this research, security, data loss and compliance were identified as the top 3 concerns when moving to the cloud. In the face of increasingly complex environments, cloud visibility and expertise are essential to ensuring a manageable, secure and fluent transition to a native cloud, hybrid or multi-cloud environment.

    In this webinar Yitzy Tannenbaum, Product Marketing Manager at AlgoSec will review and analyze the findings from the new CSA report “Cloud Security Complexity: Challenges in Managing Security in Native Hybrid and Multi-Cloud Environments”, including:

    • Types of cloud platforms being used by companies
    • Common challenges faced by companies when moving workloads to the cloud
    • The many stakeholder involved in cloud security
    • Methods of managing risk and vulnerabilities in the cloud environment
    • Causes of network or application outages and the amount of time it took to remediate
  • Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar Recorded: May 29 2019 57 mins
    Doug Hurd, Security Technical Alliances at Cisco and Yonatan Klein, Director of Product Management at AlgoSec
    Many enterprises are moving to Cisco’s next generation firewall, Firepower, which offers unique capabilities - including Next Gen IPS powered by Snort and Advanced Malware Protection (AMP). However, migrating current security policy to Cisco Firepower is often complex, time-consuming and prone to errors. A single mistake could, potentially, cause outages, compliance violations and security gaps.

    In this webinar Doug Hurd, Security Technical Alliances at Cisco and Yonatan Klein, Director of Product Management at AlgoSec, will explore the benefits of Cisco Firepower, how to simplify and accelerate the migration process with AlgoSec, the challenges associated with managing the holistic network, and how AlgoSec can help manage security policies across your disperse network.

    Join this live webinar to hear how to:
    • Utilize a broader set of management and policy optimization features
    • Make the most out of Cisco Firepower’s features and capabilities
    • Automate policy optimization and migration from an existing firewall to Firepower
    • Manage both platforms with a common tool throughout the migration process
    • Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation
    • Reduce risks and ensure continuous compliance across the entire enterprise environment
  • CSA Study: Security Challenges in Cloud Environments Recorded: May 22 2019 61 mins
    John Yeoh, Global VP of Research (CSA) & Yitzy Tannenbaum Product Marketing Manager (AlgoSec)
    Cloud computing provides improved security, agility, and flexibility. However, integrating this new service into legacy IT environments comes with great concern.

    In a recent report published by the Cloud Security Alliance (CSA), security, data loss and compliance were identified as the top 3 concerns when moving to the cloud. In the face of increasingly complex environments, cloud visibility and expertise are essential to ensuring a manageable, secure and fluent transition to a native cloud, hybrid or multi-cloud environment.

    Join our special webinar with John Yeoh, Director of Research with expertise in cybersecurity, cloud computing, information security, and next generation technology from the Cloud Security Alliance (CSA).

    We will cover various topics from the new CSA report Cloud Complexity: The Use of Hybrid and Multi-Cloud Environments, including:

    • Workloads being used in or moved to the cloud and how they are being deployed/migrated
    • Types of cloud platforms being used by companies
    • Common security challenges faced by companies when moving workloads to the cloud
    • Methods of managing risk and vulnerabilities in the cloud environment
    • Causes of network or application outages and the amount of time it took to remediate
  • Firewall Rule Recertification with Application Connectivity Recorded: Apr 24 2019 20 mins
    Asher Benbenisty, Director of Product Marketing
    Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.

    However, manual firewall rule recertification is complex, time-consuming and prone to errors.

    Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.

    In this webinar Asher will cover:
    • Why it is important to regularly review and recertify your firewall rules
    • How to use application connectivity for firewall rule recertification
    • How to automatically manage the rule-recertification process
  • Boosting Network Security with ChatOps Recorded: Apr 17 2019 30 mins
    Dania Ben Peretz, Product Manager (AlgoSec)
    The way we consume content has greatly evolved throughout the years - from text-only collateral to using applications that centralize the content and make it easier to access. However, the number of business applications is rapidly growing, ultimately causing organizations to suffer from “app fatigue”.

    Network security stakeholders can benefit from such a shift in content consumption by taking a conversational approach with ChatOps.

    In this webinar, Dania Ben Peretz, Product Manager at AlgoSec covers how ChatOps helps network security and operational staff to:
    • Shorten resolution time of critical security incidents
    • Manage security more efficiently through collaboration and transparency between IT, Security, Network and DevOps teams
    • Ensure ongoing security and compliance
  • Taming the storm clouds: managing network security across hybrid and multi-cloud Recorded: Mar 27 2019 46 mins
    Yonatan Klein, Director of Product Management (AlgoSec)
    Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.

    Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.

    Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.

    Yonatan will cover how to:
    •Easily and automatically identify security risks and misconfigurations in your cloud
    •Centrally manage security controls across accounts, regions and VPCs/VNETs
    •Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs
    •Obtain a cross-network-estate risk analysis
  • Panel: Network Security and Compliance best practices for Financial Institutions Recorded: Mar 20 2019 24 mins
    Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.

    There’s a better way to manage your network security!

    Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.

    Topics include:

    •How to overcome security management complexities with automation
    •How to pass compliance audits in the face of demanding regulations
    •Key industry metrics that compare security environments within and beyond the finance industry
    •Real financial customers case studies
  • Cyber Security Battles: How to Prepare and Win Recorded: Mar 6 2019 45 mins
    Shahrokh Shahidzadeh (Acceptto), George McGregor (Imperva), Avishai Wool (Algosec), Chris Morales (Vectra)
    What is the future of cyber warfare and how does it impact enterprise security? While the world has yet to see a cyber battle between AI systems, experts predict this might be on the horizon in the next three to five years.

    Join this interactive Q&A panel with security experts to learn more about:
    - The current state of cybersecurity and AI
    - How to deploy AI to detect malware
    - What is adversarial AI (or offensive AI) and how to protect against cyber attacks
    - Preparing for battle
    - What's needed to build an AI system and how to build one that can be used to bypass other AI systems
    - How to fight adversaries that have better resources
    - Protecting against nation state attacks
    - Lessons and recommendations for a more resilient enterprise
Security Policy Management
AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1,500 of the world’s leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Taming the storm clouds: managing network security across hybrid and multi-cloud
  • Live at: Mar 27 2019 2:00 pm
  • Presented by: Yonatan Klein, Director of Product Management (AlgoSec)
  • From:
Your email has been sent.
or close