Hi [[ session.user.profile.firstName ]]

Effective Multi-Vendor Management | Fortinet & AlgoSec Joint Webinar

In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.

In this webinar, Satish Veerapuneni, Director of Products and Solutions at Fortinet and Yoav Karnibad, Product Manager at AlgoSec will discuss how joint customers benefit from AlgoSec’s multi-vendor security policy management capabilities while leveraging Fortinet’s industry-leading Security Fabric’s FortiManager & FortiAnalyzer.

Join this live webinar to learn how to:
• Automate policy optimization and risk assessment across all your security devices.
• Enhance visibility and exercise greater control over your hybrid / heterogeneous network
• Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation
• Assess risk and ensure regulatory compliance across the entire enterprise environment
• Realize single pane of glass management with advanced analysis and management of policy modifications through Fortinet Security Fabric’s FortiManager/FortiAnalyzer
and AlgoSec’s Firewall Analyzer, FireFlow and BusinessFlow
Recorded Jun 26 2019 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec)
Presentation preview: Effective Multi-Vendor Management | Fortinet & AlgoSec Joint Webinar
  • Channel
  • Channel profile
  • Live Webinar: 5 Practical Steps to Implementing a Zero-Trust Network Jun 30 2020 2:00 pm UTC 60 mins
    Chase Cunningham, Principal Analyst (Forrester Research), Prof. Avishai Wool, Co-founder & CTO (AlgoSec)
    A zero-trust architecture mitigates risk by only providing the minimally required access to your network resources. But implementing zero-trust is easier said than done.

    Get practical tips to successfully implement zero-trust architecture in this webinar featuring Chase Cunningham of Forrester Research and Prof. Avishai Wool, AlgoSec’s co-founder and CTO.

    In this session, they will discuss why zero-trust architecture is the blueprint for an effective security strategy, challenges implementing zero-trust architecture, as well as provide the five practical steps to successfully implementing zero-trust architecture:

    • Taking an inventory of your sensitive data and deciding how to segment it
    • Mapping the traffic flows of your sensitive data and associate them to your business applications
    • Designing and enforcing your network’s micro-perimeters
    • Ensuring all your security ecosystem integrates so you can holistically monitor and adjust your network if threats are detected
    • Embracing security automation and orchestration for long-term success
  • [Live Demo Webcast] Securing your network with change management automation Jun 23 2020 3:30 pm UTC 45 mins
    Malcom Sargla, Regional Sales Engineer
    Organizations’ cyber risks have increased as organizations were forced to make changes rapidly to adapt to the shift to stay-at-home and increased pressure on digital resources. Many of those changes were implemented under tremendous pressure, digital tools were hastily adopted, and left doors open for attackers. These open doors need to be fixed, even as COVID-19 and its related workplace and economic pressure continue.

    According to a recent World Economic Forum survey, 50% of respondents are worried about an increase in cyberattacks against their companies in the post COVID-19 era.

    In our live demo webcast, we will show you how to use automated policy change management to keep your network secure as you cope with these.

    In the session, we will discuss:
    • Rapid policy provisioning with confidence – how to automate your policy provisioning so you can safely make changes in minutes instead of days
    • Policy management across your entire hybrid network, and how to safely migrate data to the cloud
    • How to review and cleanup VPN policies, so you can shape your policies to meet your business requirements
    • Best practices for targeted security policy cleanup – how to focus on overly permissive and unused policies where it matters most

    Secure your seat, this live demo webcast will not be available on-demand.
    Request a personal demo by clicking the link in the attachments tab.
  • [Live Demo Webcast] Securing your network with change management automation Jun 23 2020 7:00 am UTC 45 mins
    Kulpreet Ahuja, Regional Sales Engineer (AlgoSec)
    Organizations’ cyber risks have increased as organizations were forced to make changes rapidly to adapt to the shift to stay-at-home and increased pressure on digital resources. Many of those changes were implemented under tremendous pressure, digital tools were hastily adopted, and left doors open for attackers. These open doors need to be fixed, even as COVID-19 and its related workplace and economic pressure continue.

    According to a recent World Economic Forum survey, 50% of respondents are worried about an increase in cyberattacks against their companies in the post COVID-19 era.

    In our live demo webcast, we will show you how to use automated policy change management to keep your network secure as you cope with these.

    In the session, we will discuss:
    • Rapid policy provisioning with confidence – how to automate your policy provisioning so you can safely make changes in minutes instead of days
    • Policy management across your entire hybrid network, and how to safely migrate data to the cloud
    • How to review and cleanup VPN policies, so you can shape your policies to meet your business requirements
    • Best practices for targeted security policy cleanup – how to focus on overly permissive and unused policies where it matters most

    Secure your seat, this live demo webcast will not be available on-demand.
    Request a personal demo by clicking the link in the attachments tab.
  • Cisco & AlgoSec Achieving application-driven security across your hybrid network Jun 10 2020 2:00 pm UTC 60 mins
    Roxana Diaz, Worldwide Technical Solutions Architect (Cisco), Yonatan Klein, Director of Product (AlgoSec)
    Your network extends into hybrid environments and may include private clouds running Cisco ACI, and on-premises devices. Managing network security policies in your multi-vendor estate is complex.

    Because your network is made up of multiple vendors and each part of your network estate is managed in its own silo, it is tough to get centralized management of your entire network. Making changes is a chore and validating security is difficult.

    Learn how to unify, consolidate, and automate your entire network security policy management across your Cisco and multi-vendor estate.

    In this session Roxana Diaz, Worldwide Technical Solutions Architect at Cisco, and Yonatan Klein, AlgoSec’s Director of Product, will discuss how to manage the Cisco and multi-cloud estate and how to:
    • Capitalize on your Cisco ACI investment to take advantage of its full capabilities
    • Bring centralized visibility, automation, and compliance monitoring into your Cisco and multi-vendor network ecosystem
    • Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it, including Cisco firewalls and routers, as well as multi-vendor devices.
    • Take advantage of Cisco Tetration Analytics and AlgoSec’s intelligent discovery to get a full picture of your network and application traffic and to design and provision a micro-segmentation network policy design.
    • Unify, consolidate, and automate your network security policy management
    • Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations

    Be sure to check out the Attachments tab for more resources.
  • [Live Demo Webcast] Secure Gov't Networks and Applications, Accelerate Change Jun 9 2020 3:00 pm UTC 45 mins
    James Miller, Solutions Engineer (AlgoSec)
    With increased attack surfaces created by the need to work from home, security management and continuous compliance are more important than ever in government agencies and those supporting them.

    Agencies are undertaking digital transformation initiatives and moving to public and private clouds. The current crisis has only accelerated these critical initiatives. Agencies must protect applications and data in periods of rapid change.

    In this live demo, we will show you how to accelerate change while securing your government network and its critical applications.

    In the session, learn how to:
    • Model your heterogeneous network to surface compliance, policy, and zone to zone traffic risks
    • Create an accurate application dependency model to understand risks, vulnerabilities, incidents, and prioritize remediation efforts
    • Gain control of server and application migration projects and automate provisioning to assure continuous compliance and reduce outages
    • Maintain compliance with critical regulations and internal standards, while effectively documenting changes so you remain audit-ready
    • Associate the new rules and changes with their related business applications, in order to enable recertifications and secure decommissioning
    • Empower responders to quickly visualize the criticality of incidents and reduce their impact on the organization rapidly
  • [Live Demo Webcast] Secure Gov't Networks and Applications, Accelerate Change Jun 9 2020 7:00 am UTC 45 mins
    Kulpreet Ahuja, Solutions Engineer (AlgoSec)
    With increased attack surfaces created by the need to work from home, security management and continuous compliance are more important than ever in government agencies and those supporting them.

    Agencies are undertaking digital transformation initiatives and moving to public and private clouds. The current crisis has only accelerated these critical initiatives. Agencies must protect applications and data in periods of rapid change.

    In this live demo, we will show you how to accelerate change while securing your government network and its critical applications.

    In the session, learn how to:
    • Model your heterogeneous network to surface compliance, policy, and zone to zone traffic risks
    • Create an accurate application dependency model to understand risks, vulnerabilities, incidents, and prioritize remediation efforts
    • Gain control of server and application migration projects and automate provisioning to assure continuous compliance and reduce outages
    • Maintain compliance with critical regulations and internal standards, while effectively documenting changes so you remain audit-ready
    • Associate the new rules and changes with their related business applications, in order to enable recertifications and secure decommissioning
    • Empower responders to quickly visualize the criticality of incidents and reduce their impact on the organization rapidly
  • Panel: Network Security and Compliance best practices for Financial Institutions Jun 4 2020 1:00 pm UTC 23 mins
    Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.

    There’s a better way to manage your network security!

    Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.

    Topics include:

    • How to overcome security management complexities with automation
    • How to pass compliance audits in the face of demanding regulations
    • Key industry metrics that compare security environments within and beyond the finance industry
    • Real financial customers case studies
  • [Panel] How to Solve the Hybrid Cloud Policy Management Challenge Recorded: May 27 2020 55 mins
    Yonatan Klein, Director of Product, Omer Ganot, Product Manager and Yitzy Tannenbaurm, Product Marketing Manager (AlgoSec)
    Today, your network is complex, extending beyond the perimeter in multiple locations, made up of multiple public and private clouds, SDNs, as well as on-premises data centers. Security controls are a “black box.” IT and security staff find it difficult to gain visibility, and maintain security in the hybrid cloud.

    Join a panel discussion with Yonatan Klein and Omer Ganot from AlgoSec’s product management team, along with moderator Yitzy Tannenbaum as they debate the hybrid management cloud challenge.

    They will discuss how to solve complex challenges securing hybrid networks, including:
    • Gaining full policy and network visibility for their hybrid, multi-cloud network
    • Multiple clouds with emphasis on the hybrid network - private and public
    • Effective communication among multiple business, IT and security stakeholders to save time, reduce risk, and avoid misconfigurations
    • Managing network security controls in a heterogeneous network environment
  • Cut the Clutter with ChatOps & Improve Network Security Recorded: May 13 2020 26 mins
    Dania Ben Peretz, Product Manager (AlgoSec)
    IT teams’ alerts are overflowing with questions about network status from coworkers. Say no to overwhelming alerts in multiple applications. There is a better way to get critical answers about the state of your network: ChatOps.

    ChatOps, using your existing chat tools such as Slack or Microsoft Teams, can get the crucial questions answered, and not have to track multiple apps separately.

    In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, will demonstrate the latest in AlgoBot and show how to:
    • Get immediate answers to pressing network traffic questions
    • Get immediate answers about whether your business applications are secure
    • Decrease the time it takes to resolve critical security incidents
    • Empower your business and application teams to drive innovation
    • Ensure that your network and security teams are focusing on the most critical issues
    • Efficiently manage security by transparently collaborating with IT, Security, Network and DevOps teams

    All while saving time, reducing resources, and cutting the clutter.
  • Turning network security alerts into action: Change automation to the rescue Recorded: Apr 7 2020 29 mins
    Dania Ben Peretz, Product Manager (AlgoSec)
    You use multiple network security controls in your organization, but they don’t talk to each other. And while you may get alerts that come with tools such as SIEM solutions and vulnerability scanners - in your security landscape, making the necessary changes to proactively react to the myriad of alerts is difficult. Responding to alerts feels like a game of whack-a-mole. Manual changes are also error-prone, resulting in misconfigurations. It’s clear that manual processes are insufficient for your multi-device, multi-vendor, and heterogeneous environment network landscape.

    What’s the solution? Network security change automation!

    By implementing change automation for your network security policies across your enterprise security landscape you can continue to use your existing business processes while enhancing business agility, accelerate incident response times, and reduce the risk of compliance violations and security misconfigurations.

    In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, will show you how to:

    •Automate your network security policy changes without breaking core network connectivity
    •Analyze and recommend changes to your network security policies
    •Push network security policy changes with zero-touch automation to your multi-vendor security devices
    •Maximize the ROI of your existing security controls by automatically analyzing, validating, and implementing network security policy changes – all while seamlessly integrating with your existing business processes
  • Optimize your Juniper investment with intelligent network security automation Recorded: Mar 24 2020 32 mins
    Max Shirshov, EMEA Solutions Architect at AlgoSec
    Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.
    In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.
    Join the webinar to learn how to:
    • Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks
    • Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds
    • Automate application and user aware security policy management and ensure your Juniper devices are properly configured
    • Assess risk and ensure regulatory compliance across your entire enterprise environment

    Contact us: https://www.algosec.com/contact-us/
    Request a demo: https://www.algosec.com/products/#request-demo-container
    Additional Resources: https://www.algosec.com/resources/
    Follow us on LinkedIn and stay up to date! https://www.linkedin.com/company/algosec/
  • Cisco ACI & AlgoSec: Achieving application-driven security across hybrid network Recorded: Mar 18 2020 63 mins
    Omer Ganot, Product Manager (AlgoSec)
    As your network extends into hybrid and multi-cloud environments, including software-defined networks such as Cisco ACI, managing security policies within your hybrid estate becomes more and more complex.

    Because each part of your network estate is managed in its own silo, it’s tough to get a full view of your entire network. Making changes across your entire network is a chore and validating your entire network’s security is virtually impossible.

    Learn how to unify, consolidate, and automate your entire network security policy management including both within the Cisco ACI fabric and elements outside the fabric.

    In this session Omer Ganot, AlgoSec’s Product Manager, will discuss how to:
    •Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it.
    •Unify, consolidate, and automate your network security policy management, including elements within and outside of the Cisco ACI fabric.
    •Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations
  • Cessation of misconfigurations: Common network risks & how to avoid them Recorded: Mar 11 2020 32 mins
    Avivi Siman-Tov, Director of Product (AlgoSec)
    Misconfigurations aren’t simply inconvenient mistakes but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s list of Top 10 most critical web application security risks.

    A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your audits, and cause costly outages that bring your business to a standstill.

    In this webinar, Avivi Siman-Tov, AlgoSec’s Director of Product, will show examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid them.

    Watch the webinar to learn how to:
    •Understand and map your entire network before you make a change
    •Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole and understand the impact of changes to your entire network
    •Maximize the capabilities of network management automation to avoid common misconfigurations
    •Avoid common mistakes when making changes to your network security devices

    For questions click here: https://www.algosec.com/contact-us/
    For a demo click here: https://www.algosec.com/products/#request-demo-container
    For additional resources: https://www.algosec.com/resources/
  • Network Security Vision with Application Visibility Recorded: Mar 5 2020 52 mins
    Avishai Wool, CTO & Co-founder (AlgoSec) & Yoni Geva, Product Manager (AlgoSec)
    You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.

    But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?

    Stop running blind. Expand your vision with application visibility.

    With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.

    In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate – in a live demo - how to overcome these challenges and ensure business continuity through application visibility.

    Join the webinar and learn how to:
    • Associate your business applications with your security policy rules.
    • Identify the network traffic relevant for each application.
    • Identify hidden risks and vulnerabilities in your applications.
    • Associate compliance violations with the relevant business applications.
    • Improve troubleshooting by identifying affected applications.
    • Better document the applications on your network.
  • Network Security Policy Management: Visibility & Automation in Tech Eco-Systems Recorded: Feb 27 2020 28 mins
    Yonatan Klein, Director of Product, AlgoSec & Rolf von Roessing, Board Director, ISACA
    When it comes to managing network security policy changes in 2020, organizations are still struggling with visibility across their environments and oftentimes, manual processes. Changing security policies also involves different teams that have different objectives (e.g. security vs. networking vs application delivery) and use different terminology. Mistakes are common and can result in compliance violations. How can you process changes to the network security policy without slowing down your business? 

    Join this video interview with Yonatan Klein, Director of Product, AlgoSec, to learn what's needed to proactively assess security policy changes to minimize risk to your business, avoid outages and ensure compliance. 

    -Today's network security technology eco-system / heterogeneous environments, including hybrid cloud
    -Visibility for network security
    -Network security change management and automation
    -Compliance issues around network securityNetwork security use cases
    -Tying all of the above to the business

    This exclusive video interview will be broadcast LIVE from San Francisco during the 2020 RSA Conference.
  • Application-aware Network Security! Securing business apps on your network Recorded: Feb 17 2020 36 mins
    Asher Benbenisty, Director of Product Marketing
    You’re constantly adding and removing applications on your network and managing associated connectivity, while faced with a constant barrage of cyber-attacks. Your security management efforts need to focus on what matters most – making sure that the business applications on your network run smoothly while remaining secure and compliant.

    With full visibility to your network’s application architecture, you can better understand how to secure your network environment and ensure business agility in the context of constant change management.

    In this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, discusses how to identify business applications, discover their traffic flows, and apply this knowledge to enhance their network security and connectivity.

    Learn how to:
    - Gain insight into your company’s security policy management maturity level
    - Obtain true visibility into your application architecture environment
    - Discover and map your business applications’ network connectivity flows
    - Identify security risks and associate them to affected business applications
    - Securely migrate business applications and security devices to new data centers
  • 5 ways to better manage your network security in 2020 Recorded: Feb 13 2020 47 mins
    Avishai Wool, CTO & Co-founder (AlgoSec) & Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Is your network ready for 2020? What practical steps are you taking to prepare for even more demanding security management in the new year?

    In this live panel discussion, Yitzy Tannenbaum, Product Marketing Manager and Avishai Wool, AlgoSec’s co-founder and CTO, will cover 5 practical steps to help you better manage your network security in the new year.

    Address these pressing network security challenges:

    • Preventing breaches due to network misconfigurations
    • Managing complex compliance requirements
    • Determine the intention of your security controls and embracing intent-based network security
    • Implementing datacenter micro-segmentation
    • Understanding the shared responsibility model and effectively managing cloud security

    Kick off the new year better prepared to face the network security management challenges – don’t miss this important discussion.
  • Achieving Visibility & Security in AWS & Hybrid Network | Joint AWS & AlgoSec Recorded: Feb 4 2020 49 mins
    Yonatan Klein, Director of Product (AlgoSec) Ram Dileepan, Partner Solutions Architect (AWS)
    As enterprises rapidly migrate data and applications to public clouds such as Amazon Web Services (AWS), they achieve many benefits, including advanced security capabilities, but also face new security challenges.

    AWS lets organizations operate applications in a hybrid deployment mode by providing multiple networking capabilities. To maintain an effective security posture while deploying applications across complex hybrid network environments, security professionals need a holistic view and control from a single source.

    Yet, security isn’t just the responsibility of the cloud providers alone. Organizations need to understand the shared responsibility model and their role in maintaining a secure deployment. While AWS’s cloud framework is secured by AWS, the challenge of using the cloud securely is the responsibility of your organization’s IT and CISOs. As multiple DevOps and IT personnel make frequent configuration changes, the shared responsibility model helps achieve visibility and maintain cloud security.

    In this webinar, Yonatan Klein, AlgoSec’s Director of Product, and Ram Dileepan, Amazon Web Service’s Partner Solutions Architect, will share best practices for network security governance in AWS and hybrid network environments.
  • 1-2-1 Interview - AlgoSec, Cybertech Tel Aviv 2020 Recorded: Feb 4 2020 11 mins
    Asher Benbenisty, Director of Product Marketing
    AlgoSec, Cybertech Tel Aviv 2020
    1-2-1 Interview - Asher Benbenisty, Director of Product Marketing
  • Network Security Management: Insights from the Field Recorded: Jan 26 2020 35 mins
    Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) and Kyle Wickert, Worldwide Solution Architect (AlgoSec)
    Every organization manages security differently and changes at a different pace. But how does your organization compare to others? Are there practices from other organizations that you can adopt?
    Join the conversation with Yitzy Tannenbaum, Product Marketing Manager, and Kyle Wickert, Worldwide Strategic Architect, as Kyle shares his insights from visiting hundreds of companies in the field.
    Learn about:
    •Managing multi-vendors and multi-technologies within large enterprise hybrid networks.
    •Accelerating troubleshooting and cumbersome processes, such as rule recertification and application connectivity.
    •Ensuring continuous compliance while adopting new regulations.
    •Utilizing a network security management to achieve Zero Trust.
    •Understanding business applications and the potential related security risks
    •How organizations are handing internal struggles between teams and stakeholders in a complex hybrid environment.
    Join us for an insightful webcast.
Business-Driven Network Security Policy Management
The leading provider of business-driven security management solutions, AlgoSec helps the world’s largest organizations align security with their business processes. With AlgoSec users can discover, map and migrate business application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate network security changes with zero touch - across their cloud, SDN and on-premise networks. Over 1,800 leading organizations, including 20 of the Fortune 50, have utilized AlgoSec’s solutions to make their organizations more agile, more secure and more compliant - all the time. Since its inception, AlgoSec has provided the industry’s only money-back guarantee.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Effective Multi-Vendor Management | Fortinet & AlgoSec Joint Webinar
  • Live at: Jun 26 2019 3:00 pm
  • Presented by: Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec)
  • From:
Your email has been sent.
or close