Hi [[ session.user.profile.firstName ]]

Cisco ACI & AlgoSec: Achieving application-driven security across hybrid network

As your network extends into hybrid and multi-cloud environments, including software-defined networks such as Cisco ACI, managing security policies within your hybrid estate becomes more and more complex.

Because each part of your network estate is managed in its own silo, it’s tough to get a full view of your entire network. Making changes across your entire network is a chore and validating your entire network’s security is virtually impossible.

Learn how to unify, consolidate, and automate your entire network security policy management including both within the Cisco ACI fabric and elements outside the fabric.

In this session Omer Ganot, AlgoSec’s Product Manager, will discuss how to:
•Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it.
•Unify, consolidate, and automate your network security policy management, including elements within and outside of the Cisco ACI fabric.
•Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations
Recorded Mar 18 2020 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Omer Ganot, Product Manager (AlgoSec)
Presentation preview: Cisco ACI & AlgoSec: Achieving application-driven security across hybrid network
  • Channel
  • Channel profile
  • A Customer Story: The NCR journey to effective and agile network security Dec 17 2020 3:00 pm UTC 72 mins
    Yitzy Tannenbaum, Product Marketing Manager (AlgoSec), Scott Theriault, Global Manager, Network Perimeter Security (NCR Corp)
    Managing security in a multi-billion-dollar enterprise poses many challenges, as well as opportunities. Go inside an S&P 500 company and hear how they manage their network security.

    Join Scott Theriault, Global Manager, Network Perimeter Security at NCR Corporation as he shares his real-world experience managing security in a global organization with Yitzy Tannenbaum, Product Marketing Manager at AlgoSec. Get insights on:
    - Key factors managing network security in complex organizations
    - The benefits of network policy optimization
    - Importance of maintaining and demonstrating compliance
    - Change management and automation in large, complex networks
    - Driving alignment of cloud and on-premises security
  • [Panel] How Financial Institutions Can Achieve Network Security and Compliance Recorded: Nov 26 2020 22 mins
    Asher Benbenisty, Director of Product Marketing and Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Financial institutions have strict network security requirements, which sometimes hinder innovation and digital transformation. Security and regulatory requirements act as a barrier to innovation. However, financial institutions can enable business innovation, while still achieving network security and compliance.
    Watch AlgoSec’s panel discussion, as Asher Benbenisty, Director of Product Marketing, and Yitzy Tannenbaum, Product Marketing Manager, discuss how financial institutions can simplify the network security management, reduce risk and ensure continuous compliance.
    They will discuss:
    • How intelligent automation helps overcome security management intricacy
    • How to make sure network changes meet compliance requirements and pass regulatory audits the first time
    • Industry metrics so you can benchmark your own organization as well as see how the finance sector compares to other industries
    • Case studies from other financial institutions
  • MSSP Cloud Server Migration: Onboarding Your Customer Recorded: Nov 18 2020 32 mins
    Tim Bloomer, MSSP Sales Engineer and Jason Weller, MSSP Sales Director
    Using the firewall policies to guide the data center migration can let the network security team lead the migration process. Even in the most poorly documented data centers, the firewall rules can provide crucial clues to other IT teams as to which applications will be affected by migrating a server, and which groups of servers will benefit from being migrated simultaneously.
    Join Tim Bloomer, MSSP Sales Engineer at AlgoSec, and Jason Weller, MSSP Sales Director at AlgoSec, as they show you why to migrate your customer’s physical data center (or at least some critical applications within the data center) to a virtual data center:
    • Improving disaster-recovery capabilities
    • Addressing regulatory requirements for keeping certain customers’ personal data in-country rather than offshore
    • Reducing operating costs
  • CTO Round Table: Fighting Ransomware with Micro-segmentation Recorded: Nov 17 2020 58 mins
    Ariel Zeitlin, CTO (Guardicore) | Avishai Wool, CTO & Co-founder (AlgoSec)
    In the past few months, we’ve witnessed a steep rise in ransomware attacks targeting anyone from small companies to large, global enterprises. It seems like no organization is immune to ransomware. So how do you protect your network from such attacks?

    Join our discussion with AlgoSec CTO Prof. Avishai Wool and Guardicore CTO Ariel Zeitlin, and discover how micro-segmentation can help you reduce your network attack surface and protect your organization from cyber-attacks.


    Learn:
    • Why micro-segmentation is critical to fighting ransomware and other cyber threats.
    • Common pitfalls organizations face when implementing a micro-segmentation project
    • How to discover applications and their connectivity requirements across complex network environments.
    • How to write micro-segmentation filtering policy within and outside the data center
  • Cloud migrations made simpler: Safe, Secure and Successful Migrations Recorded: Oct 28 2020 36 mins
    Avivi Siman-Tov, Director of Product (AlgoSec)
    Migrating applications to the cloud – without creating security holes, application outages or violating compliance – is within reach!

    In this webinar, Avivi Siman-Tov, Director of Product at AlgoSec, will guide you how to simplify and accelerate large-scale complex application migration projects.

    The webinar will cover:
    • Why organizations choose to migrate their applications to the cloud
    • What is required in order to move the security portion of your application and how long it may take
    • Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved
    • How to deliver unified security policy management across the hybrid cloud environment
  • Implement a Zero-Trust Network - in 5 steps Recorded: Oct 21 2020 58 mins
    Chase Cunningham, Principal Analyst (Forrester Research), Prof. Avishai Wool, Co-founder & CTO (AlgoSec)
    A zero-trust architecture mitigates risk by only providing the minimally required access to your network resources. But implementing zero-trust is easier said than done.

    Get practical tips to successfully implement zero-trust architecture in this webinar featuring Chase Cunningham of Forrester Research and Prof. Avishai Wool, AlgoSec’s co-founder and CTO.

    In this session, they will discuss why zero-trust architecture is the blueprint for an effective security strategy, challenges implementing zero-trust architecture, as well as provide the five practical steps to successfully implementing zero-trust architecture:

    • Taking an inventory of your sensitive data and deciding how to segment it
    • Mapping the traffic flows of your sensitive data and associate them to your business applications
    • Designing and enforcing your network’s micro-perimeters
    • Ensuring all your security ecosystem integrates so you can holistically monitor and adjust your network if threats are detected
    • Embracing security automation and orchestration for long-term success
  • Radically Reduce Firewall Rules with Application-Driven Rule Recertification Recorded: Oct 14 2020 41 mins
    Asher Benbenisty, Director of Product Marketing (AlgoSec)
    Does your network still have obsolete firewall rules? Do you often feel overwhelmed with the number of firewall rules in your network?

    To make sure your network is secure and compliant, you need to regularly review and recertify firewall rules. However, manual firewall rule recertification is complex, time-consuming and error-prone, and mistakes may cause application outages.

    Discover a better way to recertify your firewall rules with Asher Benbenisty, AlgoSec’s Director of Product Marketing, as he discusses how associating application connectivity with your firewall rules can radically reduce the number of firewall rules on your network as well as the efforts involved in rule recertification.

    In this webinar, we will discuss:
    * The importance of regularly reviewing and recertifying your firewall rules
    * Integrating application connectivity into your firewall rule recertification process
    * Automatically managing the rule-recertification process using an application-centric approach
  • Overcoming the Challenges of Managing a Hybrid Environment Recorded: Sep 30 2020 56 mins
    Omer Ganot, Cloud Security Product Manager (AlgoSec), Stuti Deshpande, Partner Solution Architect (AWS)
    Public clouds such as Amazon Web Services (AWS) are a critical part of your hybrid network. It is important to keep out the bad guys (including untrusted insiders) and proactively secure your entire hybrid network.

    Securing your network is both the responsibility of the cloud providers, as well as your organization’s IT and CISOs – the shared responsibility model. As a result, your organization needs visibility into what needs to be protected, as well as an understanding of the tools that are available to keep them secure.

    In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande's, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment, including how to:

    • Securely migrate workloads from on-prem to public cloud
    • Gain unified visibility into your network topology and traffic flows, including both public cloud and on-premises assets, from a single console.
    • Manage/orchestrate multiple layers of security controls and proactively detect misconfigurations
    • Protect your data, accounts, and workloads from misconfiguration risks
    • Protect web applications in AWS by filtering traffic and blocking common attack patterns, such as SQL injection or cross-site scripting
    • Gain a unified view of your compliance status and achieve continuous compliance
  • [Panel] How Financial Institutions Can Achieve Network Security and Compliance Recorded: Sep 8 2020 23 mins
    Asher Benbenisty, Director of Product Marketing and Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Financial institutions have strict network security requirements, which sometimes hinder innovation and digital transformation. Security and regulatory requirements act as a barrier to innovation. However, financial institutions can enable business innovation, while still achieving network security and compliance.
    Watch AlgoSec’s panel discussion, as Asher Benbenisty, Director of Product Marketing, and Yitzy Tannenbaum, Product Marketing Manager, discuss how financial institutions can simplify the network security management, reduce risk and ensure continuous compliance.
    They will discuss:
    • How intelligent automation helps overcome security management intricacy
    • How to make sure network changes meet compliance requirements and pass regulatory audits the first time
    • Industry metrics so you can benchmark your own organization as well as see how the finance sector compares to other industries
    • Case studies from other financial institutions
  • Network Security Vision with Application Visibility Recorded: Aug 30 2020 52 mins
    Avishai Wool, CTO & Co-founder (AlgoSec) & Yoni Geva, Product Manager (AlgoSec)
    You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.

    But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?

    Stop running blind. Expand your vision with application visibility.

    With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.

    In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate how to overcome these challenges and ensure business continuity through application visibility.

    Join the webinar and learn how to:
    • Associate your business applications with your security policy rules.
    • Identify the network traffic relevant for each application.
    • Identify hidden risks and vulnerabilities in your applications.
    • Associate compliance violations with the relevant business applications.
    • Improve troubleshooting by identifying affected applications.
    • Better document the applications on your network.
  • Firewall Rule Recertification with Application Connectivity Recorded: Aug 20 2020 19 mins
    Asher Benbenisty, Director of Product Marketing (AlgoSec)
    Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.

    However, manual firewall rule recertification is complex, time-consuming and prone to errors.

    Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.

    In this webinar Asher will cover:
    • Why it is important to regularly review and recertify your firewall rules
    • How to use application connectivity for firewall rule recertification
    • How to automatically manage the rule-recertification process
  • Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar Recorded: Jul 22 2020 61 mins
    Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec)
    Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.

    They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.

    Join our live webinar to learn how to:
    • Understand your business applications to create your microsegmentation policy
    • Validate your micro-segmentation policy is accurate
    • Enforce these granular policies on workloads and summarized policies across your infrastructure
    • Use risk and vulnerability analysis to tighten your workload and network security
    • Identify and manage security risk and compliance in your micro-segmented environment

    Save your seat!
  • Automate Firewall Compliance and Remediation Reporting for MSSP Customers Recorded: Jul 14 2020 34 mins
    Tim Bloomer, MSSP Sales Engineer and Jason Weller, MSSP Sales Director
    The highly competitive nature of the MSSP market has service providers evaluating new methods to increase their margins and minimize their customer’s churn. Managing complex customer networks requires significant hands-on, manual efforts. Managed service offerings such as policy change requests have become a commodity.

    Join Tim Bloomer, MSSP Sales Engineer at AlgoSec, and Jason Weller, MSSP Sales Director at AlgoSec, as they show you how MSSPs integrate AlgoSec’s intelligent network security policy automation into their operations to deliver security policy changes in minutes instead of days. MSSPs can reduce their average cost and while cutting the time needed to make firewall change requests and increase their customer satisfaction at the same time. Join in and learn how to make this a reality.
  • Micro-segmentation – from Strategy to Execution Recorded: Jul 7 2020 60 mins
    Avishai Wool, CTO & Co-founder (AlgoSec)
    Organizations heavily invest in security solutions to keep their networks safe, but still struggle to close the security gaps. Micro-segmentation helps protect against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren’t sure where to begin or what approach to take.

    In this practical webinar, Prof. Avishai Wool, AlgoSec’s CTO and co-founder will guide you through each stage of a micro-segmentation project – from developing the correct micro-segmentation strategy to effectively implementing it and continually maintaining your micro-segmented network.

    Register now for this live webinar and get a practical blueprint to creating your micro-segmentation policy:

    • What is micro-segmentation.
    • Common pitfalls in micro-segmentation projects and how to avoid them.
    • The stages of a successful micro-segmentation project.
    • The role of policy change management and automation in micro-segmentation.

    Don't forget to also click on the links in the Attachments tab.
  • 5 Practical Steps to Implementing a Zero-Trust Network - with Forrester Research Recorded: Jun 30 2020 59 mins
    Chase Cunningham, Principal Analyst (Forrester Research), Prof. Avishai Wool, Co-founder & CTO (AlgoSec)
    A zero-trust architecture mitigates risk by only providing the minimally required access to your network resources. But implementing zero-trust is easier said than done.

    Get practical tips to successfully implement zero-trust architecture in this webinar featuring Chase Cunningham of Forrester Research and Prof. Avishai Wool, AlgoSec’s co-founder and CTO.

    In this session, they will discuss why zero-trust architecture is the blueprint for an effective security strategy, challenges implementing zero-trust architecture, as well as provide the five practical steps to successfully implementing zero-trust architecture:

    • Taking an inventory of your sensitive data and deciding how to segment it
    • Mapping the traffic flows of your sensitive data and associate them to your business applications
    • Designing and enforcing your network’s micro-perimeters
    • Ensuring all your security ecosystem integrates so you can holistically monitor and adjust your network if threats are detected
    • Embracing security automation and orchestration for long-term success
  • Cisco & AlgoSec Achieving application-driven security across your hybrid network Recorded: Jun 10 2020 63 mins
    Roxana Diaz, Worldwide Technical Solutions Architect (Cisco), Yonatan Klein, Director of Product (AlgoSec)
    Your network extends into hybrid environments and may include private clouds running Cisco ACI, and on-premises devices. Managing network security policies in your multi-vendor estate is complex.

    Because your network is made up of multiple vendors and each part of your network estate is managed in its own silo, it is tough to get centralized management of your entire network. Making changes is a chore and validating security is difficult.

    Learn how to unify, consolidate, and automate your entire network security policy management across your Cisco and multi-vendor estate.

    In this session Roxana Diaz, Worldwide Technical Solutions Architect at Cisco, and Yonatan Klein, AlgoSec’s Director of Product, will discuss how to manage the Cisco and multi-cloud estate and how to:
    • Capitalize on your Cisco ACI investment to take advantage of its full capabilities
    • Bring centralized visibility, automation, and compliance monitoring into your Cisco and multi-vendor network ecosystem
    • Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it, including Cisco firewalls and routers, as well as multi-vendor devices.
    • Take advantage of Cisco Tetration Analytics and AlgoSec’s intelligent discovery to get a full picture of your network and application traffic and to design and provision a micro-segmentation network policy design.
    • Unify, consolidate, and automate your network security policy management
    • Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations

    Be sure to check out the Attachments tab for more resources.
  • Panel: Network Security and Compliance best practices for Financial Institutions Recorded: Jun 4 2020 23 mins
    Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.

    There’s a better way to manage your network security!

    Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.

    Topics include:

    • How to overcome security management complexities with automation
    • How to pass compliance audits in the face of demanding regulations
    • Key industry metrics that compare security environments within and beyond the finance industry
    • Real financial customers case studies
  • Cut the Clutter with ChatOps & Improve Network Security Recorded: May 13 2020 26 mins
    Dania Ben Peretz, Product Manager (AlgoSec)
    IT teams’ alerts are overflowing with questions about network status from coworkers. Say no to overwhelming alerts in multiple applications. There is a better way to get critical answers about the state of your network: ChatOps.

    ChatOps, using your existing chat tools such as Slack or Microsoft Teams, can get the crucial questions answered, and not have to track multiple apps separately.

    In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, will demonstrate the latest in AlgoBot and show how to:
    • Get immediate answers to pressing network traffic questions
    • Get immediate answers about whether your business applications are secure
    • Decrease the time it takes to resolve critical security incidents
    • Empower your business and application teams to drive innovation
    • Ensure that your network and security teams are focusing on the most critical issues
    • Efficiently manage security by transparently collaborating with IT, Security, Network and DevOps teams

    All while saving time, reducing resources, and cutting the clutter.
  • Turning network security alerts into action: Change automation to the rescue Recorded: Apr 7 2020 29 mins
    Dania Ben Peretz, Product Manager (AlgoSec)
    You use multiple network security controls in your organization, but they don’t talk to each other. And while you may get alerts that come with tools such as SIEM solutions and vulnerability scanners - in your security landscape, making the necessary changes to proactively react to the myriad of alerts is difficult. Responding to alerts feels like a game of whack-a-mole. Manual changes are also error-prone, resulting in misconfigurations. It’s clear that manual processes are insufficient for your multi-device, multi-vendor, and heterogeneous environment network landscape.

    What’s the solution? Network security change automation!

    By implementing change automation for your network security policies across your enterprise security landscape you can continue to use your existing business processes while enhancing business agility, accelerate incident response times, and reduce the risk of compliance violations and security misconfigurations.

    In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, will show you how to:

    •Automate your network security policy changes without breaking core network connectivity
    •Analyze and recommend changes to your network security policies
    •Push network security policy changes with zero-touch automation to your multi-vendor security devices
    •Maximize the ROI of your existing security controls by automatically analyzing, validating, and implementing network security policy changes – all while seamlessly integrating with your existing business processes
  • Optimize your Juniper investment with intelligent network security automation Recorded: Mar 24 2020 32 mins
    Max Shirshov, EMEA Solutions Architect at AlgoSec
    Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.
    In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.
    Join the webinar to learn how to:
    • Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks
    • Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds
    • Automate application and user aware security policy management and ensure your Juniper devices are properly configured
    • Assess risk and ensure regulatory compliance across your entire enterprise environment

    Contact us: https://www.algosec.com/contact-us/
    Request a demo: https://www.algosec.com/products/#request-demo-container
    Additional Resources: https://www.algosec.com/resources/
    Follow us on LinkedIn and stay up to date! https://www.linkedin.com/company/algosec/
Business-Driven Network Security Policy Management
The leading provider of business-driven security management solutions, AlgoSec helps the world’s largest organizations align security with their business processes. With AlgoSec users can discover, map and migrate business application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate network security changes with zero touch - across their cloud, SDN and on-premise networks. Over 1,800 leading organizations, including 20 of the Fortune 50, have utilized AlgoSec’s solutions to make their organizations more agile, more secure and more compliant - all the time. Since its inception, AlgoSec has provided the industry’s only money-back guarantee.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cisco ACI & AlgoSec: Achieving application-driven security across hybrid network
  • Live at: Mar 18 2020 3:00 pm
  • Presented by: Omer Ganot, Product Manager (AlgoSec)
  • From:
Your email has been sent.
or close