Hi [[ session.user.profile.firstName ]]

Overcoming the Challenges of Managing a Hybrid Environment

Public clouds such as Amazon Web Services (AWS) are a critical part of your hybrid network. It is important to keep out the bad guys (including untrusted insiders) and proactively secure your entire hybrid network.

Securing your network is both the responsibility of the cloud providers, as well as your organization’s IT and CISOs – the shared responsibility model. As a result, your organization needs visibility into what needs to be protected, as well as an understanding of the tools that are available to keep them secure.

In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande's, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment, including how to:

• Securely migrate workloads from on-prem to public cloud
• Gain unified visibility into your network topology and traffic flows, including both public cloud and on-premises assets, from a single console.
• Manage/orchestrate multiple layers of security controls and proactively detect misconfigurations
• Protect your data, accounts, and workloads from misconfiguration risks
• Protect web applications in AWS by filtering traffic and blocking common attack patterns, such as SQL injection or cross-site scripting
• Gain a unified view of your compliance status and achieve continuous compliance
Recorded Sep 30 2020 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Omer Ganot, Cloud Security Product Manager (AlgoSec), Stuti Deshpande, Partner Solution Architect (AWS)
Presentation preview: Overcoming the Challenges of Managing a Hybrid Environment
  • Channel
  • Channel profile
  • Securely Accelerate Digital Transformation Feb 17 2021 3:00 pm UTC 60 mins
    Brian Heilo (VMware) Jeremiah Cornelius (AlgoSec)
    This past year was an earthquake. The global pandemic amplified the urgent need for businesses to accelerate digital transformation, at the same time that concerns about security achieved heightened levels of urgency. Digital transformation offers the ability to turn these challenges into opportunities.

    In this joint session by VMware and AlgoSec, you’ll find out how you can maintain both security and agility throughout your digital business transformation project though the AlgoSec integration with VMware NSX-T.

    Our experts, Brian Heili from VMware and Jeremiah Cornelius from AlgoSec will show you:
    • Why infrastructure modernization with VMware NSX is vital for a successful and faster digital transformation.
    • How to gain complete visibility in NSX and across your entire hybrid network with AlgoSec.
    • How to automatically discover, map and manage application connectivity in VMware NSX.
    • How to assess risk in configuration of all network security policy changes and eliminate error with zero-touch automation.
    • How to ensure continuous compliance, including NSX Service Insertion and physical networks.
  • Compliance made easy. Pass your audits stress-free. Jan 27 2021 3:00 pm UTC 45 mins
    Tal Dayan, Product Manager (AlgoSec)
    Don’t fail an audit ever again. Yes, it’s possible.

    It doesn’t matter what regulation you are talking about, whether your own internal compliance standard or a common global framework such as PCI DSS, SOX, HIPPA, SWIFT, or even HKMA.

    We’ll show you how.

    In this webinar, AlgoSec security expert Tal Dayan will reveal:

    * The secrets to passing audits
    * How to improve your compliance score
    * How to always remain compliant
  • Tightening security posture with micro-segmentation Jan 27 2021 10:00 am UTC 60 mins
    Jan Heijdra, Cisco Security Specialist . Yitzy Tannenbaum, Product Marketing Manager
    Micro-segmentation protects your network by limiting the lateral movement of ransomware and other threats in your network. Yet successfully implementing a defense-in-depth strategy using micro-segmentation may be complicated.

    In this second webinar in a series of two webinars about ransomware, Yitzy Tannenbaum, Product Marketing Manager from AlgoSec and Jan Heijdra, Cisco Security Specialist, will provide a blueprint to implementing micro-segmentation using Cisco Secure Workload (formerly Cisco Tetration) and AlgoSec Network Security Policy Management.

    Join our live webinar to learn:
    • Why micro-segmentation is critical to fighting ransomware
    • Understand your business applications to create your micro-segmentation policy
    • Validate your micro-segmentation policy is accurate
    • Enforce these granular policies on workloads and summarized policies across your infrastructure
    • Use risk and vulnerability analysis to tighten your workload and network security
    • Identify and manage security risk and compliance in your micro-segmented environment
  • 5 power tips to keep your network secure in 2021 Recorded: Jan 13 2021 39 mins
    Jade Kahn and Asher Benbenisty
    No one could have predicted how unpredictable 2020 would be, so we’re here to help you get prepared for whatever is in store in 2021.

    No matter what happens in the upcoming year – there are five things you can do now to keep your network secure in 2021.

    Join network security experts Jade Kahn and Asher Benbenisty, and learn how to:
    1. Never fly blind: Ensure visibility across your entire hybrid network
    2. Do more with less: Accelerate digital transformation & avoid misconfigurations with automation
    3. Stay continuously compliant
    4. Fight ransomware with micro-segmentation
    5. Accelerate in the cloud
  • Reducing Risk of Ransomware Attacks - Back to Basics Recorded: Jan 13 2021 60 mins
    Jan Heijdra, Cisco Security Specialist. Yitzy Tannenbaum, Product Marketing Manager
    Did you know that 50% of organizations were hit by ransomware attacks in 2020? These attacks have become more sophisticated, as attackers change tactics from “spray and pray” to more targeted server-based attacks. So how do you protect your network from such attacks?

    We invite you to join our series of webinars about ransomware with AlgoSec and Cisco, to learn practical methods to reduce your network attack surface and protect your organization from ransomware and other cyber-attacks.

    In our first webinar in the series, Yitzy Tannenbaum, Product Marketing Manager from AlgoSec and
    Jan Heijdra, Cisco Security Specialist , will take you back to the basics. They will discuss:
    • Popular methods used to infect your network with ransomware
    • The importance of a layered defense-in-depth strategy
    • Best practices for managing your security devices
    • How to build a security wall with Cisco Secure and AlgoSec Network Security Policy Management to block ransomware
  • [Panel] How Financial Institutions Can Achieve Network Security and Compliance Recorded: Nov 26 2020 22 mins
    Asher Benbenisty, Director of Product Marketing and Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Financial institutions have strict network security requirements, which sometimes hinder innovation and digital transformation. Security and regulatory requirements act as a barrier to innovation. However, financial institutions can enable business innovation, while still achieving network security and compliance.
    Watch AlgoSec’s panel discussion, as Asher Benbenisty, Director of Product Marketing, and Yitzy Tannenbaum, Product Marketing Manager, discuss how financial institutions can simplify the network security management, reduce risk and ensure continuous compliance.
    They will discuss:
    • How intelligent automation helps overcome security management intricacy
    • How to make sure network changes meet compliance requirements and pass regulatory audits the first time
    • Industry metrics so you can benchmark your own organization as well as see how the finance sector compares to other industries
    • Case studies from other financial institutions
  • A Customer Story: The NCR journey to effective and agile network security Recorded: Nov 19 2020 49 mins
    Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) and Scott Thiebault
    Managing security in a multi-billion-dollar enterprise poses many challenges, as well as opportunities. Go inside an S&P 500 company and hear how they manage their network security.

    Join Scott Theriault, Global Manager, Network Perimeter Security at NCR Corporation as he shares his real-world experience managing security in a global organization with Yitzy Tannenbaum, Product Marketing Manager at AlgoSec. Get insights on:
    - Key factors managing network security in complex organizations
    - The benefits of network policy optimization
    - Importance of maintaining and demonstrating compliance
    - Change management and automation in large, complex networks
    - Driving alignment of cloud and on-premises security
  • MSSP Cloud Server Migration: Onboarding Your Customer Recorded: Nov 18 2020 32 mins
    Tim Bloomer, MSSP Sales Engineer and Jason Weller, MSSP Sales Director
    Using the firewall policies to guide the data center migration can let the network security team lead the migration process. Even in the most poorly documented data centers, the firewall rules can provide crucial clues to other IT teams as to which applications will be affected by migrating a server, and which groups of servers will benefit from being migrated simultaneously.
    Join Tim Bloomer, MSSP Sales Engineer at AlgoSec, and Jason Weller, MSSP Sales Director at AlgoSec, as they show you why to migrate your customer’s physical data center (or at least some critical applications within the data center) to a virtual data center:
    • Improving disaster-recovery capabilities
    • Addressing regulatory requirements for keeping certain customers’ personal data in-country rather than offshore
    • Reducing operating costs
  • CTO Round Table: Fighting Ransomware with Micro-segmentation Recorded: Nov 17 2020 58 mins
    Ariel Zeitlin, CTO (Guardicore) | Avishai Wool, CTO & Co-founder (AlgoSec)
    In the past few months, we’ve witnessed a steep rise in ransomware attacks targeting anyone from small companies to large, global enterprises. It seems like no organization is immune to ransomware. So how do you protect your network from such attacks?

    Join our discussion with AlgoSec CTO Prof. Avishai Wool and Guardicore CTO Ariel Zeitlin, and discover how micro-segmentation can help you reduce your network attack surface and protect your organization from cyber-attacks.


    Learn:
    • Why micro-segmentation is critical to fighting ransomware and other cyber threats.
    • Common pitfalls organizations face when implementing a micro-segmentation project
    • How to discover applications and their connectivity requirements across complex network environments.
    • How to write micro-segmentation filtering policy within and outside the data center
  • Cloud migrations made simpler: Safe, Secure and Successful Migrations Recorded: Oct 28 2020 36 mins
    Avivi Siman-Tov, Director of Product (AlgoSec)
    Migrating applications to the cloud – without creating security holes, application outages or violating compliance – is within reach!

    In this webinar, Avivi Siman-Tov, Director of Product at AlgoSec, will guide you how to simplify and accelerate large-scale complex application migration projects.

    The webinar will cover:
    • Why organizations choose to migrate their applications to the cloud
    • What is required in order to move the security portion of your application and how long it may take
    • Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved
    • How to deliver unified security policy management across the hybrid cloud environment
  • Implement a Zero-Trust Network - in 5 steps Recorded: Oct 21 2020 58 mins
    Chase Cunningham, Principal Analyst (Forrester Research), Prof. Avishai Wool, Co-founder & CTO (AlgoSec)
    A zero-trust architecture mitigates risk by only providing the minimally required access to your network resources. But implementing zero-trust is easier said than done.

    Get practical tips to successfully implement zero-trust architecture in this webinar featuring Chase Cunningham of Forrester Research and Prof. Avishai Wool, AlgoSec’s co-founder and CTO.

    In this session, they will discuss why zero-trust architecture is the blueprint for an effective security strategy, challenges implementing zero-trust architecture, as well as provide the five practical steps to successfully implementing zero-trust architecture:

    • Taking an inventory of your sensitive data and deciding how to segment it
    • Mapping the traffic flows of your sensitive data and associate them to your business applications
    • Designing and enforcing your network’s micro-perimeters
    • Ensuring all your security ecosystem integrates so you can holistically monitor and adjust your network if threats are detected
    • Embracing security automation and orchestration for long-term success
  • Radically Reduce Firewall Rules with Application-Driven Rule Recertification Recorded: Oct 14 2020 41 mins
    Asher Benbenisty, Director of Product Marketing (AlgoSec)
    Does your network still have obsolete firewall rules? Do you often feel overwhelmed with the number of firewall rules in your network?

    To make sure your network is secure and compliant, you need to regularly review and recertify firewall rules. However, manual firewall rule recertification is complex, time-consuming and error-prone, and mistakes may cause application outages.

    Discover a better way to recertify your firewall rules with Asher Benbenisty, AlgoSec’s Director of Product Marketing, as he discusses how associating application connectivity with your firewall rules can radically reduce the number of firewall rules on your network as well as the efforts involved in rule recertification.

    In this webinar, we will discuss:
    * The importance of regularly reviewing and recertifying your firewall rules
    * Integrating application connectivity into your firewall rule recertification process
    * Automatically managing the rule-recertification process using an application-centric approach
  • Overcoming the Challenges of Managing a Hybrid Environment Recorded: Sep 30 2020 56 mins
    Omer Ganot, Cloud Security Product Manager (AlgoSec), Stuti Deshpande, Partner Solution Architect (AWS)
    Public clouds such as Amazon Web Services (AWS) are a critical part of your hybrid network. It is important to keep out the bad guys (including untrusted insiders) and proactively secure your entire hybrid network.

    Securing your network is both the responsibility of the cloud providers, as well as your organization’s IT and CISOs – the shared responsibility model. As a result, your organization needs visibility into what needs to be protected, as well as an understanding of the tools that are available to keep them secure.

    In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande's, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment, including how to:

    • Securely migrate workloads from on-prem to public cloud
    • Gain unified visibility into your network topology and traffic flows, including both public cloud and on-premises assets, from a single console.
    • Manage/orchestrate multiple layers of security controls and proactively detect misconfigurations
    • Protect your data, accounts, and workloads from misconfiguration risks
    • Protect web applications in AWS by filtering traffic and blocking common attack patterns, such as SQL injection or cross-site scripting
    • Gain a unified view of your compliance status and achieve continuous compliance
  • [Panel] How Financial Institutions Can Achieve Network Security and Compliance Recorded: Sep 8 2020 23 mins
    Asher Benbenisty, Director of Product Marketing and Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)
    Financial institutions have strict network security requirements, which sometimes hinder innovation and digital transformation. Security and regulatory requirements act as a barrier to innovation. However, financial institutions can enable business innovation, while still achieving network security and compliance.
    Watch AlgoSec’s panel discussion, as Asher Benbenisty, Director of Product Marketing, and Yitzy Tannenbaum, Product Marketing Manager, discuss how financial institutions can simplify the network security management, reduce risk and ensure continuous compliance.
    They will discuss:
    • How intelligent automation helps overcome security management intricacy
    • How to make sure network changes meet compliance requirements and pass regulatory audits the first time
    • Industry metrics so you can benchmark your own organization as well as see how the finance sector compares to other industries
    • Case studies from other financial institutions
  • Network Security Vision with Application Visibility Recorded: Aug 30 2020 52 mins
    Avishai Wool, CTO & Co-founder (AlgoSec) & Yoni Geva, Product Manager (AlgoSec)
    You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.

    But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?

    Stop running blind. Expand your vision with application visibility.

    With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.

    In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate how to overcome these challenges and ensure business continuity through application visibility.

    Join the webinar and learn how to:
    • Associate your business applications with your security policy rules.
    • Identify the network traffic relevant for each application.
    • Identify hidden risks and vulnerabilities in your applications.
    • Associate compliance violations with the relevant business applications.
    • Improve troubleshooting by identifying affected applications.
    • Better document the applications on your network.
  • Firewall Rule Recertification with Application Connectivity Recorded: Aug 20 2020 19 mins
    Asher Benbenisty, Director of Product Marketing (AlgoSec)
    Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.

    However, manual firewall rule recertification is complex, time-consuming and prone to errors.

    Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.

    In this webinar Asher will cover:
    • Why it is important to regularly review and recertify your firewall rules
    • How to use application connectivity for firewall rule recertification
    • How to automatically manage the rule-recertification process
  • Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar Recorded: Jul 22 2020 61 mins
    Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec)
    Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.

    They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.

    Join our live webinar to learn how to:
    • Understand your business applications to create your microsegmentation policy
    • Validate your micro-segmentation policy is accurate
    • Enforce these granular policies on workloads and summarized policies across your infrastructure
    • Use risk and vulnerability analysis to tighten your workload and network security
    • Identify and manage security risk and compliance in your micro-segmented environment

    Save your seat!
  • Automate Firewall Compliance and Remediation Reporting for MSSP Customers Recorded: Jul 14 2020 34 mins
    Tim Bloomer, MSSP Sales Engineer and Jason Weller, MSSP Sales Director
    The highly competitive nature of the MSSP market has service providers evaluating new methods to increase their margins and minimize their customer’s churn. Managing complex customer networks requires significant hands-on, manual efforts. Managed service offerings such as policy change requests have become a commodity.

    Join Tim Bloomer, MSSP Sales Engineer at AlgoSec, and Jason Weller, MSSP Sales Director at AlgoSec, as they show you how MSSPs integrate AlgoSec’s intelligent network security policy automation into their operations to deliver security policy changes in minutes instead of days. MSSPs can reduce their average cost and while cutting the time needed to make firewall change requests and increase their customer satisfaction at the same time. Join in and learn how to make this a reality.
  • Micro-segmentation – from Strategy to Execution Recorded: Jul 7 2020 60 mins
    Avishai Wool, CTO & Co-founder (AlgoSec)
    Organizations heavily invest in security solutions to keep their networks safe, but still struggle to close the security gaps. Micro-segmentation helps protect against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren’t sure where to begin or what approach to take.

    In this practical webinar, Prof. Avishai Wool, AlgoSec’s CTO and co-founder will guide you through each stage of a micro-segmentation project – from developing the correct micro-segmentation strategy to effectively implementing it and continually maintaining your micro-segmented network.

    Register now for this live webinar and get a practical blueprint to creating your micro-segmentation policy:

    • What is micro-segmentation.
    • Common pitfalls in micro-segmentation projects and how to avoid them.
    • The stages of a successful micro-segmentation project.
    • The role of policy change management and automation in micro-segmentation.

    Don't forget to also click on the links in the Attachments tab.
  • 5 Practical Steps to Implementing a Zero-Trust Network - with Forrester Research Recorded: Jun 30 2020 59 mins
    Chase Cunningham, Principal Analyst (Forrester Research), Prof. Avishai Wool, Co-founder & CTO (AlgoSec)
    A zero-trust architecture mitigates risk by only providing the minimally required access to your network resources. But implementing zero-trust is easier said than done.

    Get practical tips to successfully implement zero-trust architecture in this webinar featuring Chase Cunningham of Forrester Research and Prof. Avishai Wool, AlgoSec’s co-founder and CTO.

    In this session, they will discuss why zero-trust architecture is the blueprint for an effective security strategy, challenges implementing zero-trust architecture, as well as provide the five practical steps to successfully implementing zero-trust architecture:

    • Taking an inventory of your sensitive data and deciding how to segment it
    • Mapping the traffic flows of your sensitive data and associate them to your business applications
    • Designing and enforcing your network’s micro-perimeters
    • Ensuring all your security ecosystem integrates so you can holistically monitor and adjust your network if threats are detected
    • Embracing security automation and orchestration for long-term success
Business-Driven Network Security Policy Management
The leading provider of business-driven security management solutions, AlgoSec helps the world’s largest organizations align security with their business processes. With AlgoSec users can discover, map and migrate business application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate network security changes with zero touch - across their cloud, SDN and on-premise networks. Over 1,800 leading organizations, including 20 of the Fortune 50, have utilized AlgoSec’s solutions to make their organizations more agile, more secure and more compliant - all the time. Since its inception, AlgoSec has provided the industry’s only money-back guarantee.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Overcoming the Challenges of Managing a Hybrid Environment
  • Live at: Sep 30 2020 2:00 pm
  • Presented by: Omer Ganot, Cloud Security Product Manager (AlgoSec), Stuti Deshpande, Partner Solution Architect (AWS)
  • From:
Your email has been sent.
or close