Hi [[ session.user.profile.firstName ]]

Webinar: Un Piano Applicabile Per Segmentare la Tua Rete

Una rete segmentata rende operativa le policy di sicurezza, consente uno stato di compliance continua con il minimo sforzo e offre opzioni di mitigazione per gli attacchi informatici. Ma la segmentazione della rete non è un compito facile!

Unisciti agli esperti di Tufin il 20 Marzo 14:30 mentre condividono consigli utili per la segmentazione della rete, tra cui:

•Insidie da evitare durante la creazione di una strategia di
segmentazione
•Framework per la segmentazione
•Linee guida per l'applicazione e il mantenimento di una rete
segmentata
Recorded Mar 20 2019 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Flavio Di Cosmo, Pre-Sales Engineer SEEMEA
Presentation preview: Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
  • Channel
  • Channel profile
  • How to Define Network Zones Aug 29 2019 1:30 pm UTC 45 mins
    Jonathan Campbell - Sales Engineer, NEMEA
    Defining zones is a critical part of network segmentation and achieving Zero Trust, but it’s very rarely a simple process. Some struggle to identify where to start, others neglect the ongoing management of zones, while still more over-segment their network into a state of unmanageability. The good news is that you can avoid the mistakes of others.

    Join us on August 29th to gain insight into how organisations successfully establish and maintain network zones. The session will help you avoid pitfalls and utilise proven strategies based on lessons learned from segmenting some of the largest and most complex enterprise networks in the world.

    Register now to get practical guidance on defining effective network zones that will ensure your success in network segmentation.
  • Comment définir les zones réseau ? Aug 29 2019 11:00 am UTC 45 mins
    Anthony Le Pipe, Sales Engineer WEMEA
    Définir des zones est un élément essentiel qui permet de segmenter le réseau et de parvenir au « Zéro trust », mais il s’agit, très rarement, d’un processus simple. Certains ont du mal à savoir par où commencer, d’autres négligent la gestion continue des zones, tandis que d’autres encore segmentent leur réseau plus qu’il n’en faut, le rendant impossible à gérer. La bonne nouvelle est que vous pouvez éviter de reproduire les erreurs des autres.

    Rejoignez-nous le 29 août pour mieux comprendre comment les entreprises réussissent à établir et à maintenir des zones réseau. Cette session vous aidera à éviter les pièges et à utiliser des stratégies éprouvées qui reposent sur des leçons tirées de la segmentation de certains des réseaux d’entreprise les plus grands et les plus complexes au monde.

    Inscrivez-vous dès maintenant pour obtenir des conseils pratiques sur la détermination de zones réseau efficaces qui vous permettront d’obtenir une segmentation réussie du réseau.
  • Come Definire le Zone della rete Aug 29 2019 10:00 am UTC 45 mins
    Flavio Di Cosmo, Sales Engineer SEMEA
    La definizione delle zone è un elemento cruciale per ottenere la segmentazione della rete e attuare un approccio Zero Trust, ma raramente si tratta di un processo semplice. Alcuni hanno difficoltà a capire da dove iniziare, altri trascurano la gestione costante delle zone, mentre ancora più aziende operano una segmentazione eccessiva, rendendo la propria rete ingestibile. La buona notizia è che gli errori degli altri si possono evitare.

    Unitevi a noi il 29 agosto per scoprire in che modo le organizzazioni creano zone nella propria rete e le mantengono con successo. La sessione vi aiuterà a evitare le trappole e a utilizzare strategie collaudate basate sugli insegnamenti tratti dalla segmentazione di alcune delle reti aziendali più grandi e complesse del mondo.

    Iscrivetevi ora per ricevere indicazioni pratiche su come definire zone di rete efficaci che vi permetteranno di segmentare la vostra rete con successo.
  • Webinar: Accelerating the Digital Transformation: Why Security Policy Management Aug 28 2019 3:00 pm UTC 60 mins
    Colby Dyess, Director Cloud Marketing, Tufin
    Public cloud providers have built some of the secure environments in modern history, yet It seems every week another security breach makes headline news. Upon inspection it is revealed that most breaches are due to misconfigurations by end-users, not the providers. So why does this keep happening and what can be done to avoid being next week’s headline?

    This session describes why organizations struggle with cloud-native security, and how security policy automation address those challenges. Audience members will learn how Tufin cloud solutions help users gain visibility into their cloud security posture, establish Zero Trust security model and improved compliance across hybrid and multi-cloud environments.
  • Webinar: How to Build a Change Workflow to Increase Control Recorded: Aug 21 2019 58 mins
    Maya Malevich Director of Product Marketing, Tufin & Ruth Gomel Director Product Design, Tufin
    “The only thing that is constant is change.” However, change can also be risky.

    Network security changes may lead to broken connectivity, exposure to cyberattacks, or even compliance violations that may result in an audit failure. How do you control and document changes to firewall access?

    Join this session to learn best practices for building a change workflow to:
    • Ensure all changes are documented and audit-ready
    • Enforce a security policy check within every change to improve control
    • Increase efficiency and eliminate errors through automation

    Register now to gain insight into what an effective workflow looks like and how you can streamline the change process you currently use.
  • Webinar: How to Build a Change Workflow to Increase Control Recorded: Aug 7 2019 59 mins
    Maya Malevich Director of Product Marketing, Tufin
    “The only thing that is constant is change.” However, change can also be risky.

    Network security changes may lead to broken connectivity, exposure to cyberattacks, or even compliance violations that may result in an audit failure. How do you control and document changes to firewall access?

    Join this session to learn best practices for building a change workflow to:
    • Ensure all changes are documented and audit-ready
    • Enforce a security policy check within every change to improve control
    • Increase efficiency and eliminate errors through automation

    Register now to gain insight into what an effective workflow looks like and how you can streamline the change process you currently use.
  • 3 Steps to Meeting Cloud Agility with Security Policy Automation Recorded: Jul 31 2019 46 mins
    Reuven Harrison Co-Founder and CTO, Tufin & Maya Malevich Director of Product Marketing, Tufin
    Good news: migrating to the cloud helps your enterprise gain agility and competitiveness. More good news: transitioning to the cloud can be easier by taking security policy management to the next level.

    Join Tufin CTO and Co-Founder, Reuven Harrison, on July 18 to learn the three steps that can help you meet cloud agility:
    *Optimizing security policies
    * Automating the policy lifecycle
    * Incorporating security policy into the CI/CD pipeline

    Register now
  • 3 Steps to Meeting Cloud Agility with Security Policy Automation Recorded: Jul 18 2019 47 mins
    Reuven Harrison Co-Founder and CTO, Tufin & Maya Malevich Director of Product Marketing, Tufin
    Migrating to the cloud means that your business becomes more agile, but what about your IT operations?

    Join this session on Thursday, July 18th with Tufin CTO and Co-Founder Reuven Harrison, to learn the three steps that can help you meet cloud agility:

    •Optimizing security policies
    •Automating the policy lifecycle
    •Incorporating security policy into the CI/CD pipeline

    Register now
  • Case Study Webinar: Moving Network Operations into the Future Recorded: Jul 16 2019 47 mins
    Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE & Karen Crowley,Sr. Product Marketing Manager
    Join us for a lively discussion with Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE, the second largest utility provider in Germany.

    We will discuss RWE’s challenges and success in moving their network operations into the future without compromising security and compliance, including:
    • consolidating security and orchestrating connectivity across a hybrid network, including legacy firewalls and routers, next generation firewalls, and the AWS cloud platform
    • incorporating a cloud-first strategy and a heavy investment in DevOps to identify and address security violations in AWS, and allow application developers to spin up new applications without knowing IPs, protocols and ports
    • reclaiming visibility of their firewall configurations and moving from error-prone manual changes to automating the process
    • vastly improving workflows to improve audit preparation from a previously non-auditable change process

    Register now to gain amazing insight into how they have found success. We will wrap up with a live Q&A, so have your questions ready!
  • Preparing and Protecting Your Network from an Automated Zero-Day Attack Recorded: Jul 15 2019 42 mins
    Joe Schreiber, Technical Director, Business Development, Tufin and Dan Rheault Sr. Product Marketing Manager, Tufin
    Attackers have embraced automation to launch attacks and expand their reach within your network. But ill-intentioned individuals aren’t alone in having automation in their toolkit. It’s time to fight automation with automation.

    How quickly you can respond to a zero-day attack largely depends on how proactively you secure your network. When attackers engineer malware to automatically detect vulnerabilities on your network, the way to prevent damage is to employ automation so you can react quickly and ensure its integrity.

    Join Tufin experts Dan Rheault and Joe Schreiber, also an established SOC professional, for an educational webinar that will discuss best practices to:

    •Secure the network through effective segmentation
    •Contain risk from zero-day attacks
    •Leverage automation to respond to security incidents
  • How to Define Network Zones Recorded: Jul 10 2019 41 mins
    Dan Rheault Sr. Product Marketing Manager, Tufin
    Defining zones is a critical part of network segmentation and achieving Zero Trust, but it’s very rarely a simple process. Some struggle to identify where to start, others neglect the ongoing management of zones, while still more over-segment their network into a state of unmanageability. The good news is that you can avoid the mistakes of others.
    In this session, Tufin network security expert Dan Rheault will share lessons learned from implementing segmentation for some of the largest and most complex networks in the world, on how to:
    •Successfully establish and maintain network zones
    •Avoid common pitfalls that compromise network manageability
    •Utilize proven strategies for network segmentation

    Whether you’re starting your zone creation for network segmentation or delving into microsegmentation, this webinar is designed to be helpful for all.
  • How to Define Network Zones Recorded: Jun 26 2019 42 mins
    Dan Rheault Sr. Product Marketing Manager, Tufin
    Defining zones is a critical part of network segmentation and achieving Zero Trust, but it’s very rarely a simple process. Some struggle to identify where to start, others neglect the ongoing management of zones, while still more over-segment their network into a state of unmanageability. The good news is that you can avoid the mistakes of others.
    In this session, Tufin network security expert Dan Rheault will share lessons learned from implementing segmentation for some of the largest and most complex networks in the world, on how to:
    •Successfully establish and maintain network zones
    •Avoid common pitfalls that compromise network manageability
    •Utilize proven strategies for network segmentation

    Whether you’re starting your zone creation for network segmentation or delving into microsegmentation, this webinar is designed to be helpful for all.
  • 5 Clear Signs You Need to Automate Network Security Operations Recorded: Jun 26 2019 35 mins
    Hadas Lahav, Senior Product Manager,Automation, Tufin and Karen Crowley, Sr. Product Marketing Manager, Tufin
    Why automate? Why now? Automation is critical to digital transformation, essential for reducing the attack surface and mandatory to ensure continuous compliance.

    Watch the pre-recorded webinar “5 Clear Signs You Need to Automate Network Security Operations” to learn:

    * How to securely speed up the network change process
    * Best practices to getting started with automation
    * Guidelines to meet the goal of Zero-Touch Automation

    We will review the use cases to begin automating network security operations and explain why it’s mandatory to focus on policy-based change automation. Watch now!
  • Seminario web: 5 señales claras que necesitas automatización Recorded: Jun 25 2019 48 mins
    Alberto Maestre, Pre-Sales Engineer SEEMEA
    ¿Por qué automatizar? ¿Porqué ahora? La automatización es crítica para la transformación digital, esencial para reducir la superficie de ataque y obligatoria para garantizar el cumplimiento continuo.

    Únase a nosotros para nuestro webcast el 25 de junio a las 10:30 “5 señales claras que necesita para automatizar las operaciones de seguridad de red” para aprender:

    Cómo acelerar de forma segura el proceso de cambio de red
    Mejores prácticas para comenzar con la automatización
    Pautas para cumplir con el objetivo de Zero-Touch Automation

    Conviértalo en una de sus resoluciones 2019 para adoptar la automatización y reducir el tiempo y el esfuerzo que dedica a las tareas manuales relacionadas con las operaciones de firewall. Los cinco signos claros pueden ayudarlo a desarrollar el caso de negocios y obtener una participación de la administración para maximizar la agilidad y la seguridad con la automatización y la orquestación de políticas de seguridad de Tufin.
  • Webinar: An Actionable Plan for Segmenting Your Network Recorded: Jun 24 2019 49 mins
    Erez Tadmor,Sr. Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin
    A segmented network operationalizes your network security policy, enables a demonstrable state of continuous compliance, and provides mitigation options for cyberattacks.

    Our advice: organizations must go back to the basics to accomplish this crucial project.

    This webinar will cover actionable tips for network segmentation based on the experience of over 2,000 organizations. We will share:
    •Common pitfalls to avoid
    •How to start segmenting your network today
    •Tips for applicable enforcement
    •Q&A from the attendees
  • Applying Zero Trust Principles to Your Network (Featuring Guest Analyst) Recorded: Jun 19 2019 53 mins
    Chase Cunningham, Forrester Principal Analyst Serving Security & Risk Professionals & Erez Tadmor, Product Manager, Tufin
    Networks and network security tooling has continued to proliferate at light speed as organizations infrastructures and systems have moved to the cloud. This massive sprawl of the control surface has created a nightmare scenario for businesses to control and maintain. This webinar will delve into the truths around how large this problem is and detail the facts related to the necessity for automation and orchestration within today's cloud-enabled businesses. Our session will provide guidance and thoughts on the impossibility of achieving Zero Trust without the use of a central security policy and automated control technologies.

    Join guest speaker Chase Cunningham, Forrester’s Principal Analyst for Security and Risk Professionals and Erez Tadmor, Director Product Management, together with Dan Rheault, Tufin Senior Product Marketing Manager to gain an in-depth understanding of the Zero Trust framework, and how it can successfully be implemented in your network and maintained through security policy management.
  • Applying Zero Trust Principles to Your Network (Featuring Guest Analyst) Recorded: Jun 5 2019 54 mins
    Chase Cunningham, Forrester Principal Analyst Serving Security & Risk Professionals & Erez Tadmor, Product Manager, Tufin
    Networks and network security tooling has continued to proliferate at light speed as organizations infrastructures and systems have moved to the cloud. This massive sprawl of the control surface has created a nightmare scenario for businesses to control and maintain. This webinar will delve into the truths around how large this problem is and detail the facts related to the necessity for automation and orchestration within today's cloud-enabled businesses. Our session will provide guidance and thoughts on the impossibility of achieving Zero Trust without the use of a central security policy and automated control technologies.

    Join guest speaker Chase Cunningham, Forrester’s Principal Analyst for Security and Risk Professionals and Erez Tadmor, Director Product Management, together with Dan Rheault, Tufin Senior Product Marketing Manager to gain an in-depth understanding of the Zero Trust framework, and how it can successfully be implemented in your network and maintained through security policy management.
  • Webinar: Are you approaching cloud security wrong? Recorded: Jun 4 2019 34 mins
    Colby Dyess, Director Cloud Marketing, Tufin, Ethan Smart, Sales Engineer & Dan Rheault, Sr. Product Marketing Manager, Tufin
    Cloud security isn’t new, but some of the approaches are. Whether your approach is lift and shift or cloud-native security, we now know more about the strengths and deficiencies of each approach through publicly disclosed breaches.

    Join Tufin’s security experts Colby Dyess, Ethan Smart and Dan Rheault on April 24th for a deep dive into how organizations are approaching security, how security-mature organizations are applying improvements, and an overview of key lessons learned from the frontlines.

    Register for this webinar today.
  • Webinar: Capgemini talks Gaining Operational Efficiency in Network Operations Recorded: May 28 2019 51 mins
    Geoffrey Hughes, Capgemini, Former CISO, Architect, Compliance Officer, Karen Crowley, Sr. Product Marketing Manager, Tufin
    Join us on May 28th at 2pm SGT/4pm AEST to hear Capgemini talk about the challenges of improving operational efficiency in the age of increasing network complexity and digital transformation.

    Former CISO, Security Architect and Compliance Officer, Geoff Hughes of Capgemini will address:

    Why organisations struggle to deploy automation at scale
    Best practices for getting started with automation
    The role application security plays in digital transformation
    Register now for this 30-minute discussion to learn how you can improve operations and meet business agility goals with automation.
  • Webinar: 5 klare Zeichen für die Automatisierung von Netzwerksicherheitsvorgänge Recorded: May 23 2019 35 mins
    Christian Giebner & Joachim Nossek, EMEA Sales Engineering
    Warum automatisieren? Warum jetzt? Automatisierung ist für die digitale Transformation von entscheidender Bedeutung, da sie für die Reduzierung der Angriffsfläche unerlässlich und für die Gewährleistung einer kontinuierlichen Compliance unabdingbar ist.

    Besuchen Sie uns am Dienstag, den 21. Mai, für unseren Webcast "5 eindeutige Anzeichen für die Automatisierung von Netzwerksicherheitsvorgängen", um Folgendes zu erfahren:

    - So beschleunigen Sie den Netzwerkänderungsprozess sicher
    - Best Practices für den Einstieg in die Automatisierung
    - Richtlinien zur Erreichung des Ziels der Zero-Touch-Automatisierung

    Machen Sie es zu einem Ihrer Ziele für 2019, die Automatisierung zu übernehmen und den Zeit- und Arbeitsaufwand für manuelle Aufgaben rund um Firewall-Vorgänge zu reduzieren. Mithilfe der fünf eindeutigen Zeichen können Sie den Business Case erstellen und das Management-Buy-in für die Maximierung von Flexibilität und Sicherheit mit Tufin Security Policy Automation and Orchestration erzielen.

    Kannst du die Live Session nicht machen? Registrieren Sie sich und die On-Demand-Aufzeichnung wird an Sie gesendet.
Security Policy Orchestration Solutions
Tufin® is the leader in Network Security Policy Orchestration, serving more than half of the top 50 companies in the Forbes Global 2000. Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. Tufin reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries.

Find out more at www.tufin.com
Tufin blog SuiteTalk™ http://www.tufin.com/blog/
Twitter: http://twitter.com/TufinTech
Webinars http://www.tufin.com/resources/webinars/
YouTube https://www.youtube.com/user/Tufintech

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
  • Live at: Mar 20 2019 1:30 pm
  • Presented by: Flavio Di Cosmo, Pre-Sales Engineer SEEMEA
  • From:
Your email has been sent.
or close