Hi [[ session.user.profile.firstName ]]

網絡安全策略管理研討會

請加入我們的網絡研討會,我們將會分享有關當今網絡安全和運作要件的實際經驗,以及各企業組織如何透過自動化有效地應用安全方案微細分(Micro-Segmentation)來減輕安全風險,同時又能保持敏捷。

加入我們可瞭解更多有關: 

1.「何謂」網絡安全策略管理解決方案購買,又為什麼「購買」?  
2. 即核心功能和常見的使用案例,網路安全策略管理解決方案可以協助達成 
3. 執行成功以及如何讓您的投資獲得最大的價值 
4. 如何評估網路安全策略管理解決方案以及關鍵注意事項

網絡研討會將於3月19日下午 4:00 由Tufin的北亞區售前工程師趙不灝 Pat Chiu 主持,他已經為數十個企業組織提供了多年諮詢服務,針對網路設計和實施安全策略和程序進行研討。Tufin 專家們像他一樣持續與雲端、網路安全經營團隊以及法規遵循經理相互合作,以支持他們建立企業級網路安全計劃所做的努力。
Recorded Mar 19 2020 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
趙不灝 Pat Chiu, Tufin北亞區售前工程師
Presentation preview: 網絡安全策略管理研討會
  • Channel
  • Channel profile
  • Make Zero Trust a Strategic Priority – Tips and Advice from Forrester Oct 1 2020 6:00 am UTC 60 mins
    David Holmes, Senior Security & Risk Analyst, Forrester; Hillary Madge, VP, Product Marketing, Tufin
    Join David Holmes, Senior Security & Risk Analyst at Forrester, as he shares advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.

    Please join us on October 1st to learn about the importance of defining a Zero Trust network access strategy and roadmap, how this will help align many other security initiatives, and the major challenges likely to be encountered. David will impart his view on:
    • Why Zero Trust should be a strategic priority that drives technology adoption
    • The importance of network segmentation, visibility, and continuous inspection to enable Zero Trust
    • How vulnerability management is integral to the success of Zero Trust initiatives and how they can work hand in hand
    • The cost, productivity, compliance and security benefits of consolidating multiple security functions into a single platform
    • Ways to leverage Zero Trust to foster close relationships with other technology teams and break down silos
  • SecureCloud Webinar: Cloud-Native Security without Compromise Sep 30 2020 6:00 am UTC 60 mins
    Ben Grissinger, Cloud SME and Henry Pea Sales Engineering Director, APAC - Tufin
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.

    In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and move to the cloud by giving security, devops, and cloud operations teams a cloud-native automation solution for security policy. Topics covered:
    • Why traditional IT security processes and approaches don’t work for cloud-native
    • Align devops, security, and cloud-ops to create a security-first approach to cloud security
    • Automate security in a CI/CD process
    • Best practices for getting started
  • SecureCloud Webinar: Cloud-Native Security without Compromise Sep 29 2020 3:00 pm UTC 60 mins
    Ben Grissinger, Cloud SME
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.

    In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and move to the cloud by giving security, devops, and cloud operations teams a cloud-native automation solution for security policy. Topics covered:
    • Why traditional IT security processes and approaches don’t work for cloud-native
    • Align devops, security, and cloud-ops to create a security-first approach to cloud security
    • Automate security in a CI/CD process
    • Best practices for getting started
  • Addressing the Universal Challenges of Security vs. Speed of Change Sep 25 2020 6:00 am UTC 60 mins
    Pam Cyr - SVP Business and Corporate Development, Tufin
    Organizations today are investing numerous resources to strike a fine balance between fueling growth and delivering critical infrastructure changes at a rapid pace.

    Maintaining security and compliance while delivering change is a universal challenge for network as well as security teams. This challenge is compounded by multi-vendor, multi-platform environments which prevent comprehensive visibility and control, leading to delays and security lapses.

    Join this webinar on September 25th featuring a panel of visionaries from Innogy, Fortinet, and Tufin to learn their view on:
    • Best practices for securing your diverse multi-vendor network through visibility and automation
    • Automation to improve productivity, speed and accuracy of network administration
    • Dr Juergen Tusch’s personal quest to enable secure infrastructure changes and reduce Germany’s global energy footprint at the same time

    Our panelists include:
    • Dr. Juergen Tusch – Head of Telecommunications, Innogy Westenergie
    • John Jacobs – Vice President, Global Solutions Architecture, Fortinet
    • Reuven Harrison – CTO and Co-founder, Tufin
    • Pam Cyr - SVP Business and Corporate Development, Tufin
  • TechTalk: Solutions for Creating & Enforcing Policies for Kubernetes Flows Sep 24 2020 6:00 am UTC 60 mins
    Chintan Patnaik, Pre-Sales Engineer, India - Tufin
    Are you looking for an effective and automated way to secure Kubernetes deployments and automate security across your hybrid network? Watch this webinar to learn how you can use Tufin solutions to establish your firewalls as a second layer of defense around your Kuberenets clusters. This can help enable network level and app level segmentation, risk analysis, and compliance assessment of your IT environment, irrespective of the underlying platform or network security devices.

    In this webinar we’ll review use cases and best practices, as well as demonstrate:
    • How to gain visibility to avoid blind spots of Kubernetes N-S traffic
    • How to easily audit if policies differ from corporate standards
    • How to maintain the benefits of your existing admin processes and workflows to yield consistent, efficient, and comprehensive hybrid management
  • TechTalk: Solutions for Creating & Enforcing Policies for Kubernetes Flows Sep 22 2020 3:00 pm UTC 45 mins
    Ricky Egge, Sales Engineer
    Are you looking for an effective and automated way to secure Kubernetes deployments and automate security across your hybrid network? Watch this webinar to learn how you can use Tufin solutions to establish your firewalls as a second layer of defense around your Kuberenets clusters. This can help enable network level and app level segmentation, risk analysis, and compliance assessment of your IT environment, irrespective of the underlying platform or network security devices.

    In this webinar we’ll review use cases and best practices, as well as demonstrate:
    • How to gain visibility to avoid blind spots of Kubernetes N-S traffic
    • How to easily audit if policies differ from corporate standards
    • How to maintain the benefits of your existing admin processes and workflows to yield consistent, efficient, and comprehensive hybrid management
  • SecureCloud Webinar: Avoiding Cloud Policy Misconfigurations Recorded: Sep 4 2020 53 mins
    Colby Dyess, Director, Product Management, Cloud and Henry Pea, Sales Engineering Director, APAC - Tufin
    According to Gartner, 99% of the security breaches in the cloud will occur from policy misconfigurations made by the customer – not the cloud platform vendor.

    This webinar will provide an overview of these misconfiguration issues and how you can use Tufin SecureCloud to automate the creation and ongoing management of security policy configurations.

    Topics covered:
    • Why misconfigurations are so easy to create
    • Create policies using automation
    • Manage and monitor policy configuration throughout the SDLC lifecycle
  • SecureCloud Webinar: Avoiding Cloud Policy Misconfigurations Recorded: Sep 3 2020 52 mins
    Colby Dyess, Director, Product Management, Cloud
    According to Gartner, 99% of the security breaches in the cloud will occur from policy misconfigurations made by the customer – not the cloud platform vendor.

    This webinar will provide an overview of these misconfiguration issues and how you can use Tufin SecureCloud to automate the creation and ongoing management of security policy configurations.

    Topics covered:
    • Why misconfigurations are so easy to create
    • Create policies using automation
    • Manage and monitor policy configuration throughout the SDLC lifecycle
  • TechTalk: Gain Vendor-Agnostic Visibility to Secure your Hybrid Network Recorded: Sep 3 2020 46 mins
    Alex Apt, Solutions Architect, APAC Sales - Tufin
    Maintaining and controlling a healthy compliance posture across the fragmented network is complex and challenging. This is due to the lack of visibility of what talks to what across your hybrid network. When visibility is afforded, combined with a centralized multi-vendor control plane, you can achieve enforcement of consistent security and compliance across different types of apps and workloads, environments (public, private, multi-cloud) as well as network platforms and infrastructure devices.

    Join us for a TechTalk webinar where you will learn from real world scenarios on how to gain visibility and achieve continuous compliance of your security policy management.

    We will demonstrate how to:
    • Gain visibility of your security policies both on-premises and across the multi-cloud vendors
    • Identify and mitigate highly permissive rules
    • Define security policy guiderails and automatically compare rules against them
    • Automate compliance controls
  • TechTalk: Gain Vendor-Agnostic Visibility to Secure your Hybrid Network Recorded: Sep 2 2020 46 mins
    Jojo Aricat, Sales Engineer
    Maintaining and controlling a healthy compliance posture across the fragmented network is complex and challenging. This is due to the lack of visibility of what talks to what across your hybrid network. When visibility is afforded, combined with a centralized multi-vendor control plane, you can achieve enforcement of consistent security and compliance across different types of apps and workloads, environments (public, private, multi-cloud) as well as network platforms and infrastructure devices.

    Join us for a TechTalk webinar where you will learn from real world scenarios on how to gain visibility and achieve continuous compliance of your security policy management.

    We will demonstrate how to:
    • Gain visibility of your security policies both on-premises and across the multi-cloud vendors
    • Identify and mitigate highly permissive rules
    • Define security policy guiderails and automatically compare rules against them
    • Automate compliance controls
  • Webinar: Rethinking Security Segmentation for the Remote Workforce Recorded: Sep 2 2020 45 mins
    Panel Discussion
    Live Panel: Rethinking Security Segmentation for the Remote Workforce

    The abruptness and unprecedented scale at which organizations moved to a remote workforce has given rise to complex and widespread IT security challenges. Ensuring employees had the tools and access they needed to be productive was the priority. But now IT, Compliance & Security teams needs to consider the security issues created.

    IT admins had to hurriedly configure and scale their VPN infrastructure to accommodate the surge of connections. VPNs are complex to manage and given the short time frame, there are likely insufficiently strong policies and misconfigurations that will create vulnerabilities.

    In this webinar, experts will share key insights and discuss recommendations. Talking points could include:
    - Real world examples – lessons learned from customer experience managing security postures during the “big switch”
    - How to identify and mitigate risks introduced when going remote, without utilizing all IT resources
    - Considerations for updating your segmentation strategy for remote workers

    Register now to garner thoughts from experts on how to improve your security posture for the new normal.

    Panelists, each with over 20 years of experience managing security postures for global, Fortune 2000 organizations, include:
    1. Justin Anthony Pitt, Senior Security Engineer, Duke Energy
    2. David Goodman, Director of Engineering & Founder, G2 Deployment Advisors, IT Security Consulting
  • Webinar: Rethinking Security Segmentation for the Remote Workforce Recorded: Sep 1 2020 42 mins
    Panel Discussion
    Live Panel: Rethinking Security Segmentation for the Remote Workforce

    The abruptness and unprecedented scale at which organizations moved to a remote workforce has given rise to complex and widespread IT security challenges. Ensuring employees had the tools and access they needed to be productive was the priority. But now IT, Compliance & Security teams needs to consider the security issues created.

    IT admins had to hurriedly configure and scale their VPN infrastructure to accommodate the surge of connections. VPNs are complex to manage and given the short time frame, there are likely insufficiently strong policies and misconfigurations that will create vulnerabilities.

    In this webinar, listen to a panel of experts share key insights and discuss recommendations including:
    •Real world examples – lessons learned from customer experience managing security postures during the “big switch”
    •How to identify and mitigate risks introduced when going remote, without utilizing all of your IT resources
    •Considerations for updating your segmentation strategy for remote workers
    •Security policy best practices


    Register now to garner thoughts from experts on how to improve your security posture for the new normal.

    Panelists, each with over 20 years of experience managing security postures for global, Fortune 2000 organizations, include:
    1. Justin Anthony Pitt, Senior Security Engineer, Duke Energy
    2. David Goodman, Director of Engineering & Founder, G2 Deployment Advisors, IT Security Consulting
  • 如何在疫情期间及以后的工作中规划网络安全投资 Recorded: Aug 18 2020 24 mins
    赵不灏 Pat Chiu, Tufin北亚区售前工程师
    随着远程工作的流行,网络安全状态几乎在一夜之间发生了巨大变化。当务之急是速度,以及对员工的干扰最小,这使许多机构无法遵循其标准安全流程。了解我们的财富500强客户如何在一夜之间转变,其网络安全风险的变化,采用的解决方案以及下一步的策略。

    根据对Tufin客户的最近调查结果,研讨会将讨论以下内容:
    • 远程工作时机构面临的重大安全挑战
    • 大量员工远程工作时,通过分段和访问控制,评估和改善网络安全的最佳实践
    • 客户计划恢复其安全状态的投资,提高其网络和安全团队的效率,并为将来可能发生的关键转折或冲击做准备

    诚邀您参加 8月18日下午2:30举行的研讨会。
  • Investitionen in Netzwerksicherheit priorisieren Recorded: Aug 14 2020 39 mins
    Paul Bauer, Regional Sales Manager, Germany - Tufin
    Die Anforderungen an Netzwerksicherheit haben sich aufgrund der notwendigen Verlagerung zur Arbeit im Homeoffice praktisch über Nacht grundlegend verändert. Die Notwendigkeit dieser extrem schnellen Anpassung – bei minimalen Unterbrechungen für Mitarbeiter – hat aber in vielen Organisationen dazu geführt, dass Standardsicherheitsverfahren nicht umfassend beachtet wurden. Erfahren Sie, wie unsere Fortune-500-Kunden die Veränderungen bewältigt, die Auswirkungen auf Netzwerksicherheitsrisiken bewertet und entsprechende Lösungen ausgewählt haben, sowie sie für die Zukunft planen.

    Auf Grundlage der Ergebnisse einer kürzlich von Tufin durchgeführten Kundenumfrage, werden wir in diesem Webinar folgende Aspekte näher betrachten:
    • Die wichtigsten Herausforderungen im Zusammenhang mit Sicherheit, durch die Einrichtung von Homeoffice-Kapazitäten
    • Bewährte Verfahren für die Bewertung und Verbesserung der Netzwerksicherheit bei einer großen Anzahl von Mitarbeitern im Homeoffice – mit Segmentierung und Zugriffskontrollen
    • Geplante Investitionen von Kunden, um Sicherheitsanforderungen erneut zu erfüllen, die Produktivität der Netzwerk- und Sicherheitsteams zu steigern und für mögliche Veränderungen oder Krisen in Zukunft gerüstet zu sein

    Seien Sie mit dabei, am 14. August um 10:00 Uhr

    Falls Sie nicht am Live-Webinar teilnehmen können, melden Sie sich hier an und wir werden Ihnen die Aufzeichnung zusenden.
  • Prioritizing Network Security Investments During Covid & Beyond Recorded: Aug 14 2020 51 mins
    Chintan Patnaik, Pre-Sales Engineer, India - Tufin
    Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organizations from following their standard security processes. Learn how our Fortune 500 customers transformed overnight, the implications on their network security risks, the solutions employed, and what’s next.

    Based on results of a recent survey of Tufin customers, in this webinar, we’ll take a closer look at:
    Key security challenges organizations introduced when enabling remote workers
    Best practices for how-to asses and improve network security, with a large remote workforce, through segmentation and access controls
    Investments customers plan to make to restore their security posture, increase the productivity of their network and security teams, and prepare for another possible pivot or shock in the future

    Please join us on August 14th at 2pm (SGT)

    If you're unable to attend the live webinar, sign up here and we’ll send you the recording
  • Prioritizing Network Security Investments During Covid & Beyond Recorded: Aug 13 2020 43 mins
    Roi Alon, Senior Product Manager - Tufin
    Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organizations from following their standard security processes. Learn how our Fortune 500 customers transformed overnight, the implications on their network security risks, the solutions employed, and what’s next.

    Based on results of a recent survey of Tufin customers, in this webinar, we’ll take a closer look at:
    Key security challenges organizations introduced when enabling remote workers
    Best practices for how-to asses and improve network security, with a large remote workforce, through segmentation and access controls
    Investments customers plan to make to restore their security posture, increase the productivity of their network and security teams, and prepare for another possible pivot or shock in the future

    Please join us on August 13th at 11am (EST)

    If you're unable to attend the live webinar, sign up here and we’ll send you the recording
  • Prioritizzare gli investimenti in sicurezza della rete nell’era COVID e oltre Recorded: Aug 13 2020 24 mins
    Flavio Di Cosmo, Pre Sales engineer, Italy - Tufin
    I livelli di sicurezza della rete hanno subito una brusca trasformazione con il passaggio improvviso al telelavoro. La necessità imprescindibile di velocità, con disagi minimi per i dipendenti, ha impedito a molte organizzazioni di seguire le proprie procedure tradizionali in materia di sicurezza. Scopri la trasformazione che i nostri clienti Fortune 500 hanno attuato dall'oggi al domani, le implicazioni relative ai rischi per la sicurezza della propria rete, le soluzioni utilizzate e i piani per il futuro.

    Sulla base dei risultati di un recente sondaggio condotto tra i clienti Tufin, in questo webinar esamineremo in maggiore dettaglio:
    • Le principali sfide per la sicurezza che le organizzazioni si sono trovate ad affrontare nel passaggio al telelavoro.
    • Le pratiche migliori per valutare e potenziare la sicurezza della rete, con un gran numero di dipendenti che lavora da remoto, attraverso la segmentazione e il controllo degli accessi.
    • Gli investimenti che i clienti prevedono di effettuare per ripristinare il proprio livello di sicurezza, aumentare la produttività dei team incaricati della rete e della sicurezza e prepararsi a un altro possibile colpo o scossa in futuro.

    Unisciti a noi il 13 agosto alle 15:00 (CEST).

    Se non puoi partecipare al webinar in diretta, iscriviti qui e ti invieremo la registrazione.
  • Security Policy Clean-Up and Optimization through Administrative Automation Recorded: Aug 13 2020 37 mins
    Alex Apt, Solutions Architect, APAC Sales - Tufin
    Security policy clean-up does not need to be a drag. Imagine automated identification or alerts for policies which haven’t been used for three months, automatic populating of tickets to decommission these rules, automated server decommissioning, and automated group modifications aligned with your IPAM changes.

    Join us for a TechTalk to learn how to take the drag out of security policy clean-up, and how to optimize your policy management efficiently, productively and accurately.
  • SecureCloud Webinar Series: Cloud Security Posture Visibility Recorded: Aug 13 2020 35 mins
    Jonathan Campbell, Cloud SME and Pat Chiu Pre Sales Engineer, North Asia - Tufin
    Gaining visibility into public cloud and Kubernetes environments is a critical first step to ensuring your cloud is secure. Using Tufin SecureCloud, we will show you how to gain valuable insight and visibility into your cloud security posture, and discuss the next steps to actionable remediation and continued compliance.

    This webinar will review the key metrics, insights, industry standards, and best-practices required to determine your current cloud security posture. Topics covered:
    • Cloud platform vendor best practices
    • CIS Benchmarks – how to interpret and act on them
    • Find and understand overly permissive security policies
  • SecureCloud Webinar Series: Cloud Security Posture Visibility Recorded: Aug 12 2020 39 mins
    Jonathan Campbell, Cloud SME
    Gaining visibility into public cloud and Kubernetes environments is a critical first step to ensuring your cloud is secure. Using Tufin SecureCloud, we will show you how to gain valuable insight and visibility into your cloud security posture, and discuss the next steps to actionable remediation and continued compliance.

    This webinar will review the key metrics, insights, industry standards, and best-practices required to determine your current cloud security posture. Topics covered:
    • Cloud platform vendor best practices
    • CIS Benchmarks – how to interpret and act on them
    • Find and understand overly permissive security policies
Security Policy Orchestration Solutions
Tufin® is the leader in Network Security Policy Orchestration, serving more than half of the top 50 companies in the Forbes Global 2000. Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. Tufin reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries.

Find out more at www.tufin.com
Tufin blog SuiteTalk™ http://www.tufin.com/blog/
Twitter: http://twitter.com/TufinTech
Webinars http://www.tufin.com/resources/webinars/
YouTube https://www.youtube.com/user/Tufintech

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 網絡安全策略管理研討會
  • Live at: Mar 19 2020 8:00 am
  • Presented by: 趙不灝 Pat Chiu, Tufin北亞區售前工程師
  • From:
Your email has been sent.
or close