Praktische Tipps, um ein Zero Trust Framework zu planen und zu implementieren
Zero Trust ist kein neues Konzept. Nahezu alle Organisationen vertrauen auf Netzwerk-Security-Geräte (virtuell oder physikalisch), um das Netzwerk zu segmentieren, zu limitieren, und zu definieren, was mit was und wer mit wem kommunizieren kann.
Dies basiert alles auf Zero Trust Prinzipien, was wiederum zwei Probleme impliziert:
Einerseits kann Perimeter-basierte Segmentation nicht effizient für Cloud-Native Applikationen genutzt werden,
andererseits ist der Einsatz von Multi-Vendor Lösungen zur Segmentation oder Microsegmentation von Hybridumgebungen zeitaufwendig, fehleranfällig und nicht effizient skalierbar.
Nehmen Sie an diesem Webinar teil, um bei den folgenden Sachverhalten Ihr Wissen zu vertiefen:
• Worum geht es beim Zero Trust Netzwerk
• Wie definiere und manage ich (Micro-) Segmentation
• Wie werden Policy Changes auf Zero Trust Prinzipien implementiert (Changes werden zum schwächsten Glied, also ist es in Ihrem Interesse, die Prozesse zu simulieren, zu testen und zu kontrollieren)
• Wie wird eine Zero Trust Strategie implementiert und gemanaged über beliebige Umgebungen für beliebige Applikationen/Workloads, ohne zusätzliche Agents oder Proxies zu involvieren?
RecordedMay 6 202039 mins
Your place is confirmed, we'll send you email reminders
Sattwik Gavli, Director Cloud Security Product at Tufin and Shaan Mulchandani, Global AWS Security Lead at Accenture
Working with the world’s largest enterprises, Accenture sees the most common pitfalls in cloud security - from misconfigurations to ever-changing technology. Learn from Accenture’s Senior Cloud Security Manager, Shaan Mulchandani, how their clients combat the burning problem of misconfigurations in their large, heterogeneous environments.
In this webinar you will hear:
- Real client scenarios describing what caused misconfigurations in their network
- The key reasons for misconfigurations in multi-cloud and hybrid cloud environments
- Best practices to avoid misconfigurations
Register now and gain a strategy to secure your cloud environment without misconfigurations.
Unable to attend? Sign up here and we’ll send you the recording.
Sattwik Gavli, Director Cloud Security Product at Tufin and Shaan Mulchandani, Global AWS Security Lead at Accenture
Working with the world’s largest enterprises, Accenture sees the most common pitfalls in cloud security - from misconfigurations to ever-changing technology. Learn from Accenture’s Senior Cloud Security Manager, Shaan Mulchandani, how their clients combat the burning problem of misconfigurations in their large, heterogeneous environments.
In this webinar you will hear:
- Real client scenarios describing what caused misconfigurations in their network
- The key reasons for misconfigurations in multi-cloud and hybrid cloud environments
- Best practices to avoid misconfigurations
Register now and gain a strategy to secure your cloud environment without misconfigurations.
Unable to attend? Sign up here and we’ll send you the recording.
If you can’t see it, you can’t measure, monitor, or control it. For network and security management, a lack of visibility leads to blind spots, non-compliance, and inefficiency.
In this TechTalk, "Utilizing Tufin Topology to Effectively Troubleshoot Connectivity Across the Enterprise", we will explain what full network visibility should entail, and what is required to achieve it, across your hybrid, multi-vendor, multi-platform environment.
Join us on February 25th, 2021 at 2pm SGT to learn how to gain the five layers of visibility:
• Which devices, programs and workloads are running
• Which existing security rules are in force between these devices
• What security policy should be allowed
• Which access rules are in (or out of) compliance
• Least privilege Access – how security policies can be narrowed to establish least privilege acces
If you can’t see it, you can’t measure, monitor, or control it. For network and security management, a lack of visibility leads to blind spots, non-compliance, and inefficiency.
In this TechTalk, "Utilizing Tufin Topology to Effectively Troubleshoot Connectivity Across the Enterprise", we will explain what full network visibility should entail, and what is required to achieve it, across your hybrid, multi-vendor, multi-platform environment.
Join us on February 24th, 2021 at 11:00am ET to learn how to gain the five layers of visibility:
• Which devices, programs and workloads are running
• Which existing security rules are in force between these devices
• What security policy should be allowed
• Which access rules are in (or out of) compliance
• Least privilege Access – how security policies can be narrowed to establish least privilege access
Dan Rheault, Product Manager, Security Solutions & Delme Herbert, Senior Technical Product Manager at BlueCat
To effectively protect sensitive assets and achieve a Zero Trust architecture, organizations increasingly turn to segmentation. Segmentation, or micro-segmentation, can reduce the risk of attacks by making it difficult to traverse the network. But segmentation is complex to manage and its maintenance can potentially impact business continuity.
Join us as BlueCat Sr. Technical Product Manager, Delme Herbert, and Tufin Product Manager, Dan Rheault share how to establish and maintain an effective segmentation policy including:
The common challenges of maintaining an accurate segmentation policy
How Tufin and IPAM solutions, such as BlueCat Networks, enable consistent security policy management across your hybrid environment
How network and security teams can collaborate through enhanced visibility, proactive risk assessments, and more
Take the next step with a segmentation strategy that helps further secure your environment
Dan Rheault, Product Manager, Security Solutions & Delme Herbert, Senior Technical Product Manager at BlueCat
To effectively protect sensitive assets and achieve a Zero Trust architecture, organizations increasingly turn to segmentation. Segmentation, or micro-segmentation, can reduce the risk of attacks by making it difficult to traverse the network. But segmentation is complex to manage and its maintenance can potentially impact business continuity.
Join us on Tuesday, February 23 at 11am ET/ 4pm GMT, as BlueCat Sr. Technical Product Manager, Delme Herbert, and Tufin Product Manager, Dan Rheault share how to establish and maintain an effective segmentation policy.
This interactive session highlights:
- The common challenges of maintaining an accurate segmentation policy
- How Tufin and IPAM solutions, such as BlueCat Networks, enable consistent security policy management across your hybrid environment
- How network and security teams can collaborate through enhanced visibility, proactive risk assessments, and more
Tufin’s new release, R21-1, includes enhanced support for Azure and AWS environments and Check Point CloudGuard, as well as new NGFW capabilities to help you extend your visibility and control across your hybrid environment (cloud and on-premise).
In addition, the new Vulnerability-based Change Automation (VCA) App allows you to ensure consistent risk assessments during access change workflows. Embed into your process an automated confirmation from your vulnerability scanners that new sources or destinations have no known vulnerabilities. With the VCA, you can make accurate risk decisions based on both policy and security data.
Join us on Thursday, February 18 at 2 pm SGT to learn how you can use Tufin’s newest security automation features to:
- Enhance the risk analysis step of your provisioning workflows through automatically incorporating vulnerability scanner output
- Manage policy changes within and across the Azure environment.
- Manage changes for environments that are not natively supported by Tufin
- Gain enhanced visibility into AWS VPC Peering and Transit GW Traffic
- Achieve complete visibility into LDAP objects and multi-vendor User-ID NGFW policies
- View and track changes for Check Point CloudGuard policies with AWS, NSX, and Cisco-ACI (in addition to Azure) objects
Tufin’s new release, R21-1, includes enhanced support for Azure and AWS environments and Check Point CloudGuard, as well as new NGFW capabilities to help you extend your visibility and control across your hybrid environment (cloud and on-premise).
In addition, the new Vulnerability-based Change Automation (VCA) App allows you to ensure consistent risk assessments during access change workflows. Embed into your process an automated confirmation from your vulnerability scanners that new sources or destinations have no known vulnerabilities. With the VCA, you can make accurate risk decisions based on both policy and security data.
Join us on Wednesday, February 17 at 11 am EST/ 4pm GMT to learn how you can use Tufin’s newest security automation features to:
- Enhance the risk analysis step of your provisioning workflows through automatically incorporating vulnerability scanner output
- Manage policy changes within and across the Azure environment
- Manage changes for environments that are not natively supported by Tufin
- Gain enhanced visibility into AWS VPC Peering and Transit GW Traffic
- Achieve complete visibility into LDAP objects and multi-vendor User-ID NGFW policies
- View and track changes for Check Point CloudGuard policies with AWS, NSX, and Cisco-ACI (in addition to Azure) objects
Jonathan Campbell, Sales Engineer, Cloud; Alex Apt, Solutions Architect
Agility and speed are key drivers behind most DevOps, sometimes at the expense of secure development or timely security reviews. CI/CD often creates a challenge for organizations to maintain compliance as security policies are typically introduced much later in the development cycle, potentially increasing risks. The manual processes of checking dynamic security policies across the entire organizations as they adopt CI/CD at a scale is simply asking for a catastrophe to happen.
How does security policy automation drive agility in DevOps?
- Helps organizations adopt ‘shift-left’ strategy with a rock-solid plan
- Eliminates manual security checks late in the build cycle
- Alerts developers to course-correct earlier in the build cycle
- Assures security teams that their most updated security policies are incorporated in the CI/CD pipeline
- Meets security and compliance requirements without impacting the agility of application development
This webinar will highlight how one customer uses Tufin to introduce security policies much earlier in the build cycle. Automated updates to the security policies in the code repository allow developers to access the latest security team-defined policies while effectively accelerating CI/CD.
Agility and speed are key drivers behind most DevOps, sometimes at the expense of secure development or timely security reviews. CI/CD often creates a challenge for organizations to maintain compliance as security policies are typically introduced much later in the development cycle, potentially increasing risks. The manual processes of checking dynamic security policies across the entire organizations as they adopt CI/CD at a scale is simply asking for a catastrophe to happen.
How does security policy automation drive agility in DevOps?
- Helps organizations adopt ‘shift-left’ strategy with a rock-solid plan
- Eliminates manual security checks late in the build cycle
- Alerts developers to course-correct earlier in the build cycle
- Assures security teams that their most updated security policies are incorporated in the CI/CD pipeline
- Meets security and compliance requirements without impacting the agility of application development
This webinar will highlight how one customer uses Tufin to introduce security policies much earlier in the build cycle. Automated updates to the security policies in the code repository allow developers to access the latest security team-defined policies while effectively accelerating CI/CD.
Join us on Friday, January 29 at 2 pm SGT for a tech-driven session packed with valuable security policy info and tips, as Blake Hutchins, Tufin’s senior security engineer reviews the practical steps Tufin’s customers are taking to achieve Zero Trust network access across the hybrid cloud (on-premise & cloud).
In this webinar, "Attaining Least Access and Zero Trust", you’ll learn how to:
* Effectively define and maintain policies using automation to ensure they’re sufficiently restrictive
* Reduce the size and scope of existing security rule sets to help you meet regulatory compliance requirement
* Gain visibility into cloud network configurations and ensure consistent Zero Trust access approach
Join us for a tech-driven session packed with valuable security policy info and tips, as Blake Hutchins, Tufin’s senior security engineer reviews the practical steps Tufin’s customers are taking to achieve Zero Trust network access across the hybrid cloud (on-premise & cloud).
In this webinar, you’ll learn how to:
• Effectively define and maintain policies using automation to ensure they’re sufficiently restrictive
• Reduce the size and scope of existing security rule sets to help you meet regulatory compliance requirements
• Gain visibility into cloud network configurations and ensure consistent Zero Trust access approach
Ian Zwirek, Senior Manager, Infrastructure Security, Accenture & Dan Rheault, Product Manager, Security Solutions, Tufin
Zero Trust, or ZT is the current buzzword in the industry. We are encountering this concept frequently because many organizations are employing some level of a remote workforce, and the attention is now focused on network security to manage and control access of their hybrid cloud environment. Zero Trust principles provides you with a model to reinforce and improve your network security.
Join us for an interactive webinar, on Thursday, January 28 at 2 pm SGT, as Accenture’s Head of Adaptive Security & Zero Trust Center, Ian Zwirek, shares his hands-on experience and expertise on how to start planning and deploying Zero Trust network architecture in your organization.
In this webinar, Ian will discuss:
* Challenges customers face when they start implementing Zero Trust principles
* Accenture’s recommendations and how to implement context-aware policies via automation
* How to integrate ZT into your supply chain
Ian Zwirek, Senior Manager, Infrastructure Security, Accenture & Dan Rheault, Product Manager, Security Solutions, Tufin
Zero Trust, or ZT is the current buzzword in the industry. We are encountering this concept frequently because many organizations are employing some level of a remote workforce, and the attention is now focused on network security to manage and control access of their hybrid cloud environment. Zero Trust principles provides you with a model to reinforce and improve your network security.
Join us for an interactive webinar, on Wednesday, January 27 at 11 am EST/4 pm GMT, as Accenture’s Head of Adaptive Security & Zero Trust Center, Ian Zwirek, shares his hands-on experience and expertise on how to start planning and deploying Zero Trust network architecture in your organization.
In this webinar, Ian will discuss:
* Challenges customers face when they start implementing Zero Trust principles
* Accenture’s recommendations and how to implement context-aware policies via automation
* How to integrate ZT into your supply chain
Join this session to learn how to prioritize the remediation and mitigation of vulnerabilities using network insights from the Tufin Orchestration Suite.
Join our cloud experts to learn why Kubernetes is not secure without security policies that govern access and segmentation using cloud-native controls and Devops processes
Hadas Lahav, Director Producy Marketing and Sagi Bar-Zvi, Pre-Sales Manager, Americas
Join this session to learn how Tufin customers leverage network change automation and firewall automation to boost agility, improve productivity, and enforce continues policy compliance.
Tufin® is the leader in Network Security Policy Orchestration, serving more than half of the top 50 companies in the Forbes Global 2000. Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. Tufin reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries.
Find out more at www.tufin.com
Tufin blog SuiteTalk™ http://www.tufin.com/blog/
Twitter: http://twitter.com/TufinTech
Webinars http://www.tufin.com/resources/webinars/
YouTube https://www.youtube.com/user/Tufintech
Praktische Tipps, um ein Zero Trust Framework zu planen und zu implementierenManuel Haehr, EMEA Sales Engineering, Tufin[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]38 mins