top of page

Webinars

Turning Network Security Alerts into Action: Change Automation to the Rescue

Turning Network Security Alerts into Action: Change Automation to the Rescue

Kfir Tabak & Jacqueline Basil

AlgoSec

Filter by Type
Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires

Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires

Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires

The growing body of regulations and standards forces enterprises to put considerable emphasis on compliance verified by ad hoc and regular auditing of security policies and control...

Turning Network Security Alerts into Action: Change Automation to the Rescue

Turning Network Security Alerts into Action: Change Automation to the Rescue

Turning Network Security Alerts into Action: Change Automation to the Rescue

You use multiple network security controls in your organization, but they don’t talk to each other. And while you may get alerts that come with tools such as SIEM solutions and v...

Tightening security posture with micro-segmentation

Tightening security posture with micro-segmentation

Tightening security posture with micro-segmentation

Micro-segmentation protects your network by limiting the lateral movement of ransomware and other threats in your network. Yet successfully implementing a defense-in-depth strategy...

The 6 best practices to stay secure in the hybrid cloud

The 6 best practices to stay secure in the hybrid cloud

The 6 best practices to stay secure in the hybrid cloud

What if we told you that there were just six things that you can start doing to be more secure in your hybrid cloud environment? In this session, you’ll get clear insigh...

Stop Putting out Fires. Pass Network Security Audits – Every Time

Stop Putting out Fires. Pass Network Security Audits – Every Time

Stop Putting out Fires. Pass Network Security Audits – Every Time

Compliance with network and data security regulations and internal standards is vital and mission-critical. But with increasing global regulations and network complexities, it’s ...

State of Ransomware: Caught between perception and reality

State of Ransomware: Caught between perception and reality

State of Ransomware: Caught between perception and reality

Ransomware continues to be a major problem—and the problem is only getting worse. An exclusive ExtraHop 2022 survey conducted with over 500 security and IT decision makers provid...

Securely Accelerate Digital Transformation – A Joint VMware & AlgoSec Webinar

Securely Accelerate Digital Transformation – A Joint VMware & AlgoSec Webinar

Securely Accelerate Digital Transformation – A Joint VMware & AlgoSec Webinar

This past year was an earthquake. The global pandemic amplified the urgent need for businesses to accelerate digital transformation, at the same time that concerns about security a...

Secure Application Connectivity with Automation

Secure Application Connectivity with Automation

Secure Application Connectivity with Automation

How can a high degree of application connectivity be achieved when your data is widely distributed? Efficient cloud management helps simplify today’s complex network environment,...

Rescuing Your Network with Micro-Segmentation

Rescuing Your Network with Micro-Segmentation

Rescuing Your Network with Micro-Segmentation

Cybersecurity has turned into a top priority as hackers grow more sophisticated. Micro-segmentation is a protective measure that allows you to put in gateways separating specific a...

Reducing Risk of Ransomware Attacks - Back to Basics

Reducing Risk of Ransomware Attacks - Back to Basics

Reducing Risk of Ransomware Attacks - Back to Basics

Did you know that 50% of organizations were hit by ransomware attacks in 2020? These attacks have become more sophisticated, as attackers change tactics from “spray and pray” t...

Radically reduce firewall rules with application-driven rule recertification

Radically reduce firewall rules with application-driven rule recertification

Radically reduce firewall rules with application-driven rule recertification

Does your network still have obsolete firewall rules? Do you often feel overwhelmed with the number of firewall rules in your network? To make sure your network is secure and co...

The quick guide to change automation: Turning network security alerts into action

The quick guide to change automation: Turning network security alerts into action

The quick guide to change automation: Turning network security alerts into action

You use multiple network security controls in your organization, but they just don’t talk to each other. And while you probably get alerts from SIEM solutions and vulnerabilit...

Choose a better way to manage your network

bottom of page