top of page

Search results

626 results found with an empty search

  • Network management & policy change automation | AlgoSec

    Automate network management and policy changes to increase efficiency, reduce errors, and ensure security compliance across your network infrastructure. Network management & policy change automation ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Choose a better way to manage your network

  • Firewall ISO compliance: ISO/IEC 27001 explained | AlgoSec

    Understand how to achieve and maintain firewall compliance with ISO/IEC 27001. Learn key requirements, best practices, and how to strengthen your overall security posture. Firewall ISO compliance: ISO/IEC 27001 explained ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec platform White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure continuous compliance Solution overview See how this customer improved compliance readiness and risk management with AlgoSec Case study Choose a better way to manage your network

  • Firewall ruleset examples & policy best practices | AlgoSec

    Learn from expert-crafted firewall ruleset examples and best practices. Optimize your security posture with actionable guidance and improve your firewall configurations. Firewall ruleset examples & policy best practices ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Use these six best practices to simplify compliance and risk White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure Solution overview See how this customer improved compliance readiness and risk Case study Choose a better way to manage your network

  • PORSCHE | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. PORSCHE INFORMATIK SIMPLIFIES NETWORK OPERATIONS AND STRENGTHENS SECURITY Organization PORSCHE Industry Retail & Manufacturing Headquarters Austria Download case study Share Customer
success stories "We quickly saw a clear return on our investment with AlgoSec. It enabled us to significantly increase the efficiency of our firewall operations team without increasing head count. With AlgoSec, We can focus on what is most important to Porsche Informatik: our customers" Leading European Automobile Trading Enterprise Increases Security, Ensures Compliance, Optimizes Firewall Operations and Streamlines Productivity AlgoSec Business Impact • Increase IT productivity without adding headcount• Reduce time and resources required to implement firewall policy changes• Improve IT Governance and accountability over the network security policy• Improve security posture and gain visibility into the impact of proposed changes Background Porsche Informatik GmbH, a subsidiary of Porsche Holding, is one of the biggest private trading enterprises in Austria and the most successful automobile trade companies in Europe. The Company provides integrated software solutions for the automobile sector serving importers, retailers and financial service providers in over 21 countries. With its multi-vendor, multi-firewall infrastructure consisting of various Check Point clusters and firewalls, Porsche Informatik has been supporting some of the most successful automobile brands in the world including Volkswagen, Audi, Porsche, Seat and Skoda. Challenge As an enterprise serving the leading automobile brands, Porsche Informatik is committed to ensuring the integrity of its network and maintaining compliance with corporate security policies. Optimizing its operations is another top priority. With a large number of firewalls undergoing continuous rule changes, Porsche Informatik’s team had to manually confirm that all of the changes were correctly configured and adhered to corporate policy. To do this, Porsche Informatik needed to keep track of changes: when they were made, who made them and verify that they weren’t introducing clutter and subsequent risk into their environment. “As the rule base continued to grow, it became increasingly complex and harder to keep track of the details,” says Anton Spitzer, Infrastructure Services Manager at Porsche Informatik. “Monitoring and auditing of our firewalls and clusters has become a painstaking manual, time and labor intensive process and we needed to handle it more effectively.” Porsche Informatik looked for a solution that would allow them to automatically and comprehensively manage the entire change lifecycle of their heterogeneous firewall infrastructure to improve and optimize operations, bolster security and comply with the corporate security policy in an easier way. Solution Porsche Informatik selected the AlgoSec Security Management solution to provide automated, comprehensive firewall operations and security risk management.In particular, Porsche Informatik liked AlgoSec’s auditing capability as it tracks changes in real-time as well as provides analysis of the operational and security implications of those changes. Results With AlgoSec, Porsche Informatik can now intelligently automate manual, labor and time intensive tasks, optimize firewall operations and improve network security while enforcing corporate policies to provide improved IT Governance.“AlgoSec allows our team to quickly and easily understand the operational and security impact of rule changes on our corporate policy, while at the same time provides a detailed audit trail, which is crucial for us to maintain compliance,” says Spitzer. From an operations and risk perspective, AlgoSec enables Porsche Informatik to instantly know which rules and objects are obsolete, invalid and duplicate and where potential security holes exist. The ability to clean up the firewall policy has streamlined network operations and given Porsche Informatik better visibility into their firewall infrastructure. “We cleaned up our existing policy base and now utilize the “what if” analysis to prevent the introduction of clutter and risk into our environment,” explains Spitzer.Ultimately, with AlgoSec, Porsche Informatik can now easily determine the necessity of changes and their potential security implications which saves time and effort. As a result productivity has increased without adding headcount. “After several months of use, AlgoSec has made a quantifiable impact on our firewall operations and security risk management. We know exactly what changes are being made, by whom and the implications of those changes on our operations and security posture,” said Spitzer. “We now spend much less time analyzing and auditing our firewalls, allowing our IT personnel to work on additional projects. As a customer-centric company, optimized internal operations directly benefits our clients by allowing Porsche Informatik to focus wholly on their needs instead of on firewall management.” Schedule time with one of our experts

  • AlgoSec | Intrinsic Transformation: VMware NSX-T and AlgoSec Go Beyond Virtualization

    Jeremiah Cornelius, Technical Leader for Alliances and Partners at AlgoSec, explores the security capability native to VMware’s approach... Digital Transformation Intrinsic Transformation: VMware NSX-T and AlgoSec Go Beyond Virtualization Jeremiah Cornelius 2 min read Jeremiah Cornelius Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 7/8/21 Published Jeremiah Cornelius, Technical Leader for Alliances and Partners at AlgoSec, explores the security capability native to VMware’s approach for virtual networking with NSX-T. Intrinsic transformation NSX-T culminates VMware’s decade of development of these technologies, that better align than ever before with AlgoSec’s approach for software automation of micro-segmentation and compliant security operations management. It is the latest iteration of VMware’s approach to networking and security, derived from many years as a platform for operating virtual machines, and managing these as hosted “vApp” workloads. If you’re familiar with the main players in Software Defined Networking, then you may remember that NSX-T shares its origin in the same student research at Stanford University, which also gave rise to several other competing SDN offerings. One thing that differentiated VMware from other players was their strong focus on virtualization over traditional network equipment stacks. This meant in some cases, network connections, data-packets, forwarding, and endpoints all existing in software and no “copper wire” existing anywhere! Knowing about this difference is more than a bit of trivia — it explains how the NSX family was designed with security features built into the architecture, having native capability for software security controls such as firewall segmentation and packet inspection. Described by VMware as “Intrinsic Security,” these are NSX capabilities that first drove the widespread acceptance of practical micro-segmentation in the data center. Since that first introduction of NSX micro-segmentation, a transformation occurred in customer demands, which required an expansion of VMware’s universe to horizons beyond their hypervisor and virtual machines. As a key enabler for this expansion, NSX-T has emerged as a networking and security technology that extends from serverless micro-services and container frameworks to VMs hosted on many cloud architectures located in physical data centers or as tenants in public clouds. The current iteration is called the NSX-T Service-Defined Firewall, which controls access to applications and services along with business-focused policies. Leaders in our segments If you’ve followed this far along, then maybe you’ve recognized several common themes between AlgoSec’s Security Management Suite and VMware’s NSX-T. Among these are security operations management as software configuration, modeling connectivity on business uses versus technology conventions, and transforming security into an enabling function. It’s not a surprise then, to know that our companies are technology partners. In fact, we began our alliance with VMware back in 2015 as the uptake in NSX micro-segmentation began to reveal an increased need for visibility, planning, automation, and reporting — along with requirements for extending policy from NSX objects to attached physical security devices from a variety of vendors. The sophistication and flexibility of NSX enforcement capability were excellently matched by the AlgoSec strengths in identifying risk and maintaining compliance while sustaining a change management record of configurations from our combined workflow automation. Strength to strength Up until now, this is a rosy picture painted, with an emphasis on the upsides of the AlgoSec partnership with VMware NSX-T. In the real world, we find that many of our applications are not-so-well understood as to be ready for micro-segmentation. More often, the teams responsible for the availability and security of these applications are detached from the business intent and value, further making it difficult to assess and therefore address risks. The line between traditional-style infrastructure and modern services isn’t always as clearly defined, either — making the advantages possible by migration and transformation difficult to determine and potentially introducing their own risks. It is in these environments, with multiple technologies, different stakeholders, and operation teams with different scopes, that AlgoSec solves hard problems with better automation tools. Taking advantage of NSX-T means first being faced with multiple deployment types, including public and private clouds as well as on-prem infrastructure, multiple security vendors, unclear existing network flows, and missing associations between business applications and their existing controls. These are visibility issues that AlgoSec resolves by automating the discovery and mapping of business applications , including associated policies across different technologies, and producing visual, graphic analysis that includes risk assessment and impact of changes. This capability for full visibility leads directly to addressing the open issues for risk and compliance. After all, if these present challenges in discovering and identifying risk using existing technology solutions, then there’s a big gap to close on the way to transforming these. Since AlgoSec has addressed the visibility across these, identifying risk becomes uniform and manageable. AlgoSec can lower transformation risk with NSX-T while ensuring that risk and compliance management are maintained on an ongoing basis. Workflow for risk mitigation by NSX-T intrinsic security can be driven by AlgoSec policy automation, without recourse to multiple tools when these mitigations need to cross boundaries to third-party firewalls or cloud security controls. With this integrated policy automation, what were once point-in-time configurations can be enabled for discovery-based updates for internal standards and changes to regulatory mandates. The result of AlgoSec pairing with VMWare NSX-T is a simplified overall security architecture — one that more rapidly responds to emerging risk and requests for changes, accelerates the speed of operations while more closely aligning with business, and ensures both compliant configurations and compliant lifecycle operations. VMware NSX? Ask AlgoSec The AlgoSec integration with VMware NSX-T builds on our years of collaboration with earlier versions of the NSX platform, with a track record of solving the more difficult configuration management problems for leaders of principal industries around the globe. If you want to discover more about what AlgoSec does to enable and enrich our alliance solution with VMware , contact us! AlgoSec works directly with VMware and your trusted technology delivery partners, and we’re glad to share more with you. Schedule a personal demo to see how AlgoSec makes your transformation to VMware Intrinsic Security possible now. Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Verizon | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. VERIZON HELPS CLIENTS IMPROVE SECURITY AND BUSINESS AGILITY USING ALGOSEC Organization Verizon Industry Telecom Headquarters NJ, USA Download case study Share Customer
success stories "I selected AlgoSec’s Security Management Solution because the reporting is very trustworthy, it helps reduce the operational workload for network security administrators, and ultimately it improves performance and security." AlgoSec Business Impact Reduce the workload for the operations team and improve efficiency Provide comprehensive trustworthy reporting on change management Improve overall network performance and security Background Verizon is one of the world’s largest global communications companies and an international technology innovator. Verizon provides products and services related to networks, cloud, machine to machine and mobile technologies; data, hosting and storage; and managed security, as well as other wired and wireless offerings to business and government clients around the world. The company’s Global IP Network connects people and businesses in 2,700 cities and 150 countries. Challenge Verizon’s professional services consultants find that their clients too often focus on compliance to the detriment of security and operational issues. “From an auditing perspective, if the firewall is up and running some clients think they are more or less okay,” says Stefano Ciminelli, EMEA Practice Manager, Business Resiliency & Optimization at Verizon Business. Ciminelli warns that clients also need to be certain that “the firewall policies do not contain mistakes—those that could bring down their business. It’s not just a problem of protecting the IT systems, it’s really a matter of protecting the business,” he notes. Firewall management can also create tension between the network security group and business managers. “You always have the network security people focused on IT and the business people who like to focus on change management. Often these two groups don’t really communicate or understand each other easily,” Ciminelli adds.Moreover, many companies have several people devoted to managing firewalls and “firefighting,” “because they simply do not have the right tools,” says Ciminelli. Solution Ciminelli and his team at Verizon wanted to provide their clients with a way to address IT and security issues and, at the same time, automate change management workflows in order to support business continuity.“You want to be operationally efficient; you want to be secure; and especially, you want to help your business do their business. But, when it comes to network firewall management and analysis, you actually have few tools available that help you meet all those goals,” says Ciminelli. From the security manager’s perspective, AlgoSec’s Security Management Solution was the top choice. “The reporting is very trustworthy, it helps reduce the operational workload for network security administrators, and ultimately it improves performance and security,” Ciminelli states. “You can find a lot of vendors for security products in the market. But I don’t want to just sell products. I am entrusted to recommend quality services, so I rely on an extremely trustworthy partner like AlgoSec.” Results Ciminelli reports that when his customers invest in AlgoSec, “they are very happy because they can proactively manage their firewalls.” More importantly, though, “they are not forced to change a rule, close their eyes, cross their fingers and hope that everything is going to be okay.” Customers can trust AlgoSec’s reports to show how a rule change will affect access and their overall security before a change is made, and that there will be no surprises after the fact. The ability to share information between IT and business managers has also provided some unexpected benefits for Ciminelli. “When it comes to asking for additional budget, for instance, IT can now prove value and that makes life easier for everybody,” he notes. Customer service ranks high in Ciminelli’s priorities—and AlgoSec consistently delivers. “Whenever I have a problem I always get very efficient and proactive technical support from the AlgoSec team. This is one of the primary reasons I continue to advise my customers to purchase AlgoSec,” he says. Ciminelli urges his clients and other companies to think broadly about the real purpose of firewall policy management. “What you want is not just a well configured firewall, you want good long-term security management.” The goal is to have a firewall that provides excellent protection as the company grows, needs change, and applications are deployed, changed or decommissioned. Ciminelli’s final recommendation? “Using AlgoSec products and relying on good professional services to help you, that is really the smart choice.” Schedule time with one of our experts

  • Top 11 FireMon competitors & alternatives (ranked & rated) | AlgoSec

    Explore top-rated FireMon alternatives for firewall security management. Find the best solutions for your needs based on our ranked and rated comparison. Top 11 FireMon competitors & alternatives (ranked & rated) ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec platform White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure continuous compliance Solution overview See how this customer improved compliance readiness and risk Case study Choose a better way to manage your network

  • AlgoSec | Bridging Network Security Gaps with Better Network Object Management

    Prof. Avishai Wool, AlgoSec co-founder and CTO, stresses the importance of getting the often-overlooked function of managing network... Professor Wool Bridging Network Security Gaps with Better Network Object Management Prof. Avishai Wool 2 min read Prof. Avishai Wool Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 4/13/22 Published Prof. Avishai Wool, AlgoSec co-founder and CTO, stresses the importance of getting the often-overlooked function of managing network objects right, particularly in hybrid or multi-vendor environments Using network traffic filtering solutions from multiple vendors makes network object management much more challenging. Each vendor has its own management platform, which often forces network security admins to define objects multiple times, resulting in a counter effect. First and foremost, this can be an inefficient use of valuable resources from a workload bottlenecking perspective. Secondly, it creates a lack of naming consistency and introduces a myriad of unexpected errors, leading to security flaws and connectivity problems. This can be particularly applicable when a new change request is made. With these unique challenges at play, it begs the question: Are businesses doing enough to ensure their network objects are synchronized in both legacy and greenfield environments? What is network object management? At its most basic, the management of network objects refers to how we name and define “objects” within a network. These objects can be servers, IP addresses, or groups of simpler objects. Since these objects are subsequently used in network security policies, it is imperative to simultaneously apply a given rule to an object or object group. On its own, that’s a relatively straightforward method of organizing the security policy. But over time, as organizations reach scale, they often end up with large quantities of network objects in the tens of thousands, which typically lead to critical mistakes. Hybrid or multi-vendor networks Let’s take name duplication as an example. Duplication on its own is bad enough due to the wasted resource, but what’s worse is when two copies of the same name have two distinctly different definitions. Let’s say we have a group of database servers in Environment X containing three IP addresses. This group is allocated a name, say “DBs”. That name is then used to define a group of database servers in Environment Y containing only two IP addresses because someone forgot to add in the third. In this example, the security policy rule using the name DBs would look absolutely fine to even a well-trained eye, because the names and definitions it contained would seem identical. But the problem lies in what appears below the surface: one of these groups would only apply to two IP addresses rather than three. As in this case, minor discrepancies are commonplace and can quickly spiral into more significant security issues if not dealt with in the utmost time-sensitive manner. It’s important to remember that accuracy is the name in this game. If a business is 100% accurate in the way it handles network object management, then it has the potential to be 100% efficient. The Bottom Line The security and efficiency of hybrid multi-vendor environments depend on an organization’s digital hygiene and network housekeeping. The naming and management of network objects aren’t particularly glamorous tasks. Having said that, everything from compliance and automation to security and scalability will be far more seamless and risk averse if taken care of correctly. To learn more about network object management and why it’s arguably more important now than ever before, watch our webcast on the subject or read more in our resource hub . Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • A Customer Story: The NCR journey to effective and agile network security | AlgoSec

    Learn how NCR improved network security and agility through automation and optimization with Algosec's solutions. Webinars A Customer Story: The NCR journey to effective and agile network security Managing security in a multi-billion-dollar enterprise poses many challenges, as well as opportunities. Go inside an S&P 500 company and hear how they manage their network security. Join Scott Theriault, Global Manager, Network Perimeter Security at NCR Corporation as he shares his real-world experience managing security in a global organization with Yitzy Tannenbaum, Product Marketing Manager at AlgoSec. Get insights on: Key factors managing network security in complex organizations The benefits of network policy optimization Importance of maintaining and demonstrating compliance Change management and automation in large, complex networks Driving alignment of cloud and on-premises security December 17, 2020 Yitzy Tannenbaum Product Marketing Manager Scott Theriault Global Manager, Network Perimeter Security at NCR Corporation Relevant resources AlgoSec Case Study: BT Watch Video Discovery Case Study Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Overcoming hybrid environment management challenges | AWS & AlgoSec Webinar | AlgoSec

    In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande s, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment Webinars Overcoming hybrid environment management challenges | AWS & AlgoSec Webinar Public clouds such as Amazon Web Services (AWS) are a critical part of your hybrid network. It is important to keep out the bad guys (including untrusted insiders) and proactively secure your entire hybrid network. Securing your network is both the responsibility of the cloud providers, as well as your organization’s IT and CISOs – the shared responsibility model. As a result, your organization needs visibility into what needs to be protected, as well as an understanding of the tools that are available to keep them secure. In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande’s, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment, including how to: Securely migrate workloads from on-prem to public cloud Gain unified visibility into your network topology and traffic flows, including both public cloud and on-premises assets, from a single console. Manage/orchestrate multiple layers of security controls and proactively detect misconfigurations Protect your data, accounts, and workloads from misconfiguration risks Protect web applications in AWS by filtering traffic and blocking common attack patterns, such as SQL injection or cross-site scripting Gain a unified view of your compliance status and achieve continuous compliance September 30, 2020 Stuti Deshpande Partner Solution Architect, AWS Omer Ganot Product Manager Relevant resources Migrating Business Applications to AWS? Tips on Where to Start Keep Reading Tips for auditing your AWS security policies, the right way Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Network security policy management software (NSPM) | AlgoSec

    Efficiently manage network security policies with AlgoSec’s solution to ensure compliance, reduce risks, and streamline operations across your hybrid IT environment. Network security policy management software (NSPM) ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec platform White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure continuous compliance Solution overview See how this customer improved compliance readiness and risk management with AlgoSec Case study Choose a better way to manage your network

  • Firewall Management 201 | algosec

    Security Policy Management with Professor Wool Firewall Management 201 Firewall Management with Professor Wool is a whiteboard-style series of lessons that examine the challenges of and provide technical tips for managing security policies in evolving enterprise networks and data centers. Lesson 1 In this lesson, Professor Wool discusses his research on different firewall misconfigurations and provides tips for preventing the most common risks. Examining the Most Common Firewall Misconfigurations Watch Lesson 2 In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow. Automating the Firewall Change Control Process Watch Lesson 3 In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions. Using Object Naming Conventions to Reduce Firewall Management Overhead Watch Lesson 4 In this lesson, Professor Wool examines some tips for including firewall rule recertification as part of your change management process, including questions you should be asking and be able to answer as well as guidance on how to effectively recertify firewall rules Tips for Firewall Rule Recertification Watch Lesson 5 In this lesson, Professor Wool examines how virtualization, outsourcing of data centers, worker mobility and the consumerization of IT have all played a role in dissolving the network perimeter and what you can do to regain control. Managing Firewall Policies in a Disappearing Network Perimeter Watch Lesson 6 In this lesson, Professor Wool examines some of the challenges when it comes to managing routers and access control lists (ACLs) and provides recommendations for including routers as part of your overall security policy with tips on change management, auditing and ACL optimization. Analyzing Routers as Part of Your Security Policy Watch Lesson 7 In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP. Examining the Challenges of Accurately Simulating Network Routing Watch Lesson 8 In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP. NAT Considerations When Managing Your Security Policy Watch Lesson 9 In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly. How to Structure Network Objects to Plan for Future Policy Growth Watch Lesson 10 In this lesson, Professor Wool examines the challenges of migrating business applications and physical data centers to a private cloud and offers tips to conduct these migrations without the risk of outages. Tips to Simplify Migrations to a Virtual Data Center Watch Lesson 11 In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall. If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them. Tips for Filtering Traffic within a Private Cloud Watch Lesson 12 In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites. Managing Your Security Policy for Disaster Recovery Watch Lesson 13 In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process. Zero-Touch Change Management with Checks and Balances Watch Lesson 14 Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios. Synchronized Object Management in a Multi-Vendor Environment Watch Lesson 15 Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work. In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions. How to Synchronize Object Management with a CMDB Watch Lesson 16 Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity. How to Take Control of a Firewall Migration Project Watch Lesson 17 PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations. PCI – Linking Vulnerabilities to Business Applications Watch Lesson 18 Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams. For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights). In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise. Sharing Network Security Information with the Wider IT Community With Team Collaboration Tools Watch Have a Question for Professor Wool? Ask him now Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

bottom of page