Joint webinar with Microsoft Azure - Understanding Hybrid Network Security

September 14, 2023
Yuval Pery
Product Manager, Azure Network Security at Microsoft
Yoav Yam-Karnibad
Product Manager, Cloud Network Security at AlgoSec
Learn how Microsoft Azure and AlgoSec solutions help companies improve visibility and identify risk in large complex hybrid networking environments

In this joint webinar with Microsoft, we discuss the challenges in these hybrid networks and how Microsoft Azure and AlgoSec are helping companies leverage cloud technologies to add more capacity and business applications without increasing their exposure to security risk.

During the webinar you will hear Yuval Pery, the Product Manager for Azure Network Security at Microsoft, review and discuss the security features and options available with Microsoft Azure.  We also have Yoav Yam-Karnibad, the Product Manager for Cloud Network Security at AlgoSec, show the integrations that exist today between AlgoSec and Microsoft Azure that help improve visibility and identify and prioritize risk in today’s hybrid environments.

Relevant Resources
Adopting an application-centric approach to security management: are we mature enough?

Adopting an application-centric approach to security management: are we mature enough?

IT security teams are finding it difficult to keep up with the dynamic businesses they are tasked with enabling and keeping secure. These teams typically serve every line of business, and are expected to not only maintain robust security..

Application Connectivity: There’s a Map for That

Application Connectivity: There's a Map for That

Over the life cycle of an application, network connections tend to become more complex and the need for them may come and go. Yet it’s difficult to know how and why data flows between applications below the multiple overlapping layers...

Firewall Rule Recertification with Application Connectivity

Firewall Rule Recertification with Application Connectivity

Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.