In this webinar you will learn about:
• Key industry metrics that compare security environments within and beyond the finance industry
• Network security policy management challenges that hamper digital transformation
• Overcoming security management complexity with automation for speed and accuracy
• Passing compliance audits in the face of demanding regulations
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Automating Security Policy Management Allows Financial Institutions to Make the Triple Play
1. AUTOMATING SECURITY POLICY
MANAGEMENT ALLOWS FINANCIAL
INSTITUTIONS TO MAKE THE TRIPLE PLAY
Asher Benbenisty
Director of product marketing
Asher.Benbenisty@algosec.com
2. WELCOME
Have a question? Submit it via the chat
This webinar is being recorded!
Slides and recording will be sent to you after the webinar
2
marketing@algosec.com
www.linkedin.com/company/AlgoSec
3. The State of
Network Security
& Its
Complexities
Benchmark
Firewalls in
the Network
Bridging the
Complexity Gap
MAKING THE TRIPLE PLAY
THE AGENDA
3
4. POLL #1:
WHAT WORRIES YOU MOST IN REGARDS TO NETWORK SECURITY?
Please vote using the “Votes” tab in your BrightTALK panel
• Compliance
• Automation
• Risk
• Hybrid Cloud
• Microsegmentation
4 |
5. WHAT WORRIES
MOST IN REGARDS
TO NETWORK
SECURITY?
50%
30%
20%
10%
Compliance Automation Hybrid Cloud Micorsegmentation
5
12. MANUAL AUDITS
SLOW DOWN
BUSINESS
AND
ARE ERROR-PRONE
26%
29%
27%
12%
6%
<1 week
1-2 weeks
2-4 weeks
1-2 months
2+ months
Time devoted to firewall audits each year
12
14. A TYPICAL CHANGE PROCESS
Request a network
change
Map devices in path Check for risk
involved
Plan the rules Implement the
change on the
devices
Validate the change
14
15. MAP
DEVICES
IN PATH
Find which security devices are in the
path and are currently blocking the
requested traffic
Firewall policies, Router ACLs, SDN
segmentation, cloud security
groups
15
16. CHECK FOR RISKS INVOLVED
Define allowed connectivity between
zones
Whatever is not pre-approved – should
raise a risk
17. PLAN THE RULES
• Vendor-specific
decisions – choose
policy, zones, ACLs,
objects
• Implement in an optimal
way (avoid rule/object
duplications)
• Enforce naming
conventions and best
practices
17
18. IMPLEMENT THE CHANGE ON THE DEVICES
Push change to device management (via APIs) or directly to the device (CLI), as available
REST API
18
20. AUTOMATION
CAN BRIDGE
THE GAP
20 | Confidential
2 main challenges:
• Compliance
• Digital transformation
The number of firewalls does
not necessarily predict the level
of complexity
20
48. SUMMARY
• 2 challenging missions:
• Compliance
• Digital transformation
• Don’t let the number of firewalls
overwhelm you
48
SECURITY POLICY AUTOMATION
CAN HELP YOU FULFIL THESE
MISSIONS AND MORE
49. Q & A
Request a Demo, or send your questions to: marketing@algosec.com
50. White Papers | Datasheets | Solution Brochure
https://www.algosec.com/resources
Prof. Wool Video Courses
PPT Slides
50
51. OCTOBER WEBINARS | www.algosec.com/webinars
ALGOSUMMIT AMERICAS
OCT 15-18
The premier event for
AlgoSec customers & channel partners
www.algosec.com/algosummit
Oct 25
Managing Effective Security Policies Across Hybrid
and Multi-Cloud Environments
(Yitzy Tannenbaum, Product Marketing Manager)
Oct 22 & 23
As part of the BrightTalk Cloud Summit we will be
presenting several webinars and participating in
panel discussions on cloud security – be sure to
check us out!
51
52. 52
JOIN OUR COMMUNITY
Follow us for the latest on security policy management trends, tips & tricks,
best practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos
presented by Professor Wool
youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
Now, let’s open up the floor for some Q & A questions.
Seed Questions:
How often do people integrate NSPM with an external ticketing or orchestration system?
The App-centric approach makes sense, how difficult is it to onboard business applications
What do you think are the biggest obstacles facing the implementation of a security policy management solution?
How does a nspm solution like algosec keep up with the speed of the cloud?
Miki
Miki
And, before we part – we welcome you to connect with us through our social networks in LinkedIn, Facebook, Twitter and our blog.