SlideShare une entreprise Scribd logo
1  sur  66
SELECTING THE RIGHT
SECURITY POLICY
MANAGEMENT SOLUTION
Kyle Wickert
AlgoSec Worldwide Strategic Architect
WELCOME
Have a question? Submit it via the chat
This webinar is being recorded!
Slides and recording will be sent to you after the webinar
2
marketing@algosec.com
3
Intelligent
Automation –
It’s More Than
Just Defining
Policies
A Application-
Centric
Approach Sets
The Stage For
The Future
Managing A
Hybrid
Environment
Together – Cloud,
SDN, & On-
Premise
Using The Best Of
Existing Processes,
Combine With
New Automation
Techniques
SELECTING THE RIGHT SECURITY POLICY
MANAGEMENT SOLUTION
THE AGENDA
POLL #2:
IN REGARDS TO THE NETWORK SECURITY POLICY MANAGEMENT
SOLUTION, WHICH CATEGORY DO YOU SEE YOURSELF?
Please vote using the “Votes from Audience” tab in your BrightTALK panel
4
• This is my first time purchasing a Security Policy Management solution
• I’m looking to replace an existing solution
• I’m looking to expand my Network Security Policy Management solution
• My organization is expanding into the public or SDN and I’m looking to
understand more
5
HIGH LEVEL…
WRITEUP….
Intelligent Automation – It’s More Than Just
Defining Policies
 Intelligent Automation is about connectivity fulfillment vs point
policy creation
INTELLIGENT AUTOMATION
• Intelligent Automation is about
intelligently enhancing & automating
time consuming security processes
• Much More Than “Create Rule On This
Device”:
• Algorithms augment human known-how
• Actionable & intelligent analysis added
throughout the workflow
• Policy-Push is just the tip of the iceberg!
6
INTELLIGENT AUTOMATION WORKFLOW
7
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
INTELLIGENT AUTOMATION WORKFLOW
8
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
Leverage Traffic Simulation engine to
work across on-premise, SDN, and
cloud security controls to automatically
analyze traffic requests and discover
all devices and rules which need to be
changed!
Unnecessary ("already works")
changes should be instantly identified
and closed and requestors notified –
Real-world customers see 30% of
change requests automatically closed!
INTELLIGENT AUTOMATION WORKFLOW
9
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
Automatically assess every
proposed change – before it is
implemented – to ensure
compliance with regulatory and
corporate standards, and identify
any changes in risk levels. This
process should be proactive &
tailored to suit individual specific
compliance & enterprise security
standards
INTELLIGENT AUTOMATION WORKFLOW
10
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
Automatic & intelligent design of
technical implementation steps for
all requests, to ensure they are
designed in the most efficient
method possible avoiding future
policy cleanup efforts &
optimization challenges.
Automated implementation of
policy changes directly on the
device, cloud platform, or firewall
management platform, to save time
and remove manual errors
INTELLIGENT AUTOMATION WORKFLOW
11
Design Of Policy Should Be Aware Of Policy Hierarchy….
Intelligent design of
technical implementation
steps must factor in policy
complexities, including
awareness of policy
hierarchy, to correctly place
new policies
INTELLIGENT AUTOMATION WORKFLOW
12
Assume we wish to allow the following traffic:
The traffic is partially allowed, 1.1.1.1-2.2.2.2 is not allowed by any rule
Design of policies must
consider traffic which is
already permitted, which
enables improved design
considerations around
modification where needed
INTELLIGENT AUTOMATION WORKFLOW
Implementation
designs should
consider policy
structure, and
recommend policy
modifications, based
on Least Privileged
Access, where
suitable!
INTELLIGENT AUTOMATION WORKFLOW
14
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
Post-implementation peer-
review should be completely
automated, to further reduce
manual efforts. This ensures the
Network Analyst responsible for
the request implementation can
be confident the request was
implemented accurately. This
functionality is critical in
preventing the premature
closing of tickets & avoiding
defective policies being sent to
the business as completed
15
HIGH LEVEL…
WRITE UP…
A Application-Centric Approach Sets The Stage
For The Future
POLL #2:
IS YOUR ORGANIZATION CONSIDERING AN APPLICATION-CENTRIC APPROACH
WHEN LOOKING AT A NETWORK SECURITY POLICY MANAGEMENT SOLUTION?
Please vote using the “Votes from Audience” tab in your BrightTALK panel
16
• No, not really
• Yes, but no defined time-frame
• Yes, within the next year
• Yes, within the next 3 years
• Yes, within the next 5 years
 Network Security Policy Management Solutions must cater to
enabling & transforming the business
BUSINESS-CENTRIC APPROACH
• A Business-Centric Approach should be
focused on aligning processes, with
business goals & mindset
• Application context weaved through
solution
• “Plain English” connectivity provisioning
• Breakdown communication walls between
teams
17
BUSINESS-CENTRIC APPROACH
Application Owners
Security
Network Operations
BUSINESS-CENTRIC APPROACH
BUSINESS-CENTRIC APPROACH
BUSINESS-CENTRIC APPROACH
Kyle, I duplicated this slide – it’s a placeholder for what you want to flush out
22
HIGH LEVEL…
WRITE UP…
Using The Best Of Existing Processes, Combine
With New Automation Techniques
 Bottom line: WORDS
COMBINING AUTOMATION WITH EXISTING PROCESSES
• New automation technologies, should
be merged with existing process
• Avoid introduction of “manual steps” into
automation solutions
• Introduce zero-touch where possible, to
maximize value
• Streamline workflow by leveraging out-of-
box where possible
23
COMBINING AUTOMATION WITH EXISTING PROCESSES
• New automation
technologies, should
be merged with
existing process
• Avoid introduction of
“manual steps” into
automation solutions
• Introduce zero-touch
where possible, to
maximize value
• Streamline workflow
by leveraging out-of-
box where possible
24
COMBINING AUTOMATION WITH EXISTING PROCESSES
• Zero-Touch
25
COMBINING AUTOMATION WITH EXISTING PROCESSES
Existing
Change
Request/
Orchestration
Solution
Connectivity
Functional?
No
Yes Success
27
HIGH LEVEL…
WRITE UP…
Managing A Hybrid Environment Together –
Cloud, SDN, & On-Premise
 Bottom line: WORDS
MANAGE HYBRID ENVIRONMENTS
• Hybrid Environments should be
managed uniformly & seamlessly
within existing processes
• Cloud Platforms visibility focused on
security control points
• SDN Platforms
• Single Pane of Glass visibility to the hybrid
datacenter & applications moving across
28
MANAGE HYBRID ENVIRONMENTS
• Hybrid Environments
should be managed
uniformly &
seamlessly within
existing processes
• Cloud Platforms
visibility focused on
security control points
• SDN Platforms
• Single Pane of Glass
visibility to the hybrid
datacenter &
applications moving
across
29
AWS Estate –
Cloud
EnvironmentOn Prem –
Physical Network
VPN Tunnel /
DirectConnect
SELECTING THE RIGHT
SECURITY POLICY
MANAGEMENT SOLUTION
Kyle Wickert
AlgoSec Worldwide Strategic Architect
WELCOME
Have a question? Submit it via the chat
This webinar is being recorded!
Slides and recording will be sent to you after the webinar
31
marketing@algosec.com
32
Intelligent
Automation –
It’s More Than
Just Defining
Policies
A Application-
Centric
Approach Sets
The Stage For
The Future
Managing A
Hybrid
Environment
Together – Cloud,
SDN, & On-
Premise
Using The Best Of
Existing Processes,
Combine With
New Automation
Techniques
SELECTING THE RIGHT SECURITY POLICY
MANAGEMENT SOLUTION
THE AGENDA
POLL #2:
IN REGARDS TO THE NETWORK SECURITY POLICY MANAGEMENT
SOLUTION, WHICH CATEGORY DO YOU SEE YOURSELF?
Please vote using the “Votes from Audience” tab in your BrightTALK panel
33
• This is my first time purchasing a Security Policy Management solution
• I’m looking to replace an existing solution
• I’m looking to expand my Network Security Policy Management solution
• My organization is expanding into the public or SDN and I’m looking to
understand more
34
Consider how a Security Policy
Management Solution introduces
intelligent automation into your
processes, to streamline decision making
& work effort!
Intelligent Automation – It’s More Than Just
Defining Policies
 Intelligent Automation is about connectivity fulfillment vs point
policy creation
INTELLIGENT AUTOMATION
• Intelligent Automation is about
intelligently enhancing & automating
time consuming security processes
• Much More Than “Create Rule On This
Device”:
• Algorithms augment human known-how
• Actionable & intelligent analysis added
throughout the workflow
• Policy-Push is just the tip of the iceberg!
35
INTELLIGENT AUTOMATION WORKFLOW
36
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
INTELLIGENT AUTOMATION WORKFLOW
37
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
Leverage Traffic Simulation engine to
work across on-premise, SDN, and
cloud security controls to automatically
analyze traffic requests and discover
all devices and rules which need to be
changed!
Unnecessary ("already works")
changes should be instantly identified
and closed and requestors notified –
Real-world customers see 30% of
change requests automatically closed!
INTELLIGENT AUTOMATION WORKFLOW
38
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
Automatically assess every
proposed change – before it is
implemented – to ensure
compliance with regulatory and
corporate standards, and identify
any changes in risk levels. This
process should be proactive &
tailored to suit individual specific
compliance & enterprise security
standards
INTELLIGENT AUTOMATION WORKFLOW
39
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
Automatic & intelligent design of
technical implementation steps for
all requests, to ensure they are
designed in the most efficient
method possible avoiding future
policy cleanup efforts &
optimization challenges.
Automated implementation of
policy changes directly on the
device, cloud platform, or firewall
management platform, to save time
and remove manual errors
INTELLIGENT AUTOMATION WORKFLOW
40
Design Of Policy Should Be Aware Of Policy Hierarchy….
Intelligent design of
technical implementation
steps must factor in policy
complexities, including
awareness of policy
hierarchy, to correctly place
new policies
INTELLIGENT AUTOMATION WORKFLOW
41
Assume we wish to allow the following traffic:
The traffic is partially allowed, 1.1.1.1-2.2.2.2 is not allowed by any rule
Design of policies must
consider traffic which is
already permitted, which
enables improved design
considerations around
modification where needed
INTELLIGENT AUTOMATION WORKFLOW
Implementation
designs should
consider policy
structure, and
recommend policy
modifications, based
on Least Privileged
Access, where
suitable!
INTELLIGENT AUTOMATION WORKFLOW
43
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
Post-implementation peer-
review should be completely
automated, to further reduce
manual efforts. This ensures the
Network Analyst responsible for
the request implementation can
be confident the request was
implemented accurately. This
functionality is critical in
preventing the premature
closing of tickets & avoiding
defective policies being sent to
the business as completed
44
Organizations world-wide are undergoing
massive digital transformation, and
moving forward IT must cater to the
business by driving change from
applications downward. It is imperative
any Security Policy Management Solution
supports this methodology!
A Application-Centric Approach Sets The Stage
For The Future
POLL #2:
IS YOUR ORGANIZATION CONSIDERING AN APPLICATION-CENTRIC APPROACH
WHEN LOOKING AT A NETWORK SECURITY POLICY MANAGEMENT SOLUTION?
Please vote using the “Votes from Audience” tab in your BrightTALK panel
45
• No, not really
• Yes, but no defined time-frame
• Yes, within the next year
• Yes, within the next 3 years
• Yes, within the next 5 years
 Network Security Policy Management Solutions must cater to
enabling & transforming the business
APPLICATION-CENTRIC APPROACH
• A Application-Centric Approach should
be focused on aligning processes, with
business goals & mindset
• Application context weaved through
solution
• “Plain English” connectivity provisioning
• Breakdown communication walls between
teams
46
APPLICATION-CENTRIC APPROACH
Application Owners
Security
Network Operations
APPLICATION-CENTRIC APPROACH
Application Owners
APPLICATION-CENTRIC APPROACH
50
Many organizations maintain existing
network change processes which involve
manual steps & decision making. Injecting
these practices into a modern Security Policy
Management Solution can often slow
deployment. Organizations should take an
opportunity to take fresh look & optimize
processed, with automation “baked in”!
Using The Best Of Existing Processes, Combine
With New Automation Techniques
 LEVERAGING A COMBINATION TO EXISTING PROCESSES WITH
NEW AUTOMATION TECHNIQUES, IS KEY TO SUCCESS
COMBINING AUTOMATION WITH EXISTING PROCESSES
• New automation technologies, should
be merged with existing process
• Avoid introduction of “manual steps” into
automation solutions
• Introduce zero-touch where possible, to
maximize value
• Streamline workflow by leveraging out-of-
box where possible
51
COMBINING AUTOMATION WITH EXISTING PROCESSES
• Avoid introducing manual steps from legacy
processes, into a new automation solution!
• Streamline processes & leverage automation
to drive efficiencies for standard changes
52
Firewall Change
Coordinator
Network Review Security Review
Network
Implementation
Design
Firewall Change
Request CAB Board
Security Director
Approval
Network
Implementation
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
= Asynchronous Zero-Touch Enabled
COMBINING AUTOMATION WITH EXISTING PROCESSES
• Zero-Touch can be
leveraged to reduce
security approval
bottlenecks & speed
DevOps in specific
environments!
53
Initial Plan Risk Check
Work Order &
ActiveChange
SmartValidation
Traffic Change
Request Resolved Recertify
= Asynchronous Zero-Touch Enabled
IF <DEVICE> = DEV Automated Implementation!
IF <RISK> = NONE Automated Approval!
COMBINING AUTOMATION WITH EXISTING PROCESSES
Existing
Change
Request/
Orchestration
Solution
Connectivity
Functional?
No
Yes Success
• Leverage out-of-box
functionality to provide value
quickly!
• Traffic Simulation APIs
• Connectivity-As-Code for
DevOps
55
While Cloud & SDN technologies drive
drastic change & offer new innovative
opportunities, the learning curve can be
steep. An effective Security Policy
Management Solution should offer
capabilities to smooth this curve & speed
adoption of these critical technologies!
Managing A Hybrid Environment Together –
Cloud, SDN, & On-Premise
 MAINTAINING UNIFORM CONTROL & VISBILITY ACROSS ALL
ENVIRONMENTS IS KEY
MANAGE HYBRID ENVIRONMENTS
• Hybrid Environments should be
managed uniformly & seamlessly
within existing processes
• Cloud Platforms visibility focused on
security control points
• SDN & Cloud integration should be
seamlessly integrated, to ease learning
curve
• Single Pane of Glass visibility to the hybrid
datacenter & applications
56
MANAGE HYBRID ENVIRONMENTS
• “Security Set” approach
should be use to manage
cloud environments
• Enhanced visibility into control
points
• Allows clearer understanding of
layer protection provided to
cloud assets
• Enables clear visibility in large
enterprise cloud estates
57
MANAGE HYBRID ENVIRONMENTS
58
MANAGE HYBRID ENVIRONMENTS
• SDN & Cloud visibility must easily integrate
into the NSPM solution, to make
engineering resources effective quickly
• A familiar experience can drastically speed
up adoption of cloud & SDN!
59
MANAGE HYBRID ENVIRONMENTS
• Hybrid Environments
spread across Cloud
& SDN, should be
easily visible &
integrated
• Traffic Simulation
capabilities should be
supported across
SDN, On-Premise, &
Cloud to support
complete
automation!
60
AWS Estate –
Cloud
EnvironmentOn Prem –
Physical Network
VPN Tunnel /
DirectConnect
Join our Online Community
Q&A
61
Send us your questions
Request a Free Evaluation:
marketing@algosec.com youtube.com/user/AlgoSec
linkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
SUMMARY
• Intelligent automation is about connectivity
fulfillment vs point policy creation
• Network security policy management solutions
must cater to enabling & transforming the
business
• Leveraging a combination to existing processes
with new automation techniques, is key to
success
• Maintaining uniform control & visbility across
all environments is key
62
White Paper
https://www.algosec.com/resources
Prof. Wool Video Courses
PPT SlidesSolution Brochure
63
64
JOIN OUR COMMUNITY
Follow us for the latest on security policy management trends, tips & tricks,
best practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos
presented by Professor Wool
youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
THANK YOU!
Questions can be emailed to
marketing@algosec.com
THANK YOU!
Questions can be emailed to
marketing@algosec.com

Contenu connexe

Tendances

Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...AlgoSec
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...AlgoSec
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesAdi Gazit Blecher
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarAlgoSec
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to executionAlgoSec
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...AlgoSec
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...AlgoSec
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivityshira koper
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...AlgoSec
 
Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...shira koper
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)AlgoSec
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Securityshira koper
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationAlgoSec
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation Maytal Levi
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...AlgoSec
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesAlgoSec
 

Tendances (20)

Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Security
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 

Similaire à Selecting the Right Security Policy Management Solution for Your Hybrid Environment

Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationAlgoSec
 
Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?Aggregage
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...Peter de Haas
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation4 Ways IT Can Drive Innovation
4 Ways IT Can Drive InnovationVMware
 
6 Trng2_PLM&Windchill_Overview.pdf
6 Trng2_PLM&Windchill_Overview.pdf6 Trng2_PLM&Windchill_Overview.pdf
6 Trng2_PLM&Windchill_Overview.pdfRatheshPriyanK1
 
Discover - Innovating With Speed and Agility
Discover - Innovating With Speed and AgilityDiscover - Innovating With Speed and Agility
Discover - Innovating With Speed and AgilityLaurenWendler
 
5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernizationscoopnewsgroup
 
Alfresco Day Amsterdam 2015 - Alfresco Keynote: Accelerating Digital Transfor...
Alfresco Day Amsterdam 2015 - Alfresco Keynote: Accelerating Digital Transfor...Alfresco Day Amsterdam 2015 - Alfresco Keynote: Accelerating Digital Transfor...
Alfresco Day Amsterdam 2015 - Alfresco Keynote: Accelerating Digital Transfor...Alfresco Software
 
Matrix Vision Deck
Matrix Vision DeckMatrix Vision Deck
Matrix Vision DeckAbu Turay
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesInductive Automation
 
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...XebiaLabs
 
Curiosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of TestingCuriosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of TestingCuriosity Software Ireland
 
100 day plan - Technology Vision Australian Perspective
100 day plan - Technology Vision Australian Perspective100 day plan - Technology Vision Australian Perspective
100 day plan - Technology Vision Australian Perspectiveaccenture
 
AFCOM HYBRID CLOUD Strategy
AFCOM HYBRID CLOUD StrategyAFCOM HYBRID CLOUD Strategy
AFCOM HYBRID CLOUD StrategyKrisMathisen
 
Culture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcingCulture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcingBJIT Ltd
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 

Similaire à Selecting the Right Security Policy Management Solution for Your Hybrid Environment (20)

Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
 
Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?
 
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
20 6-2013 - breinwave - nationale voorraaddag - de impact van cloud in de sup...
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation4 Ways IT Can Drive Innovation
4 Ways IT Can Drive Innovation
 
6 Trng2_PLM&Windchill_Overview.pdf
6 Trng2_PLM&Windchill_Overview.pdf6 Trng2_PLM&Windchill_Overview.pdf
6 Trng2_PLM&Windchill_Overview.pdf
 
Discover - Innovating With Speed and Agility
Discover - Innovating With Speed and AgilityDiscover - Innovating With Speed and Agility
Discover - Innovating With Speed and Agility
 
Two speed-it
Two speed-itTwo speed-it
Two speed-it
 
5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization
 
Alfresco Day Amsterdam 2015 - Alfresco Keynote: Accelerating Digital Transfor...
Alfresco Day Amsterdam 2015 - Alfresco Keynote: Accelerating Digital Transfor...Alfresco Day Amsterdam 2015 - Alfresco Keynote: Accelerating Digital Transfor...
Alfresco Day Amsterdam 2015 - Alfresco Keynote: Accelerating Digital Transfor...
 
Matrix Vision Deck
Matrix Vision DeckMatrix Vision Deck
Matrix Vision Deck
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise Architectures
 
The journey to Cloud
The journey to CloudThe journey to Cloud
The journey to Cloud
 
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
Building a Software Chain of Custody: A Guide for CTOs, CIOs, and Enterprise ...
 
Curiosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of TestingCuriosity Software, Infuse and Kumoco present: The Democratisation of Testing
Curiosity Software, Infuse and Kumoco present: The Democratisation of Testing
 
100 day plan - Technology Vision Australian Perspective
100 day plan - Technology Vision Australian Perspective100 day plan - Technology Vision Australian Perspective
100 day plan - Technology Vision Australian Perspective
 
AFCOM HYBRID CLOUD Strategy
AFCOM HYBRID CLOUD StrategyAFCOM HYBRID CLOUD Strategy
AFCOM HYBRID CLOUD Strategy
 
Culture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcingCulture is more important than competence in IT outsourcing
Culture is more important than competence in IT outsourcing
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 

Plus de AlgoSec

The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinarAlgoSec
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...AlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentAlgoSec
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinarAlgoSec
 

Plus de AlgoSec (7)

The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinar
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
 

Dernier

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Selecting the Right Security Policy Management Solution for Your Hybrid Environment

  • 1. SELECTING THE RIGHT SECURITY POLICY MANAGEMENT SOLUTION Kyle Wickert AlgoSec Worldwide Strategic Architect
  • 2. WELCOME Have a question? Submit it via the chat This webinar is being recorded! Slides and recording will be sent to you after the webinar 2 marketing@algosec.com
  • 3. 3 Intelligent Automation – It’s More Than Just Defining Policies A Application- Centric Approach Sets The Stage For The Future Managing A Hybrid Environment Together – Cloud, SDN, & On- Premise Using The Best Of Existing Processes, Combine With New Automation Techniques SELECTING THE RIGHT SECURITY POLICY MANAGEMENT SOLUTION THE AGENDA
  • 4. POLL #2: IN REGARDS TO THE NETWORK SECURITY POLICY MANAGEMENT SOLUTION, WHICH CATEGORY DO YOU SEE YOURSELF? Please vote using the “Votes from Audience” tab in your BrightTALK panel 4 • This is my first time purchasing a Security Policy Management solution • I’m looking to replace an existing solution • I’m looking to expand my Network Security Policy Management solution • My organization is expanding into the public or SDN and I’m looking to understand more
  • 5. 5 HIGH LEVEL… WRITEUP…. Intelligent Automation – It’s More Than Just Defining Policies
  • 6.  Intelligent Automation is about connectivity fulfillment vs point policy creation INTELLIGENT AUTOMATION • Intelligent Automation is about intelligently enhancing & automating time consuming security processes • Much More Than “Create Rule On This Device”: • Algorithms augment human known-how • Actionable & intelligent analysis added throughout the workflow • Policy-Push is just the tip of the iceberg! 6
  • 7. INTELLIGENT AUTOMATION WORKFLOW 7 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify
  • 8. INTELLIGENT AUTOMATION WORKFLOW 8 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Leverage Traffic Simulation engine to work across on-premise, SDN, and cloud security controls to automatically analyze traffic requests and discover all devices and rules which need to be changed! Unnecessary ("already works") changes should be instantly identified and closed and requestors notified – Real-world customers see 30% of change requests automatically closed!
  • 9. INTELLIGENT AUTOMATION WORKFLOW 9 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Automatically assess every proposed change – before it is implemented – to ensure compliance with regulatory and corporate standards, and identify any changes in risk levels. This process should be proactive & tailored to suit individual specific compliance & enterprise security standards
  • 10. INTELLIGENT AUTOMATION WORKFLOW 10 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Automatic & intelligent design of technical implementation steps for all requests, to ensure they are designed in the most efficient method possible avoiding future policy cleanup efforts & optimization challenges. Automated implementation of policy changes directly on the device, cloud platform, or firewall management platform, to save time and remove manual errors
  • 11. INTELLIGENT AUTOMATION WORKFLOW 11 Design Of Policy Should Be Aware Of Policy Hierarchy…. Intelligent design of technical implementation steps must factor in policy complexities, including awareness of policy hierarchy, to correctly place new policies
  • 12. INTELLIGENT AUTOMATION WORKFLOW 12 Assume we wish to allow the following traffic: The traffic is partially allowed, 1.1.1.1-2.2.2.2 is not allowed by any rule Design of policies must consider traffic which is already permitted, which enables improved design considerations around modification where needed
  • 13. INTELLIGENT AUTOMATION WORKFLOW Implementation designs should consider policy structure, and recommend policy modifications, based on Least Privileged Access, where suitable!
  • 14. INTELLIGENT AUTOMATION WORKFLOW 14 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Post-implementation peer- review should be completely automated, to further reduce manual efforts. This ensures the Network Analyst responsible for the request implementation can be confident the request was implemented accurately. This functionality is critical in preventing the premature closing of tickets & avoiding defective policies being sent to the business as completed
  • 15. 15 HIGH LEVEL… WRITE UP… A Application-Centric Approach Sets The Stage For The Future
  • 16. POLL #2: IS YOUR ORGANIZATION CONSIDERING AN APPLICATION-CENTRIC APPROACH WHEN LOOKING AT A NETWORK SECURITY POLICY MANAGEMENT SOLUTION? Please vote using the “Votes from Audience” tab in your BrightTALK panel 16 • No, not really • Yes, but no defined time-frame • Yes, within the next year • Yes, within the next 3 years • Yes, within the next 5 years
  • 17.  Network Security Policy Management Solutions must cater to enabling & transforming the business BUSINESS-CENTRIC APPROACH • A Business-Centric Approach should be focused on aligning processes, with business goals & mindset • Application context weaved through solution • “Plain English” connectivity provisioning • Breakdown communication walls between teams 17
  • 21. BUSINESS-CENTRIC APPROACH Kyle, I duplicated this slide – it’s a placeholder for what you want to flush out
  • 22. 22 HIGH LEVEL… WRITE UP… Using The Best Of Existing Processes, Combine With New Automation Techniques
  • 23.  Bottom line: WORDS COMBINING AUTOMATION WITH EXISTING PROCESSES • New automation technologies, should be merged with existing process • Avoid introduction of “manual steps” into automation solutions • Introduce zero-touch where possible, to maximize value • Streamline workflow by leveraging out-of- box where possible 23
  • 24. COMBINING AUTOMATION WITH EXISTING PROCESSES • New automation technologies, should be merged with existing process • Avoid introduction of “manual steps” into automation solutions • Introduce zero-touch where possible, to maximize value • Streamline workflow by leveraging out-of- box where possible 24
  • 25. COMBINING AUTOMATION WITH EXISTING PROCESSES • Zero-Touch 25
  • 26. COMBINING AUTOMATION WITH EXISTING PROCESSES Existing Change Request/ Orchestration Solution Connectivity Functional? No Yes Success
  • 27. 27 HIGH LEVEL… WRITE UP… Managing A Hybrid Environment Together – Cloud, SDN, & On-Premise
  • 28.  Bottom line: WORDS MANAGE HYBRID ENVIRONMENTS • Hybrid Environments should be managed uniformly & seamlessly within existing processes • Cloud Platforms visibility focused on security control points • SDN Platforms • Single Pane of Glass visibility to the hybrid datacenter & applications moving across 28
  • 29. MANAGE HYBRID ENVIRONMENTS • Hybrid Environments should be managed uniformly & seamlessly within existing processes • Cloud Platforms visibility focused on security control points • SDN Platforms • Single Pane of Glass visibility to the hybrid datacenter & applications moving across 29 AWS Estate – Cloud EnvironmentOn Prem – Physical Network VPN Tunnel / DirectConnect
  • 30. SELECTING THE RIGHT SECURITY POLICY MANAGEMENT SOLUTION Kyle Wickert AlgoSec Worldwide Strategic Architect
  • 31. WELCOME Have a question? Submit it via the chat This webinar is being recorded! Slides and recording will be sent to you after the webinar 31 marketing@algosec.com
  • 32. 32 Intelligent Automation – It’s More Than Just Defining Policies A Application- Centric Approach Sets The Stage For The Future Managing A Hybrid Environment Together – Cloud, SDN, & On- Premise Using The Best Of Existing Processes, Combine With New Automation Techniques SELECTING THE RIGHT SECURITY POLICY MANAGEMENT SOLUTION THE AGENDA
  • 33. POLL #2: IN REGARDS TO THE NETWORK SECURITY POLICY MANAGEMENT SOLUTION, WHICH CATEGORY DO YOU SEE YOURSELF? Please vote using the “Votes from Audience” tab in your BrightTALK panel 33 • This is my first time purchasing a Security Policy Management solution • I’m looking to replace an existing solution • I’m looking to expand my Network Security Policy Management solution • My organization is expanding into the public or SDN and I’m looking to understand more
  • 34. 34 Consider how a Security Policy Management Solution introduces intelligent automation into your processes, to streamline decision making & work effort! Intelligent Automation – It’s More Than Just Defining Policies
  • 35.  Intelligent Automation is about connectivity fulfillment vs point policy creation INTELLIGENT AUTOMATION • Intelligent Automation is about intelligently enhancing & automating time consuming security processes • Much More Than “Create Rule On This Device”: • Algorithms augment human known-how • Actionable & intelligent analysis added throughout the workflow • Policy-Push is just the tip of the iceberg! 35
  • 36. INTELLIGENT AUTOMATION WORKFLOW 36 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify
  • 37. INTELLIGENT AUTOMATION WORKFLOW 37 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Leverage Traffic Simulation engine to work across on-premise, SDN, and cloud security controls to automatically analyze traffic requests and discover all devices and rules which need to be changed! Unnecessary ("already works") changes should be instantly identified and closed and requestors notified – Real-world customers see 30% of change requests automatically closed!
  • 38. INTELLIGENT AUTOMATION WORKFLOW 38 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Automatically assess every proposed change – before it is implemented – to ensure compliance with regulatory and corporate standards, and identify any changes in risk levels. This process should be proactive & tailored to suit individual specific compliance & enterprise security standards
  • 39. INTELLIGENT AUTOMATION WORKFLOW 39 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Automatic & intelligent design of technical implementation steps for all requests, to ensure they are designed in the most efficient method possible avoiding future policy cleanup efforts & optimization challenges. Automated implementation of policy changes directly on the device, cloud platform, or firewall management platform, to save time and remove manual errors
  • 40. INTELLIGENT AUTOMATION WORKFLOW 40 Design Of Policy Should Be Aware Of Policy Hierarchy…. Intelligent design of technical implementation steps must factor in policy complexities, including awareness of policy hierarchy, to correctly place new policies
  • 41. INTELLIGENT AUTOMATION WORKFLOW 41 Assume we wish to allow the following traffic: The traffic is partially allowed, 1.1.1.1-2.2.2.2 is not allowed by any rule Design of policies must consider traffic which is already permitted, which enables improved design considerations around modification where needed
  • 42. INTELLIGENT AUTOMATION WORKFLOW Implementation designs should consider policy structure, and recommend policy modifications, based on Least Privileged Access, where suitable!
  • 43. INTELLIGENT AUTOMATION WORKFLOW 43 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Post-implementation peer- review should be completely automated, to further reduce manual efforts. This ensures the Network Analyst responsible for the request implementation can be confident the request was implemented accurately. This functionality is critical in preventing the premature closing of tickets & avoiding defective policies being sent to the business as completed
  • 44. 44 Organizations world-wide are undergoing massive digital transformation, and moving forward IT must cater to the business by driving change from applications downward. It is imperative any Security Policy Management Solution supports this methodology! A Application-Centric Approach Sets The Stage For The Future
  • 45. POLL #2: IS YOUR ORGANIZATION CONSIDERING AN APPLICATION-CENTRIC APPROACH WHEN LOOKING AT A NETWORK SECURITY POLICY MANAGEMENT SOLUTION? Please vote using the “Votes from Audience” tab in your BrightTALK panel 45 • No, not really • Yes, but no defined time-frame • Yes, within the next year • Yes, within the next 3 years • Yes, within the next 5 years
  • 46.  Network Security Policy Management Solutions must cater to enabling & transforming the business APPLICATION-CENTRIC APPROACH • A Application-Centric Approach should be focused on aligning processes, with business goals & mindset • Application context weaved through solution • “Plain English” connectivity provisioning • Breakdown communication walls between teams 46
  • 50. 50 Many organizations maintain existing network change processes which involve manual steps & decision making. Injecting these practices into a modern Security Policy Management Solution can often slow deployment. Organizations should take an opportunity to take fresh look & optimize processed, with automation “baked in”! Using The Best Of Existing Processes, Combine With New Automation Techniques
  • 51.  LEVERAGING A COMBINATION TO EXISTING PROCESSES WITH NEW AUTOMATION TECHNIQUES, IS KEY TO SUCCESS COMBINING AUTOMATION WITH EXISTING PROCESSES • New automation technologies, should be merged with existing process • Avoid introduction of “manual steps” into automation solutions • Introduce zero-touch where possible, to maximize value • Streamline workflow by leveraging out-of- box where possible 51
  • 52. COMBINING AUTOMATION WITH EXISTING PROCESSES • Avoid introducing manual steps from legacy processes, into a new automation solution! • Streamline processes & leverage automation to drive efficiencies for standard changes 52 Firewall Change Coordinator Network Review Security Review Network Implementation Design Firewall Change Request CAB Board Security Director Approval Network Implementation Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify = Asynchronous Zero-Touch Enabled
  • 53. COMBINING AUTOMATION WITH EXISTING PROCESSES • Zero-Touch can be leveraged to reduce security approval bottlenecks & speed DevOps in specific environments! 53 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify = Asynchronous Zero-Touch Enabled IF <DEVICE> = DEV Automated Implementation! IF <RISK> = NONE Automated Approval!
  • 54. COMBINING AUTOMATION WITH EXISTING PROCESSES Existing Change Request/ Orchestration Solution Connectivity Functional? No Yes Success • Leverage out-of-box functionality to provide value quickly! • Traffic Simulation APIs • Connectivity-As-Code for DevOps
  • 55. 55 While Cloud & SDN technologies drive drastic change & offer new innovative opportunities, the learning curve can be steep. An effective Security Policy Management Solution should offer capabilities to smooth this curve & speed adoption of these critical technologies! Managing A Hybrid Environment Together – Cloud, SDN, & On-Premise
  • 56.  MAINTAINING UNIFORM CONTROL & VISBILITY ACROSS ALL ENVIRONMENTS IS KEY MANAGE HYBRID ENVIRONMENTS • Hybrid Environments should be managed uniformly & seamlessly within existing processes • Cloud Platforms visibility focused on security control points • SDN & Cloud integration should be seamlessly integrated, to ease learning curve • Single Pane of Glass visibility to the hybrid datacenter & applications 56
  • 57. MANAGE HYBRID ENVIRONMENTS • “Security Set” approach should be use to manage cloud environments • Enhanced visibility into control points • Allows clearer understanding of layer protection provided to cloud assets • Enables clear visibility in large enterprise cloud estates 57
  • 59. MANAGE HYBRID ENVIRONMENTS • SDN & Cloud visibility must easily integrate into the NSPM solution, to make engineering resources effective quickly • A familiar experience can drastically speed up adoption of cloud & SDN! 59
  • 60. MANAGE HYBRID ENVIRONMENTS • Hybrid Environments spread across Cloud & SDN, should be easily visible & integrated • Traffic Simulation capabilities should be supported across SDN, On-Premise, & Cloud to support complete automation! 60 AWS Estate – Cloud EnvironmentOn Prem – Physical Network VPN Tunnel / DirectConnect
  • 61. Join our Online Community Q&A 61 Send us your questions Request a Free Evaluation: marketing@algosec.com youtube.com/user/AlgoSec linkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  • 62. SUMMARY • Intelligent automation is about connectivity fulfillment vs point policy creation • Network security policy management solutions must cater to enabling & transforming the business • Leveraging a combination to existing processes with new automation techniques, is key to success • Maintaining uniform control & visbility across all environments is key 62
  • 63. White Paper https://www.algosec.com/resources Prof. Wool Video Courses PPT SlidesSolution Brochure 63
  • 64. 64 JOIN OUR COMMUNITY Follow us for the latest on security policy management trends, tips & tricks, best practices, thought leadership, fun stuff, prizes and much more! Subscribe to our YouTube channel for a wide range of educational videos presented by Professor Wool youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  • 65. THANK YOU! Questions can be emailed to marketing@algosec.com
  • 66. THANK YOU! Questions can be emailed to marketing@algosec.com

Notes de l'éditeur

  1. “best practices” from Kyle the expert
  2. “best practices” from Kyle the expert
  3. Links: WP - The Network Security Policy Management Lifecycle: https://www.algosec.com/lp/network-security-policy-management-lifecycle/ Solution Brochure Webinar Slides
  4. Miki And, before we part – we welcome you to connect with us through our social networks in LinkedIn, Facebook, Twitter and our blog.