SlideShare une entreprise Scribd logo
1  sur  44
Accelerate Application
Deployment Across Your Cisco
ACI Fabric
On-Premise Firewalls and Cloud
Security Controls
Jonathan Gold-Shalev
Senior Product Manager
Welcome
Have a question? Submit it via the chat
This webinar is being recorded!
Slides and recording will be sent to you after the
webinar
marketing@algosec.com
2
Agenda
AlgoSec
Overview
Visibility to the
ACI Contracts
and EPGs
Zero-touch
application
delivery across
the hybrid
network
Continuous Risk
and Compliance
Assessment of
the ACI Fabric
How to reduce the
scope of your audit
and instantly
generate audit-ready
reports
3
AlgoSec enables
companies to align
security with their
business processes
Business-driven
Agility
Business-driven Visibility
Business-driven Security
BUSINESS DRIVEN SECURITY
MANAGEMENT
    
4
Business-Driven Security Business-Driven Agility
Business-Driven Network Security Policy Management
Unified Visibility Across Cloud, SDN & On-Premise Enterprise Networks
BUSINESS-DRIVEN SECURITY
MANAGEMENT
Use cases
5
Auditing &
Compliance
Risk
Management
Business
Continuity
Cloud
Migration
Change
Management
Incident
Response
DevOpsMicro-
Segmentation
Digital
Transformation
The
AlgoSec
ecosystem
Integrate
Business Process
For a complete list of supported devices visit www.algosec.com
Manage
• Thinking about it
• Actively Testing
• Moved to production in the last 6 months
• In Production for more than 6 months
POLL #1:
Where are you with deploying ACI in Your
Network?
Please vote using the “Votes from Audience” tab in your
BrightTALK panel
7
Visibility to the
ACI Contracts
8
Solution architecture
9
Perimeter & Upstream
FWs
ACI
Data Center
Data Center FWs (L4-L7 services)
• Visibility & Compliance
• Automatic Provisioning
• Business Applications
Visibility to the ACI Contracts (and more)
Security Policy Visibility Across The Entire Network
• Browse and filter the ACI Contracts
• Understand whether the Contracts allow/block certain traffic
• View alongside other security policies
10
Real Time Monitoring Of Changes
• Application Profiles, Contracts, EPGs
and Filters
• React fast to out of band changes in
underlying firewalls
Security
Policy
Visibility
11
Security
Policy
Visibility
12
Real-Time
Change
Monitoring
13
Real-Time
Change
Monitoring
14
Risk and
Compliance
Assessment
15
• Continuous visibility to the network risk
posture of your ACI fabric
• Group reporting for the security posture of
the entire network
• Based on the organization’s Risk Profile
• Regulatory Compliance (e.g., PCI, GDPR)
• C-Level charts and dashboards
• What-if risk analysis to avoid new risks
during change management
Risk and compliance
Assessment
16
ACI Tenant
Report
17
Risk
Assessment
18
Risk
Assessment
19
Regulatory
Compliance
20
Group
Reporting
21
C-Level
Reporting –
Risk Level
Over Time
22
Zero-touch
application delivery
across the hybrid
network
23
• We are still not in production
• 5-10 changes a month
• 5-10 changes a week
• More than tens per week
POLL #2:
How Frequently do you change ACI contracts?
Please vote using the “Votes from Audience” tab in your
BrightTALK panel
24
• Business application owners discover and define
the application flows
• Instant visibility whether or not each flow is
allowed in the network
• Change requests submitted in simple flow
language
• Change requests are translated to network
language
• Go through a zero-touch and fully-audited
workflow until implemented
• Application discovery, definition and change are all
available via APIs
Application Connectivity
Management
25
Security Is
No Longer
A Bottleneck!
Application
Connectivity
Visibility
26
• Automatic detection of security controls requiring
change
• Proactive what-if risk analysis for every request
• Automatic generation of Implementation
instructions
• Automatic push of the recommended changes to
the security controls
• Validation - the traffic is allowed and properly
implemented
• Full audit of every step of the workflow
• Security is no longer a bottleneck
Zero-Touch
Fully-Audited Workflow
27
Application
Connectivity
Visibility
28
Changing a
Flow in an
Application
29
Changing a
Flow in an
Application
30
Identifying
the Devices
Requiring
Change
31
Traffic
Simulation
Results
32
What-If
Risk
Analysis
33
Implementation
34
35
Zero-Touch
• Application creation / change is available via APIs
• The change workflow can run zero-touch
• Fully customizable to define exceptions
• Certain devices require manual approval
• Certain risk levels need manager approval
• And many more
• Fully integrated with DevOps solutions for rapid application delivery
Cisco aci app
center
The AlgoSec App
36
AlgoSec’s Connectivity and Compliance
App
37
Instant
visibility to the
ACI PCI
compliance
level
Verification
that a contract
is allowed
throughout
the network
In case it is not
– easily
submit a
change
request to
allow it
Instant
visibility to the
ACI risk level
01 03 0402
38
Q & A
Request a Demo, or send your questions to: marketing@algosec.com
summary
• Visibility to the ACI Contracts and EPGs
• Continuous Risk and Compliance
Assessment of the ACI Fabric
• Zero-touch application delivery across the
hybrid network
• ACI App Center - the AlgoSec App
40
Blog Posts
Joint Solution
https://www.algosec.com/resources
Prof. Wool Video
Courses
PPT Slides
• …
41
Datasheets
UPCOMING EVENTS
42
SEPTEMBER & OCTOBER
WEBINARS
www.algosec.com/webinars
ALGOSUMMIT AMERICAS
OCT 15-18
The premier event for
AlgoSec customers and channel partners
www.algosec.com/algosummit
• Sept 17 – Selecting the Right Security Policy
Management Solutions (Kyle Wickert, Worldwide
Strategic Architect)
• Oct 11 – Automated Security Policy Management
Allows Financial Institutions to make the Triple Play
(Asher Benbenisty, Director of Product Marketing)
• Oct 25 – Managing Effective Security Policies
Across Hybrid and Multi-Cloud Environments (Yitzy
Tannenbaum, Product Marketing Manager)
43
Join our community
Follow us for the latest on security policy management trends, tips & tricks, best
practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos presented
by Professor Wool
youtube.com/user/AlgoSe
c
linkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
THANK YOU!
Questions can be emailed to
marketing@algosec.com

Contenu connexe

Tendances

Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
Maytal Levi
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...
AlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
AlgoSec
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
AlgoSec
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
shira koper
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
AlgoSec
 

Tendances (20)

Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
 
Firewall Rule Recertification - An Application-Centric Approach
Firewall Rule Recertification - An Application-Centric ApproachFirewall Rule Recertification - An Application-Centric Approach
Firewall Rule Recertification - An Application-Centric Approach
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
Examining the Impact of Security Management on the Business (Infographic)
Examining the Impact of Security Management on the Business (Infographic)Examining the Impact of Security Management on the Business (Infographic)
Examining the Impact of Security Management on the Business (Infographic)
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 

Similaire à Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewalls and Cloud Security Controls

Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinarCisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
Maytal Levi
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
hoanv
 
Connect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API ProtectionConnect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API Protection
DevOps.com
 

Similaire à Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewalls and Cloud Security Controls (20)

Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinarCisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
Enhanced Security and Visibility for Microservices Applications
Enhanced Security and Visibility for Microservices ApplicationsEnhanced Security and Visibility for Microservices Applications
Enhanced Security and Visibility for Microservices Applications
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
 
Infrastructure as Code in Large Scale Organizations
Infrastructure as Code in Large Scale OrganizationsInfrastructure as Code in Large Scale Organizations
Infrastructure as Code in Large Scale Organizations
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 
New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024
 
Connect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API ProtectionConnect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API Protection
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015
 
Driving success in the cloud with NGINX
Driving success in the cloud with NGINXDriving success in the cloud with NGINX
Driving success in the cloud with NGINX
 
Accelarting Hybrid Cloud Adoption through Use Cases in vCloud Air
Accelarting Hybrid Cloud Adoption through Use Cases in vCloud AirAccelarting Hybrid Cloud Adoption through Use Cases in vCloud Air
Accelarting Hybrid Cloud Adoption through Use Cases in vCloud Air
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
Optimize your CI/CD with GitLab and AWS
Optimize your CI/CD with GitLab and AWSOptimize your CI/CD with GitLab and AWS
Optimize your CI/CD with GitLab and AWS
 

Plus de AlgoSec

Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
AlgoSec
 

Plus de AlgoSec (12)

The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinar
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
Cloud migrations made simpler safe secure and successful migrations
Cloud migrations made simpler   safe secure and successful migrationsCloud migrations made simpler   safe secure and successful migrations
Cloud migrations made simpler safe secure and successful migrations
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewalls and Cloud Security Controls

  • 1. Accelerate Application Deployment Across Your Cisco ACI Fabric On-Premise Firewalls and Cloud Security Controls Jonathan Gold-Shalev Senior Product Manager
  • 2. Welcome Have a question? Submit it via the chat This webinar is being recorded! Slides and recording will be sent to you after the webinar marketing@algosec.com 2
  • 3. Agenda AlgoSec Overview Visibility to the ACI Contracts and EPGs Zero-touch application delivery across the hybrid network Continuous Risk and Compliance Assessment of the ACI Fabric How to reduce the scope of your audit and instantly generate audit-ready reports 3
  • 4. AlgoSec enables companies to align security with their business processes Business-driven Agility Business-driven Visibility Business-driven Security BUSINESS DRIVEN SECURITY MANAGEMENT      4
  • 5. Business-Driven Security Business-Driven Agility Business-Driven Network Security Policy Management Unified Visibility Across Cloud, SDN & On-Premise Enterprise Networks BUSINESS-DRIVEN SECURITY MANAGEMENT Use cases 5 Auditing & Compliance Risk Management Business Continuity Cloud Migration Change Management Incident Response DevOpsMicro- Segmentation Digital Transformation
  • 6. The AlgoSec ecosystem Integrate Business Process For a complete list of supported devices visit www.algosec.com Manage
  • 7. • Thinking about it • Actively Testing • Moved to production in the last 6 months • In Production for more than 6 months POLL #1: Where are you with deploying ACI in Your Network? Please vote using the “Votes from Audience” tab in your BrightTALK panel 7
  • 8. Visibility to the ACI Contracts 8
  • 9. Solution architecture 9 Perimeter & Upstream FWs ACI Data Center Data Center FWs (L4-L7 services) • Visibility & Compliance • Automatic Provisioning • Business Applications
  • 10. Visibility to the ACI Contracts (and more) Security Policy Visibility Across The Entire Network • Browse and filter the ACI Contracts • Understand whether the Contracts allow/block certain traffic • View alongside other security policies 10 Real Time Monitoring Of Changes • Application Profiles, Contracts, EPGs and Filters • React fast to out of band changes in underlying firewalls
  • 16. • Continuous visibility to the network risk posture of your ACI fabric • Group reporting for the security posture of the entire network • Based on the organization’s Risk Profile • Regulatory Compliance (e.g., PCI, GDPR) • C-Level charts and dashboards • What-if risk analysis to avoid new risks during change management Risk and compliance Assessment 16
  • 24. • We are still not in production • 5-10 changes a month • 5-10 changes a week • More than tens per week POLL #2: How Frequently do you change ACI contracts? Please vote using the “Votes from Audience” tab in your BrightTALK panel 24
  • 25. • Business application owners discover and define the application flows • Instant visibility whether or not each flow is allowed in the network • Change requests submitted in simple flow language • Change requests are translated to network language • Go through a zero-touch and fully-audited workflow until implemented • Application discovery, definition and change are all available via APIs Application Connectivity Management 25 Security Is No Longer A Bottleneck!
  • 27. • Automatic detection of security controls requiring change • Proactive what-if risk analysis for every request • Automatic generation of Implementation instructions • Automatic push of the recommended changes to the security controls • Validation - the traffic is allowed and properly implemented • Full audit of every step of the workflow • Security is no longer a bottleneck Zero-Touch Fully-Audited Workflow 27
  • 29. Changing a Flow in an Application 29
  • 30. Changing a Flow in an Application 30
  • 35. 35 Zero-Touch • Application creation / change is available via APIs • The change workflow can run zero-touch • Fully customizable to define exceptions • Certain devices require manual approval • Certain risk levels need manager approval • And many more • Fully integrated with DevOps solutions for rapid application delivery
  • 36. Cisco aci app center The AlgoSec App 36
  • 37. AlgoSec’s Connectivity and Compliance App 37 Instant visibility to the ACI PCI compliance level Verification that a contract is allowed throughout the network In case it is not – easily submit a change request to allow it Instant visibility to the ACI risk level 01 03 0402
  • 38. 38
  • 39. Q & A Request a Demo, or send your questions to: marketing@algosec.com
  • 40. summary • Visibility to the ACI Contracts and EPGs • Continuous Risk and Compliance Assessment of the ACI Fabric • Zero-touch application delivery across the hybrid network • ACI App Center - the AlgoSec App 40
  • 41. Blog Posts Joint Solution https://www.algosec.com/resources Prof. Wool Video Courses PPT Slides • … 41 Datasheets
  • 42. UPCOMING EVENTS 42 SEPTEMBER & OCTOBER WEBINARS www.algosec.com/webinars ALGOSUMMIT AMERICAS OCT 15-18 The premier event for AlgoSec customers and channel partners www.algosec.com/algosummit • Sept 17 – Selecting the Right Security Policy Management Solutions (Kyle Wickert, Worldwide Strategic Architect) • Oct 11 – Automated Security Policy Management Allows Financial Institutions to make the Triple Play (Asher Benbenisty, Director of Product Marketing) • Oct 25 – Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments (Yitzy Tannenbaum, Product Marketing Manager)
  • 43. 43 Join our community Follow us for the latest on security policy management trends, tips & tricks, best practices, thought leadership, fun stuff, prizes and much more! Subscribe to our YouTube channel for a wide range of educational videos presented by Professor Wool youtube.com/user/AlgoSe c linkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  • 44. THANK YOU! Questions can be emailed to marketing@algosec.com