Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

2018 10-11 automating network security policy management allows financial institutions to make the triple play

569 views

Published on


In this webinar you will learn about:

• Key industry metrics that compare security environments within and beyond the finance industry
• Network security policy management challenges that hamper digital transformation
• Overcoming security management complexity with automation for speed and accuracy
• Passing compliance audits in the face of demanding regulations

Published in: Software
  • Be the first to comment

  • Be the first to like this

2018 10-11 automating network security policy management allows financial institutions to make the triple play

  1. 1. AUTOMATING SECURITY POLICY MANAGEMENT ALLOWS FINANCIAL INSTITUTIONS TO MAKE THE TRIPLE PLAY Asher Benbenisty Director of product marketing Asher.Benbenisty@algosec.com
  2. 2. WELCOME Have a question? Submit it via the chat This webinar is being recorded! Slides and recording will be sent to you after the webinar 2 marketing@algosec.com www.linkedin.com/company/AlgoSec
  3. 3. The State of Network Security & Its Complexities Benchmark Firewalls in the Network Bridging the Complexity Gap MAKING THE TRIPLE PLAY THE AGENDA 3
  4. 4. POLL #1: WHAT WORRIES YOU MOST IN REGARDS TO NETWORK SECURITY? Please vote using the “Votes” tab in your BrightTALK panel • Compliance • Automation • Risk • Hybrid Cloud • Microsegmentation 4 |
  5. 5. WHAT WORRIES MOST IN REGARDS TO NETWORK SECURITY? 50% 30% 20% 10% Compliance Automation Hybrid Cloud Micorsegmentation 5
  6. 6. Drivers for Network Security Network Security Complexity 6
  7. 7. WHY IS IT SO COMPLEX FOR FINANCIAL ORGANIZATIONS? 7
  8. 8. 10 20242731 38 45 525255 111 BENCHMARK: FIREWALLS BY INDUSTRY 8
  9. 9. FIREWALL RULE BASE 9
  10. 10. IS COMPLIANCE REALLY A BURDEN? 10
  11. 11. FINANCE ORGANIZATIONS COMPLIANCE NETWORK SECURITY RELATED REQUIREMENTS PCI-DSS Basel Sox GDPR 11
  12. 12. MANUAL AUDITS SLOW DOWN BUSINESS AND ARE ERROR-PRONE 26% 29% 27% 12% 6% <1 week 1-2 weeks 2-4 weeks 1-2 months 2+ months Time devoted to firewall audits each year 12
  13. 13. DOES NETWORK SECURITY REALLY HOLD BACK THE BUSINESS? 13
  14. 14. A TYPICAL CHANGE PROCESS Request a network change Map devices in path Check for risk involved Plan the rules Implement the change on the devices Validate the change 14
  15. 15. MAP DEVICES IN PATH Find which security devices are in the path and are currently blocking the requested traffic Firewall policies, Router ACLs, SDN segmentation, cloud security groups 15
  16. 16. CHECK FOR RISKS INVOLVED Define allowed connectivity between zones Whatever is not pre-approved – should raise a risk
  17. 17. PLAN THE RULES • Vendor-specific decisions – choose policy, zones, ACLs, objects • Implement in an optimal way (avoid rule/object duplications) • Enforce naming conventions and best practices 17
  18. 18. IMPLEMENT THE CHANGE ON THE DEVICES Push change to device management (via APIs) or directly to the device (CLI), as available REST API 18
  19. 19. VALIDATE THE CHANGE Verify change was implemented successfully and requested traffic is now allowed
  20. 20. AUTOMATION CAN BRIDGE THE GAP 20 | Confidential 2 main challenges: • Compliance • Digital transformation The number of firewalls does not necessarily predict the level of complexity 20
  21. 21. COMPLIANCE 21
  22. 22. 22
  23. 23. 23
  24. 24. 24 | Confidential24
  25. 25. 25 | Confidential25
  26. 26. 26 | Confidential26
  27. 27. CHANGE AUTOMATION 27
  28. 28. 28
  29. 29. 29
  30. 30. 30
  31. 31. 31
  32. 32. 32
  33. 33. 33
  34. 34. 34
  35. 35. 35
  36. 36. 36
  37. 37. 37
  38. 38. 38
  39. 39. 39
  40. 40. 40
  41. 41. 41
  42. 42. 42
  43. 43. 43
  44. 44. 44
  45. 45. 45
  46. 46. 46
  47. 47. 47
  48. 48. SUMMARY • 2 challenging missions: • Compliance • Digital transformation • Don’t let the number of firewalls overwhelm you 48 SECURITY POLICY AUTOMATION CAN HELP YOU FULFIL THESE MISSIONS AND MORE
  49. 49. Q & A Request a Demo, or send your questions to: marketing@algosec.com
  50. 50. White Papers | Datasheets | Solution Brochure https://www.algosec.com/resources Prof. Wool Video Courses PPT Slides 50
  51. 51. OCTOBER WEBINARS | www.algosec.com/webinars ALGOSUMMIT AMERICAS OCT 15-18 The premier event for AlgoSec customers & channel partners www.algosec.com/algosummit Oct 25 Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments (Yitzy Tannenbaum, Product Marketing Manager) Oct 22 & 23 As part of the BrightTalk Cloud Summit we will be presenting several webinars and participating in panel discussions on cloud security – be sure to check us out! 51
  52. 52. 52 JOIN OUR COMMUNITY Follow us for the latest on security policy management trends, tips & tricks, best practices, thought leadership, fun stuff, prizes and much more! Subscribe to our YouTube channel for a wide range of educational videos presented by Professor Wool youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  53. 53. THANK YOU! Questions can be emailed to marketing@algosec.com

×