Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

More Things You Can Do with the AlgoSec Security Policy Management Suite


Published on

Join us in this webinar to learn the latest advantages of managing your network security policy with AlgoSec

Published in: Technology
  • Be the first to comment

  • Be the first to like this

More Things You Can Do with the AlgoSec Security Policy Management Suite

  1. 1. More things you can do with a security policy management suite Dania Ben Peretz, Product Manager
  2. 2. Welcome Have a question? Submit it via the chat This webinar is being recorded! Slides and recording will be sent to you after the webinar 2
  3. 3. Do you have a network security management solution in place today? • Yes, we do • No, still researching • Yes, we are using the AlgoSec solution Please vote using the “votes” tab in your BrightTALK panel poll 3
  4. 4. Agenda Tying Cyber Attacks to Business Impact Achieving Automation Gaining Visibility into Unprotected Flows Accelerating the Speed of Business AlgoSec Reporting Tool 01 02 03 04 05 4
  6. 6. Integrating with SIEM Systems A server is flagged as exposed to an attack Fast impact analysis and isolation are required INTRODUCING: ALGOSEC PLUGIN FOR YOUR SIEM SYSTEM Get instant visibility into applications impacted by this server Immediately initiate isolation of the exposed server Continue using the SIEM system interface 6
  7. 7. Business applications impacted by Incident • Critical application? (priority, business impact) • Firewalls in path for internet connectivity 7
  8. 8. Incident Reachability analysis Can reach Internet? Data exfiltration Can reach critical zones? Damage potential 8
  9. 9. remediation – automate server isolation Change request to drop traffic to/from infected server 9
  10. 10. Complete Gaps in Your Network Map 10
  11. 11. Detect Missing Routers in Your Network Map • A complete map is essential to enjoy zero-touch automation! • Review and modify application connectivity Why is it so important? 11
  12. 12. Detect Missing Routers in Your Network Map 12
  13. 13. Routers are prioritized 13
  14. 14. Gaining visibility into unprotected flows 14
  15. 15. Unfiltered Flows for Micro- Segmentatio n 15
  16. 16. 16 Better security with Micro- Segmentation • Introduce filtering choke-points between zones • Allows control of east-west traffic • Enables restriction of lateral movement between zones • Making it a reality • Traditional data centers: place hardware and cabling • Virtualized networks: use built-in Firewalls as part of the infrastructure
  17. 17. 17 Accelerating the speed of business
  18. 18. How we consume content and use the net 199 5 We b Application s Conversatio nal 200 7 201 9 18
  19. 19. Engage stakeholders more easily There’s an issue with this application, who’s its owner? Server was compromised – what are the critical processes it uses for? This server needs to be taken down… who should I speak to? I need to know the activity times of this application server - we need to migrate it 19
  20. 20. Chatops to accelerate your business AlgoBot in Slack 20
  21. 21. Meet algobot Queries the Algosec Security Management Suite 01 02 Knows your permissions Accessible through Slack and Skype for Business 03 21
  22. 22. POLL Who are the stakeholders in your company that will benefit the most from the AlgoBot engagement? Cloud deployment team DevOps Other All 01 02 03 04 22 Please vote using the “votes” tab in your BrightTALK panel
  23. 23. THE ALGOSEC REPORTING TOOL for c-level 23
  24. 24. 24 Enhancing C-Level Visibility Summary of problems, trends and bottom-line numbers Delivered to their inbox Receive reports periodically Prefer colorful visuals: dashboards and charts
  25. 25. AlgoSec Reporting Tool Rich reporting capabilities on AlgoSec’s top 3 entities: • Devices • Change Requests • Business Applications Rich set of out-of-the- box dashboards and charts 01 02 25
  26. 26. Chart examples 26
  27. 27. Devices with lowest PCI score 27
  28. 28. Most risky devices 28
  29. 29. Security rating over time And Many More 29
  30. 30. Change requests status distribution 30
  31. 31. Number of change requests by status per device group 31
  32. 32. Change requests per application And Many More 32
  33. 33. The algosec reporting tool is simple Export the dashboards to PDF or CSV format Schedule sending these dashboard to C-Level recipients Easily create charts and dashboards 33
  34. 34. Some Dashboard Samples 34
  35. 35. Scheduling Dashboard Emails 35
  36. 36. Poll How many reporting methods do you utilize in your business? (APIs, Syslog, and in-app reporting) • One • Two • All • None 36 Please vote using the “votes” tab in your BrightTALK panel
  37. 37. Q & A You are also welcome to request a demo and email questions
  39. 39. 39 Join our community Follow us for the latest on security policy management trends, tips & tricks, best practices, thought leadership, fun stuff, prizes and much more! Subscribe to our YouTube channel for a wide range of educational videos presented by Professor Wool c
  40. 40. THANK YOU! Questions can be emailed to