Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Selecting the right security policy management solution for your organization

323 views

Published on

IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.

In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.

Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.

Key topics include:
- Intelligent automation is more than just adding policies
- Letting a business-centric approach take the lead
- Extracting the best from existing automation processes and creating new ones
- Managing it all together: cloud, SDN and on-premise

Published in: Software
  • Be the first to comment

  • Be the first to like this

Selecting the right security policy management solution for your organization

  1. 1. Selecting The Right security policy management solution Kyle Wickert AlgoSec Worldwide Strategic Architect
  2. 2. Welcome Have a question? Submit it via the chat This webinar is being recorded! Slides and recording will be sent to you after the webinar 2 marketing@algosec.com
  3. 3. 3 Intelligent Automation – It’s More Than Just Defining Policies A Application- Centric Approach Sets The Stage For The Future Managing A Hybrid Environment Together – Cloud, SDN, & On-Premise Using The Best Of Existing Processes, Combine With New Automation Techniques SELECTING THE RIGHT SECURITY POLICY MANAGEMENT SOLUTION the Agenda
  4. 4. POLL #1: In regards to the Network Security Policy Management solution, which category do you see yourself? Please vote using the “Votes from Audience” tab in your BrightTALK panel 4 • This is my first time purchasing a Security Policy Management solution • I’m looking to replace an existing solution • I’m looking to expand my Network Security Policy Management solution • My organization is expanding into the public or SDN and I’m looking to understand more
  5. 5. Intelligent Automation It’s More Than Just Defining Policies Consider how a security policy management solution introduces intelligent automation into your processes, to streamline decision making & work effort! 5
  6. 6.  Intelligent Automation is about connectivity fulfillment vs point policy creation INTELLIGENT AUTOMATION • Intelligent Automation is about intelligently enhancing & automating time consuming security processes • Much More Than “Create Rule On This Device”: • Algorithms augment human known-how • Actionable & intelligent analysis added throughout the workflow • Policy-Push is just the tip of the iceberg! 6
  7. 7. Intelligent AUTOMATION WORKFLOW 7 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify
  8. 8. Intelligent AUTOMATION WORKFLOW 8 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Leverage Traffic Simulation engine to work across on-premise, SDN, and cloud security controls to automatically analyze traffic requests and discover all devices and rules which need to be changed! Unnecessary ("already works") changes should be instantly identified and closed and requestors notified – Real-world customers see 30% of change requests automatically closed!
  9. 9. Intelligent AUTOMATION WORKFLOW 9 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Automatically assess every proposed change – before it is implemented – to ensure compliance with regulatory and corporate standards, and identify any changes in risk levels. This process should be proactive & tailored to suit individual specific compliance & enterprise security standards
  10. 10. Intelligent AUTOMATION WORKFLOW 10 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Automatic & intelligent design of technical implementation steps for all requests, to ensure they are designed in the most efficient method possible avoiding future policy cleanup efforts & optimization challenges. Automated implementation of policy changes directly on the device, cloud platform, or firewall management platform, to save time and remove manual errors
  11. 11. Intelligent AUTOMATION WORKFLOW 11 Design Of Policy Should Be Aware Of Policy Hierarchy…. Intelligent design of technical implementation steps must factor in policy complexities, including awareness of policy hierarchy, to correctly place new policies
  12. 12. Intelligent AUTOMATION WORKFLOW 12 Assume we wish to allow the following traffic: The traffic is partially allowed, 1.1.1.1-2.2.2.2 is not allowed by any rule Design of policies must consider traffic which is already permitted, which enables improved design considerations around modification where needed
  13. 13. Intelligent AUTOMATION WORKFLOW Implementation designs should consider policy structure, and recommend policy modifications, based on Least Privileged Access, where suitable!
  14. 14. Intelligent AUTOMATION WORKFLOW 14 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify Post-implementation peer- review should be completely automated, to further reduce manual efforts. This ensures the Network Analyst responsible for the request implementation can be confident the request was implemented accurately. This functionality is critical in preventing the premature closing of tickets & avoiding defective policies being sent to the business as completed
  15. 15. 15 AN Application-Centric Approach Sets The Stage For The Future Organizations world-wide are undergoing massive digital transformation Moving forward IT must cater to the business by driving change from applications downward It is imperative any Security Policy
  16. 16. POLL #2: is your organization considering an Application-centric approach when looking at a network security policy management solution? Please vote using the “Votes from Audience” tab in your BrightTALK panel 16 • No, not really • Yes, but no defined time-frame • Yes, within the next year • Yes, within the next 3 years • Yes, within the next 5 years
  17. 17.  Network Security Policy Management Solutions must cater to enabling & transforming the business APPLICATION-centric approach • A Application-Centric Approach should be focused on aligning processes, with business goals & mindset • Application context weaved through solution • “Plain English” connectivity provisioning • Breakdown communication walls between teams 17
  18. 18. APPLICATION-centric approach Application Owners Security Network Operations
  19. 19. APPLICATION-centric approach Application Owners
  20. 20. APPLICATION-centric approach
  21. 21. 21 Using The Best Of Existing Processes, Combined With New Automation Techniques Many organizations maintain existing network change processes, which involve manual steps & decision making. Injecting these practices into a modern Security Policy Management Solution can often slow deployment. Organizations should take an opportunity to take fresh look & optimize processed, with automation “baked in”!
  22. 22.  LEVERAGING A COMBINATION TO EXISTING PROCESSES WITH NEW AUTOMATION TECHNIQUES, IS KEY TO SUCCESS Combining automation with existing processes• New automation technologies, should be merged with existing process • Avoid introduction of “manual steps” into automation solutions • Introduce zero-touch where possible, to maximize value • Streamline workflow by leveraging out-of- box where possible 22
  23. 23. Combining automation with existing processes• Avoid introducing manual steps from legacy processes, into a new automation solution! • Streamline processes & leverage automation to drive efficiencies for standard changes 23 Firewall Change Coordinator Network Review Security Review Network Implementation Design Firewall Change Request CAB Board Security Director Approval Network Implementation Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify = Asynchronous Zero-Touch Enabled
  24. 24. Combining automation with existing processes• Zero-Touch can be leveraged to reduce security approval bottlenecks & speed DevOps in specific environments! 24 Initial Plan Risk Check Work Order & ActiveChange SmartValidation Traffic Change Request Resolved Recertify = Asynchronous Zero-Touch Enabled IF <DEVICE> = DEV Automated Implementation! IF <RISK> = NONE Automated Approval!
  25. 25. Combining automation with existing processes Existing Change Request/ Orchestratio n Solution Connectivi ty Functional ? No Yes Success • Leverage out-of-box functionality to provide value quickly! • Traffic Simulation APIs • Connectivity-As-Code for DevOps
  26. 26. 26 Managing A Hybrid Environment Together – Cloud, SDN, & On-Premise While Cloud & SDN technologies drive drastic change & offer new innovative opportunities - The learning curve can be steep. An effective Security Policy Management Solution should offer capabilities to smooth this curve & speed adoption of these critical technologies!
  27. 27.  MAINTAINING UNIFORM CONTROL & VISBILITY ACROSS ALL ENVIRONMENTS IS KEY MANAGE HYBRID ENVIRONMENTS • Hybrid Environments should be managed uniformly & seamlessly within existing processes • Cloud Platforms visibility focused on security control points • SDN & Cloud integration should be seamlessly integrated, to ease learning curve • Single Pane of Glass visibility to the hybrid datacenter & applications 27
  28. 28. MANAGE HYBRID ENVIRONMENTS • “Security Set” approach should be use to manage cloud environments • Enhanced visibility into control points • Allows clearer understanding of layer protection provided to cloud assets • Enables clear visibility in large enterprise cloud estates 28
  29. 29. MANAGE HYBRID ENVIRONMENTS 29
  30. 30. MANAGE HYBRID ENVIRONMENTS • SDN & Cloud visibility must easily integrate into the NSPM solution, to make engineering resources effective quickly • A familiar experience can drastically speed up adoption of cloud & SDN! 30
  31. 31. MANAGE HYBRID ENVIRONMENTS • Hybrid Environments spread across Cloud & SDN, should be easily visible & integrated • Traffic Simulation capabilities should be supported across SDN, On-Premise, & Cloud to support complete automation! 31 AWS Estate – Cloud EnvironmentOn Prem – Physical Network VPN Tunnel / DirectConnect
  32. 32. Q & A Request a Demo, or send your questions to: marketing@algosec.com
  33. 33. summary • Intelligent automation is about connectivity fulfillment vs point policy creation • Network security policy management solutions must cater to enabling & transforming the business • Leveraging a combination to existing processes with new automation techniques, is key to success • Maintaining uniform control & visbility across all environments is key 33
  34. 34. White Paper https://www.algosec.com/resources Prof. Wool Video Courses PPT SlidesSolution Brochure 34
  35. 35. OCTOBER WEBINARS | www.algosec.com/webinars ALGOSUMMIT AMERICAS OCT 15-18 The premier event for AlgoSec customers & channel partners www.algosec.com/algosummit Oct 11 Automated Security Policy Management Allows Financial Institutions to make the Triple Play (Asher Benbenisty, Director of Product Marketing) Oct 25 Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments (Yitzy Tannenbaum, Product Marketing Manager) Oct 22 & 23 As part of the BrightTalk Cloud Summit we will be presenting several webinars and participating in panel discussions on cloud security – be sure to check us out! 35
  36. 36. 36 Join our community Follow us for the latest on security policy management trends, tips & tricks, best practices, thought leadership, fun stuff, prizes and much more! Subscribe to our YouTube channel for a wide range of educational videos presented by Professor Wool youtube.com/user/AlgoSe c linkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  37. 37. THANK YOU! Questions can be emailed to marketing@algosec.com

×