Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.
They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.
Join our live webinar to learn how to:
• Understand your business applications to create your micro-segmentation policy
• Validate your micro-segmentation policy is accurate
• Enforce these granular policies on workloads and summarized policies across your infrastructure
• Use risk and vulnerability analysis to tighten your workload and network security
• Identify and manage security risk and compliance in your micro-segmented environment
Save your seat!
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
Build and enforce defense in depth - an algo sec-cisco tetration webinar
1. BUILD AND ENFORCE
DEFENSE IN-DEPTH
Yoni Geva
Product Manager
AlgoSec
Jothi Prakash
Sr. Product Manager
Cisco systems
2. WELCOME
Comment through the Live Chat
Have a question?
This webinar will be available On-demand and as Podcast
Connect with AlgoSec online!
2
marketing@algosec.com
• https://www.algosec.com/resources
• https://www.algosec.com/webinars
• https://www.algosec.com/podcasts
13. CORPORATE OVERVIEW
2 | Confidential
13
Founded 2004
1800+ Enterprise Customers
Serving 20 of the Fortune 50
24/7 Support via 3 Global Centers
ISO 27001 Certified
Passionate about Customer Satisfaction
FORTUNE
50
ISO
27001
2004
14. BUSINESS-DRIVEN SECURITY MANAGEMENT
14 | Confidential
AlgoSec enables
companies to align
security with their
business processes
Uniform Visibility
Tighten Network Security Posture
Business-Driven Intelligent
Automation
Across Cloud, SDN & On-Premise Enterprise Network
15. Operational
Framework Layer
Security LayerFirewalls Routers Web
Proxies
Load
Balancers
Security
Groups
Physical Networks Private Cloud/SDN Public Cloud
Implementation Integration
Vulnerability
ScannersTicketing
Systems
GRC
Systems SIEM/SOAR
Systems
ALGOSEC FRAMEWORK
Application
Framework Layer
Implementation Integration
Syslog &
Traffic Data
Authentication
Authorization
CMDB Data Orchestration
35. ALGOSEC BUSINESS OWNER VIEW
AlgoSec AppViz provides a concise & human-readable business owner view
into business application connectivity, including:
• Automated application architecture pdf
• Security governance zone overlay & diagramming
• Business application flows optimized for viewing
• Automated mapping of business applications to downstream device changes
36. Intelligent Automation is about connectivity fulfillment vs point policy creation
ALGOSEC INTELLIGENT AUTOMATION
Intelligent Automation is about
intelligently enhancing and automating
the implementation of security policies
Much more than “create rule on this device”:
• Algorithms augment human known-how
• Actionable & intelligent analysis added
throughout the workflow
• Policy-Push is just the tip of the iceberg!
37. PRO-ACTIVE RISK ASSESSMENT
Automatic assessment of
every proposed change –
before it is implemented –
to ensure compliance with
regulatory and corporate
standards, and identify any
changes in risk levels.
This process is proactive &
tailored to suit individual
specific compliance &
enterprise security
standards
38. INTELLIGENT POLICY DESIGN
Automatic & intelligent design of technical implementation steps for all requests, to
ensure they are designed in the most efficient method possible avoiding future policy
cleanup efforts & optimization challenges.
Automated implementation of policy changes directly on the device, cloud platform, or
firewall management platform, to save time and remove manual errors.
39. MICRO-SEGMENTATION
✓ Single pane of glass
✓ End-to-end automation
✓ Continuous compliance
✓ Business context
Define
Enforce
AppViz
FireFlow
Discover