SlideShare a Scribd company logo
1 of 47
Download to read offline
ACCELERATING DATA CENTER
APPLICATION DEPLOYMENTS WITH
CISCO ACI AND ALGOSEC
Juan Lage, Principal Engineer at Cisco
Anner Kushnir, VP Technology at AlgoSec
AGENDA
• AlgoSec overview
• Cisco ACI overview
• AlgoSec & Cisco ACI - integrated solution
• Solution demo
• Summary
• Q&A
Founded 2004
1500+ Enterprise Customers
Serving 20 of the Fortune 50
24/7 Support via 3 Global Centers
Passionate about Customer
Satisfaction
3
ALGOSEC OVERVIEW
4 | Confidential
Security Management
Automation
Single Pane of
Glass
Business Driven
Security
Provide Business
Application context to
Security and Risk
Provide uniform visibility
across the entire network
security infrastructure –
on premise, private cloud &
SDN, and in public cloud
Intelligently enhance and
automate time-consuming
security processes and
activities with business
context
Manage Security at the Speed of Business
KEY BUSINESS CHALLENGES THAT ALGOSEC ADDRESSES
Automating
security change
management
Tying cyber
threats to business
processes
Single pane of
glass for network
security policy
management
Securing business
transformation to
the cloud
Ensuring
continuous
compliance
Effectively
managing
application
connectivity
Reducing risk from
misconfigurations
Avoiding
application
outages due to
connectivity issues
Business-Driven
SECURITY
Business-Driven
AGILITY
THE ALGOSEC SECURITY POLICY MANAGEMENT SUITE
CISCO ACI - OVERVIEW
* Cisco Global IT Impact Survey
APPLICATIONS ARE CHANGING
Type
Consumption
Delivery
78% The network is even more critical to delivering
applications than a year ago*
Big Data,
Distributed
Apps, Mobile
Cloud–public,
Private, Hybrid
Anywhere,
Anytime, Any
Device
THE NETWORK IS THE BEST PLACE TO PUT POLICY
Because it touches everything, the network never lies
POLICY
DATA CENTER
Public Cloud
APPAPP APP
Edge
Cisco® ACI Fabric
App DBWeb
QoS
Filter
Filter
Service
QoS
Filter
Outside
Cisco Application
Policy Infrastructure
Controller (APIC)
CISCO ACI – MULTI-TENANT INTENT DRIVEN
NETWORKING
6
Security Everywhere9
Analytics Everywhere10
8 Policy Everywhere
POLICY-DRIVEN INTEGRATED INFRASTRUCTURE
ANSWERS CUSTOMERS’ REQUEST
1
Modernize Infrastructure:
Open and Programmable
Network / L4-7
Compute
Storage
Security
Data Center
5
Move Data and
Workloads Securely
6
Self-Service Portal
(IT as a Service)
7
Extend Policy
Model
2
Automate
and Simplify
POLICY
3
Build Your
Hybrid Cloud
Private Cloud
Stack
Integrated Infrastructure
4
Choose any
Other Cloud
Managed
Public
Private
ACI, CLOUDCENTER AND TETRATION
AUTOMATE APPLICATION POLICY
App Level Policy Enforcement / Visibility
Self-documenting Network
Real-time Change Notification
Real
TimeData
Network
Policy
App Policy
Tetration
8
CUSTOMER ACCEPTANCE CONTINUES
17,100+ 652,700+
Nexus 9K and Nexus 3K
Customers Globally
Ecosystem
Partners
ACI
Customers
NEW ECOSYSTEM
CISCO ACI SECURITY
AUTOMATED SECURITY WITH BUILT-IN MULTI-TENANCY
Distributed stateless firewall
Line-rate security enforcement
Open: Integrate any security device
PCI and FIPS (new)
Embedded Security
• Whitelist firewall policy model
• Authenticated northbound API (X.509)
• Encrypted management plane (TLS 1.2)
Microsegmentation
• vDS, Hyper-V, and bare-metal workloads
• Intra-EPG isolation
• Attribute-based isolation and quarantine
Security Automation
• Dynamic service insertion and chaining
• Security policy follows workloads
• Centralized security provisioning and visibility
Cisco ACI™
Services Graph
11
• Application-centric policy management
• Automation and agile application delivery
• Built for enterprise customers
• Full support for Cisco firewalls and routers
• Integrated with Cisco CloudCenter (CliQr)
• Full support for all leading security vendors
ALGOSEC AND CISCO ACI – BETTER TOGETHER
Data Center
ACI
SOLUTION ARCHITECTURE
 Visibility & Compliance
 Automatic Provisioning
 Business Applications
Data Center FWs (L4-L7 services)
Perimeter & Upstream FWs
ALGOSEC & CISCO ACI - KEY VALUE POINTS
• Security policy visibility across the entire network
Within Data Center - Cisco ACI and underlying firewalls
Perimeter and upstream firewalls
Cloud security groups
• Monitor and proactively identify security policy changes
Track changes in application profiles, contracts, EPGs, filters
Verify no out of band changes in underlying firewalls
• Troubleshooting
End-to-end connectivity
• Full multi-tenant support
End-to-End Visibility
ALGOSEC & CISCO ACI - KEY VALUE POINTS
Automation & Business Agility
• AlgoSec extends Cisco ACI policy-based automation across
the entire network
Automated security policy change management for
multi-vendor devices
• Avoid misconfigurations and outages
• End-to-end automation
Security is no longer the bottleneck for agile application delivery
• Continuous compliance and documentation is retained
ALGOSEC & CISCO ACI - KEY VALUE POINTS
• Risk and compliance analysis for Cisco ACI contracts
alongside firewall security policies
• Significantly simplify and reduce audit preparation efforts
and costs
Supports all the industry regulatory standards
• Automated workflow’s “what-if” risk check assures
continuous compliance
• Full audit trail for all policy changes
Security & Compliance
SOLUTION DEMO
USE CASE 1
END-TO-END VISIBILITY
USE CASE 2
SECURITY POLICY CHANGE AUTOMATION
USE CASE 3
PREPARING FOR AUDITS
CISCO ACI APP CENTER:
ALGOSEC CONNECTIVITY AND COMPLIANCE APP
CISCO ACI APP CENTER: ALGOSEC APP
Risk and Compliance
• Visibility into ACI contracts risk and compliance posture
• Visibility into risk and compliance posture of the underlying
firewalls in the ACI fabric
Network Connectivity
• Automate security policy changes on underlying and upstream
firewalls
• Contract connectivity check
SUMMARY
SUMMARY
ACCELERATING DATA CENTER APPLICATION DEPLOYMENTS WITH CISCO
ACI AND ALGOSEC
• Security policy visibility across the entire network,
including Cisco ACI
• Automated security policy change management for multi-
vendor devices across the entire estate
• Risk and compliance analysis for Cisco ACI contracts
alongside firewall security policies
• Significantly simplify and reduce audit preparation efforts
and costs - supports all the industry regulatory standards
DON’T FORGET!
If you would like more information or a personal demo, please email us
at marketing@algosec.com
Make sure to visit us at Cisco Live in Berlin in a couple of weeks time!
MORE RESOURCES
48
THANK YOU!
Questions can be emailed to
marketing@algosec.Com

More Related Content

What's hot

2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)AlgoSec
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...AlgoSec
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...AlgoSec
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practicesshira koper
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloudAlgoSec
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network finalAlgoSec
 
Migrating Application Connectivity and Network Security to AWS
Migrating Application Connectivity and Network Security to AWSMigrating Application Connectivity and Network Security to AWS
Migrating Application Connectivity and Network Security to AWSAlgoSec
 
Firewall Rule Recertification - An Application-Centric Approach
Firewall Rule Recertification - An Application-Centric ApproachFirewall Rule Recertification - An Application-Centric Approach
Firewall Rule Recertification - An Application-Centric ApproachAlgoSec
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 
5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy managementAlgoSec
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Securityshira koper
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivityshira koper
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondAlgoSec
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy managementAlgoSec
 
AlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarAlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarMaytal Levi
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarAlgoSec
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...AlgoSec
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAlgoSec
 

What's hot (20)

2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloud
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network final
 
Migrating Application Connectivity and Network Security to AWS
Migrating Application Connectivity and Network Security to AWSMigrating Application Connectivity and Network Security to AWS
Migrating Application Connectivity and Network Security to AWS
 
Firewall Rule Recertification - An Application-Centric Approach
Firewall Rule Recertification - An Application-Centric ApproachFirewall Rule Recertification - An Application-Centric Approach
Firewall Rule Recertification - An Application-Centric Approach
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Security
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management
 
AlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarAlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
 

Viewers also liked

How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...Adi Gazit Blecher
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesAdi Gazit Blecher
 
Why we should choose the cisco 3850 and 3650 switches
Why we should choose the cisco 3850 and 3650 switchesWhy we should choose the cisco 3850 and 3650 switches
Why we should choose the cisco 3850 and 3650 switchescandy tang
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyAdi Gazit Blecher
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextAlgoSec
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesAlgoSec
 
Dos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your NetworkDos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your NetworkAlgoSec
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentAlgoSec
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesAlgoSec
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglyAlgoSec
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveAlgoSec
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to PracticeAlgoSec
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveAlgoSec
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesCisco Mobility
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceAlgoSec
 

Viewers also liked (17)

How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
 
how to simulate ACI
how to simulate ACIhow to simulate ACI
how to simulate ACI
 
SDN Presentation
SDN PresentationSDN Presentation
SDN Presentation
 
Why we should choose the cisco 3850 and 3650 switches
Why we should choose the cisco 3850 and 3650 switchesWhy we should choose the cisco 3850 and 3650 switches
Why we should choose the cisco 3850 and 3650 switches
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiency
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business context
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy Changes
 
Dos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your NetworkDos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your Network
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changes
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switches
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
 

Similar to Cisco aci and AlgoSec webinar

Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015ldangelo0772
 
Cisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjonesCisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjonesBilly jones Monarquia
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05hoanv
 
Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)Cisco Russia
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
Cisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stackCisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stackAymen Mami
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformShashi Kiran
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyCloud Standards Customer Council
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
Cisco UCS for OpenStack Cloud
Cisco UCS for OpenStack CloudCisco UCS for OpenStack Cloud
Cisco UCS for OpenStack CloudLora O'Haver
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...AlgoSec
 
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOXContinuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOXDevOps.com
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center LandscapeCisco Canada
 
Cisco Impresa40 - Trends, Vision, Solutions
Cisco Impresa40 - Trends, Vision, SolutionsCisco Impresa40 - Trends, Vision, Solutions
Cisco Impresa40 - Trends, Vision, SolutionsMatteo Masi
 
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...ldangelo0772
 
Unified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
Unified Security through Armor and AWS - DEM05 - Atlanta AWS SummitUnified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
Unified Security through Armor and AWS - DEM05 - Atlanta AWS SummitAmazon Web Services
 

Similar to Cisco aci and AlgoSec webinar (20)

Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015
 
Cisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjonesCisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjones
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)Стратегия Cisco в ЦОД (доклад на английском языке)
Стратегия Cisco в ЦОД (доклад на английском языке)
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
Cisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stackCisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stack
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
Cisco UCS for OpenStack Cloud
Cisco UCS for OpenStack CloudCisco UCS for OpenStack Cloud
Cisco UCS for OpenStack Cloud
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOXContinuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
Cisco Impresa40 - Trends, Vision, Solutions
Cisco Impresa40 - Trends, Vision, SolutionsCisco Impresa40 - Trends, Vision, Solutions
Cisco Impresa40 - Trends, Vision, Solutions
 
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...
 
Unified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
Unified Security through Armor and AWS - DEM05 - Atlanta AWS SummitUnified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
Unified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Cisco aci and AlgoSec webinar

  • 1. ACCELERATING DATA CENTER APPLICATION DEPLOYMENTS WITH CISCO ACI AND ALGOSEC Juan Lage, Principal Engineer at Cisco Anner Kushnir, VP Technology at AlgoSec
  • 2. AGENDA • AlgoSec overview • Cisco ACI overview • AlgoSec & Cisco ACI - integrated solution • Solution demo • Summary • Q&A
  • 3. Founded 2004 1500+ Enterprise Customers Serving 20 of the Fortune 50 24/7 Support via 3 Global Centers Passionate about Customer Satisfaction 3 ALGOSEC OVERVIEW
  • 4. 4 | Confidential Security Management Automation Single Pane of Glass Business Driven Security Provide Business Application context to Security and Risk Provide uniform visibility across the entire network security infrastructure – on premise, private cloud & SDN, and in public cloud Intelligently enhance and automate time-consuming security processes and activities with business context Manage Security at the Speed of Business
  • 5. KEY BUSINESS CHALLENGES THAT ALGOSEC ADDRESSES Automating security change management Tying cyber threats to business processes Single pane of glass for network security policy management Securing business transformation to the cloud Ensuring continuous compliance Effectively managing application connectivity Reducing risk from misconfigurations Avoiding application outages due to connectivity issues Business-Driven SECURITY Business-Driven AGILITY
  • 6. THE ALGOSEC SECURITY POLICY MANAGEMENT SUITE
  • 7. CISCO ACI - OVERVIEW
  • 8. * Cisco Global IT Impact Survey APPLICATIONS ARE CHANGING Type Consumption Delivery 78% The network is even more critical to delivering applications than a year ago* Big Data, Distributed Apps, Mobile Cloud–public, Private, Hybrid Anywhere, Anytime, Any Device
  • 9. THE NETWORK IS THE BEST PLACE TO PUT POLICY Because it touches everything, the network never lies POLICY DATA CENTER Public Cloud APPAPP APP Edge
  • 10. Cisco® ACI Fabric App DBWeb QoS Filter Filter Service QoS Filter Outside Cisco Application Policy Infrastructure Controller (APIC) CISCO ACI – MULTI-TENANT INTENT DRIVEN NETWORKING 6
  • 11. Security Everywhere9 Analytics Everywhere10 8 Policy Everywhere POLICY-DRIVEN INTEGRATED INFRASTRUCTURE ANSWERS CUSTOMERS’ REQUEST 1 Modernize Infrastructure: Open and Programmable Network / L4-7 Compute Storage Security Data Center 5 Move Data and Workloads Securely 6 Self-Service Portal (IT as a Service) 7 Extend Policy Model 2 Automate and Simplify POLICY 3 Build Your Hybrid Cloud Private Cloud Stack Integrated Infrastructure 4 Choose any Other Cloud Managed Public Private
  • 12. ACI, CLOUDCENTER AND TETRATION AUTOMATE APPLICATION POLICY App Level Policy Enforcement / Visibility Self-documenting Network Real-time Change Notification Real TimeData Network Policy App Policy Tetration 8
  • 13. CUSTOMER ACCEPTANCE CONTINUES 17,100+ 652,700+ Nexus 9K and Nexus 3K Customers Globally Ecosystem Partners ACI Customers NEW ECOSYSTEM
  • 14. CISCO ACI SECURITY AUTOMATED SECURITY WITH BUILT-IN MULTI-TENANCY Distributed stateless firewall Line-rate security enforcement Open: Integrate any security device PCI and FIPS (new) Embedded Security • Whitelist firewall policy model • Authenticated northbound API (X.509) • Encrypted management plane (TLS 1.2) Microsegmentation • vDS, Hyper-V, and bare-metal workloads • Intra-EPG isolation • Attribute-based isolation and quarantine Security Automation • Dynamic service insertion and chaining • Security policy follows workloads • Centralized security provisioning and visibility Cisco ACI™ Services Graph 11
  • 15. • Application-centric policy management • Automation and agile application delivery • Built for enterprise customers • Full support for Cisco firewalls and routers • Integrated with Cisco CloudCenter (CliQr) • Full support for all leading security vendors ALGOSEC AND CISCO ACI – BETTER TOGETHER
  • 16. Data Center ACI SOLUTION ARCHITECTURE  Visibility & Compliance  Automatic Provisioning  Business Applications Data Center FWs (L4-L7 services) Perimeter & Upstream FWs
  • 17. ALGOSEC & CISCO ACI - KEY VALUE POINTS • Security policy visibility across the entire network Within Data Center - Cisco ACI and underlying firewalls Perimeter and upstream firewalls Cloud security groups • Monitor and proactively identify security policy changes Track changes in application profiles, contracts, EPGs, filters Verify no out of band changes in underlying firewalls • Troubleshooting End-to-end connectivity • Full multi-tenant support End-to-End Visibility
  • 18. ALGOSEC & CISCO ACI - KEY VALUE POINTS Automation & Business Agility • AlgoSec extends Cisco ACI policy-based automation across the entire network Automated security policy change management for multi-vendor devices • Avoid misconfigurations and outages • End-to-end automation Security is no longer the bottleneck for agile application delivery • Continuous compliance and documentation is retained
  • 19. ALGOSEC & CISCO ACI - KEY VALUE POINTS • Risk and compliance analysis for Cisco ACI contracts alongside firewall security policies • Significantly simplify and reduce audit preparation efforts and costs Supports all the industry regulatory standards • Automated workflow’s “what-if” risk check assures continuous compliance • Full audit trail for all policy changes Security & Compliance
  • 21.
  • 22.
  • 23. USE CASE 1 END-TO-END VISIBILITY
  • 24.
  • 25.
  • 26.
  • 27. USE CASE 2 SECURITY POLICY CHANGE AUTOMATION
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. USE CASE 3 PREPARING FOR AUDITS
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. CISCO ACI APP CENTER: ALGOSEC CONNECTIVITY AND COMPLIANCE APP
  • 41. CISCO ACI APP CENTER: ALGOSEC APP Risk and Compliance • Visibility into ACI contracts risk and compliance posture • Visibility into risk and compliance posture of the underlying firewalls in the ACI fabric Network Connectivity • Automate security policy changes on underlying and upstream firewalls • Contract connectivity check
  • 42.
  • 44. SUMMARY ACCELERATING DATA CENTER APPLICATION DEPLOYMENTS WITH CISCO ACI AND ALGOSEC • Security policy visibility across the entire network, including Cisco ACI • Automated security policy change management for multi- vendor devices across the entire estate • Risk and compliance analysis for Cisco ACI contracts alongside firewall security policies • Significantly simplify and reduce audit preparation efforts and costs - supports all the industry regulatory standards
  • 45. DON’T FORGET! If you would like more information or a personal demo, please email us at marketing@algosec.com Make sure to visit us at Cisco Live in Berlin in a couple of weeks time!
  • 47. THANK YOU! Questions can be emailed to marketing@algosec.Com