New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.
2. 2
WELCOME
Have a question? Submit it via the chat tab or email us:
This webinar is being recorded!
The recording will be emailed to you after the webinar
And the slides will be available in the Attachments tab
Follow us online !
2
marketing@algosec.com
3. 3
AGENDA
The situation today
Security operations are not aware of the related
business applications01
02 The biggest pain point &
the solution
Application centric use cases, including policy
cleanup and documentation
How to prevent outages due to firewall
misconfiguration
03
3
Step back & look at the lifecycle
of the applications in your network
Innovative application discovery technologies
How to simplify and accelerate rule recertification
How to prevent breaches
How to ensure ongoing compliance and audit readiness
5. 5
RUN FASTER!
• Constant demand for
higher business agility
• Technology enablers
(DevOps, cloud, SDN)
• Deliver in minutes/hours,
not weeks/months
PROTECT YOUR
NETWORK BETTER!
• Attacks and breaches are constantly
on the rise and more sophisticated
• Security must be stronger and tighter
But also…
6. 6
THE BALANCING ACT - REALITY
Trying to find the perfect balance:
• Both agility and security are affected
• Constant tension between Security and Apps teams
Security Business Agility
And if it fails … Shadow IT starts
8. INFORMATIONMANAGING SECURITY WITHIN THE BUSINESS CONTEXT
* Slide from AlgoSec webinar featuring Gartner
The move to the cloud, mobile and digital business requires changes in how we approach security
People
Processes
Application & Services
Workspace
OS
Network
Hardware
TOP DOWN
Information, process and
Application-centric security
Business-driven security
BOTTOM UP
Device and OS fixation, “lockdown”
Asset-centric security
8
15. 15
AlgoSec enables
companies to align
security with their
business processes
Business-driven Agility
Business-driven Visibility
Business-driven Security
BUSINESS DRIVEN SECURITY MANAGEMENT
22. 22
THE SECURITY POLICY MANAGEMENT LIFECYCLE
Design for segmentation
Translate application connectivity
into firewall rules
Assess risk and compliance
Auto-discover and map application
connectivity and security
infrastructure
Allow application owners and
architects to easily define their
application connectivity needs
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
23. 23
THE SECURITY POLICY MANAGEMENT LIFECYCLE
Automated policy push
Design for segmentation
Translate application connectivity
into firewall rules
Assess risk and compliance
Auto-discover and map application
connectivity and security
infrastructure
Allow application owners and
architects to easily define their
application connectivity needs
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
24. 24
THE SECURITY POLICY MANAGEMENT LIFECYCLE
Out-of-the box auditing and
compliance reports
Link firewall rules to applications
Policy clean up and optimization
Tie cyber-attacks and vulnerabilities
to business processes
Prioritize risks and vulnerabilities
Design for segmentation
Translate application connectivity
into firewall rules
Assess risk and compliance
Auto-discover and map application
connectivity and security
infrastructure
Allow application owners and
architects to easily define their
application connectivity needs
Automated policy push
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
25. 25
RISK AND THE
APPLICATION
• Easily identify high risk
applications
• Present risk also to application
owners and BU managers
• Prioritize based on risk level,
applications sensitivity and
criticality
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
27. 27
THE SECURITY POLICY MANAGEMENT LIFECYCLE
Delete redundant firewall rules
and application connectivity
Out-of-the box auditing and
compliance reports
Link firewall rules to applications
Policy clean up and optimization
Tie cyber-attacks and vulnerabilities
to business processes
Auto-discover and map application
connectivity and security
infrastructure
Allow application owners and
architects to easily define their
application connectivity needs
Design for segmentation
Translate application connectivity
into firewall rules
Assess risk and compliance
Automated policy push
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
28. 28
SUMMARY
2
8
• The Pain Point
Lack of application visibility
• The Solution
Connecting applications to policy rules
• Step-by-Step
Look into the Application Lifecycle
30. 3030
JOIN OUR COMMUNITY
Follow us for the latest on security policy management trends, tips & tricks,
best practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for
a wide range of educational videos
presented by Professor Wool
youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
31. 31
ALGOSUMMIT
THE PREMIER EVENT FOR
ALGOSEC CUSTOMERS & CHANNEL PARTNERS
31
www.algosec.com/algosummit
Dallas | Oct 21-24
2019
UPCOMING WEBINARS
June 26th
Joint Webinar with Fortinet
FEATURED WEBINARS
CSA Study
Security challenges in Cloud Environments
John Yeoh (VP Global Research, CSA)
Yitzy Tannenbaum (Product Manager, AlgoSec)
PANEL DISCUSSION
CISCO FIREPOWER MIGRATION
Doug Hurd (Security Technical Alliances, Cisco)
Yonatan Klein (Director of Product, AlgoSec)