SlideShare uma empresa Scribd logo
1 de 46
IMPROVING BUSINESS
AGILITY WITH
SECURITY POLICY
AUTOMATION
Yoni Geva,
Product Manager
yoni.geva@algosec.com
2
WELCOME
Have a question? Submit it via the chat
This webinar is being recorded!
Slides and recording will be sent to you after the webinar
2
marketing@algosec.com
3
How difficult is it for your network
teams to understand the business
context of firewall rules?
• Very
• Slightly
• This is not a challenge
Please vote using the “votes from
audience” tab in your BrightTALK panel
POLL
GROWING EXPECTATIONS
FROM IT AND
SECURITY TEAMS
5
RUN FASTER!
• Constant demand for
higher business agility
• Technology enablers
(DevOps, cloud, SDN)
• Deliver in minutes/hours,
not weeks/months
PROTECT YOUR
NETWORK BETTER!
• Attacks and breaches are constantly
on the rise, more sophisticated
• Security must be stronger and tighter
But also…
6
THE BALANCING ACT - REALITY
Trying to find the perfect balance:
• Both agility and security are affected
• Constant tension between Security and Apps teams
Security Business Agility
And if it fails … Shadow IT starts
7
BUT WHAT IF
YOU COULD…
HAVE YOUR
CAKE AND
EAT IT TOO?
INFORMATIONMANAGING SECURITY WITH THE BUSINESS CONTEXT
* Slide from AlgoSec webinar featuring Gartner
The move to the cloud, mobile and digital business requires changes in how we approach security
People
Processes
Application & Services
Workspace
OS
Network
Hardware
TOP DOWN
Information, process and
Application-centric security
Business-driven security
BOTTOM UP
Device and OS fixation, “lockdown”
Asset-centric security
9
ALGOSEC BUSINESS FLOW
• Provision connectivity for business
applications
• Assess the impact of network changes
• Easily migrate application to cloud
environments
• View risk and vulnerabilities for the
business application
• Securely decommission applications
and policy rules
10
WHY IS BUSINESS
CONTEXT SO
IMPORTANT?
• Prioritize risk management by
application criticality
• Application sensitivity impact
security levels
• E.g. PCI
• Security policy affected by
application status
Matching of business application to firewall rules
11
AlgoSec enables
companies to align
security with their
business processes
Business-driven Agility
Business-driven Visibility
Business-driven Security
BUSINESS DRIVEN SECURITY MANAGEMENT
12
POLL
How do application owners in
your organization document the
application flows?
• We do not have documentation for
most of the applications
• Manually in Excel, Visio or Word
• CMDB or other database
• I don’t know, it’s not my responsibility
Please vote using the “Votes” tab
in your BrightTALK panel
13
THE APPLICATION LIFECYCLE
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
14
THE SECURITY POLICY MANAGEMENT LIFECYCLE
Auto-discover and map application
connectivity and security
infrastructure
Allow application owners and
architects to easily define their
application connectivity needs
DecommissionMaintainPlan & Assess Migrate & DeployDiscovery
15
DESIGN OR DISCOVER EXISTING APPLICATIONS
• Existing sources?
• CMDB
• Excel Spreadsheet
• Firewall Rules
• APM DB
• Network discovery
• Firewall logs
• Network sensing
• 3rd party network probing
• Design a new application
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
16
APPLICATION & CONNECTIVITY AUTO-DISCOVERY
• Various sources: network mirroring, PCAP files, NetFlow, sFlow
Network
sensing
• Determine hosts
• Determine active flows
Analyze
network traffic
• Smart heuristics to identify web services, data bases, applications
• Application identity “hints”
Identify business
applications
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
17
THE MAPPED
BUSINESS
APPLICATIONS
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
18
DISCOVERED
APPLICATIONS
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
19
DISCOVERED
APPLICATION
FLOWS
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
20
OPTIMIZED
FLOWS
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
21
THE SECURITY POLICY MANAGEMENT LIFECYCLE
Design for segmentation
Translate application connectivity
into firewall rules
Assess risk and compliance
Auto-discover and map application
connectivity and security
infrastructure
Allow application owners and
architects to easily define their
application connectivity needs
Discovery DecommissionMaintainMigrate & DeployPlan & Assess
22
UNFILTERED
FLOWS FOR
MICRO-
SEGMENTATION
If you place endpoints in different
segments:
• Write policy to allow the flow
• … or application will break
• Enables Micro-segmentation!
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
23
Design Enforce
FULL CYCLE FROM DESIGN TO ENFORCEMENT
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
24
EASILY VISUALIZE
AND REVIEW
APPLICATION
CONNECTIVITY
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
25
ANALYZE AND
REVIEW
APPLICATION
CONNECTIVITY
RISKS
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
26
AND …
VULNERABILITIES
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
27
THE SECURITY POLICY MANAGEMENT LIFECYCLE
Automated policy push
Design for segmentation
Translate application connectivity
into firewall rules
Assess risk and compliance
Auto-discover and map application
connectivity and security
infrastructure
Allow application owners and
architects to easily define their
application connectivity needs
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
28
MANAGING
APPLICATION
LIFECYCLE AS
A PROJECT
Move Application Payroll from testing to staging
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
29
EASILY
MANAGE
APPLICATION
LIFECYCLE
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
30
REVIEW
RISKS
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
31
OPEN
CHANGE
REQUEST
• Easily tracked
• Approval workflows
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
32
AUTOMATIC
CALCULATION
OF DEVICES
IN PATH
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
33
AUTOMATIC
CALCULATION
OF DEVICES
IN PATH
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
34
APPROVAL
OF RISKS
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
35
TRANSLATION
AND
IMPLEMENTATION
OF POLICY RULES
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
36
THE SECURITY POLICY MANAGEMENT LIFECYCLE
Out-of-the box auditing and
compliance reports
Link firewall rules to applications
Policy clean up and optimization
Tie cyber attacks and vulnerabilities
to business processes
Prioritize risks and vulnerabilities
Design for segmentation
Translate application connectivity
into firewall rules
Assess risk and compliance
Auto-discover and map application
connectivity and security
infrastructure
Allow application owners and
architects to easily define their
application connectivity needs
Automated policy push
Discovery DecommissionPlan & Assess Migrate & Deploy Maintain
37
RISK AND THE
APPLICATION
• Easily identify high risk
applications
• Present risk also to application
owners and BU managers
• Prioritize based on risk level,
applications sensitivity and
criticality
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
38
CONSIDER THE
APPLICATION IN
POLICY CLEAN UP
Example: we are considering the
effect of a new FTP related threat
– which applications are at risk?
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
39
BRING BUSINESS-
CENTRIC
VULNERABILITY
MODELING INTO
REGULATORY
COMPLIANCE
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
PCI sensitive
applications…
40
THE SECURITY POLICY MANAGEMENT LIFECYCLE
Decommission redundant
firewall rules and application
connectivity
Out-of-the box auditing and
compliance reports
Link firewall rules to applications
Policy clean up and optimization
Tie cyber attacks and vulnerabilities
to business processes
Auto-discover and map application
connectivity and security
infrastructure
Allow application owners and
architects to easily define their
application connectivity needs
Design for segmentation
Translate application connectivity
into firewall rules
Assess risk and compliance
Automated policy push
Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
Q & A
You are also welcome to request
a demo and email questions
marketing@algosec.com
42
SUMMARY
• Taking the top-down,
business-driven
approach
• Business-driven
automation
• Tying application
information to
security controls
43
MORE RESOURCES
WHITEPAPER SOLUTION BROCHURE PPT
PROF. WOOL EDUCATIONAL VIDEOS
www.algosec.com/resources
44
UPCOMING WEBINARS
https://www.algosec.com/webinars
Taking Control of Your Complex Security Policy Across Hybrid and Multi-Cloud
Environments
When: Dec 4th
By: Yitzy Tannenbaum, Product Marketing Manager & CSA
Exclusive LIVE Panel: AlgoSec and AWS Sharing Best Practices
When: Dec 11th
By: Prof. Avishai Wool, CTO & Scott Ward, Principal Solutions Architect (AWS)
More Things You Can Do with the AlgoSec Security Policy Management Suite
When: Dec 17th
By: Dania Peretz, Product Manager
SIGN UP
NOW
4545
JOIN OUR COMMUNITY
Follow us for the latest on security policy management trends, tips & tricks,
best practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos
presented by Professor Wool
youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
THANK YOU!
Questions can be emailed to
marketing@algosec.com

Mais conteúdo relacionado

Mais procurados

2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...AlgoSec
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloudAlgoSec
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...AlgoSec
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteAlgoSec
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Securityshira koper
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solutionAlgoSec
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)AlgoSec
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
DevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsDevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsshira koper
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation Maytal Levi
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...AlgoSec
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Cloud migrations made simpler safe secure and successful migrations
Cloud migrations made simpler   safe secure and successful migrationsCloud migrations made simpler   safe secure and successful migrations
Cloud migrations made simpler safe secure and successful migrationsAlgoSec
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivityshira koper
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesAlgoSec
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationAlgoSec
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practicesshira koper
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...AlgoSec
 

Mais procurados (20)

2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloud
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Security
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
DevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsDevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOps
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Cloud migrations made simpler safe secure and successful migrations
Cloud migrations made simpler   safe secure and successful migrationsCloud migrations made simpler   safe secure and successful migrations
Cloud migrations made simpler safe secure and successful migrations
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 

Semelhante a 2018 11-19 improving business agility with security policy automation final

CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudAlert Logic
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alAlert Logic
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpseG Innovations
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteSurfWatch Labs
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudAlert Logic
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudAlert Logic
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital SecurityShawn Wells
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWSAlert Logic
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureCprime
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyAdi Gazit Blecher
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeRunpipe
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Scalar Decisions
 
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudSkytap Cloud
 

Semelhante a 2018 11-19 improving business agility with security policy automation final (20)

CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
 
Learn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiencyLearn how an app-centric approach will improve security & operational efficiency
Learn how an app-centric approach will improve security & operational efficiency
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Microsoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with RunpipeMicrosoft Power Platform Governance with Runpipe
Microsoft Power Platform Governance with Runpipe
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the CloudApplication Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
 

Mais de AlgoSec

The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinarAlgoSec
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...AlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentAlgoSec
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationAlgoSec
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinarAlgoSec
 

Mais de AlgoSec (8)

The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinar
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

2018 11-19 improving business agility with security policy automation final

  • 1. IMPROVING BUSINESS AGILITY WITH SECURITY POLICY AUTOMATION Yoni Geva, Product Manager yoni.geva@algosec.com
  • 2. 2 WELCOME Have a question? Submit it via the chat This webinar is being recorded! Slides and recording will be sent to you after the webinar 2 marketing@algosec.com
  • 3. 3 How difficult is it for your network teams to understand the business context of firewall rules? • Very • Slightly • This is not a challenge Please vote using the “votes from audience” tab in your BrightTALK panel POLL
  • 4. GROWING EXPECTATIONS FROM IT AND SECURITY TEAMS
  • 5. 5 RUN FASTER! • Constant demand for higher business agility • Technology enablers (DevOps, cloud, SDN) • Deliver in minutes/hours, not weeks/months PROTECT YOUR NETWORK BETTER! • Attacks and breaches are constantly on the rise, more sophisticated • Security must be stronger and tighter But also…
  • 6. 6 THE BALANCING ACT - REALITY Trying to find the perfect balance: • Both agility and security are affected • Constant tension between Security and Apps teams Security Business Agility And if it fails … Shadow IT starts
  • 7. 7 BUT WHAT IF YOU COULD… HAVE YOUR CAKE AND EAT IT TOO?
  • 8. INFORMATIONMANAGING SECURITY WITH THE BUSINESS CONTEXT * Slide from AlgoSec webinar featuring Gartner The move to the cloud, mobile and digital business requires changes in how we approach security People Processes Application & Services Workspace OS Network Hardware TOP DOWN Information, process and Application-centric security Business-driven security BOTTOM UP Device and OS fixation, “lockdown” Asset-centric security
  • 9. 9 ALGOSEC BUSINESS FLOW • Provision connectivity for business applications • Assess the impact of network changes • Easily migrate application to cloud environments • View risk and vulnerabilities for the business application • Securely decommission applications and policy rules
  • 10. 10 WHY IS BUSINESS CONTEXT SO IMPORTANT? • Prioritize risk management by application criticality • Application sensitivity impact security levels • E.g. PCI • Security policy affected by application status Matching of business application to firewall rules
  • 11. 11 AlgoSec enables companies to align security with their business processes Business-driven Agility Business-driven Visibility Business-driven Security BUSINESS DRIVEN SECURITY MANAGEMENT
  • 12. 12 POLL How do application owners in your organization document the application flows? • We do not have documentation for most of the applications • Manually in Excel, Visio or Word • CMDB or other database • I don’t know, it’s not my responsibility Please vote using the “Votes” tab in your BrightTALK panel
  • 13. 13 THE APPLICATION LIFECYCLE Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 14. 14 THE SECURITY POLICY MANAGEMENT LIFECYCLE Auto-discover and map application connectivity and security infrastructure Allow application owners and architects to easily define their application connectivity needs DecommissionMaintainPlan & Assess Migrate & DeployDiscovery
  • 15. 15 DESIGN OR DISCOVER EXISTING APPLICATIONS • Existing sources? • CMDB • Excel Spreadsheet • Firewall Rules • APM DB • Network discovery • Firewall logs • Network sensing • 3rd party network probing • Design a new application Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 16. 16 APPLICATION & CONNECTIVITY AUTO-DISCOVERY • Various sources: network mirroring, PCAP files, NetFlow, sFlow Network sensing • Determine hosts • Determine active flows Analyze network traffic • Smart heuristics to identify web services, data bases, applications • Application identity “hints” Identify business applications Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 21. 21 THE SECURITY POLICY MANAGEMENT LIFECYCLE Design for segmentation Translate application connectivity into firewall rules Assess risk and compliance Auto-discover and map application connectivity and security infrastructure Allow application owners and architects to easily define their application connectivity needs Discovery DecommissionMaintainMigrate & DeployPlan & Assess
  • 22. 22 UNFILTERED FLOWS FOR MICRO- SEGMENTATION If you place endpoints in different segments: • Write policy to allow the flow • … or application will break • Enables Micro-segmentation! Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 23. 23 Design Enforce FULL CYCLE FROM DESIGN TO ENFORCEMENT Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 24. 24 EASILY VISUALIZE AND REVIEW APPLICATION CONNECTIVITY Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 27. 27 THE SECURITY POLICY MANAGEMENT LIFECYCLE Automated policy push Design for segmentation Translate application connectivity into firewall rules Assess risk and compliance Auto-discover and map application connectivity and security infrastructure Allow application owners and architects to easily define their application connectivity needs Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 28. 28 MANAGING APPLICATION LIFECYCLE AS A PROJECT Move Application Payroll from testing to staging Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 31. 31 OPEN CHANGE REQUEST • Easily tracked • Approval workflows Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 32. 32 AUTOMATIC CALCULATION OF DEVICES IN PATH Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 33. 33 AUTOMATIC CALCULATION OF DEVICES IN PATH Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 35. 35 TRANSLATION AND IMPLEMENTATION OF POLICY RULES Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 36. 36 THE SECURITY POLICY MANAGEMENT LIFECYCLE Out-of-the box auditing and compliance reports Link firewall rules to applications Policy clean up and optimization Tie cyber attacks and vulnerabilities to business processes Prioritize risks and vulnerabilities Design for segmentation Translate application connectivity into firewall rules Assess risk and compliance Auto-discover and map application connectivity and security infrastructure Allow application owners and architects to easily define their application connectivity needs Automated policy push Discovery DecommissionPlan & Assess Migrate & Deploy Maintain
  • 37. 37 RISK AND THE APPLICATION • Easily identify high risk applications • Present risk also to application owners and BU managers • Prioritize based on risk level, applications sensitivity and criticality Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 38. 38 CONSIDER THE APPLICATION IN POLICY CLEAN UP Example: we are considering the effect of a new FTP related threat – which applications are at risk? Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 39. 39 BRING BUSINESS- CENTRIC VULNERABILITY MODELING INTO REGULATORY COMPLIANCE Discovery DecommissionMaintainPlan & Assess Migrate & Deploy PCI sensitive applications…
  • 40. 40 THE SECURITY POLICY MANAGEMENT LIFECYCLE Decommission redundant firewall rules and application connectivity Out-of-the box auditing and compliance reports Link firewall rules to applications Policy clean up and optimization Tie cyber attacks and vulnerabilities to business processes Auto-discover and map application connectivity and security infrastructure Allow application owners and architects to easily define their application connectivity needs Design for segmentation Translate application connectivity into firewall rules Assess risk and compliance Automated policy push Discovery DecommissionMaintainPlan & Assess Migrate & Deploy
  • 41. Q & A You are also welcome to request a demo and email questions marketing@algosec.com
  • 42. 42 SUMMARY • Taking the top-down, business-driven approach • Business-driven automation • Tying application information to security controls
  • 43. 43 MORE RESOURCES WHITEPAPER SOLUTION BROCHURE PPT PROF. WOOL EDUCATIONAL VIDEOS www.algosec.com/resources
  • 44. 44 UPCOMING WEBINARS https://www.algosec.com/webinars Taking Control of Your Complex Security Policy Across Hybrid and Multi-Cloud Environments When: Dec 4th By: Yitzy Tannenbaum, Product Marketing Manager & CSA Exclusive LIVE Panel: AlgoSec and AWS Sharing Best Practices When: Dec 11th By: Prof. Avishai Wool, CTO & Scott Ward, Principal Solutions Architect (AWS) More Things You Can Do with the AlgoSec Security Policy Management Suite When: Dec 17th By: Dania Peretz, Product Manager SIGN UP NOW
  • 45. 4545 JOIN OUR COMMUNITY Follow us for the latest on security policy management trends, tips & tricks, best practices, thought leadership, fun stuff, prizes and much more! Subscribe to our YouTube channel for a wide range of educational videos presented by Professor Wool youtube.com/user/AlgoSeclinkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  • 46. THANK YOU! Questions can be emailed to marketing@algosec.com