top of page

Search results

610 results found with an empty search

  • AlgSec support programs - AlgoSec

    AlgSec support programs Datasheet Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Customer Success Manager - AlgoSec

    Customer Success Manager Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Managing Business Application Connectivity | algosec

    Security Policy Management with Professor Wool Managing Business Application Connectivity Managing Business Application Connectivity is a whiteboard-style series of lessons that examine the challenges of and provide technical tips for provisioning and decommissioning application connectivity across enterprise networks and data centers. Lesson 1 In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications. Examining the Need for Application-Centric Security Policy Management Watch Lesson 2 In this lesson, Professor Wool discusses how to look at and prioritize network security vulnerabilities in a new way - from the perspective of the business applications in your data center. How to Prioritize Risk from the Business Perspective Watch Lesson 3 In this lesson, Professor Wool examines how to leverage firewall rules for discovering the connectivity requirements of data center applications. Tips to Discover Business Application Connectivity Requirements Watch Lesson 4 In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use. Tips for Secure Decommissioning of Business Applications Watch Lesson 5 How to Automatically Identify Business Application Connectivity Needs from Network Traffic Watch Lesson 6 The Different Data Sources for Application Connectivity Discovery Watch Lesson 7 How to Aggregate Network Flows Into Application Flows Watch Lesson 8 The Benefits of Mapping Firewall Rules to Business Applications Watch Have a Question for Professor Wool? Ask him now Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Slavery and Human Trafficking Statement - AlgoSec

    Slavery and Human Trafficking Statement Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • CASE STUDY NCR ACCELERATES TOWARDS ZERO-TRUST - AlgoSec

    CASE STUDY NCR ACCELERATES TOWARDS ZERO-TRUST Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Fortifying cloud security and HIPAA compliance for a global health services company - AlgoSec

    Fortifying cloud security and HIPAA compliance for a global health services company Case Study Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Cisco and AlgoSec Partner solution brief- Better together for network segmentation - AlgoSec

    Cisco and AlgoSec Partner solution brief- Better together for network segmentation Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Defining & Enforcing a Micro-segmentation Strategy - AlgoSec

    Defining & Enforcing a Micro-segmentation Strategy Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Network Security for VMware NSX | algosec

    Security Policy Management with Professor Wool Network Security for VMware NSX Network Security for VMware NSX with Professor Wool is a whiteboard-style series of lessons that examine the some of the challenges of and provide technical tips for managing security policies across the VMware NSX software-defined data center and traditional data center. Lesson 1 VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform. Migrating to NSX: Understanding the Why in Order to Figure Out the How Watch Lesson 2 When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic. Tips on How to Create Filtering Policies for NSX Watch Lesson 3 Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment. Best Practices for Bringing NSX Security Policy Management into the InfoSec Fold Watch Have a Question for Professor Wool? Ask him now Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Enterprise hybrid network management solutions - AlgoSec

    Enterprise hybrid network management solutions Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Partner solution brief AlgoSec and Check Point - AlgoSec

    Partner solution brief AlgoSec and Check Point Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Building trust in automation - AlgoSec

    Building trust in automation WhitePaper Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

bottom of page