top of page

Webinars

Tightening security posture with micro-segmentation

Micro-segmentation protects your network by limiting the lateral movement of ransomware and other threats in your network. Yet successfully implementing a defense-in-depth strategy using micro-segmentation may be complicated.

In this second webinar in a series of two webinars about ransomware, Yitzy Tannenbaum, Product Marketing Manager from AlgoSec and Jan Heijdra, Cisco Security Specialist, will provide a blueprint to implementing micro-segmentation using Cisco Secure Workload (formerly Cisco Tetration) and AlgoSec Network Security Policy Management.

Join our live webinar to learn:

  • Why micro-segmentation is critical to fighting ransomware

  • Understand your business applications to create your micro-segmentation policy

  • Validate your micro-segmentation policy is accurate

  • Enforce these granular policies on workloads and summarized policies across your infrastructure

  • Use risk and vulnerability analysis to tighten your workload and network security

  • Identify and manage security risk and compliance in your micro-segmented environment

January 27, 2021



Jan Heijdra

Cisco Security Specialist

Yitzy Tannenbaum

Product Marketing Manager



Relevant resources

Micro-segmentation – from strategy to execution

Micro-segmentation – from strategy to execution

Defining & Enforcing a Micro-segmentation Strategy

Defining & Enforcing a Micro-segmentation Strategy

Building a Blueprint for a Successful Micro-segmentation Implementation

Building a Blueprint for a Successful Micro-segmentation Implementation

Choose a better way to manage your network

bottom of page