<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Prof Wool: Network Segmentation</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>Prof Wool: Network Segmentation</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/audiopodcast/prof-wool-network-segmentation-1"/>
        <atom:link rel="next" href="https://video.algosec.com/audiopodcast/prof-wool-network-segmentation-1?p=2&amp;album%5fid=49615334&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/audio/podcast/44181876-4-audio.mp3" type="audio/mp3" length="2091353"/>
            <title>Lesson 7: How to Aggregate Network Flows Into Application Flows</title>
            <link>http://video.algosec.com/lesson-7-how-to-aggregate-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181876</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Aggregate Network Flows Into Application Flows</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d5894f7ffc54d4f9858292bb6ee2723c&amp;source=podcast&amp;photo%5fid=44181876" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center applications</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/audio/podcast/44182248-4-audio.mp3" type="audio/mp3" length="1566449"/>
            <title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</title>
            <link>http://video.algosec.com/lesson-5-the-challenges-of-east</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-the-challenges-of-east"&gt;&lt;img src="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182248</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-the-challenges-of-east"&gt;&lt;img src="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=29825a33ac4f02b0fdd0df1d19c6aafc&amp;source=podcast&amp;photo%5fid=44182248" width="625" height="352" type="text/html" medium="video" duration="261" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>network security</category>
            <category>network security segmentation</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/audio/podcast/44182175-4-audio.mp3" type="audio/mp3" length="2636163"/>
            <title>Lesson 6: How to Build Firewall Policies for East West Traffic</title>
            <link>http://video.algosec.com/lesson-6-how-to-build-firewall</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182175</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 6: How to Build Firewall Policies for East West Traffic</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0b703ddeea2e989e3bc350549757ce6a&amp;source=podcast&amp;photo%5fid=44182175" width="625" height="352" type="text/html" medium="video" duration="439" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/audio/podcast/44182303-4-audio.mp3" type="audio/mp3" length="2433662"/>
            <title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security...</title>
            <link>http://video.algosec.com/lesson-3-common-mistakes-and-best</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-common-mistakes-and-best"&gt;&lt;img src="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182303</guid>
            <pubDate>Thu, 26 Mar 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security...</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-common-mistakes-and-best"&gt;&lt;img src="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=01e5f51fd43db5def8186c84fe86ec65&amp;source=podcast&amp;photo%5fid=44182303" width="625" height="352" type="text/html" medium="video" duration="405" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewalls</category>
            <category>network security</category>
            <category>network security zone</category>
            <category>network security zones</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security zone</category>
            <category>security zones</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/audio/podcast/44182229-4-audio.mp3" type="audio/mp3" length="1847161"/>
            <title>Lesson 4: Data Center Segmentation Best Practices</title>
            <link>http://video.algosec.com/lesson-4-data-center-segmentation</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-data-center-segmentation"&gt;&lt;img src="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182229</guid>
            <pubDate>Wed, 28 Jan 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Data Center Segmentation Best Practices</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-data-center-segmentation"&gt;&lt;img src="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e7de21fde97412592b2fd22ec86e6e4a&amp;source=podcast&amp;photo%5fid=44182229" width="625" height="352" type="text/html" medium="video" duration="308" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>network security</category>
            <category>network security segmentation</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/audio/podcast/44182257-4-audio.mp3" type="audio/mp3" length="2367050"/>
            <title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</title>
            <link>http://video.algosec.com/lesson-1-how-to-structure-your</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-structure-your"&gt;&lt;img src="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182257</guid>
            <pubDate>Wed, 01 Oct 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-structure-your"&gt;&lt;img src="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f89558d6f367f66d2f7fd246d7b932ed&amp;source=podcast&amp;photo%5fid=44182257" width="625" height="352" type="text/html" medium="video" duration="394" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/audio/podcast/44182330-4-audio.mp3" type="audio/mp3" length="1983677"/>
            <title>Lesson 2: How to Define, Simplify and Enforce Network Segmentation and...</title>
            <link>http://video.algosec.com/lesson-2-how-to-define-simplify-and</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool recommends a simple matrix to define network segments and security zones, and the traffic allowed to and from each zone. This matrix can then be used to immediately assess a firewall change requests as well as validate that existing security policies have been implemented correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-how-to-define-simplify-and"&gt;&lt;img src="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182330</guid>
            <pubDate>Thu, 14 Aug 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: How to Define, Simplify and Enforce Network Segmentation and...</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool recommends a simple matrix to define network segments and security zones, and the traffic allowed to and from each zone. This matrix can then be used to immediately assess a firewall change requests as well as validate that existing security policies have been implemented correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-how-to-define-simplify-and"&gt;&lt;img src="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a971e559de70d0684d8858d2c05145fc&amp;source=podcast&amp;photo%5fid=44182330" width="625" height="352" type="text/html" medium="video" duration="330" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>network segmentation</category>
            <category>network zoning</category>
            <category>prof wool</category>
        </item>
    </channel>
</rss>
