<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Prof Wool: Next Generation Firewalls</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>Prof Wool: Next Generation Firewalls</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/audiopodcast/prof-wool-next-generation-firewalls-1"/>
        <atom:link rel="next" href="https://video.algosec.com/audiopodcast/prof-wool-next-generation-firewalls-1?p=2&amp;album%5fid=49615352&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/audio/podcast/44182238-4-audio.mp3" type="audio/mp3" length="2086181"/>
            <title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</title>
            <link>http://video.algosec.com/lesson-4-using-next-generation</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182238</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dab3bab204d4a15a112afe579c826e2d&amp;source=podcast&amp;photo%5fid=44182238" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>cyber threat detection</category>
            <category>cyber threat prevention</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Next-Generation Firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/audio/podcast/44182171-4-audio.mp3" type="audio/mp3" length="2107497"/>
            <title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</title>
            <link>http://video.algosec.com/lesson-3-managing-your-security</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182171</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b9e12ad72654514540985c604cfa8e53&amp;source=podcast&amp;photo%5fid=44182171" width="625" height="352" type="text/html" medium="video" duration="351" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>next generation firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/audio/podcast/44182711-4-audio.mp3" type="audio/mp3" length="3813241"/>
            <title>Lesson 2: NGFWs - Whitelisting &amp; Blacklisting Policy Considerations</title>
            <link>http://video.algosec.com/lesson-2-ngfws-whitelisting</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the pros and cons of whitelisting and blacklisting policies and offers some recommendations on policy considerations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-ngfws-whitelisting"&gt;&lt;img src="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182711</guid>
            <pubDate>Wed, 06 Jun 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: NGFWs - Whitelisting &amp; Blacklisting Policy Considerations</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the pros and cons of whitelisting and blacklisting policies and offers some recommendations on policy considerations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-ngfws-whitelisting"&gt;&lt;img src="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=aa2c6bbe57878bf5156d1ea06e0353f3&amp;source=podcast&amp;photo%5fid=44182711" width="625" height="352" type="text/html" medium="video" duration="635" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>blacklisting</category>
            <category>firewall management</category>
            <category>firewall policies</category>
            <category>firewalls</category>
            <category>Network Security</category>
            <category>next-generation firewalls</category>
            <category>policy</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>whitelisting</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/audio/podcast/44182727-4-audio.mp3" type="audio/mp3" length="3265296"/>
            <title>Lesson 1: Next-Generation Firewalls: Overview of Application and User-Aware...</title>
            <link>http://video.algosec.com/lesson-1-next-generation-firewalls</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 1&lt;br&gt;
In this lesson, Professor Wool examines next-generation firewalls and the granular capabilities they provide for improved control over applications and users.
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-next-generation-firewalls"&gt;&lt;img src="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182727</guid>
            <pubDate>Mon, 21 May 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Next-Generation Firewalls: Overview of Application and User-Aware...</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 1&lt;br&gt;
In this lesson, Professor Wool examines next-generation firewalls and the granular capabilities they provide for improved control over applications and users.
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-next-generation-firewalls"&gt;&lt;img src="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ac281d49577cafce8bc246ba69434e3&amp;source=podcast&amp;photo%5fid=44182727" width="625" height="352" type="text/html" medium="video" duration="544" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewalls</category>
            <category>next-generation firewalls</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>Technology</category>
        </item>
    </channel>
</rss>
