<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/audiopodcast/tag/migrating applications"/>
        <atom:link rel="next" href="https://video.algosec.com/audiopodcast/tag/migrating applications?tag=migrating+applications&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/audio/podcast/49615359-2-audio.mp3" type="audio/mp3" length="15778837"/>
            <title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</title>
            <link>http://video.algosec.com/managing-effective-security</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-effective-security"&gt;&lt;img src="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615359</guid>
            <pubDate>Wed, 18 Mar 2020 14:04:50 GMT</pubDate>
            <media:title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-effective-security"&gt;&lt;img src="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a61b1227849251e32a2981784acbc6a7&amp;source=podcast&amp;photo%5fid=49615359" width="625" height="352" type="text/html" medium="video" duration="2630" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>cloud security</category>
            <category>compliance</category>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>hybrid environment</category>
            <category>IDC</category>
            <category>migrating applications</category>
            <category>multi-cloud</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/audio/podcast/49721659-2-audio.mp3" type="audio/mp3" length="10731510"/>
            <title>Movin' On Up to the Cloud: How to Migrate your Application Connectivity</title>
            <link>http://video.algosec.com/movin-on-up-to-the-cloud-how-to</link>
            <description>&lt;p&gt;&lt;span&gt;&lt;b&gt;Avivi Siman-Tov, Product Manager |&lt;/b&gt; Feb 6 2018&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;br&gt;&lt;/span&gt;Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.&lt;br&gt;&lt;br&gt;If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.&amp;nbsp;&lt;br&gt;&lt;br&gt;Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, explores how to simplify and accelerate large-scale complex application migration projects, while making security a priority.&amp;nbsp;&lt;br&gt;&lt;br&gt;Discover best practices to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Automatically discover applications and their existing connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups&amp;nbsp;&lt;/li&gt;&lt;li&gt;Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Assess the risk and ensure compliance throughout the migration process&amp;nbsp;&lt;/li&gt;&lt;li&gt;Deliver unified security policy management across the hybrid enterprise cloud environment&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/movin-on-up-to-the-cloud-how-to"&gt;&lt;img src="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49721659</guid>
            <pubDate>Wed, 20 Mar 2019 10:53:55 GMT</pubDate>
            <media:title>Movin' On Up to the Cloud: How to Migrate your Application Connectivity</media:title>
            <media:description type="html">&lt;p&gt;&lt;span&gt;&lt;b&gt;Avivi Siman-Tov, Product Manager |&lt;/b&gt; Feb 6 2018&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;br&gt;&lt;/span&gt;Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.&lt;br&gt;&lt;br&gt;If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.&amp;nbsp;&lt;br&gt;&lt;br&gt;Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, explores how to simplify and accelerate large-scale complex application migration projects, while making security a priority.&amp;nbsp;&lt;br&gt;&lt;br&gt;Discover best practices to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Automatically discover applications and their existing connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups&amp;nbsp;&lt;/li&gt;&lt;li&gt;Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Assess the risk and ensure compliance throughout the migration process&amp;nbsp;&lt;/li&gt;&lt;li&gt;Deliver unified security policy management across the hybrid enterprise cloud environment&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/movin-on-up-to-the-cloud-how-to"&gt;&lt;img src="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b7638ecd622bb415d654ed299e5208b2&amp;source=podcast&amp;photo%5fid=49721659" width="625" height="352" type="text/html" medium="video" duration="1788" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>application discovery</category>
            <category>cloudsecurity</category>
            <category>Firewall Management</category>
            <category>hybrid</category>
            <category>migrating applications</category>
            <category>networksecurity</category>
            <category>network security</category>
            <category>risk assessment</category>
            <category>Security Policy</category>
        </item>
    </channel>
</rss>
