<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/podcast/tag/firewalls"/>
        <atom:link rel="next" href="https://video.algosec.com/podcast/tag/firewalls?tag=firewalls&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/64968570/88428609/03cf2d77aa4060500bbe2d2df6a0b7cc/video_medium/case-study-overcoming-firewall-video.mp4?source=podcast" type="video/mp4" length="22236581"/>
            <title>Case Study - Overcoming firewall rule recertification challenges with Kyle...</title>
            <link>http://video.algosec.com/case-study-overcoming-firewall</link>
            <description>&lt;p&gt;Learn about the best practices and strategies employed by a successful organization to streamline recertification processes, enhance security, and maintain compliance.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/case-study-overcoming-firewall"&gt;&lt;img src="http://video.algosec.com/64968570/88428609/03cf2d77aa4060500bbe2d2df6a0b7cc/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/88428609</guid>
            <pubDate>Thu, 07 Sep 2023 14:11:03 GMT</pubDate>
            <media:title>Case Study - Overcoming firewall rule recertification challenges with Kyle...</media:title>
            <media:description type="html">&lt;p&gt;Learn about the best practices and strategies employed by a successful organization to streamline recertification processes, enhance security, and maintain compliance.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/case-study-overcoming-firewall"&gt;&lt;img src="http://video.algosec.com/64968570/88428609/03cf2d77aa4060500bbe2d2df6a0b7cc/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=03cf2d77aa4060500bbe2d2df6a0b7cc&amp;source=podcast&amp;photo%5fid=88428609" width="625" height="352" type="text/html" medium="video" duration="261" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968570/88428609/03cf2d77aa4060500bbe2d2df6a0b7cc/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>firewalls</category>
            <category>rule recertification</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/video_medium/simplifying-firewall-audits-and-video.mp4?source=podcast" type="video/mp4" length="5045870"/>
            <title>Simplifying Firewall Audits and Demonstrating Compliance</title>
            <link>http://video.algosec.com/simplifying-firewall-audits-and</link>
            <description>&lt;p&gt;AlgoSec Firewall Analyzer delivers out-of-the-box compliance reports for the widest range of industry standards including PCI-DSS, ISO 27001, Sarbanes Oxley and more. These reports help you dramatically reduce the time and effort required to prepare for audits - by as much as 80%.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/simplifying-firewall-audits-and"&gt;&lt;img src="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182646</guid>
            <pubDate>Tue, 22 Mar 2022 11:15:34 GMT</pubDate>
            <media:title>Simplifying Firewall Audits and Demonstrating Compliance</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec Firewall Analyzer delivers out-of-the-box compliance reports for the widest range of industry standards including PCI-DSS, ISO 27001, Sarbanes Oxley and more. These reports help you dramatically reduce the time and effort required to prepare for audits - by as much as 80%.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/simplifying-firewall-audits-and"&gt;&lt;img src="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7288f88413432a2d88381591c13209ee&amp;source=podcast&amp;photo%5fid=44182646" width="625" height="352" type="text/html" medium="video" duration="124" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>Firewall analyzer</category>
            <category>firewall audit</category>
            <category>firewall compliance</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>ISO 27001</category>
            <category>IT audit</category>
            <category>PCI</category>
            <category>PCI audit</category>
            <category>PCI compliance</category>
            <category>PCI-DSS</category>
            <category>Sarbanes-Oxley compliance</category>
            <category>security audit</category>
            <category>Security Policy</category>
            <category>SOX</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543316/58920293/0d8ffa607b30b177ef077eed481124ec/video_medium/5-ways-algosec-enhances-your-f5-video.mp4?source=podcast" type="video/mp4" length="2271343"/>
            <title>5 ways AlgoSec enhances your F5 Security Posture Management</title>
            <link>http://video.algosec.com/5-ways-algosec-enhances-your-f5</link>
            <description>&lt;p&gt;Discover the benefits of integrating AlgoSec with your entire security infrastructure including F5 Advanced Firewall Manager (AFM) &amp;amp; Local Traffic Manager (LTM).&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-ways-algosec-enhances-your-f5"&gt;&lt;img src="http://video.algosec.com/49543316/58920293/0d8ffa607b30b177ef077eed481124ec/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/58920293</guid>
            <pubDate>Mon, 03 Jan 2022 17:11:50 GMT</pubDate>
            <media:title>5 ways AlgoSec enhances your F5 Security Posture Management</media:title>
            <media:description type="html">&lt;p&gt;Discover the benefits of integrating AlgoSec with your entire security infrastructure including F5 Advanced Firewall Manager (AFM) &amp;amp; Local Traffic Manager (LTM).&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-ways-algosec-enhances-your-f5"&gt;&lt;img src="http://video.algosec.com/49543316/58920293/0d8ffa607b30b177ef077eed481124ec/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0d8ffa607b30b177ef077eed481124ec&amp;source=podcast&amp;photo%5fid=58920293" width="625" height="469" type="text/html" medium="video" duration="77" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543316/58920293/0d8ffa607b30b177ef077eed481124ec/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>f5 networks</category>
            <category>Firewalls</category>
            <category>Network Security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/video_medium/top-5-predictions-best-practices-video.mp4?source=podcast" type="video/mp4" length="46819234"/>
            <title>Top 5 Predictions &amp; Best Practices for 2022</title>
            <link>http://video.algosec.com/top-5-predictions-best-practices</link>
            <description>&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/72839921</guid>
            <pubDate>Tue, 21 Dec 2021 14:09:54 GMT</pubDate>
            <media:title>Top 5 Predictions &amp; Best Practices for 2022</media:title>
            <media:description type="html">&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7644f86b455465ff65ca0eb3f8bfa109&amp;source=podcast&amp;photo%5fid=72839921" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>microsegmentation</category>
            <category>network security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/video_medium/gain-control-of-your-network-video.mp4?source=podcast" type="video/mp4" length="43586546"/>
            <title>Gain control of your network security with complete visibility: An AlgoSec...</title>
            <link>http://video.algosec.com/gain-control-of-your-network</link>
            <description>&lt;p&gt;In this technical demo of the AlgoSec Security Management Solution, we will show you how network security visibility is an important part of your security arsenal.
&lt;p&gt;Join the session and discover how to:&lt;br&gt;
   •	Gain visibility of your multi-vendor devices and traffic flows throughout your entire network – on-premises and in the cloud.&lt;br&gt;
   •	Ensure continuous compliance and reduce the effort needed to prepare for audits with out-of-the-box regulatory compliance reports.&lt;br&gt;
   •	Visualize and map firewall rulesets.&lt;br&gt;
   •	Identify and mitigate risky rules and provide intelligent recommendations to remediate the risks.&lt;/p&gt;
&lt;p&gt;Gain control of your network security policies with complete visibility.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/gain-control-of-your-network"&gt;&lt;img src="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/standard/download-9-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/62192775</guid>
            <pubDate>Thu, 29 Jul 2021 12:53:13 GMT</pubDate>
            <media:title>Gain control of your network security with complete visibility: An AlgoSec...</media:title>
            <media:description type="html">&lt;p&gt;In this technical demo of the AlgoSec Security Management Solution, we will show you how network security visibility is an important part of your security arsenal.
&lt;p&gt;Join the session and discover how to:&lt;br&gt;
   •	Gain visibility of your multi-vendor devices and traffic flows throughout your entire network – on-premises and in the cloud.&lt;br&gt;
   •	Ensure continuous compliance and reduce the effort needed to prepare for audits with out-of-the-box regulatory compliance reports.&lt;br&gt;
   •	Visualize and map firewall rulesets.&lt;br&gt;
   •	Identify and mitigate risky rules and provide intelligent recommendations to remediate the risks.&lt;/p&gt;
&lt;p&gt;Gain control of your network security policies with complete visibility.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/gain-control-of-your-network"&gt;&lt;img src="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/standard/download-9-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2c40c999839ca34d57f5f7e7edfcdbb7&amp;source=podcast&amp;photo%5fid=62192775" width="625" height="352" type="text/html" medium="video" duration="1993" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/standard/download-9-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>Live Demo Webcast</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182880/25bb94d15fdd364530a2f0dfa6d23057/video_medium/algosecs-baseline-compliance-1-video.mp4?source=podcast" type="video/mp4" length="4897138"/>
            <title>AlgoSec's Baseline Compliance Capability</title>
            <link>http://video.algosec.com/algosecs-baseline-compliance-1</link>
            <description>&lt;p&gt;AlgoSec Firewall Analyzer allows security teams to easily and efficiently define baseline hardware and software configurations to which devices must adhere, and generates reports to identify devices that do not comply with the corporate baseline, minimizing system risks.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosecs-baseline-compliance-1"&gt;&lt;img src="http://video.algosec.com/16107557/44182880/25bb94d15fdd364530a2f0dfa6d23057/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182880</guid>
            <pubDate>Thu, 29 Jul 2021 09:50:35 GMT</pubDate>
            <media:title>AlgoSec's Baseline Compliance Capability</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec Firewall Analyzer allows security teams to easily and efficiently define baseline hardware and software configurations to which devices must adhere, and generates reports to identify devices that do not comply with the corporate baseline, minimizing system risks.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosecs-baseline-compliance-1"&gt;&lt;img src="http://video.algosec.com/16107557/44182880/25bb94d15fdd364530a2f0dfa6d23057/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=25bb94d15fdd364530a2f0dfa6d23057&amp;source=podcast&amp;photo%5fid=44182880" width="625" height="352" type="text/html" medium="video" duration="128" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182880/25bb94d15fdd364530a2f0dfa6d23057/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>baseline compliance</category>
            <category>configurations</category>
            <category>corporate policy</category>
            <category>device configurations</category>
            <category>firewalls</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968556/65813899/417596c67ace9ab1c01d473b2d959d3f/video_medium/algosec-security-management-suite-11-video.mp4?source=podcast" type="video/mp4" length="31082766"/>
            <title>AlgoSec Security Management Suite Demo</title>
            <link>http://video.algosec.com/algosec-security-management-suite-11</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Dive deep into this demonstration of the
AlgoSec Security Management Suite.&lt;/p&gt;

&lt;p&gt;See how Firewall Analyzer provides
visibility into your network, visualize applications with AppViz, visualize
automatic network change management with FireFlow and see how you can even make
changes at the business application level with AppChange.&lt;/p&gt;&lt;span&gt;Click
here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/span&gt;&lt;br&gt;&lt;p&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-security-management-suite-11"&gt;&lt;img src="http://video.algosec.com/64968556/65813899/417596c67ace9ab1c01d473b2d959d3f/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/65813899</guid>
            <pubDate>Tue, 01 Jun 2021 16:35:18 GMT</pubDate>
            <media:title>AlgoSec Security Management Suite Demo</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Dive deep into this demonstration of the
AlgoSec Security Management Suite.&lt;/p&gt;

&lt;p&gt;See how Firewall Analyzer provides
visibility into your network, visualize applications with AppViz, visualize
automatic network change management with FireFlow and see how you can even make
changes at the business application level with AppChange.&lt;/p&gt;&lt;span&gt;Click
here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/span&gt;&lt;br&gt;&lt;p&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-security-management-suite-11"&gt;&lt;img src="http://video.algosec.com/64968556/65813899/417596c67ace9ab1c01d473b2d959d3f/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=417596c67ace9ab1c01d473b2d959d3f&amp;source=podcast&amp;photo%5fid=65813899" width="625" height="352" type="text/html" medium="video" duration="1323" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968556/65813899/417596c67ace9ab1c01d473b2d959d3f/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>fireflow</category>
            <category>firewalls</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/video_medium/panel-discussion-network-security-1-video.mp4?source=podcast" type="video/mp4" length="75817726"/>
            <title>Panel Discussion: Network Security and Compliance best practices for...</title>
            <link>http://video.algosec.com/panel-discussion-network-security-1</link>
            <description>&lt;p&gt;Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy&lt;br /&gt;
management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.&lt;/p&gt;
&lt;p&gt;There’s a better way to manage your network security!&lt;/p&gt;
&lt;p&gt;Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.&lt;/p&gt;
&lt;p&gt;Topics include:&lt;/p&gt;
&lt;p&gt;• How to overcome security management complexities with automation&lt;br /&gt;
• How to pass compliance audits in the face of demanding regulations&lt;br /&gt;
• Key industry metrics that compare security environments within and beyond the finance industry&lt;br /&gt;
• Real financial customers case studies&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/panel-discussion-network-security-1"&gt;&lt;img src="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44415276</guid>
            <pubDate>Tue, 15 Sep 2020 20:06:08 GMT</pubDate>
            <media:title>Panel Discussion: Network Security and Compliance best practices for...</media:title>
            <media:description type="html">&lt;p&gt;Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy&lt;br /&gt;
management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.&lt;/p&gt;
&lt;p&gt;There’s a better way to manage your network security!&lt;/p&gt;
&lt;p&gt;Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.&lt;/p&gt;
&lt;p&gt;Topics include:&lt;/p&gt;
&lt;p&gt;• How to overcome security management complexities with automation&lt;br /&gt;
• How to pass compliance audits in the face of demanding regulations&lt;br /&gt;
• Key industry metrics that compare security environments within and beyond the finance industry&lt;br /&gt;
• Real financial customers case studies&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/panel-discussion-network-security-1"&gt;&lt;img src="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=24cb2f0d85632231cc3bd811592c9758&amp;source=podcast&amp;photo%5fid=44415276" width="625" height="352" type="text/html" medium="video" duration="1355" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>audit</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>fintech</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>firewalls management</category>
            <category>network security</category>
            <category>network security policy management</category>
            <category>security analysis</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445188/63639881/83420651de6c2dcd33dcc19080a18b2d/video_medium/policy-portability-with-algosec-video.mp4?source=podcast" type="video/mp4" length="4552544"/>
            <title>Policy Portability with AlgoSec – Enabling Migration Into CISCO ACI</title>
            <link>http://video.algosec.com/policy-portability-with-algosec</link>
            <description>&lt;p&gt;Policy Portability with AlgoSec – Enabling Migration Into CISCO ACI&lt;br /&gt;
&lt;a href="https://www.algosec.com/"&gt;https://www.algosec.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/policy-portability-with-algosec"&gt;&lt;img src="http://video.algosec.com/60445188/63639881/83420651de6c2dcd33dcc19080a18b2d/standard/download-3-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63639881</guid>
            <pubDate>Tue, 07 Jul 2020 14:14:18 GMT</pubDate>
            <media:title>Policy Portability with AlgoSec – Enabling Migration Into CISCO ACI</media:title>
            <media:description type="html">&lt;p&gt;Policy Portability with AlgoSec – Enabling Migration Into CISCO ACI&lt;br /&gt;
&lt;a href="https://www.algosec.com/"&gt;https://www.algosec.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/policy-portability-with-algosec"&gt;&lt;img src="http://video.algosec.com/60445188/63639881/83420651de6c2dcd33dcc19080a18b2d/standard/download-3-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=83420651de6c2dcd33dcc19080a18b2d&amp;source=podcast&amp;photo%5fid=63639881" width="625" height="352" type="text/html" medium="video" duration="200" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445188/63639881/83420651de6c2dcd33dcc19080a18b2d/standard/download-3-thumbnail.jpg" width="75" height=""/>
            <category>cisco</category>
            <category>Firewall Migration</category>
            <category>Firewalls</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/video_medium/application-segmentation-with-cisco-video.mp4?source=podcast" type="video/mp4" length="6735850"/>
            <title>Application Segmentation with Cisco Tetration &amp; AlgoSec</title>
            <link>http://video.algosec.com/application-segmentation-with-cisco</link>
            <description>&lt;p&gt;Application Segmentation with Cisco Tetration &amp;amp; AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-segmentation-with-cisco"&gt;&lt;img src="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63637257</guid>
            <pubDate>Tue, 07 Jul 2020 09:55:35 GMT</pubDate>
            <media:title>Application Segmentation with Cisco Tetration &amp; AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;Application Segmentation with Cisco Tetration &amp;amp; AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-segmentation-with-cisco"&gt;&lt;img src="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7416aee44192b09118730b3bc4cbe9b2&amp;source=podcast&amp;photo%5fid=63637257" width="625" height="352" type="text/html" medium="video" duration="300" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Cisco</category>
            <category>Firewall Migration</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Network Segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/video_medium/achieving-intent-based-network-video.mp4?source=podcast" type="video/mp4" length="61107497"/>
            <title>"Achieving intent-based network security across your hybrid network" with...</title>
            <link>http://video.algosec.com/achieving-intent-based-network</link>
            <description>&lt;p&gt;Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-intent-based-network"&gt;&lt;img src="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63415237</guid>
            <pubDate>Wed, 24 Jun 2020 16:49:12 GMT</pubDate>
            <media:title>"Achieving intent-based network security across your hybrid network" with...</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-intent-based-network"&gt;&lt;img src="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d40d0b761aa9153a987b2dffb6cc5060&amp;source=podcast&amp;photo%5fid=63415237" width="625" height="352" type="text/html" medium="video" duration="1824" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cyber Attacks &amp; Incident Response</category>
            <category>events</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Network Segmentation</category>
            <category>Privacy and Security</category>
            <category>prof wool</category>
            <category>Risk Management and Vulnerabilities</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/video_medium/policy-optimization-1-video.mp4?source=podcast" type="video/mp4" length="4940058"/>
            <title>Policy Optimization</title>
            <link>http://video.algosec.com/policy-optimization-1</link>
            <description>&lt;p&gt;Learn how to clean up and optimize your firewall policies with the AlgoSec solution&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/policy-optimization-1"&gt;&lt;img src="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63393273</guid>
            <pubDate>Mon, 22 Jun 2020 11:01:54 GMT</pubDate>
            <media:title>Policy Optimization</media:title>
            <media:description type="html">&lt;p&gt;Learn how to clean up and optimize your firewall policies with the AlgoSec solution&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/policy-optimization-1"&gt;&lt;img src="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4585141ecbda5b81d608818932b27fba&amp;source=podcast&amp;photo%5fid=63393273" width="625" height="352" type="text/html" medium="video" duration="148" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/video_medium/cessation-of-misconfigurations-1-video.mp4?source=podcast" type="video/mp4" length="149127110"/>
            <title>Cessation of Misconfigurations: Common Network Misconfiguration Risks &amp; How...</title>
            <link>http://video.algosec.com/cessation-of-misconfigurations-1</link>
            <description>&lt;p&gt;&lt;p&gt;Misconfigurations aren’t simply inconvenient mistakes but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s list of Top 10 most critical web application security risks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your audits, and cause costly outages that bring your business to a standstill.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, AlgoSec’s Director of Product, will show examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Watch the webinar to learn how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Understand and map your entire network before you make a change&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole and understand the impact of changes to your entire network&amp;nbsp;&lt;/li&gt;&lt;li&gt;Maximize the capabilities of network management automation to avoid common misconfigurations&amp;nbsp;&lt;/li&gt;&lt;li&gt;Avoid common mistakes when making changes to your network security devices&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cessation-of-misconfigurations-1"&gt;&lt;img src="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/60676810</guid>
            <pubDate>Tue, 02 Jun 2020 12:06:41 GMT</pubDate>
            <media:title>Cessation of Misconfigurations: Common Network Misconfiguration Risks &amp; How...</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Misconfigurations aren’t simply inconvenient mistakes but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s list of Top 10 most critical web application security risks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your audits, and cause costly outages that bring your business to a standstill.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, AlgoSec’s Director of Product, will show examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Watch the webinar to learn how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Understand and map your entire network before you make a change&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole and understand the impact of changes to your entire network&amp;nbsp;&lt;/li&gt;&lt;li&gt;Maximize the capabilities of network management automation to avoid common misconfigurations&amp;nbsp;&lt;/li&gt;&lt;li&gt;Avoid common mistakes when making changes to your network security devices&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cessation-of-misconfigurations-1"&gt;&lt;img src="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b0ba8b0b18dbf77de55c855b87c4177d&amp;source=podcast&amp;photo%5fid=60676810" width="625" height="352" type="text/html" medium="video" duration="1940" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/video_medium/reece-group-empowers-business-and-video.mp4?source=podcast" type="video/mp4" length="14692444"/>
            <title>Reece Group empowers business and IT teams with ChatOps – Case Study</title>
            <link>http://video.algosec.com/reece-group-empowers-business-and</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;Reece Group, the leading Australian plumbing and HVAC company,
was able to empower their application developers, get faster response time,
reduce risks and increase compliance and more. Watch the video case study to
find out more or read the
full case study &lt;a href="https://www.algosec.com/customer-success-stories/reece-group/"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;h1&gt;&lt;br&gt;&lt;/h1&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/reece-group-empowers-business-and"&gt;&lt;img src="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/standard/download-12-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61427218</guid>
            <pubDate>Mon, 25 May 2020 14:07:56 GMT</pubDate>
            <media:title>Reece Group empowers business and IT teams with ChatOps – Case Study</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;Reece Group, the leading Australian plumbing and HVAC company,
was able to empower their application developers, get faster response time,
reduce risks and increase compliance and more. Watch the video case study to
find out more or read the
full case study &lt;a href="https://www.algosec.com/customer-success-stories/reece-group/"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;h1&gt;&lt;br&gt;&lt;/h1&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/reece-group-empowers-business-and"&gt;&lt;img src="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/standard/download-12-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2122be8cdfeb52fd29c13de0f710bb86&amp;source=podcast&amp;photo%5fid=61427218" width="625" height="352" type="text/html" medium="video" duration="276" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/standard/download-12-thumbnail.jpg" width="600" height="338"/>
            <category>case study</category>
            <category>chatops</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>Interview</category>
            <category>network security</category>
            <category>success story</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/62300594/43b974bbc9790e02f625457a1647eef7/video_medium/rule-recertification-video.mp4?source=podcast" type="video/mp4" length="8870356"/>
            <title>Rule Recertification</title>
            <link>http://video.algosec.com/rule-recertification</link>
            <description>&lt;p&gt;In this video you’ll learn how AlgoSec enables to efficiently and effectively manage the firewall rule recertification process through an application-centric approach. Following this approach, organizations must first identify all relevant business applications each rule supports, enabling you to review the firewall rules quickly and easily. If an application still exists and has not been modified, its rules still apply and can be recertified. If, however, the application no longer exists, the firewall rules should be removed.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/rule-recertification"&gt;&lt;img src="http://video.algosec.com/60650861/62300594/43b974bbc9790e02f625457a1647eef7/standard/download-2-thumbnail.jpg" width="600" height="288"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/62300594</guid>
            <pubDate>Mon, 20 Apr 2020 01:07:16 GMT</pubDate>
            <media:title>Rule Recertification</media:title>
            <media:description type="html">&lt;p&gt;In this video you’ll learn how AlgoSec enables to efficiently and effectively manage the firewall rule recertification process through an application-centric approach. Following this approach, organizations must first identify all relevant business applications each rule supports, enabling you to review the firewall rules quickly and easily. If an application still exists and has not been modified, its rules still apply and can be recertified. If, however, the application no longer exists, the firewall rules should be removed.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/rule-recertification"&gt;&lt;img src="http://video.algosec.com/60650861/62300594/43b974bbc9790e02f625457a1647eef7/standard/download-2-thumbnail.jpg" width="600" height="288"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=43b974bbc9790e02f625457a1647eef7&amp;source=podcast&amp;photo%5fid=62300594" width="625" height="300" type="text/html" medium="video" duration="384" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/62300594/43b974bbc9790e02f625457a1647eef7/standard/download-2-thumbnail.jpg" width="600" height="288"/>
            <category>application connectivity</category>
            <category>appviz</category>
            <category>Firewalls</category>
            <category>rule recertification</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445028/62300494/53fd81792673d8c37f76c8b11c541c72/video_medium/algosec-appviz-rule-video.mp4?source=podcast" type="video/mp4" length="8298903"/>
            <title>AlgoSec AppViz – Rule Recertification</title>
            <link>http://video.algosec.com/algosec-appviz-rule</link>
            <description>&lt;p&gt;In this video you’ll learn how AlgoSec enables to efficiently and effectively manage the firewall rule recertification process through an application-centric approach. Following this approach, organizations must first identify all relevant business applications each rule supports, enabling you to review the firewall rules quickly and easily. If an application still exists and has not been modified, its rules still apply and can be recertified. If, however, the application no longer exists, the firewall rules should be removed.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-appviz-rule"&gt;&lt;img src="http://video.algosec.com/60445028/62300494/53fd81792673d8c37f76c8b11c541c72/standard/download-26-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/62300494</guid>
            <pubDate>Mon, 20 Apr 2020 01:00:04 GMT</pubDate>
            <media:title>AlgoSec AppViz – Rule Recertification</media:title>
            <media:description type="html">&lt;p&gt;In this video you’ll learn how AlgoSec enables to efficiently and effectively manage the firewall rule recertification process through an application-centric approach. Following this approach, organizations must first identify all relevant business applications each rule supports, enabling you to review the firewall rules quickly and easily. If an application still exists and has not been modified, its rules still apply and can be recertified. If, however, the application no longer exists, the firewall rules should be removed.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-appviz-rule"&gt;&lt;img src="http://video.algosec.com/60445028/62300494/53fd81792673d8c37f76c8b11c541c72/standard/download-26-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=53fd81792673d8c37f76c8b11c541c72&amp;source=podcast&amp;photo%5fid=62300494" width="625" height="352" type="text/html" medium="video" duration="212" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445028/62300494/53fd81792673d8c37f76c8b11c541c72/standard/download-26-thumbnail.jpg" width="75" height=""/>
            <category>appviz</category>
            <category>Firewalls</category>
            <category>rule recertification</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/video_medium/optimize-your-juniper-investment-video.mp4?source=podcast" type="video/mp4" length="37937596"/>
            <title>Optimize your Juniper Investment with Intelligent Network Security Automation</title>
            <link>http://video.algosec.com/optimize-your-juniper-investment</link>
            <description>&lt;p&gt;Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/optimize-your-juniper-investment"&gt;&lt;img src="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61650270</guid>
            <pubDate>Wed, 25 Mar 2020 19:30:22 GMT</pubDate>
            <media:title>Optimize your Juniper Investment with Intelligent Network Security Automation</media:title>
            <media:description type="html">&lt;p&gt;Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/optimize-your-juniper-investment"&gt;&lt;img src="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d6c3dac069cd3e89e381907d0133d8cb&amp;source=podcast&amp;photo%5fid=61650270" width="625" height="352" type="text/html" medium="video" duration="1889" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>cloud security</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>juniper</category>
            <category>Network Security</category>
            <category>Network Security Automation</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/video_medium/network-security-vision-with-video.mp4?source=podcast" type="video/mp4" length="66340639"/>
            <title>Network Security Vision with Application Visibility | Live discussion and demo</title>
            <link>http://video.algosec.com/network-security-vision-with</link>
            <description>&lt;p&gt;Avishai Wool, CTO &amp; Co-founder (AlgoSec) &amp; Yoni Geva, Product Manager (AlgoSec) | March 5, 2020&lt;/p&gt;
&lt;p&gt;You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.&lt;/p&gt;
&lt;p&gt;But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?&lt;/p&gt;
&lt;p&gt;Stop running blind. Expand your vision with application visibility.&lt;/p&gt;
&lt;p&gt;With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.&lt;/p&gt;
&lt;p&gt;In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate – in a live demo - how to overcome these challenges and ensure business continuity through application visibility.&lt;/p&gt;
&lt;p&gt;Join the webinar and learn how to:&lt;br /&gt;
• Associate your business applications with your security policy rules.&lt;br /&gt;
• Identify the network traffic relevant for each application.&lt;br /&gt;
• Identify hidden risks and vulnerabilities in your applications.&lt;br /&gt;
• Associate compliance violations with the relevant business applications.&lt;br /&gt;
• Improve troubleshooting by identifying affected applications.&lt;br /&gt;
• Better document the applications on your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-vision-with"&gt;&lt;img src="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61248183</guid>
            <pubDate>Mon, 09 Mar 2020 15:53:57 GMT</pubDate>
            <media:title>Network Security Vision with Application Visibility | Live discussion and demo</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, CTO &amp; Co-founder (AlgoSec) &amp; Yoni Geva, Product Manager (AlgoSec) | March 5, 2020&lt;/p&gt;
&lt;p&gt;You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.&lt;/p&gt;
&lt;p&gt;But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?&lt;/p&gt;
&lt;p&gt;Stop running blind. Expand your vision with application visibility.&lt;/p&gt;
&lt;p&gt;With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.&lt;/p&gt;
&lt;p&gt;In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate – in a live demo - how to overcome these challenges and ensure business continuity through application visibility.&lt;/p&gt;
&lt;p&gt;Join the webinar and learn how to:&lt;br /&gt;
• Associate your business applications with your security policy rules.&lt;br /&gt;
• Identify the network traffic relevant for each application.&lt;br /&gt;
• Identify hidden risks and vulnerabilities in your applications.&lt;br /&gt;
• Associate compliance violations with the relevant business applications.&lt;br /&gt;
• Improve troubleshooting by identifying affected applications.&lt;br /&gt;
• Better document the applications on your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-vision-with"&gt;&lt;img src="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1337080fb3e4740271e01d66cc24acb6&amp;source=podcast&amp;photo%5fid=61248183" width="625" height="352" type="text/html" medium="video" duration="2991" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>application visibility</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/video_medium/5-dinge-von-denen-sie-sicherlich-video.mp4?source=podcast" type="video/mp4" length="66147965"/>
            <title>5 Dinge, von denen Sie sicherlich nicht gewusst haben, die Sie mit einer...</title>
            <link>http://video.algosec.com/5-dinge-von-denen-sie-sicherlich</link>
            <description>&lt;p&gt;Dietmar Wyhs, Regional Sales Manager DACH |  Oct 9 2017&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Die heutigen Unternehmen entwickeln sich kontinuierlich weiter, um neue Anwendungen, Transformationsinitiativen wie Cloud und SDN zu unterstützen und täglich neue und anspruchsvollere Cyber-Attacken abzuwehren. Aber die Sicherheits- und Netzwerk-Mitarbeiter haben Schwierigkeiten mitzuhalten. Dies wirkt sich nicht nur auf die Business-Agilität aus, sondern setzt Ihr Unternehmen Risiken aus und behindert dessen Fähigkeit, sich der modernen Bedrohungslandschaft zu stellen.&lt;/p&gt;
&lt;p&gt;Viele Fachleute sind der Meinung, dass sie die neuesten Anwendungen brauchen, um diese Herausforderungen zu bewältigen. Aber was, wenn Sie bereits haben, was Sie brauchen und diese Anwendung in Ihrem Unternehmen genutzt wird: Ihre Security Policy Management Lösung?&lt;/p&gt;
&lt;p&gt;Die heutigen Sicherheitsrichtlinien-Management-Lösungen machen weit mehr als die Automatisierung von traditionellen Änderungsmanagement Aufgaben. In diesem technischen Webinar zeigt Ihnen Dietmar Wyhs fünf wichtige Sicherheitsmanagement-Herausforderungen, denen Unternehmensorganisationen sich heutzutage stellen. Gleichzeitig erklärt er, wie die Lösung von AlgoSec Ihnen helfen kann, Sicherheitsbedrohungen zu bewältigen, Risiken zu verringern, und schnell auf Ausfällen zu reagieren, bei gleichzeitiger Maximierung der Geschäftsagibilität und Sicherstellung der Compliance in den unterschiedlichen, sich ständig verändernden Hybridnetzwerken.&lt;/p&gt;
&lt;p&gt;Dieses technische Webinar konzentriert sich auf:&lt;/p&gt;
&lt;p&gt;•Verwalten von Sicherheitsrichtlinien von End-to-End-Lösungen öffentlicher und privater Clouds einschließlich Microsoft Azure, Amazon Web Services AWS, Cisco ACI und VMWare NSX&lt;br&gt;
•Zuordnung von Sicherheitslücken zu Anwendungen, zur Bewertung und Priorisierung des Risikos&lt;br&gt;
•Möglichkeit Cyber-Attacken mit Geschäftsprozesse zu korrelieren&lt;br&gt;
•Migration von Firewall-Richtlinien zwischen Firewall-Herstellern&lt;br&gt;
•Durchführung einer vollautomatischen, Zero-Touch-Sicherheitsregelwerksänderung&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-dinge-von-denen-sie-sicherlich"&gt;&lt;img src="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61166183</guid>
            <pubDate>Thu, 05 Mar 2020 14:08:47 GMT</pubDate>
            <media:title>5 Dinge, von denen Sie sicherlich nicht gewusst haben, die Sie mit einer...</media:title>
            <media:description type="html">&lt;p&gt;Dietmar Wyhs, Regional Sales Manager DACH |  Oct 9 2017&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Die heutigen Unternehmen entwickeln sich kontinuierlich weiter, um neue Anwendungen, Transformationsinitiativen wie Cloud und SDN zu unterstützen und täglich neue und anspruchsvollere Cyber-Attacken abzuwehren. Aber die Sicherheits- und Netzwerk-Mitarbeiter haben Schwierigkeiten mitzuhalten. Dies wirkt sich nicht nur auf die Business-Agilität aus, sondern setzt Ihr Unternehmen Risiken aus und behindert dessen Fähigkeit, sich der modernen Bedrohungslandschaft zu stellen.&lt;/p&gt;
&lt;p&gt;Viele Fachleute sind der Meinung, dass sie die neuesten Anwendungen brauchen, um diese Herausforderungen zu bewältigen. Aber was, wenn Sie bereits haben, was Sie brauchen und diese Anwendung in Ihrem Unternehmen genutzt wird: Ihre Security Policy Management Lösung?&lt;/p&gt;
&lt;p&gt;Die heutigen Sicherheitsrichtlinien-Management-Lösungen machen weit mehr als die Automatisierung von traditionellen Änderungsmanagement Aufgaben. In diesem technischen Webinar zeigt Ihnen Dietmar Wyhs fünf wichtige Sicherheitsmanagement-Herausforderungen, denen Unternehmensorganisationen sich heutzutage stellen. Gleichzeitig erklärt er, wie die Lösung von AlgoSec Ihnen helfen kann, Sicherheitsbedrohungen zu bewältigen, Risiken zu verringern, und schnell auf Ausfällen zu reagieren, bei gleichzeitiger Maximierung der Geschäftsagibilität und Sicherstellung der Compliance in den unterschiedlichen, sich ständig verändernden Hybridnetzwerken.&lt;/p&gt;
&lt;p&gt;Dieses technische Webinar konzentriert sich auf:&lt;/p&gt;
&lt;p&gt;•Verwalten von Sicherheitsrichtlinien von End-to-End-Lösungen öffentlicher und privater Clouds einschließlich Microsoft Azure, Amazon Web Services AWS, Cisco ACI und VMWare NSX&lt;br&gt;
•Zuordnung von Sicherheitslücken zu Anwendungen, zur Bewertung und Priorisierung des Risikos&lt;br&gt;
•Möglichkeit Cyber-Attacken mit Geschäftsprozesse zu korrelieren&lt;br&gt;
•Migration von Firewall-Richtlinien zwischen Firewall-Herstellern&lt;br&gt;
•Durchführung einer vollautomatischen, Zero-Touch-Sicherheitsregelwerksänderung&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-dinge-von-denen-sie-sicherlich"&gt;&lt;img src="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=242de32ae12a997510189ac9d08bc971&amp;source=podcast&amp;photo%5fid=61166183" width="625" height="352" type="text/html" medium="video" duration="2068" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/video_medium/couchtalk-cisco-aci-and-algosec-video.mp4?source=podcast" type="video/mp4" length="53649200"/>
            <title>CouchTalk: Cisco ACI and AlgoSec – Visibility and Automation</title>
            <link>http://video.algosec.com/couchtalk-cisco-aci-and-algosec</link>
            <description>&lt;p&gt;Kyle Wickert, Worldwide Solution Architect, and Yitzy Tannenbaum, Product Marketing Manager, discuss security policy change management throughout your Cisco and hybrid environment.&amp;nbsp;&lt;br&gt;&lt;br&gt;AlgoSec provides visibility and automation into Cisco ACI, enables intent-based networking with Cisco Tetration, and manages and automates Cisco firewalls&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/couchtalk-cisco-aci-and-algosec"&gt;&lt;img src="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61138007</guid>
            <pubDate>Wed, 04 Mar 2020 14:51:39 GMT</pubDate>
            <media:title>CouchTalk: Cisco ACI and AlgoSec – Visibility and Automation</media:title>
            <media:description type="html">&lt;p&gt;Kyle Wickert, Worldwide Solution Architect, and Yitzy Tannenbaum, Product Marketing Manager, discuss security policy change management throughout your Cisco and hybrid environment.&amp;nbsp;&lt;br&gt;&lt;br&gt;AlgoSec provides visibility and automation into Cisco ACI, enables intent-based networking with Cisco Tetration, and manages and automates Cisco firewalls&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/couchtalk-cisco-aci-and-algosec"&gt;&lt;img src="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=57a06fc9e928eb2ba7b9e17f95f3aa86&amp;source=podcast&amp;photo%5fid=61138007" width="625" height="352" type="text/html" medium="video" duration="456" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>couchtalks</category>
            <category>Firewalls</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>SDN</category>
            <category>security policy</category>
            <category>software defined networking</category>
            <category>VMware NSX</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543327/57181222/bcc926c39ddfdc95bb0c18d5c31b98b5/video_medium/stop-putting-out-fires-pass-network-1-video.mp4?source=podcast" type="video/mp4" length="75780022"/>
            <title>Stop putting out fires. Pass network security audits – every time</title>
            <link>http://video.algosec.com/stop-putting-out-fires-pass-network-1</link>
            <description>&lt;p&gt;&lt;p&gt;Compliance with network and data security regulations and internal standards is vital and mission-critical. But with increasing global regulations and network complexities, it’s harder than ever to keep up.  &lt;br&gt;&lt;br&gt;Firewall management and network security policies are critical components in achieving compliance. Firewall audits are complex and demanding and documentation of current rules is lacking. There’s no time and resources to find, organize, and inspect all your firewall rules. Instead of being proactive and preventative, network security teams are constantly putting out fires.&lt;br&gt;&lt;br&gt;In this webinar, you will learn:&lt;br&gt;&lt;br&gt;   • The golden rules for passing a network security audit&lt;br&gt;   • Best practices to maintain continuous compliance&lt;br&gt;   • How to conduct a risk assessment and fix issues&lt;br&gt;&lt;br&gt;Learn how to prevent fires and pass network security audits every time.&lt;br&gt;&lt;br&gt;Tal Dayan, AlgoSec’s product manager, will reveal the Firewall Audit Checklist, the six best practices to ensure successful audits.&lt;br&gt;&lt;br&gt;By adopting these best practices, security teams will significantly improve their network’s security posture and reduce the pain of ensuring compliance with regulations, industry standards and corporate policies.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/stop-putting-out-fires-pass-network-1"&gt;&lt;img src="http://video.algosec.com/49543327/57181222/bcc926c39ddfdc95bb0c18d5c31b98b5/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/57181222</guid>
            <pubDate>Tue, 29 Oct 2019 17:37:31 GMT</pubDate>
            <media:title>Stop putting out fires. Pass network security audits – every time</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Compliance with network and data security regulations and internal standards is vital and mission-critical. But with increasing global regulations and network complexities, it’s harder than ever to keep up.  &lt;br&gt;&lt;br&gt;Firewall management and network security policies are critical components in achieving compliance. Firewall audits are complex and demanding and documentation of current rules is lacking. There’s no time and resources to find, organize, and inspect all your firewall rules. Instead of being proactive and preventative, network security teams are constantly putting out fires.&lt;br&gt;&lt;br&gt;In this webinar, you will learn:&lt;br&gt;&lt;br&gt;   • The golden rules for passing a network security audit&lt;br&gt;   • Best practices to maintain continuous compliance&lt;br&gt;   • How to conduct a risk assessment and fix issues&lt;br&gt;&lt;br&gt;Learn how to prevent fires and pass network security audits every time.&lt;br&gt;&lt;br&gt;Tal Dayan, AlgoSec’s product manager, will reveal the Firewall Audit Checklist, the six best practices to ensure successful audits.&lt;br&gt;&lt;br&gt;By adopting these best practices, security teams will significantly improve their network’s security posture and reduce the pain of ensuring compliance with regulations, industry standards and corporate policies.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/stop-putting-out-fires-pass-network-1"&gt;&lt;img src="http://video.algosec.com/49543327/57181222/bcc926c39ddfdc95bb0c18d5c31b98b5/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bcc926c39ddfdc95bb0c18d5c31b98b5&amp;source=podcast&amp;photo%5fid=57181222" width="625" height="352" type="text/html" medium="video" duration="2224" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543327/57181222/bcc926c39ddfdc95bb0c18d5c31b98b5/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>audit and compliance</category>
            <category>Firewall management</category>
            <category>Firewalls</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/video_medium/cisco-aci-hybrid-networks-breaking-video.mp4?source=podcast" type="video/mp4" length="103142794"/>
            <title>Cisco ACI &amp; Hybrid Networks Breaking Down Silos with Central Policy Management</title>
            <link>http://video.algosec.com/cisco-aci-hybrid-networks-breaking</link>
            <description>&lt;p&gt;&lt;b&gt;Yonatan Klein, Director of Product Management&lt;/b&gt; | July 30, 2019
&lt;p&gt;While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.&lt;/p&gt;
&lt;p&gt;Each part of your network estate is managed in its own independent silo instead of being holistically managed.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;He covers how to:&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/li&gt;&lt;li&gt;Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices&lt;/li&gt;&lt;li&gt;Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-hybrid-networks-breaking"&gt;&lt;img src="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54329483</guid>
            <pubDate>Tue, 30 Jul 2019 19:56:43 GMT</pubDate>
            <media:title>Cisco ACI &amp; Hybrid Networks Breaking Down Silos with Central Policy Management</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yonatan Klein, Director of Product Management&lt;/b&gt; | July 30, 2019
&lt;p&gt;While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.&lt;/p&gt;
&lt;p&gt;Each part of your network estate is managed in its own independent silo instead of being holistically managed.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;He covers how to:&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/li&gt;&lt;li&gt;Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices&lt;/li&gt;&lt;li&gt;Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-hybrid-networks-breaking"&gt;&lt;img src="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cb75f925661e325e6248fecc17f893d7&amp;source=podcast&amp;photo%5fid=54329483" width="625" height="352" type="text/html" medium="video" duration="3106" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cisco</category>
            <category>Cisco Tetration</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>hybrid environment</category>
            <category>network security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/video_medium/securely-managing-application-video.mp4?source=podcast" type="video/mp4" length="38613866"/>
            <title>Securely Managing Application Connectivity – Best Practices</title>
            <link>http://video.algosec.com/securely-managing-application</link>
            <description>&lt;p&gt;&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securely-managing-application"&gt;&lt;img src="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53083724</guid>
            <pubDate>Sun, 16 Jun 2019 11:42:42 GMT</pubDate>
            <media:title>Securely Managing Application Connectivity – Best Practices</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securely-managing-application"&gt;&lt;img src="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3a53e9daff9a2bc19930ddc029e874d9&amp;source=podcast&amp;photo%5fid=53083724" width="625" height="352" type="text/html" medium="video" duration="1111" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Application Security</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>cloud security</category>
            <category>Connectivity</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/video_medium/firewall-rule-recertification-with-video.mp4?source=podcast" type="video/mp4" length="74582768"/>
            <title>Firewall Rule Recertification with Application Connectivity</title>
            <link>http://video.algosec.com/firewall-rule-recertification-with</link>
            <description>&lt;p&gt;Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/firewall-rule-recertification-with"&gt;&lt;img src="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/51313899</guid>
            <pubDate>Mon, 29 Apr 2019 11:39:25 GMT</pubDate>
            <media:title>Firewall Rule Recertification with Application Connectivity</media:title>
            <media:description type="html">&lt;p&gt;Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/firewall-rule-recertification-with"&gt;&lt;img src="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=28b03ebf89a04b04bfe7ccebae9cb7f5&amp;source=podcast&amp;photo%5fid=51313899" width="625" height="352" type="text/html" medium="video" duration="1197" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/>
            <category> Compliance</category>
            <category> Connectivity</category>
            <category> Cyber Security</category>
            <category> firewall management</category>
            <category> firewall rule recertification</category>
            <category>Firewalls</category>
            <category> Network Security</category>
            <category> Security Management</category>
            <category> security policy</category>
            <category> security tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543326/49614976/bd1f9267d21e8da48f41902a69c86c6d/video_medium/from-antiquity-to-the-cloud-25-video.mp4?source=podcast" type="video/mp4" length="117033892"/>
            <title>From antiquity to the cloud: 25 years of firewalls and network filtering</title>
            <link>http://video.algosec.com/from-antiquity-to-the-cloud-25</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt;&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The first commercial firewall shipped in 1992. 25 years later the firewall is still the core building block of enterprises’ security infrastructures.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this educational webinar on the history of the firewall, Prof. Wool will take you through a riveting 25-year journey of the evolution of the firewall - from the ancient world of the host-based firewalls of the 90s, to today’s cloud-based firewalls, and will explain how each type of firewall works, its advantages and limitations, and provide some tips and best practices for effective network filtering.&lt;br&gt;&lt;br&gt;In this highly informational, and entertaining webinar Professor Wool will cover:&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The Early 90s: Host vs. Network&amp;nbsp;&lt;br&gt;Late 90s: Keeping State&amp;nbsp;&lt;br&gt;2003: Zone-Based firewalls&amp;nbsp;&lt;br&gt;2010: Next-Gen firewalls&amp;nbsp;&lt;br&gt;2015: Virtualized and cloud firewalls&lt;br&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/from-antiquity-to-the-cloud-25"&gt;&lt;img src="http://video.algosec.com/49543326/49614976/bd1f9267d21e8da48f41902a69c86c6d/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49614976</guid>
            <pubDate>Wed, 24 Apr 2019 09:37:26 GMT</pubDate>
            <media:title>From antiquity to the cloud: 25 years of firewalls and network filtering</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt;&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The first commercial firewall shipped in 1992. 25 years later the firewall is still the core building block of enterprises’ security infrastructures.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this educational webinar on the history of the firewall, Prof. Wool will take you through a riveting 25-year journey of the evolution of the firewall - from the ancient world of the host-based firewalls of the 90s, to today’s cloud-based firewalls, and will explain how each type of firewall works, its advantages and limitations, and provide some tips and best practices for effective network filtering.&lt;br&gt;&lt;br&gt;In this highly informational, and entertaining webinar Professor Wool will cover:&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The Early 90s: Host vs. Network&amp;nbsp;&lt;br&gt;Late 90s: Keeping State&amp;nbsp;&lt;br&gt;2003: Zone-Based firewalls&amp;nbsp;&lt;br&gt;2010: Next-Gen firewalls&amp;nbsp;&lt;br&gt;2015: Virtualized and cloud firewalls&lt;br&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/from-antiquity-to-the-cloud-25"&gt;&lt;img src="http://video.algosec.com/49543326/49614976/bd1f9267d21e8da48f41902a69c86c6d/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bd1f9267d21e8da48f41902a69c86c6d&amp;source=podcast&amp;photo%5fid=49614976" width="625" height="352" type="text/html" medium="video" duration="3888" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543326/49614976/bd1f9267d21e8da48f41902a69c86c6d/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>firewall history</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/video_medium/migration-to-cisco-firepower-video.mp4?source=podcast" type="video/mp4" length="3602179"/>
            <title>Migration to Cisco Firepower</title>
            <link>http://video.algosec.com/migration-to-cisco-firepower</link>
            <description>&lt;p&gt;How to utilize the AlgoSec solution to migrate to Cisco Firepower&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migration-to-cisco-firepower"&gt;&lt;img src="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54117797</guid>
            <pubDate>Wed, 10 Apr 2019 00:00:00 GMT</pubDate>
            <media:title>Migration to Cisco Firepower</media:title>
            <media:description type="html">&lt;p&gt;How to utilize the AlgoSec solution to migrate to Cisco Firepower&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migration-to-cisco-firepower"&gt;&lt;img src="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0534c3a48e8560e33c68423031611e30&amp;source=podcast&amp;photo%5fid=54117797" width="625" height="352" type="text/html" medium="video" duration="69" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>asa</category>
            <category>cisco</category>
            <category>firepower</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>juniper</category>
            <category>managment</category>
            <category>policy</category>
            <category>Security Policy</category>
            <category>visibility</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/video_medium/taming-the-storm-clouds-managing-video.mp4?source=podcast" type="video/mp4" length="87142532"/>
            <title>Taming the storm clouds: managing network security across hybrid and multi-cloud</title>
            <link>http://video.algosec.com/taming-the-storm-clouds-managing</link>
            <description>&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49895193</guid>
            <pubDate>Thu, 28 Mar 2019 13:04:00 GMT</pubDate>
            <media:title>Taming the storm clouds: managing network security across hybrid and multi-cloud</media:title>
            <media:description type="html">&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dc4df391a76a089c566104a63f8badf5&amp;source=podcast&amp;photo%5fid=49895193" width="625" height="352" type="text/html" medium="video" duration="2733" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cloud Security</category>
            <category>Cyber Security</category>
            <category>cyber threat</category>
            <category>Cyber Threats</category>
            <category>DevOps</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>IT Security</category>
            <category>Network Security</category>
            <category>Risk Management</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/video_medium/cisco-aci-and-algosec-integration-video.mp4?source=podcast" type="video/mp4" length="7894287"/>
            <title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration</link>
            <description>&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181812</guid>
            <pubDate>Mon, 18 Jun 2018 03:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</media:title>
            <media:description type="html">&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ea3eaaff1b36a7756bfa854f08f6b30&amp;source=podcast&amp;photo%5fid=44181812" width="625" height="352" type="text/html" medium="video" duration="376" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/video_medium/the-different-data-sources-for-video.mp4?source=podcast" type="video/mp4" length="21540827"/>
            <title>The Different Data Sources for Application Connectivity Discovery</title>
            <link>http://video.algosec.com/the-different-data-sources-for</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 6
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-different-data-sources-for"&gt;&lt;img src="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181914</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>The Different Data Sources for Application Connectivity Discovery</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 6
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-different-data-sources-for"&gt;&lt;img src="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e939292f9bdaa1169eabd25695c8c0a5&amp;source=podcast&amp;photo%5fid=44181914" width="625" height="352" type="text/html" medium="video" duration="340" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>prof. wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/video_medium/lesson-7-how-to-aggregate-network-video.mp4?source=podcast" type="video/mp4" length="21243911"/>
            <title>Lesson 7: How to Aggregate Network Flows Into Application Flows</title>
            <link>http://video.algosec.com/lesson-7-how-to-aggregate-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181876</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Aggregate Network Flows Into Application Flows</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d5894f7ffc54d4f9858292bb6ee2723c&amp;source=podcast&amp;photo%5fid=44181876" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center applications</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/video_medium/the-right-way-to-audit-aws-policies-video.mp4?source=podcast" type="video/mp4" length="20476785"/>
            <title>The Right Way to Audit AWS Policies</title>
            <link>http://video.algosec.com/the-right-way-to-audit-aws-policies</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-right-way-to-audit-aws-policies"&gt;&lt;img src="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181993</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>The Right Way to Audit AWS Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-right-way-to-audit-aws-policies"&gt;&lt;img src="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b1c1f67722fb6eb47731b6e174f7b8ae&amp;source=podcast&amp;photo%5fid=44181993" width="625" height="352" type="text/html" medium="video" duration="380" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud firewalls</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>hybrid cloud security</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>public cloud security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/video_medium/how-to-integrate-security-into-the-1-video.mp4?source=podcast" type="video/mp4" length="14040752"/>
            <title>How to Integrate Security into the Test Environment</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the-1</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the-1"&gt;&lt;img src="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181992</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the Test Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the-1"&gt;&lt;img src="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=530e283f33821556fb69c84052c07c98&amp;source=podcast&amp;photo%5fid=44181992" width="625" height="352" type="text/html" medium="video" duration="292" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Devops</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/video_medium/tips-for-adding-capacity-without-video.mp4?source=podcast" type="video/mp4" length="24919436"/>
            <title>Tips for Adding Capacity Without Changing Your Security Policies</title>
            <link>http://video.algosec.com/tips-for-adding-capacity-without</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181948</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>Tips for Adding Capacity Without Changing Your Security Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0ccdc09b741f04206dd36b3f659e9519&amp;source=podcast&amp;photo%5fid=44181948" width="625" height="352" type="text/html" medium="video" duration="446" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/video_medium/how-to-integrate-security-into-the-video.mp4?source=podcast" type="video/mp4" length="16789600"/>
            <title>How to Integrate Security into the CI Process</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181918</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the CI Process</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0181d939b45c1552d4f90366f73e9c01&amp;source=podcast&amp;photo%5fid=44181918" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/video_medium/onboarding-new-firewall-devices-video.mp4?source=podcast" type="video/mp4" length="5986333"/>
            <title>Onboarding New Firewall Devices Using AlgoSec's APIs</title>
            <link>http://video.algosec.com/onboarding-new-firewall-devices</link>
            <description>&lt;p&gt;Security integration is a common requirement for many enterprise customers and MSSPs. This video showcases the process to operationalize this requirements including:&lt;br /&gt;
1. Onboarding new firewall devices through a web portal&lt;br /&gt;
2. Easily get compliance scores for newly onboarded devices&lt;br /&gt;
3. Identify firewall cleanup opportunities&lt;br /&gt;
4. Identify if security policies are blocking application connectivity&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/onboarding-new-firewall-devices"&gt;&lt;img src="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181964</guid>
            <pubDate>Fri, 12 May 2017 03:00:00 GMT</pubDate>
            <media:title>Onboarding New Firewall Devices Using AlgoSec's APIs</media:title>
            <media:description type="html">&lt;p&gt;Security integration is a common requirement for many enterprise customers and MSSPs. This video showcases the process to operationalize this requirements including:&lt;br /&gt;
1. Onboarding new firewall devices through a web portal&lt;br /&gt;
2. Easily get compliance scores for newly onboarded devices&lt;br /&gt;
3. Identify firewall cleanup opportunities&lt;br /&gt;
4. Identify if security policies are blocking application connectivity&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/onboarding-new-firewall-devices"&gt;&lt;img src="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e10b23fea5f80c6a1fe1337d28d4fc53&amp;source=podcast&amp;photo%5fid=44181964" width="625" height="352" type="text/html" medium="video" duration="301" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>mssps</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/video_medium/the-algosec-qradar-app-for-incident-video.mp4?source=podcast" type="video/mp4" length="13528027"/>
            <title>The AlgoSec QRadar App for Incident Response</title>
            <link>http://video.algosec.com/the-algosec-qradar-app-for-incident</link>
            <description>&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-algosec-qradar-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182027</guid>
            <pubDate>Fri, 03 Mar 2017 02:00:00 GMT</pubDate>
            <media:title>The AlgoSec QRadar App for Incident Response</media:title>
            <media:description type="html">&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-algosec-qradar-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=697b47e70fcfbb1d2c48e4c514506a03&amp;source=podcast&amp;photo%5fid=44182027" width="625" height="352" type="text/html" medium="video" duration="388" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attacks</category>
            <category>cyber threats</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>IBM QRadar</category>
            <category>incident response</category>
            <category>network security</category>
            <category>security intelligence</category>
            <category>security intelligence platform</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/video_medium/demo-algosecs-cisco-aci-app-center-video.mp4?source=podcast" type="video/mp4" length="12747509"/>
            <title>Demo: AlgoSec's Cisco ACI App Center</title>
            <link>http://video.algosec.com/demo-algosecs-cisco-aci-app-center</link>
            <description>&lt;p&gt;The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosecs-cisco-aci-app-center"&gt;&lt;img src="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181981</guid>
            <pubDate>Fri, 03 Mar 2017 02:00:00 GMT</pubDate>
            <media:title>Demo: AlgoSec's Cisco ACI App Center</media:title>
            <media:description type="html">&lt;p&gt;The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosecs-cisco-aci-app-center"&gt;&lt;img src="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cd6ffbb3cb4ab2fd653726f5bec24c85&amp;source=podcast&amp;photo%5fid=44181981" width="625" height="352" type="text/html" medium="video" duration="385" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>ACI Fabric</category>
            <category>AlgoSec Cisco ACI App</category>
            <category>Audit and Compliance</category>
            <category>cisco</category>
            <category>Cisco ACI App</category>
            <category>epgs</category>
            <category>Firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/video_medium/lesson-14-synchronized-object-video.mp4?source=podcast" type="video/mp4" length="20074623"/>
            <title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</title>
            <link>http://video.algosec.com/lesson-14-synchronized-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182061</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=21c66ed92e36977f79bf555977f026be&amp;source=podcast&amp;photo%5fid=44182061" width="625" height="352" type="text/html" medium="video" duration="399" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>network management</category>
            <category>network objects</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/video_medium/lesson-16-how-to-take-control-of-a-video.mp4?source=podcast" type="video/mp4" length="18241089"/>
            <title>Lesson 16: How to Take Control of a Firewall Migration Project</title>
            <link>http://video.algosec.com/lesson-16-how-to-take-control-of-a</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182049</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 16: How to Take Control of a Firewall Migration Project</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4cf23ef44547986e20b5679b559b1b5e&amp;source=podcast&amp;photo%5fid=44182049" width="625" height="352" type="text/html" medium="video" duration="379" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall migration</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/video_medium/lesson-15-how-to-synchronize-object-video.mp4?source=podcast" type="video/mp4" length="13414169"/>
            <title>Lesson 15: How to Synchronize Object Management with a CMDB</title>
            <link>http://video.algosec.com/lesson-15-how-to-synchronize-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182008</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 15: How to Synchronize Object Management with a CMDB</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=13a6814f2c37052c1fb387ad7ea20522&amp;source=podcast&amp;photo%5fid=44182008" width="625" height="352" type="text/html" medium="video" duration="298" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cmdb</category>
            <category>firewall changes</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network management</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/video_medium/algosec-splunk-app-for-incident-video.mp4?source=podcast" type="video/mp4" length="6902436"/>
            <title>AlgoSec Splunk App for Incident Response</title>
            <link>http://video.algosec.com/algosec-splunk-app-for-incident</link>
            <description>&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-splunk-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182052</guid>
            <pubDate>Mon, 28 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Splunk App for Incident Response</media:title>
            <media:description type="html">&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-splunk-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0c4d10edf34317e11d28581651e31def&amp;source=podcast&amp;photo%5fid=44182052" width="625" height="352" type="text/html" medium="video" duration="214" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>incident response</category>
            <category>network security</category>
            <category>security information and event management</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>SIEM</category>
            <category>Splunk</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/video_medium/best-practices-for-incorporating-video.mp4?source=podcast" type="video/mp4" length="22799886"/>
            <title>Best Practices for Incorporating Security Automation into the DevOps Lifecycle</title>
            <link>http://video.algosec.com/best-practices-for-incorporating</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the need for and the process of adjusting application connectivity throughout each stage of the DevOps lifecycle.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/best-practices-for-incorporating"&gt;&lt;img src="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182114</guid>
            <pubDate>Wed, 16 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>Best Practices for Incorporating Security Automation into the DevOps Lifecycle</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the need for and the process of adjusting application connectivity throughout each stage of the DevOps lifecycle.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/best-practices-for-incorporating"&gt;&lt;img src="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c49b17648815f3daa2a78afe31fd3ad6&amp;source=podcast&amp;photo%5fid=44182114" width="625" height="352" type="text/html" medium="video" duration="387" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Devops</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>security policy change management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/video_medium/lesson-13-zero-touch-change-video.mp4?source=podcast" type="video/mp4" length="23188821"/>
            <title>Lesson 13: Zero-Touch Change Management with Checks and Balances</title>
            <link>http://video.algosec.com/lesson-13-zero-touch-change</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182144</guid>
            <pubDate>Tue, 15 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>Lesson 13: Zero-Touch Change Management with Checks and Balances</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e254cfe4860678b02481a8ea15c6745f&amp;source=podcast&amp;photo%5fid=44182144" width="625" height="352" type="text/html" medium="video" duration="423" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network operations</category>
            <category>Network Security</category>
            <category>professor wool</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>security policy change management</category>
            <category>zero touch automation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/video_medium/cisco-aci-and-algosec-integration-1-video.mp4?source=podcast" type="video/mp4" length="8871061"/>
            <title>Cisco ACI and AlgoSec Integration (Overview and Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration-1</link>
            <description>&lt;p&gt;Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration-1"&gt;&lt;img src="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182087</guid>
            <pubDate>Mon, 31 Oct 2016 02:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (Overview and Demo)</media:title>
            <media:description type="html">&lt;p&gt;Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration-1"&gt;&lt;img src="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dcd1a526c8336ca642a67e763c8639bd&amp;source=podcast&amp;photo%5fid=44182087" width="625" height="352" type="text/html" medium="video" duration="458" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/video_medium/combining-security-groups-and-video.mp4?source=podcast" type="video/mp4" length="20330009"/>
            <title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</title>
            <link>http://video.algosec.com/combining-security-groups-and</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/combining-security-groups-and"&gt;&lt;img src="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182148</guid>
            <pubDate>Thu, 29 Sep 2016 03:00:00 GMT</pubDate>
            <media:title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/combining-security-groups-and"&gt;&lt;img src="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=92cd6dd9ebc61271a4111bbc26bec00d&amp;source=podcast&amp;photo%5fid=44182148" width="625" height="352" type="text/html" medium="video" duration="393" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>firewalls</category>
            <category>nacl</category>
            <category>network access control lists</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/video_medium/using-aws-network-acls-for-enhanced-video.mp4?source=podcast" type="video/mp4" length="21725729"/>
            <title>Using AWS Network ACLs for Enhanced Traffic Filtering</title>
            <link>http://video.algosec.com/using-aws-network-acls-for-enhanced</link>
            <description>&lt;p&gt;In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/using-aws-network-acls-for-enhanced"&gt;&lt;img src="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182088</guid>
            <pubDate>Mon, 26 Sep 2016 03:00:00 GMT</pubDate>
            <media:title>Using AWS Network ACLs for Enhanced Traffic Filtering</media:title>
            <media:description type="html">&lt;p&gt;In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/using-aws-network-acls-for-enhanced"&gt;&lt;img src="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c3e563d70dbfbdadd99c127bdbee633d&amp;source=podcast&amp;photo%5fid=44182088" width="625" height="352" type="text/html" medium="video" duration="420" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>aws</category>
            <category>aws security</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>Firewalls</category>
            <category>nacl</category>
            <category>nacls</category>
            <category>network access control lists</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/video_medium/lesson-3-best-practices-for-video.mp4?source=podcast" type="video/mp4" length="15731335"/>
            <title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the...</title>
            <link>http://video.algosec.com/lesson-3-best-practices-for</link>
            <description>&lt;p&gt;Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-best-practices-for"&gt;&lt;img src="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182196</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the...</media:title>
            <media:description type="html">&lt;p&gt;Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-best-practices-for"&gt;&lt;img src="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9215d82e7075332ada9014679d1d6b7b&amp;source=podcast&amp;photo%5fid=44182196" width="625" height="352" type="text/html" medium="video" duration="297" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>auditing</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/video_medium/lesson-1-migrating-to-nsx-video.mp4?source=podcast" type="video/mp4" length="17310417"/>
            <title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</title>
            <link>http://video.algosec.com/lesson-1-migrating-to-nsx</link>
            <description>&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182155</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</media:title>
            <media:description type="html">&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=def81240212859275a1a7e8e49361dd8&amp;source=podcast&amp;photo%5fid=44182155" width="625" height="352" type="text/html" medium="video" duration="319" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/video_medium/lesson-2-tips-on-how-to-create-video.mp4?source=podcast" type="video/mp4" length="19480685"/>
            <title>Lesson 2: Tips on How to Create Filtering Policies for NSX</title>
            <link>http://video.algosec.com/lesson-2-tips-on-how-to-create</link>
            <description>&lt;p&gt;Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-tips-on-how-to-create"&gt;&lt;img src="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182098</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: Tips on How to Create Filtering Policies for NSX</media:title>
            <media:description type="html">&lt;p&gt;Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-tips-on-how-to-create"&gt;&lt;img src="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ce089eaa3bad2d6123444b73d7e938e8&amp;source=podcast&amp;photo%5fid=44182098" width="625" height="352" type="text/html" medium="video" duration="381" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/video_medium/lesson-4-using-next-generation-video.mp4?source=podcast" type="video/mp4" length="17536828"/>
            <title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</title>
            <link>http://video.algosec.com/lesson-4-using-next-generation</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182238</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dab3bab204d4a15a112afe579c826e2d&amp;source=podcast&amp;photo%5fid=44182238" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>cyber threat detection</category>
            <category>cyber threat prevention</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Next-Generation Firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/video_medium/lesson-3-managing-your-security-video.mp4?source=podcast" type="video/mp4" length="16089357"/>
            <title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</title>
            <link>http://video.algosec.com/lesson-3-managing-your-security</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182171</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b9e12ad72654514540985c604cfa8e53&amp;source=podcast&amp;photo%5fid=44182171" width="625" height="352" type="text/html" medium="video" duration="351" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>next generation firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/video_medium/lesson-12-managing-your-security-video.mp4?source=podcast" type="video/mp4" length="17164651"/>
            <title>Lesson 12: Managing Your Security Policy for Disaster Recovery</title>
            <link>http://video.algosec.com/lesson-12-managing-your-security</link>
            <description>&lt;p&gt;In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-12-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182154</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 12: Managing Your Security Policy for Disaster Recovery</media:title>
            <media:description type="html">&lt;p&gt;In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-12-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ab2e958faa7e5fa8581da3380b0a834&amp;source=podcast&amp;photo%5fid=44182154" width="625" height="352" type="text/html" medium="video" duration="318" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Disaster Recovery</category>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/video_medium/lesson-6-how-to-build-firewall-video.mp4?source=podcast" type="video/mp4" length="24591521"/>
            <title>Lesson 6: How to Build Firewall Policies for East West Traffic</title>
            <link>http://video.algosec.com/lesson-6-how-to-build-firewall</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182175</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 6: How to Build Firewall Policies for East West Traffic</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0b703ddeea2e989e3bc350549757ce6a&amp;source=podcast&amp;photo%5fid=44182175" width="625" height="352" type="text/html" medium="video" duration="439" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/video_medium/protect-outbound-traffic-in-an-aws-video.mp4?source=podcast" type="video/mp4" length="14118781"/>
            <title>Protect Outbound Traffic in an AWS Hybrid Environment</title>
            <link>http://video.algosec.com/protect-outbound-traffic-in-an-aws</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 2&lt;/p&gt;
&lt;p&gt;Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/protect-outbound-traffic-in-an-aws"&gt;&lt;img src="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182267</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>Protect Outbound Traffic in an AWS Hybrid Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 2&lt;/p&gt;
&lt;p&gt;Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/protect-outbound-traffic-in-an-aws"&gt;&lt;img src="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=03b144c5631b7e1579c2666d1136adab&amp;source=podcast&amp;photo%5fid=44182267" width="625" height="352" type="text/html" medium="video" duration="263" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AWS</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/video_medium/the-fundamentals-of-aws-security-video.mp4?source=podcast" type="video/mp4" length="17302266"/>
            <title>The Fundamentals of AWS Security Groups</title>
            <link>http://video.algosec.com/the-fundamentals-of-aws-security</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides an overview of Amazon Web Services (AWS) Security Groups and highlights some of the differences between Security Groups and traditional firewalls. The lesson continues by explaining some of the unique features of AWS and the challenges and benefits of being able to apply multiple Security Groups to a single instance.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-fundamentals-of-aws-security"&gt;&lt;img src="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182199</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>The Fundamentals of AWS Security Groups</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides an overview of Amazon Web Services (AWS) Security Groups and highlights some of the differences between Security Groups and traditional firewalls. The lesson continues by explaining some of the unique features of AWS and the challenges and benefits of being able to apply multiple Security Groups to a single instance.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-fundamentals-of-aws-security"&gt;&lt;img src="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e55f13e53dac1f9b30c7fc1ff4de07da&amp;source=podcast&amp;photo%5fid=44182199" width="625" height="352" type="text/html" medium="video" duration="298" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Amazon Web Services (Website)</category>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall policy management</category>
            <category>firewalls</category>
            <category>hybrid cloud</category>
            <category>hybrid environment</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/video_medium/change-management-auditing-and-video.mp4?source=podcast" type="video/mp4" length="22440983"/>
            <title>Change Management, Auditing and Compliance in an AWS Hybrid Environment</title>
            <link>http://video.algosec.com/change-management-auditing-and</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 3&lt;/p&gt;
&lt;p&gt;Once you start using AWS for production applications, auditing and compliance considerations come into play, especially if these applications are processing data that is subject to regulations such as PCI, HIPAA, SOX etc. In this lesson, Professor Wool reviews AWS’s own auditing tools, CloudWatch and CloudTrail, which are useful for cloud-based applications. However if you are running a hybrid data center, you will likely need to augment these tools with solutions that can provide reporting, visibility and change monitoring across the entire environment. Professor Wool provides some recommendations for key features and functionally you’ll need to ensure compliance, and tips on what the auditors are looking for.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/change-management-auditing-and"&gt;&lt;img src="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182182</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>Change Management, Auditing and Compliance in an AWS Hybrid Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 3&lt;/p&gt;
&lt;p&gt;Once you start using AWS for production applications, auditing and compliance considerations come into play, especially if these applications are processing data that is subject to regulations such as PCI, HIPAA, SOX etc. In this lesson, Professor Wool reviews AWS’s own auditing tools, CloudWatch and CloudTrail, which are useful for cloud-based applications. However if you are running a hybrid data center, you will likely need to augment these tools with solutions that can provide reporting, visibility and change monitoring across the entire environment. Professor Wool provides some recommendations for key features and functionally you’ll need to ensure compliance, and tips on what the auditors are looking for.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/change-management-auditing-and"&gt;&lt;img src="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0cea2f1b49838b5d93d68f90d8d099e&amp;source=podcast&amp;photo%5fid=44182182" width="625" height="352" type="text/html" medium="video" duration="382" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>hipaa</category>
            <category>hybrid cloud</category>
            <category>hybrid environments</category>
            <category>network security</category>
            <category>pci</category>
            <category>prof wool</category>
            <category>Regulatory Compliance</category>
            <category>SDN</category>
            <category>sox</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/video_medium/lesson-11-tips-for-filtering-video.mp4?source=podcast" type="video/mp4" length="17295313"/>
            <title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</title>
            <link>http://video.algosec.com/lesson-11-tips-for-filtering</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182282</guid>
            <pubDate>Fri, 01 May 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0a24cf40bd28e90e374321d72e5140a&amp;source=podcast&amp;photo%5fid=44182282" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>private cloud</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>virtual data center</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/video_medium/algosec-case-study-bmfbovespa-video.mp4?source=podcast" type="video/mp4" length="15258261"/>
            <title>AlgoSec Case Study: BM&amp;FBOVESPA (English)</title>
            <link>http://video.algosec.com/algosec-case-study-bmfbovespa</link>
            <description>&lt;p&gt;Hear Wellington Vita, Information Security Manager, explain how AlgoSec helps BM&amp;FBOVESPA maintain a secure, compliant trading environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-case-study-bmfbovespa"&gt;&lt;img src="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182218</guid>
            <pubDate>Wed, 01 Apr 2015 03:00:00 GMT</pubDate>
            <media:title>AlgoSec Case Study: BM&amp;FBOVESPA (English)</media:title>
            <media:description type="html">&lt;p&gt;Hear Wellington Vita, Information Security Manager, explain how AlgoSec helps BM&amp;FBOVESPA maintain a secure, compliant trading environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-case-study-bmfbovespa"&gt;&lt;img src="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=da4aa7916a2a3d8d1db6908cd39cc56f&amp;source=podcast&amp;photo%5fid=44182218" width="625" height="469" type="text/html" medium="video" duration="281" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>AlgoSec (Business Operation)</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security policy</category>
            <category>security software</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/video_medium/lesson-3-common-mistakes-and-best-video.mp4?source=podcast" type="video/mp4" length="21328766"/>
            <title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security...</title>
            <link>http://video.algosec.com/lesson-3-common-mistakes-and-best</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-common-mistakes-and-best"&gt;&lt;img src="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182303</guid>
            <pubDate>Thu, 26 Mar 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security...</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-common-mistakes-and-best"&gt;&lt;img src="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=01e5f51fd43db5def8186c84fe86ec65&amp;source=podcast&amp;photo%5fid=44182303" width="625" height="352" type="text/html" medium="video" duration="405" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewalls</category>
            <category>network security</category>
            <category>network security zone</category>
            <category>network security zones</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security zone</category>
            <category>security zones</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/video_medium/lesson-9-how-to-structure-network-video.mp4?source=podcast" type="video/mp4" length="20686665"/>
            <title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</title>
            <link>http://video.algosec.com/lesson-9-how-to-structure-network</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182306</guid>
            <pubDate>Mon, 08 Dec 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f008f7c1f97aa3aa33a02182c9c550d8&amp;source=podcast&amp;photo%5fid=44182306" width="625" height="352" type="text/html" medium="video" duration="334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>security software</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/video_medium/lesson-8-nat-considerations-when-video.mp4?source=podcast" type="video/mp4" length="22584967"/>
            <title>Lesson 8: NAT Considerations When Managing Your Security Policy</title>
            <link>http://video.algosec.com/lesson-8-nat-considerations-when</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 8&lt;br /&gt;
A business owner makes a simple change request to allow traffic to a new application. You now need to figure out the right firewall rules to change. This should be pretty simple… but what if you’re using NAT (Network Address Translation) in your environment? In this lesson, Professor Wool explains some key principles of NATing and why it’s critical to understand your NAT policy in order to identify the right paths for network traffic, which firewalls rules really need to be modified, and how to write your security policy correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-8-nat-considerations-when"&gt;&lt;img src="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182234</guid>
            <pubDate>Tue, 11 Nov 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 8: NAT Considerations When Managing Your Security Policy</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 8&lt;br /&gt;
A business owner makes a simple change request to allow traffic to a new application. You now need to figure out the right firewall rules to change. This should be pretty simple… but what if you’re using NAT (Network Address Translation) in your environment? In this lesson, Professor Wool explains some key principles of NATing and why it’s critical to understand your NAT policy in order to identify the right paths for network traffic, which firewalls rules really need to be modified, and how to write your security policy correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-8-nat-considerations-when"&gt;&lt;img src="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c4e501a5254536aa42ad741dacb80d20&amp;source=podcast&amp;photo%5fid=44182234" width="625" height="352" type="text/html" medium="video" duration="397" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network address translation</category>
            <category>Network Security</category>
            <category>network security policy</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/video_medium/algosec-overview-managing-security-video.mp4?source=podcast" type="video/mp4" length="6679131"/>
            <title>AlgoSec Overview: Managing Security Policies in Your Data Center</title>
            <link>http://video.algosec.com/algosec-overview-managing-security</link>
            <description>&lt;p&gt;As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-overview-managing-security"&gt;&lt;img src="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182317</guid>
            <pubDate>Wed, 29 Oct 2014 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Overview: Managing Security Policies in Your Data Center</media:title>
            <media:description type="html">&lt;p&gt;As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-overview-managing-security"&gt;&lt;img src="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c689444345c25371b1dc1dc245a12deb&amp;source=podcast&amp;photo%5fid=44182317" width="625" height="352" type="text/html" medium="video" duration="132" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec businessflor</category>
            <category>algosec fireflow</category>
            <category>AlgoSec Security Policy Management</category>
            <category>Audit and Compliance</category>
            <category>Data Center</category>
            <category>Datacenters</category>
            <category>firewall auditing</category>
            <category>Firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>security</category>
            <category>Security Policy</category>
            <category>virtual datacenter</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/video_medium/lesson-1-how-to-structure-your-video.mp4?source=podcast" type="video/mp4" length="20321042"/>
            <title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</title>
            <link>http://video.algosec.com/lesson-1-how-to-structure-your</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-structure-your"&gt;&lt;img src="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182257</guid>
            <pubDate>Wed, 01 Oct 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-structure-your"&gt;&lt;img src="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f89558d6f367f66d2f7fd246d7b932ed&amp;source=podcast&amp;photo%5fid=44182257" width="625" height="352" type="text/html" medium="video" duration="394" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/video_medium/lesson-2-how-to-define-simplify-and-video.mp4?source=podcast" type="video/mp4" length="17769151"/>
            <title>Lesson 2: How to Define, Simplify and Enforce Network Segmentation and...</title>
            <link>http://video.algosec.com/lesson-2-how-to-define-simplify-and</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool recommends a simple matrix to define network segments and security zones, and the traffic allowed to and from each zone. This matrix can then be used to immediately assess a firewall change requests as well as validate that existing security policies have been implemented correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-how-to-define-simplify-and"&gt;&lt;img src="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182330</guid>
            <pubDate>Thu, 14 Aug 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: How to Define, Simplify and Enforce Network Segmentation and...</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool recommends a simple matrix to define network segments and security zones, and the traffic allowed to and from each zone. This matrix can then be used to immediately assess a firewall change requests as well as validate that existing security policies have been implemented correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-how-to-define-simplify-and"&gt;&lt;img src="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a971e559de70d0684d8858d2c05145fc&amp;source=podcast&amp;photo%5fid=44182330" width="625" height="352" type="text/html" medium="video" duration="330" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>network segmentation</category>
            <category>network zoning</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/video_medium/lesson-3-using-object-naming-video.mp4?source=podcast" type="video/mp4" length="17490787"/>
            <title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</title>
            <link>http://video.algosec.com/lesson-3-using-object-naming</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182290</guid>
            <pubDate>Thu, 10 Apr 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4797ebe9fab50b0c575eb5e0b6dac4eb&amp;source=podcast&amp;photo%5fid=44182290" width="625" height="352" type="text/html" medium="video" duration="323" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>AlgoSec</category>
            <category>firewall management</category>
            <category>firewall object naming</category>
            <category>firewall objects</category>
            <category>firewall policy management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>object naming conventions</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/video_medium/tips-for-secure-decommissioning-of-video.mp4?source=podcast" type="video/mp4" length="30751680"/>
            <title>Tips for Secure Decommissioning of Business Applications</title>
            <link>http://video.algosec.com/tips-for-secure-decommissioning-of</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-secure-decommissioning-of"&gt;&lt;img src="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182331</guid>
            <pubDate>Fri, 14 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Tips for Secure Decommissioning of Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-secure-decommissioning-of"&gt;&lt;img src="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d3adefaf0577207562515ea8e3018ec9&amp;source=podcast&amp;photo%5fid=44182331" width="625" height="352" type="text/html" medium="video" duration="499" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>applications</category>
            <category>decommission</category>
            <category>decommissioning</category>
            <category>firewall management</category>
            <category>firewall operations management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network operations</category>
            <category>Professor Wool</category>
            <category>secure</category>
            <category>security</category>
            <category>security change management</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/video_medium/tips-to-discover-business-video.mp4?source=podcast" type="video/mp4" length="33032006"/>
            <title>Tips to Discover Business Application Connectivity Requirements</title>
            <link>http://video.algosec.com/tips-to-discover-business</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 3&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines how to leverage firewall rules for discovering the connectivity requirements of data center applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-to-discover-business"&gt;&lt;img src="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182417</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Tips to Discover Business Application Connectivity Requirements</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 3&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines how to leverage firewall rules for discovering the connectivity requirements of data center applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-to-discover-business"&gt;&lt;img src="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=80bdfba340732544d4906f71bfe7c61c&amp;source=podcast&amp;photo%5fid=44182417" width="625" height="352" type="text/html" medium="video" duration="424" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity</category>
            <category>application connectivity management</category>
            <category>business applications</category>
            <category>data center</category>
            <category>data center applications</category>
            <category>datacenter applications</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/video_medium/lesson-10-tips-to-simplify-video.mp4?source=podcast" type="video/mp4" length="17136234"/>
            <title>Lesson 10: Tips to Simplify Migrations to a Virtual Data Center</title>
            <link>http://video.algosec.com/lesson-10-tips-to-simplify</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 10&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of migrating business applications and physical data centers to a private cloud and offers tips to conduct these migrations without the risk of outages.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-10-tips-to-simplify"&gt;&lt;img src="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182380</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 10: Tips to Simplify Migrations to a Virtual Data Center</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 10&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of migrating business applications and physical data centers to a private cloud and offers tips to conduct these migrations without the risk of outages.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-10-tips-to-simplify"&gt;&lt;img src="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e32f091cc2c3304f4ce552d35b7a0ccc&amp;source=podcast&amp;photo%5fid=44182380" width="625" height="352" type="text/html" medium="video" duration="293" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>business applications</category>
            <category>cloud migration</category>
            <category>data center</category>
            <category>data center application</category>
            <category>data center consolidation</category>
            <category>datacenter consolidation</category>
            <category>data center migration</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>physical data center</category>
            <category>private cloud</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>virtual data center</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/video_medium/lesson-7-examining-the-challenges-video.mp4?source=podcast" type="video/mp4" length="40171738"/>
            <title>Lesson 7: Examining the Challenges of Accurately Simulating Network Routing</title>
            <link>http://video.algosec.com/lesson-7-examining-the-challenges</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 7&lt;br /&gt;
In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-examining-the-challenges"&gt;&lt;img src="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182374</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: Examining the Challenges of Accurately Simulating Network Routing</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 7&lt;br /&gt;
In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-examining-the-challenges"&gt;&lt;img src="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=11f3ec0bd4c2c56ab1b60ec291133dd3&amp;source=podcast&amp;photo%5fid=44182374" width="625" height="352" type="text/html" medium="video" duration="487" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>Firewalls</category>
            <category>HSRP</category>
            <category>network routing</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>routing</category>
            <category>security management</category>
            <category>SNMP</category>
            <category>SSH</category>
            <category>VRPP</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/video_medium/managing-the-security-policy-in-video.mp4?source=podcast" type="video/mp4" length="10604809"/>
            <title>Managing the Security Policy in Your Data Center and Network</title>
            <link>http://video.algosec.com/managing-the-security-policy-in</link>
            <description>&lt;p&gt;Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-the-security-policy-in"&gt;&lt;img src="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182430</guid>
            <pubDate>Thu, 06 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Managing the Security Policy in Your Data Center and Network</media:title>
            <media:description type="html">&lt;p&gt;Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-the-security-policy-in"&gt;&lt;img src="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3980f51228641374a2c44937715ee7cd&amp;source=podcast&amp;photo%5fid=44182430" width="625" height="352" type="text/html" medium="video" duration="142" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity management</category>
            <category>Audit and Compliance</category>
            <category>data center</category>
            <category>firewall audit</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security change management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182556/0d9b61811497de1802b151bd0cfc4f44/video_medium/gain-visibility-of-your-network-video.mp4?source=podcast" type="video/mp4" length="4077186"/>
            <title>Gain Visibility of Your Network with Topology Intelligence</title>
            <link>http://video.algosec.com/gain-visibility-of-your-network</link>
            <description>&lt;p&gt;&lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; - AlgoSec Firewall Analyzer leverages powerful network topology intelligence to help you analyze and visualize complex networks. This brief demonstration examines AlgoSec's interactive topology map.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/gain-visibility-of-your-network"&gt;&lt;img src="http://video.algosec.com/4465660/44182556/0d9b61811497de1802b151bd0cfc4f44/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182556</guid>
            <pubDate>Thu, 07 Mar 2013 02:00:00 GMT</pubDate>
            <media:title>Gain Visibility of Your Network with Topology Intelligence</media:title>
            <media:description type="html">&lt;p&gt;&lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; - AlgoSec Firewall Analyzer leverages powerful network topology intelligence to help you analyze and visualize complex networks. This brief demonstration examines AlgoSec's interactive topology map.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/gain-visibility-of-your-network"&gt;&lt;img src="http://video.algosec.com/4465660/44182556/0d9b61811497de1802b151bd0cfc4f44/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0d9b61811497de1802b151bd0cfc4f44&amp;source=podcast&amp;photo%5fid=44182556" width="625" height="352" type="text/html" medium="video" duration="135" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182556/0d9b61811497de1802b151bd0cfc4f44/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AFA</category>
            <category>analyze network topology</category>
            <category>firewall analysis</category>
            <category>firewall analysis tool</category>
            <category>firewall analyzer</category>
            <category>firewall rule analyzer</category>
            <category>firewalls</category>
            <category>network map</category>
            <category>Network Topology map</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/video_medium/mitigating-risk-in-your-firewall-video.mp4?source=podcast" type="video/mp4" length="8306240"/>
            <title>Mitigating Risk in Your Firewall Policy</title>
            <link>http://video.algosec.com/mitigating-risk-in-your-firewall</link>
            <description>&lt;p&gt;&lt;a href="http://www.algosec.com/"&gt;http://www.algosec.com/&lt;/a&gt; - AlgoSec Firewall Analyzer helps you understand the level of risk in your network security policy, providing complete visibility of your security posture and enabling you to mitigate risk across traditional and next-generation firewalls as well as routers. Firewall Analyzer analyzes your policy against the broadest database, which can also be customized to address your corporate policies, of more than 120 industry best practices, which includes application-based risks.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/mitigating-risk-in-your-firewall"&gt;&lt;img src="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182584</guid>
            <pubDate>Fri, 21 Dec 2012 02:00:00 GMT</pubDate>
            <media:title>Mitigating Risk in Your Firewall Policy</media:title>
            <media:description type="html">&lt;p&gt;&lt;a href="http://www.algosec.com/"&gt;http://www.algosec.com/&lt;/a&gt; - AlgoSec Firewall Analyzer helps you understand the level of risk in your network security policy, providing complete visibility of your security posture and enabling you to mitigate risk across traditional and next-generation firewalls as well as routers. Firewall Analyzer analyzes your policy against the broadest database, which can also be customized to address your corporate policies, of more than 120 industry best practices, which includes application-based risks.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/mitigating-risk-in-your-firewall"&gt;&lt;img src="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e810eb26140987749e5de78ef9aa7b26&amp;source=podcast&amp;photo%5fid=44182584" width="625" height="352" type="text/html" medium="video" duration="221" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall analyzer</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>mitigate risk</category>
            <category>network risk</category>
            <category>network security policy</category>
            <category>next-generation firewalls</category>
            <category>policy analysis</category>
            <category>risk assessment</category>
            <category>routers</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/video_medium/lesson-4-tips-for-firewall-rule-video.mp4?source=podcast" type="video/mp4" length="23075092"/>
            <title>Lesson 4: Tips for Firewall Rule Recertification</title>
            <link>http://video.algosec.com/lesson-4-tips-for-firewall-rule</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 4&lt;br /&gt;
In this lesson, Professor Wool examines some tips for including firewall rule recertification as part of your change management process, including questions you should be asking and be able to answer as well as guidance on how to effectively recertify firewall rules.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-tips-for-firewall-rule"&gt;&lt;img src="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182607</guid>
            <pubDate>Thu, 18 Oct 2012 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Tips for Firewall Rule Recertification</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 4&lt;br /&gt;
In this lesson, Professor Wool examines some tips for including firewall rule recertification as part of your change management process, including questions you should be asking and be able to answer as well as guidance on how to effectively recertify firewall rules.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-tips-for-firewall-rule"&gt;&lt;img src="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dc89d0b912300da27e034e544e2dc875&amp;source=podcast&amp;photo%5fid=44182607" width="625" height="352" type="text/html" medium="video" duration="395" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>change management</category>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewall rule</category>
            <category>firewall rule recertification</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>rule recertification</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/video_medium/lesson-1-examining-the-most-common-video.mp4?source=podcast" type="video/mp4" length="26405122"/>
            <title>Lesson 1: Examining the Most Common Firewall Misconfigurations</title>
            <link>http://video.algosec.com/lesson-1-examining-the-most-common</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool discusses his research on different firewall misconfigurations and provides tips for preventing the most common risks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-examining-the-most-common"&gt;&lt;img src="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182624</guid>
            <pubDate>Mon, 17 Sep 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Examining the Most Common Firewall Misconfigurations</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool discusses his research on different firewall misconfigurations and provides tips for preventing the most common risks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-examining-the-most-common"&gt;&lt;img src="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0b0094e9616d6c9f528a648df323567&amp;source=podcast&amp;photo%5fid=44182624" width="625" height="352" type="text/html" medium="video" duration="389" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall management software</category>
            <category>firewall misconfigurations</category>
            <category>firewall risk</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/video_medium/new-customer-collection-video-video.mp4?source=podcast" type="video/mp4" length="8022600"/>
            <title>New Customer Collection Video</title>
            <link>http://video.algosec.com/new-customer-collection-video</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-customer-collection-video"&gt;&lt;img src="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182680</guid>
            <pubDate>Tue, 07 Aug 2012 03:00:00 GMT</pubDate>
            <media:title>New Customer Collection Video</media:title>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-customer-collection-video"&gt;&lt;img src="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=956a98b36cc3219b003c721a696b5053&amp;source=podcast&amp;photo%5fid=44182680" width="625" height="469" type="text/html" medium="video" duration="166" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>fire wall change management</category>
            <category>Firewall Management</category>
            <category>firewall management software</category>
            <category>firewall management tools</category>
            <category>Firewalls</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/video_medium/lesson-2-automating-the-firewall-video.mp4?source=podcast" type="video/mp4" length="30272598"/>
            <title>Lesson 2: Automating the Firewall Change Control Process</title>
            <link>http://video.algosec.com/lesson-2-automating-the-firewall</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-automating-the-firewall"&gt;&lt;img src="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182690</guid>
            <pubDate>Thu, 28 Jun 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: Automating the Firewall Change Control Process</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-automating-the-firewall"&gt;&lt;img src="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=da5caa63acf663010badf236bea69325&amp;source=podcast&amp;photo%5fid=44182690" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>automate firewall changes</category>
            <category>firewall change control</category>
            <category>firewall change workflow</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/video_medium/lesson-2-ngfws-whitelisting-video.mp4?source=podcast" type="video/mp4" length="40617652"/>
            <title>Lesson 2: NGFWs - Whitelisting &amp; Blacklisting Policy Considerations</title>
            <link>http://video.algosec.com/lesson-2-ngfws-whitelisting</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the pros and cons of whitelisting and blacklisting policies and offers some recommendations on policy considerations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-ngfws-whitelisting"&gt;&lt;img src="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182711</guid>
            <pubDate>Wed, 06 Jun 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: NGFWs - Whitelisting &amp; Blacklisting Policy Considerations</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the pros and cons of whitelisting and blacklisting policies and offers some recommendations on policy considerations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-ngfws-whitelisting"&gt;&lt;img src="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=aa2c6bbe57878bf5156d1ea06e0353f3&amp;source=podcast&amp;photo%5fid=44182711" width="625" height="352" type="text/html" medium="video" duration="635" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>blacklisting</category>
            <category>firewall management</category>
            <category>firewall policies</category>
            <category>firewalls</category>
            <category>Network Security</category>
            <category>next-generation firewalls</category>
            <category>policy</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>whitelisting</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/video_medium/lesson-1-next-generation-firewalls-video.mp4?source=podcast" type="video/mp4" length="31036106"/>
            <title>Lesson 1: Next-Generation Firewalls: Overview of Application and User-Aware...</title>
            <link>http://video.algosec.com/lesson-1-next-generation-firewalls</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 1&lt;br&gt;
In this lesson, Professor Wool examines next-generation firewalls and the granular capabilities they provide for improved control over applications and users.
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-next-generation-firewalls"&gt;&lt;img src="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182727</guid>
            <pubDate>Mon, 21 May 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Next-Generation Firewalls: Overview of Application and User-Aware...</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 1&lt;br&gt;
In this lesson, Professor Wool examines next-generation firewalls and the granular capabilities they provide for improved control over applications and users.
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-next-generation-firewalls"&gt;&lt;img src="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ac281d49577cafce8bc246ba69434e3&amp;source=podcast&amp;photo%5fid=44182727" width="625" height="352" type="text/html" medium="video" duration="544" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewalls</category>
            <category>next-generation firewalls</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>Technology</category>
        </item>
    </channel>
</rss>
