<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/podcast/tag/network segmentation"/>
        <atom:link rel="next" href="https://video.algosec.com/podcast/tag/network segmentation?tag=network+segmentation&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/64968578/93109516/95329aa8ad752bf095bdebf44ce98b71/video_medium/application-segmentation-using-1-video.mp4?source=podcast" type="video/mp4" length="11442063"/>
            <title>Application Segmentation Using AlgoSec AutoDiscovery</title>
            <link>http://video.algosec.com/application-segmentation-using-1</link>
            <description>&lt;p&gt;In this video see AlgoSec’s unique application-centric approach to building and maintaining a Micro-Segmentation strategy in your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-segmentation-using-1"&gt;&lt;img src="http://video.algosec.com/64968578/93109516/95329aa8ad752bf095bdebf44ce98b71/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/93109516</guid>
            <pubDate>Tue, 19 Mar 2024 14:26:53 GMT</pubDate>
            <media:title>Application Segmentation Using AlgoSec AutoDiscovery</media:title>
            <media:description type="html">&lt;p&gt;In this video see AlgoSec’s unique application-centric approach to building and maintaining a Micro-Segmentation strategy in your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-segmentation-using-1"&gt;&lt;img src="http://video.algosec.com/64968578/93109516/95329aa8ad752bf095bdebf44ce98b71/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=95329aa8ad752bf095bdebf44ce98b71&amp;source=podcast&amp;photo%5fid=93109516" width="625" height="352" type="text/html" medium="video" duration="239" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968578/93109516/95329aa8ad752bf095bdebf44ce98b71/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>Micro Segmentation</category>
            <category> Network Segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968577/76099817/71bb43df4e4d207d73e879f2ef0eda17/video_medium/123-punch-on-network-segmentation-video.mp4?source=podcast" type="video/mp4" length="62120825"/>
            <title>1,2,3 punch on Network Segmentation</title>
            <link>http://video.algosec.com/123-punch-on-network-segmentation</link>
            <description>&lt;p&gt;The zero-trust network layer is a best practice to use when securing application connectivity. However, achieving zero trust for your organization requires multiple tools that work together.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Join us for a conversation about:&lt;br&gt;
- Creating zero-trust in networks&lt;br&gt;
- Integrating application connectivity with cloud, SDN, and on-prem network security controls&lt;br&gt;
- Maintaining the network and micro-segmentation in harmony&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/123-punch-on-network-segmentation"&gt;&lt;img src="http://video.algosec.com/64968577/76099817/71bb43df4e4d207d73e879f2ef0eda17/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/76099817</guid>
            <pubDate>Thu, 09 Jun 2022 09:36:11 GMT</pubDate>
            <media:title>1,2,3 punch on Network Segmentation</media:title>
            <media:description type="html">&lt;p&gt;The zero-trust network layer is a best practice to use when securing application connectivity. However, achieving zero trust for your organization requires multiple tools that work together.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Join us for a conversation about:&lt;br&gt;
- Creating zero-trust in networks&lt;br&gt;
- Integrating application connectivity with cloud, SDN, and on-prem network security controls&lt;br&gt;
- Maintaining the network and micro-segmentation in harmony&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/123-punch-on-network-segmentation"&gt;&lt;img src="http://video.algosec.com/64968577/76099817/71bb43df4e4d207d73e879f2ef0eda17/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=71bb43df4e4d207d73e879f2ef0eda17&amp;source=podcast&amp;photo%5fid=76099817" width="625" height="352" type="text/html" medium="video" duration="1091" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968577/76099817/71bb43df4e4d207d73e879f2ef0eda17/standard/download-6-thumbnail.jpg" width="75" height=""/>
            <category>Gated</category>
            <category>micro segmentation</category>
            <category>network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968578/65071031/2c4294482ca35125b8106e3dcbc9387a/video_medium/application-segmentation-using-video.mp4?source=podcast" type="video/mp4" length="11975419"/>
            <title>Application Segmentation Using AlgoSec AutoDiscovery </title>
            <link>http://video.algosec.com/application-segmentation-using</link>
            <description>&lt;p&gt;In this video see AlgoSec’s unique application-centric approach to building and maintaining a Micro-Segmentation strategy in your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-segmentation-using"&gt;&lt;img src="http://video.algosec.com/64968578/65071031/2c4294482ca35125b8106e3dcbc9387a/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/65071031</guid>
            <pubDate>Tue, 10 Nov 2020 17:36:04 GMT</pubDate>
            <media:title>Application Segmentation Using AlgoSec AutoDiscovery </media:title>
            <media:description type="html">&lt;p&gt;In this video see AlgoSec’s unique application-centric approach to building and maintaining a Micro-Segmentation strategy in your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-segmentation-using"&gt;&lt;img src="http://video.algosec.com/64968578/65071031/2c4294482ca35125b8106e3dcbc9387a/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2c4294482ca35125b8106e3dcbc9387a&amp;source=podcast&amp;photo%5fid=65071031" width="625" height="338" type="text/html" medium="video" duration="306" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968578/65071031/2c4294482ca35125b8106e3dcbc9387a/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <category>Micro Segmentation</category>
            <category>Network Segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/video_medium/application-segmentation-with-cisco-video.mp4?source=podcast" type="video/mp4" length="6735850"/>
            <title>Application Segmentation with Cisco Tetration &amp; AlgoSec</title>
            <link>http://video.algosec.com/application-segmentation-with-cisco</link>
            <description>&lt;p&gt;Application Segmentation with Cisco Tetration &amp;amp; AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-segmentation-with-cisco"&gt;&lt;img src="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63637257</guid>
            <pubDate>Tue, 07 Jul 2020 09:55:35 GMT</pubDate>
            <media:title>Application Segmentation with Cisco Tetration &amp; AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;Application Segmentation with Cisco Tetration &amp;amp; AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-segmentation-with-cisco"&gt;&lt;img src="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7416aee44192b09118730b3bc4cbe9b2&amp;source=podcast&amp;photo%5fid=63637257" width="625" height="352" type="text/html" medium="video" duration="300" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Cisco</category>
            <category>Firewall Migration</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Network Segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/63482263/2f3799da46c54141311ae5eab8144ee2/video_medium/the-first-step-towards-1-video.mp4?source=podcast" type="video/mp4" length="33204485"/>
            <title>The First Step Towards Micro-segmentation: Application Visibility</title>
            <link>http://video.algosec.com/the-first-step-towards-1</link>
            <description>&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect, AlgoSec | June 2020&lt;/b&gt;&lt;br&gt;&lt;br&gt;
As cyber threats become more sophisticated, companies struggle to stay secure. To prevent serious breaches, your network must be internally segmented to stop unauthorized users from moving freely inside the network and exfiltrate data. Network segmentation must be designed and managed properly.&lt;br&gt;&lt;br&gt;
Identifying the business applications on your network is a critical early step to develop and implement your micro-segmentation strategy.&lt;br&gt;&lt;br&gt;
In this webinar, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, will get you started on your micro-segmentation journey. &lt;br&gt;&lt;br&gt;Explore:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Why application mapping is a crucial step in your path to micro-segmentation&lt;/li&gt;&lt;li&gt;Ways to discover and map your network’s business applications using industry's leading solutions&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;How to identify how your micro-segmentation program impacts your business applications&lt;/li&gt;&lt;li&gt;Tips to understand the business impact of your planned segmentation project on your organization&lt;/li&gt;&lt;li&gt;How to succeed with your micro-segmentation project&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-first-step-towards-1"&gt;&lt;img src="http://video.algosec.com/60650861/63482263/2f3799da46c54141311ae5eab8144ee2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63482263</guid>
            <pubDate>Mon, 29 Jun 2020 10:38:21 GMT</pubDate>
            <media:title>The First Step Towards Micro-segmentation: Application Visibility</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect, AlgoSec | June 2020&lt;/b&gt;&lt;br&gt;&lt;br&gt;
As cyber threats become more sophisticated, companies struggle to stay secure. To prevent serious breaches, your network must be internally segmented to stop unauthorized users from moving freely inside the network and exfiltrate data. Network segmentation must be designed and managed properly.&lt;br&gt;&lt;br&gt;
Identifying the business applications on your network is a critical early step to develop and implement your micro-segmentation strategy.&lt;br&gt;&lt;br&gt;
In this webinar, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, will get you started on your micro-segmentation journey. &lt;br&gt;&lt;br&gt;Explore:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Why application mapping is a crucial step in your path to micro-segmentation&lt;/li&gt;&lt;li&gt;Ways to discover and map your network’s business applications using industry's leading solutions&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;How to identify how your micro-segmentation program impacts your business applications&lt;/li&gt;&lt;li&gt;Tips to understand the business impact of your planned segmentation project on your organization&lt;/li&gt;&lt;li&gt;How to succeed with your micro-segmentation project&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-first-step-towards-1"&gt;&lt;img src="http://video.algosec.com/60650861/63482263/2f3799da46c54141311ae5eab8144ee2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2f3799da46c54141311ae5eab8144ee2&amp;source=podcast&amp;photo%5fid=63482263" width="625" height="352" type="text/html" medium="video" duration="1664" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/63482263/2f3799da46c54141311ae5eab8144ee2/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>application discovery</category>
            <category>application visibility</category>
            <category>network security</category>
            <category>network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/video_medium/achieving-intent-based-network-video.mp4?source=podcast" type="video/mp4" length="61107497"/>
            <title>"Achieving intent-based network security across your hybrid network" with...</title>
            <link>http://video.algosec.com/achieving-intent-based-network</link>
            <description>&lt;p&gt;Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-intent-based-network"&gt;&lt;img src="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63415237</guid>
            <pubDate>Wed, 24 Jun 2020 16:49:12 GMT</pubDate>
            <media:title>"Achieving intent-based network security across your hybrid network" with...</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-intent-based-network"&gt;&lt;img src="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d40d0b761aa9153a987b2dffb6cc5060&amp;source=podcast&amp;photo%5fid=63415237" width="625" height="352" type="text/html" medium="video" duration="1824" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cyber Attacks &amp; Incident Response</category>
            <category>events</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Network Segmentation</category>
            <category>Privacy and Security</category>
            <category>prof wool</category>
            <category>Risk Management and Vulnerabilities</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/video_medium/microsegmentation-mapping-video.mp4?source=podcast" type="video/mp4" length="13465324"/>
            <title>Microsegmentation - Mapping Existing Applications</title>
            <link>http://video.algosec.com/microsegmentation-mapping</link>
            <description>&lt;p&gt;&lt;p&gt;Watch Prof. Wool as he shares tips on how to
prepare for network segmentation by identifying the segment borders&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-mapping"&gt;&lt;img src="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52938308</guid>
            <pubDate>Thu, 13 Jun 2019 16:46:05 GMT</pubDate>
            <media:title>Microsegmentation - Mapping Existing Applications</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Watch Prof. Wool as he shares tips on how to
prepare for network segmentation by identifying the segment borders&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-mapping"&gt;&lt;img src="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=6c21a30be19567d6b5e00c464942fbeb&amp;source=podcast&amp;photo%5fid=52938308" width="625" height="352" type="text/html" medium="video" duration="252" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/video_medium/lesson-7-how-to-prepare-for-network-video.mp4?source=podcast" type="video/mp4" length="13749334"/>
            <title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</title>
            <link>http://video.algosec.com/lesson-7-how-to-prepare-for-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181819</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f796f81cc13de312cc8c7bd06b607f5b&amp;source=podcast&amp;photo%5fid=44181819" width="625" height="352" type="text/html" medium="video" duration="247" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>avishai wool</category>
            <category>cloud security</category>
            <category>Data Center</category>
            <category>data center security</category>
            <category>east west traffic</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/video_medium/lesson-3-best-practices-for-video.mp4?source=podcast" type="video/mp4" length="15731335"/>
            <title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the...</title>
            <link>http://video.algosec.com/lesson-3-best-practices-for</link>
            <description>&lt;p&gt;Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-best-practices-for"&gt;&lt;img src="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182196</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the...</media:title>
            <media:description type="html">&lt;p&gt;Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-best-practices-for"&gt;&lt;img src="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9215d82e7075332ada9014679d1d6b7b&amp;source=podcast&amp;photo%5fid=44182196" width="625" height="352" type="text/html" medium="video" duration="297" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>auditing</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/video_medium/lesson-1-migrating-to-nsx-video.mp4?source=podcast" type="video/mp4" length="17310417"/>
            <title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</title>
            <link>http://video.algosec.com/lesson-1-migrating-to-nsx</link>
            <description>&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182155</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</media:title>
            <media:description type="html">&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=def81240212859275a1a7e8e49361dd8&amp;source=podcast&amp;photo%5fid=44182155" width="625" height="352" type="text/html" medium="video" duration="319" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/video_medium/lesson-2-tips-on-how-to-create-video.mp4?source=podcast" type="video/mp4" length="19480685"/>
            <title>Lesson 2: Tips on How to Create Filtering Policies for NSX</title>
            <link>http://video.algosec.com/lesson-2-tips-on-how-to-create</link>
            <description>&lt;p&gt;Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-tips-on-how-to-create"&gt;&lt;img src="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182098</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: Tips on How to Create Filtering Policies for NSX</media:title>
            <media:description type="html">&lt;p&gt;Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-tips-on-how-to-create"&gt;&lt;img src="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ce089eaa3bad2d6123444b73d7e938e8&amp;source=podcast&amp;photo%5fid=44182098" width="625" height="352" type="text/html" medium="video" duration="381" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/video_medium/lesson-5-the-challenges-of-east-video.mp4?source=podcast" type="video/mp4" length="13531854"/>
            <title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</title>
            <link>http://video.algosec.com/lesson-5-the-challenges-of-east</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-the-challenges-of-east"&gt;&lt;img src="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182248</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-the-challenges-of-east"&gt;&lt;img src="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=29825a33ac4f02b0fdd0df1d19c6aafc&amp;source=podcast&amp;photo%5fid=44182248" width="625" height="352" type="text/html" medium="video" duration="261" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>network security</category>
            <category>network security segmentation</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/video_medium/lesson-6-how-to-build-firewall-video.mp4?source=podcast" type="video/mp4" length="24591521"/>
            <title>Lesson 6: How to Build Firewall Policies for East West Traffic</title>
            <link>http://video.algosec.com/lesson-6-how-to-build-firewall</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182175</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 6: How to Build Firewall Policies for East West Traffic</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0b703ddeea2e989e3bc350549757ce6a&amp;source=podcast&amp;photo%5fid=44182175" width="625" height="352" type="text/html" medium="video" duration="439" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/video_medium/lesson-3-common-mistakes-and-best-video.mp4?source=podcast" type="video/mp4" length="21328766"/>
            <title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security...</title>
            <link>http://video.algosec.com/lesson-3-common-mistakes-and-best</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-common-mistakes-and-best"&gt;&lt;img src="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182303</guid>
            <pubDate>Thu, 26 Mar 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security...</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-common-mistakes-and-best"&gt;&lt;img src="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=01e5f51fd43db5def8186c84fe86ec65&amp;source=podcast&amp;photo%5fid=44182303" width="625" height="352" type="text/html" medium="video" duration="405" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewalls</category>
            <category>network security</category>
            <category>network security zone</category>
            <category>network security zones</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security zone</category>
            <category>security zones</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/video_medium/lesson-4-data-center-segmentation-video.mp4?source=podcast" type="video/mp4" length="16927987"/>
            <title>Lesson 4: Data Center Segmentation Best Practices</title>
            <link>http://video.algosec.com/lesson-4-data-center-segmentation</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-data-center-segmentation"&gt;&lt;img src="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182229</guid>
            <pubDate>Wed, 28 Jan 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Data Center Segmentation Best Practices</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-data-center-segmentation"&gt;&lt;img src="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e7de21fde97412592b2fd22ec86e6e4a&amp;source=podcast&amp;photo%5fid=44182229" width="625" height="352" type="text/html" medium="video" duration="308" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>network security</category>
            <category>network security segmentation</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/video_medium/lesson-9-how-to-structure-network-video.mp4?source=podcast" type="video/mp4" length="20686665"/>
            <title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</title>
            <link>http://video.algosec.com/lesson-9-how-to-structure-network</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182306</guid>
            <pubDate>Mon, 08 Dec 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f008f7c1f97aa3aa33a02182c9c550d8&amp;source=podcast&amp;photo%5fid=44182306" width="625" height="352" type="text/html" medium="video" duration="334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>security software</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/video_medium/lesson-1-how-to-structure-your-video.mp4?source=podcast" type="video/mp4" length="20321042"/>
            <title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</title>
            <link>http://video.algosec.com/lesson-1-how-to-structure-your</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-structure-your"&gt;&lt;img src="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182257</guid>
            <pubDate>Wed, 01 Oct 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-structure-your"&gt;&lt;img src="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f89558d6f367f66d2f7fd246d7b932ed&amp;source=podcast&amp;photo%5fid=44182257" width="625" height="352" type="text/html" medium="video" duration="394" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/video_medium/lesson-2-how-to-define-simplify-and-video.mp4?source=podcast" type="video/mp4" length="17769151"/>
            <title>Lesson 2: How to Define, Simplify and Enforce Network Segmentation and...</title>
            <link>http://video.algosec.com/lesson-2-how-to-define-simplify-and</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool recommends a simple matrix to define network segments and security zones, and the traffic allowed to and from each zone. This matrix can then be used to immediately assess a firewall change requests as well as validate that existing security policies have been implemented correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-how-to-define-simplify-and"&gt;&lt;img src="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182330</guid>
            <pubDate>Thu, 14 Aug 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: How to Define, Simplify and Enforce Network Segmentation and...</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool recommends a simple matrix to define network segments and security zones, and the traffic allowed to and from each zone. This matrix can then be used to immediately assess a firewall change requests as well as validate that existing security policies have been implemented correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-how-to-define-simplify-and"&gt;&lt;img src="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a971e559de70d0684d8858d2c05145fc&amp;source=podcast&amp;photo%5fid=44182330" width="625" height="352" type="text/html" medium="video" duration="330" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>network segmentation</category>
            <category>network zoning</category>
            <category>prof wool</category>
        </item>
    </channel>
</rss>
