<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/rss/tag/ network security"/>
        <atom:link rel="next" href="https://video.algosec.com/rss/tag/ network security?tag=+network+security&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/video_medium/case-study-ncr-corporations-network-video.mp4?source=podcast" type="video/mp4" length="18029591"/>
            <title>Case Study: NCR Corporation's Network Security Transformation with AlgoSec</title>
            <link>http://video.algosec.com/case-study-ncr-corporations-network</link>
            <description>&lt;p&gt;Discover how NCR Corporation successfully integrated AlgoSec's Security Policy Management Solution into their network infrastructure. Learn how AlgoSec Firewall Analyzer, FireFlow, AppViz, and AppChange enabled NCR to automate security policy changes, improve visibility, streamline auditing, and achieve zero trust. Explore the benefits of AlgoSec's comprehensive suite of tools in enhancing network security for a global organization like NCR.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/case-study-ncr-corporations-network"&gt;&lt;img src="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/86775576</guid>
            <pubDate>Tue, 04 Jul 2023 16:59:33 GMT</pubDate>
            <media:title>Case Study: NCR Corporation's Network Security Transformation with AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;Discover how NCR Corporation successfully integrated AlgoSec's Security Policy Management Solution into their network infrastructure. Learn how AlgoSec Firewall Analyzer, FireFlow, AppViz, and AppChange enabled NCR to automate security policy changes, improve visibility, streamline auditing, and achieve zero trust. Explore the benefits of AlgoSec's comprehensive suite of tools in enhancing network security for a global organization like NCR.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/case-study-ncr-corporations-network"&gt;&lt;img src="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=328e01b63f7c400ea2da69de572ce8f5&amp;source=podcast&amp;photo%5fid=86775576" width="625" height="355" type="text/html" medium="video" duration="120" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>AlgoSec</category>
            <category> application connectivity</category>
            <category> auditing</category>
            <category> automation</category>
            <category> Cisco ACI</category>
            <category> container security.</category>
            <category>container security</category>
            <category> firewall management</category>
            <category> microsegmentation</category>
            <category>NCR Corporation</category>
            <category>network security</category>
            <category> risk analysis</category>
            <category> security policy management</category>
            <category> visibility</category>
            <category> zero trust</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/video_medium/master-the-zero-trust-strategy-for-video.mp4?source=podcast" type="video/mp4" length="79096815"/>
            <title>Master the Zero Trust Strategy for Improved Cybersecurity</title>
            <link>http://video.algosec.com/master-the-zero-trust-strategy-for</link>
            <description>&lt;p&gt;In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/master-the-zero-trust-strategy-for"&gt;&lt;img src="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/84210327</guid>
            <pubDate>Wed, 08 Mar 2023 17:01:07 GMT</pubDate>
            <media:title>Master the Zero Trust Strategy for Improved Cybersecurity</media:title>
            <media:description type="html">&lt;p&gt;In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/master-the-zero-trust-strategy-for"&gt;&lt;img src="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f244c9bfea16f9a9b492ce8a5122a148&amp;source=podcast&amp;photo%5fid=84210327" width="625" height="352" type="text/html" medium="video" duration="1180" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>cyberattack</category>
            <category>cyber threats</category>
            <category>micro-segmentatio</category>
            <category>micro-segmentation</category>
            <category>network managemen</category>
            <category>network management</category>
            <category>network securit</category>
            <category>network security</category>
            <category>ransomware</category>
            <category>risk management</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
            <category>security policy management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/video_medium/zero-trust-framework-for-network-video.mp4?source=podcast" type="video/mp4" length="108886012"/>
            <title>Zero Trust Framework for Network Security</title>
            <link>http://video.algosec.com/zero-trust-framework-for-network</link>
            <description>&lt;p&gt;With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zero-trust-framework-for-network"&gt;&lt;img src="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/83004257</guid>
            <pubDate>Thu, 02 Feb 2023 10:11:27 GMT</pubDate>
            <media:title>Zero Trust Framework for Network Security</media:title>
            <media:description type="html">&lt;p&gt;With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zero-trust-framework-for-network"&gt;&lt;img src="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bfa44d66208c73afcdb215c88f01464d&amp;source=podcast&amp;photo%5fid=83004257" width="625" height="391" type="text/html" medium="video" duration="2681" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>cyberattack</category>
            <category>cyber threats</category>
            <category>micro segmentation</category>
            <category>micro-segmentation</category>
            <category>network management</category>
            <category>network security</category>
            <category>ransomware</category>
            <category>risk management</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
            <category>security policy management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968561/76153315/7b4ae8232c2aaa81eacfab3737f455f6/video_medium/taking-charge-of-application-1-video.mp4?source=podcast" type="video/mp4" length="148558572"/>
            <title>Taking Charge of Application Security</title>
            <link>http://video.algosec.com/taking-charge-of-application-1</link>
            <description>&lt;p&gt;Eric Jeffery, AlgoSec's venerable regional solutions engineer, calls on the attention of AppSec network engineers and offers sage advice to organizations how to align their AppSec teams with their business goals. To learn more go to&amp;nbsp;&lt;a href="https://algosec.com"&gt;https://algosec.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taking-charge-of-application-1"&gt;&lt;img src="http://video.algosec.com/64968561/76153315/7b4ae8232c2aaa81eacfab3737f455f6/standard/download-25-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/76153315</guid>
            <pubDate>Tue, 14 Jun 2022 11:33:04 GMT</pubDate>
            <media:title>Taking Charge of Application Security</media:title>
            <media:description type="html">&lt;p&gt;Eric Jeffery, AlgoSec's venerable regional solutions engineer, calls on the attention of AppSec network engineers and offers sage advice to organizations how to align their AppSec teams with their business goals. To learn more go to&amp;nbsp;&lt;a href="https://algosec.com"&gt;https://algosec.com/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taking-charge-of-application-1"&gt;&lt;img src="http://video.algosec.com/64968561/76153315/7b4ae8232c2aaa81eacfab3737f455f6/standard/download-25-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7b4ae8232c2aaa81eacfab3737f455f6&amp;source=podcast&amp;photo%5fid=76153315" width="625" height="352" type="text/html" medium="video" duration="1230" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968561/76153315/7b4ae8232c2aaa81eacfab3737f455f6/standard/download-25-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity management</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968559/73612296/9a6059145be563694c04c76fd552708f/video_medium/how-to-modernize-your-video.mp4?source=podcast" type="video/mp4" length="197880717"/>
            <title>How to modernize your infrastructure without neglecting security.mp4</title>
            <link>http://video.algosec.com/how-to-modernize-your</link>
            <description>&lt;p&gt;Moving enterprise applications onto the cloud can deliver several benefits, including increased data protection, enhanced business agility, and significant cost savings. However, if the migration isn’t appropriately executed, your hybrid cloud network could be compromised. The key is to balance your digital transformation efforts by improving your infrastructure while providing all the necessary security controls.&lt;/p&gt;
&lt;p&gt;In this webinar, our expert panel dives into the steps required to migrate applications without sacrificing security.&lt;br /&gt;
Join us in this session to learn how to:&lt;/p&gt;
&lt;p&gt;•	Transfer the security elements of your application onto the cloud&lt;br /&gt;
•	Find ways to lower migration costs and reduce risks through better preparation&lt;br /&gt;
•	Modernize your infrastructure with the help of superior visibility&lt;br /&gt;
•	Structure your security policies across your entire hybrid and multi-cloud network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-modernize-your"&gt;&lt;img src="http://video.algosec.com/64968559/73612296/9a6059145be563694c04c76fd552708f/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/73612296</guid>
            <pubDate>Sun, 16 Jan 2022 11:28:45 GMT</pubDate>
            <media:title>How to modernize your infrastructure without neglecting security.mp4</media:title>
            <media:description type="html">&lt;p&gt;Moving enterprise applications onto the cloud can deliver several benefits, including increased data protection, enhanced business agility, and significant cost savings. However, if the migration isn’t appropriately executed, your hybrid cloud network could be compromised. The key is to balance your digital transformation efforts by improving your infrastructure while providing all the necessary security controls.&lt;/p&gt;
&lt;p&gt;In this webinar, our expert panel dives into the steps required to migrate applications without sacrificing security.&lt;br /&gt;
Join us in this session to learn how to:&lt;/p&gt;
&lt;p&gt;•	Transfer the security elements of your application onto the cloud&lt;br /&gt;
•	Find ways to lower migration costs and reduce risks through better preparation&lt;br /&gt;
•	Modernize your infrastructure with the help of superior visibility&lt;br /&gt;
•	Structure your security policies across your entire hybrid and multi-cloud network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-modernize-your"&gt;&lt;img src="http://video.algosec.com/64968559/73612296/9a6059145be563694c04c76fd552708f/standard/download-6-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9a6059145be563694c04c76fd552708f&amp;source=podcast&amp;photo%5fid=73612296" width="625" height="352" type="text/html" medium="video" duration="3058" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968559/73612296/9a6059145be563694c04c76fd552708f/standard/download-6-thumbnail.jpg" width="75" height=""/>
            <category>hybrid cloud</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543316/58920293/0d8ffa607b30b177ef077eed481124ec/video_medium/5-ways-algosec-enhances-your-f5-video.mp4?source=podcast" type="video/mp4" length="2271343"/>
            <title>5 ways AlgoSec enhances your F5 Security Posture Management</title>
            <link>http://video.algosec.com/5-ways-algosec-enhances-your-f5</link>
            <description>&lt;p&gt;Discover the benefits of integrating AlgoSec with your entire security infrastructure including F5 Advanced Firewall Manager (AFM) &amp;amp; Local Traffic Manager (LTM).&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-ways-algosec-enhances-your-f5"&gt;&lt;img src="http://video.algosec.com/49543316/58920293/0d8ffa607b30b177ef077eed481124ec/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/58920293</guid>
            <pubDate>Mon, 03 Jan 2022 17:11:50 GMT</pubDate>
            <media:title>5 ways AlgoSec enhances your F5 Security Posture Management</media:title>
            <media:description type="html">&lt;p&gt;Discover the benefits of integrating AlgoSec with your entire security infrastructure including F5 Advanced Firewall Manager (AFM) &amp;amp; Local Traffic Manager (LTM).&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-ways-algosec-enhances-your-f5"&gt;&lt;img src="http://video.algosec.com/49543316/58920293/0d8ffa607b30b177ef077eed481124ec/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0d8ffa607b30b177ef077eed481124ec&amp;source=podcast&amp;photo%5fid=58920293" width="625" height="469" type="text/html" medium="video" duration="77" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543316/58920293/0d8ffa607b30b177ef077eed481124ec/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>f5 networks</category>
            <category>Firewalls</category>
            <category>Network Security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/video_medium/top-5-predictions-best-practices-video.mp4?source=podcast" type="video/mp4" length="46819234"/>
            <title>Top 5 Predictions &amp; Best Practices for 2022</title>
            <link>http://video.algosec.com/top-5-predictions-best-practices</link>
            <description>&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/72839921</guid>
            <pubDate>Tue, 21 Dec 2021 14:09:54 GMT</pubDate>
            <media:title>Top 5 Predictions &amp; Best Practices for 2022</media:title>
            <media:description type="html">&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7644f86b455465ff65ca0eb3f8bfa109&amp;source=podcast&amp;photo%5fid=72839921" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>microsegmentation</category>
            <category>network security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/video_medium/build-and-enforce-defense-in-depth-video.mp4?source=podcast" type="video/mp4" length="88746932"/>
            <title>Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</title>
            <link>http://video.algosec.com/build-and-enforce-defense-in-depth</link>
            <description>&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;/b&gt;
&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;
&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;
&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;
• Understand your business applications to create your microsegmentation policy&lt;br&gt;
• Validate your micro-segmentation policy is accurate&lt;br&gt;
• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;
• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;
• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/build-and-enforce-defense-in-depth"&gt;&lt;img src="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63855367</guid>
            <pubDate>Sun, 28 Nov 2021 15:39:29 GMT</pubDate>
            <media:title>Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;/b&gt;
&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;
&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;
&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;
• Understand your business applications to create your microsegmentation policy&lt;br&gt;
• Validate your micro-segmentation policy is accurate&lt;br&gt;
• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;
• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;
• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/build-and-enforce-defense-in-depth"&gt;&lt;img src="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=95152215d0dafd06be978cd6f5cb488d&amp;source=podcast&amp;photo%5fid=63855367" width="625" height="352" type="text/html" medium="video" duration="3657" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/video_medium/gain-control-of-your-network-video.mp4?source=podcast" type="video/mp4" length="43586546"/>
            <title>Gain control of your network security with complete visibility: An AlgoSec...</title>
            <link>http://video.algosec.com/gain-control-of-your-network</link>
            <description>&lt;p&gt;In this technical demo of the AlgoSec Security Management Solution, we will show you how network security visibility is an important part of your security arsenal.
&lt;p&gt;Join the session and discover how to:&lt;br&gt;
   •	Gain visibility of your multi-vendor devices and traffic flows throughout your entire network – on-premises and in the cloud.&lt;br&gt;
   •	Ensure continuous compliance and reduce the effort needed to prepare for audits with out-of-the-box regulatory compliance reports.&lt;br&gt;
   •	Visualize and map firewall rulesets.&lt;br&gt;
   •	Identify and mitigate risky rules and provide intelligent recommendations to remediate the risks.&lt;/p&gt;
&lt;p&gt;Gain control of your network security policies with complete visibility.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/gain-control-of-your-network"&gt;&lt;img src="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/standard/download-9-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/62192775</guid>
            <pubDate>Thu, 29 Jul 2021 12:53:13 GMT</pubDate>
            <media:title>Gain control of your network security with complete visibility: An AlgoSec...</media:title>
            <media:description type="html">&lt;p&gt;In this technical demo of the AlgoSec Security Management Solution, we will show you how network security visibility is an important part of your security arsenal.
&lt;p&gt;Join the session and discover how to:&lt;br&gt;
   •	Gain visibility of your multi-vendor devices and traffic flows throughout your entire network – on-premises and in the cloud.&lt;br&gt;
   •	Ensure continuous compliance and reduce the effort needed to prepare for audits with out-of-the-box regulatory compliance reports.&lt;br&gt;
   •	Visualize and map firewall rulesets.&lt;br&gt;
   •	Identify and mitigate risky rules and provide intelligent recommendations to remediate the risks.&lt;/p&gt;
&lt;p&gt;Gain control of your network security policies with complete visibility.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/gain-control-of-your-network"&gt;&lt;img src="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/standard/download-9-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2c40c999839ca34d57f5f7e7edfcdbb7&amp;source=podcast&amp;photo%5fid=62192775" width="625" height="352" type="text/html" medium="video" duration="1993" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/standard/download-9-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>Live Demo Webcast</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968560/69717552/e270b38be7fd75ac627cbf283bbe5893/video_medium/managing-network-security-with-1-video.mp4?source=podcast" type="video/mp4" length="6230887"/>
            <title>Managing Network Security with AlgoSec in French</title>
            <link>http://video.algosec.com/managing-network-security-with-1</link>
            <description>&lt;p&gt;AlgoSec video for Fortinet France day&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-network-security-with-1"&gt;&lt;img src="http://video.algosec.com/64968560/69717552/e270b38be7fd75ac627cbf283bbe5893/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/69717552</guid>
            <pubDate>Thu, 24 Jun 2021 11:05:49 GMT</pubDate>
            <media:title>Managing Network Security with AlgoSec in French</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec video for Fortinet France day&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-network-security-with-1"&gt;&lt;img src="http://video.algosec.com/64968560/69717552/e270b38be7fd75ac627cbf283bbe5893/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e270b38be7fd75ac627cbf283bbe5893&amp;source=podcast&amp;photo%5fid=69717552" width="625" height="352" type="text/html" medium="video" duration="124" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968560/69717552/e270b38be7fd75ac627cbf283bbe5893/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968567/69441880/63cfca3766992764f7124280f27d813a/video_medium/how-to-modernise-your-video.mp4?source=podcast" type="video/mp4" length="102739934"/>
            <title>How to Modernise Your Infrastructure Without Neglecting Your Security</title>
            <link>http://video.algosec.com/how-to-modernise-your</link>
            <description>&lt;p&gt;Alex Hilton Chief Executive, CIF | Kyle Wickert Worldwide Strategic Architect, AlgoSec | Michael Meyer CRP, MRSBPO&lt;/p&gt;
&lt;p&gt;Episode 2 of Keeping Up-to-Date with Your Network Security&lt;/p&gt;
&lt;p&gt;There is a lot of value in moving enterprise applications onto the cloud. These benefits range from security and data protection and business agility, to financial benefits and faster time to markets. However, efforts can sometimes be misplaced, which causes disruption to the network and leaves you with inadequate security and compliance measures. Cloud network security is made up of multiple layered security, and before making the decision to use enterprise applications in the cloud, you must thoughtfully consider the variety of security controls you will use to secure your data.&lt;/p&gt;
&lt;p&gt;So, how can you elevate digital transformation and cloud migration efforts, without neglecting your security? Does it have to be one or the other, and if not, what steps should be taken in your transformation journeys to ensure that network security remains a priority?&lt;/p&gt;
&lt;p&gt;Join us in this session to learn more about:&lt;br /&gt;&lt;br /&gt;
- What is required to move the security portion of your application&lt;br /&gt;&lt;br /&gt;
- Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved&lt;br /&gt;&lt;br /&gt;
- How to enhance visibility, and why this is so important when modernising your infrastructure&lt;br /&gt;&lt;br /&gt;
- How to unify your network security management across a hybrid and multi-cloud environment&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-modernise-your"&gt;&lt;img src="http://video.algosec.com/64968567/69441880/63cfca3766992764f7124280f27d813a/standard/download-19-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/69441880</guid>
            <pubDate>Mon, 14 Jun 2021 13:40:34 GMT</pubDate>
            <media:title>How to Modernise Your Infrastructure Without Neglecting Your Security</media:title>
            <media:description type="html">&lt;p&gt;Alex Hilton Chief Executive, CIF | Kyle Wickert Worldwide Strategic Architect, AlgoSec | Michael Meyer CRP, MRSBPO&lt;/p&gt;
&lt;p&gt;Episode 2 of Keeping Up-to-Date with Your Network Security&lt;/p&gt;
&lt;p&gt;There is a lot of value in moving enterprise applications onto the cloud. These benefits range from security and data protection and business agility, to financial benefits and faster time to markets. However, efforts can sometimes be misplaced, which causes disruption to the network and leaves you with inadequate security and compliance measures. Cloud network security is made up of multiple layered security, and before making the decision to use enterprise applications in the cloud, you must thoughtfully consider the variety of security controls you will use to secure your data.&lt;/p&gt;
&lt;p&gt;So, how can you elevate digital transformation and cloud migration efforts, without neglecting your security? Does it have to be one or the other, and if not, what steps should be taken in your transformation journeys to ensure that network security remains a priority?&lt;/p&gt;
&lt;p&gt;Join us in this session to learn more about:&lt;br /&gt;&lt;br /&gt;
- What is required to move the security portion of your application&lt;br /&gt;&lt;br /&gt;
- Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved&lt;br /&gt;&lt;br /&gt;
- How to enhance visibility, and why this is so important when modernising your infrastructure&lt;br /&gt;&lt;br /&gt;
- How to unify your network security management across a hybrid and multi-cloud environment&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-modernise-your"&gt;&lt;img src="http://video.algosec.com/64968567/69441880/63cfca3766992764f7124280f27d813a/standard/download-19-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=63cfca3766992764f7124280f27d813a&amp;source=podcast&amp;photo%5fid=69441880" width="625" height="352" type="text/html" medium="video" duration="3130" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968567/69441880/63cfca3766992764f7124280f27d813a/standard/download-19-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968566/69536079/140324964f1a31c47b5100a2c54f8d7d/video_medium/migrate-modernize-supercharging-video.mp4?source=podcast" type="video/mp4" length="68356794"/>
            <title>Migrate &amp; modernize: Supercharging your Cisco Nexus refresh with ACI </title>
            <link>http://video.algosec.com/migrate-modernize-supercharging</link>
            <description>&lt;p&gt;If you still have Cisco Nexus 7000 devices in your environment, surely you have been inundated with end-of-life warnings and next-gen messaging touting the benefits of upgrading to Nexus 9000 with Cisco ACI.&lt;/p&gt;
&lt;p&gt;We know, modernizing your infrastructure can be a real pain, but with change also comes opportunity!&lt;/p&gt;
&lt;p&gt;Find out in this session how to leverage your Nexus refresh to increase your efficiency and productivity, and reduce security concerns at the same time.&lt;/p&gt;
&lt;p&gt;AlgoSec’s Jeremiah Cornelius, along with Cisco’s Cynthia Broderick, will guide you on how to:&lt;/p&gt;
&lt;p&gt;• Migrate your current Nexus flows to ACI using your preferred mode – network or application centric.&lt;br /&gt;&lt;br /&gt;
• Remove vulnerabilities caused by human error via automation of network change processes.&lt;br /&gt;&lt;br /&gt;
• Instantly identify and remediate risk and compliance violations.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migrate-modernize-supercharging"&gt;&lt;img src="http://video.algosec.com/64968566/69536079/140324964f1a31c47b5100a2c54f8d7d/standard/download-10-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/69536079</guid>
            <pubDate>Thu, 10 Jun 2021 22:27:12 GMT</pubDate>
            <media:title>Migrate &amp; modernize: Supercharging your Cisco Nexus refresh with ACI </media:title>
            <media:description type="html">&lt;p&gt;If you still have Cisco Nexus 7000 devices in your environment, surely you have been inundated with end-of-life warnings and next-gen messaging touting the benefits of upgrading to Nexus 9000 with Cisco ACI.&lt;/p&gt;
&lt;p&gt;We know, modernizing your infrastructure can be a real pain, but with change also comes opportunity!&lt;/p&gt;
&lt;p&gt;Find out in this session how to leverage your Nexus refresh to increase your efficiency and productivity, and reduce security concerns at the same time.&lt;/p&gt;
&lt;p&gt;AlgoSec’s Jeremiah Cornelius, along with Cisco’s Cynthia Broderick, will guide you on how to:&lt;/p&gt;
&lt;p&gt;• Migrate your current Nexus flows to ACI using your preferred mode – network or application centric.&lt;br /&gt;&lt;br /&gt;
• Remove vulnerabilities caused by human error via automation of network change processes.&lt;br /&gt;&lt;br /&gt;
• Instantly identify and remediate risk and compliance violations.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migrate-modernize-supercharging"&gt;&lt;img src="http://video.algosec.com/64968566/69536079/140324964f1a31c47b5100a2c54f8d7d/standard/download-10-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=140324964f1a31c47b5100a2c54f8d7d&amp;source=podcast&amp;photo%5fid=69536079" width="625" height="352" type="text/html" medium="video" duration="2522" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968566/69536079/140324964f1a31c47b5100a2c54f8d7d/standard/download-10-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity</category>
            <category>change management</category>
            <category>cisco</category>
            <category>cisco aci app</category>
            <category>network security</category>
            <category>sdn</category>
            <category>security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968556/65813899/417596c67ace9ab1c01d473b2d959d3f/video_medium/algosec-security-management-suite-11-video.mp4?source=podcast" type="video/mp4" length="31082766"/>
            <title>AlgoSec Security Management Suite Demo</title>
            <link>http://video.algosec.com/algosec-security-management-suite-11</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Dive deep into this demonstration of the
AlgoSec Security Management Suite.&lt;/p&gt;

&lt;p&gt;See how Firewall Analyzer provides
visibility into your network, visualize applications with AppViz, visualize
automatic network change management with FireFlow and see how you can even make
changes at the business application level with AppChange.&lt;/p&gt;&lt;span&gt;Click
here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/span&gt;&lt;br&gt;&lt;p&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-security-management-suite-11"&gt;&lt;img src="http://video.algosec.com/64968556/65813899/417596c67ace9ab1c01d473b2d959d3f/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/65813899</guid>
            <pubDate>Tue, 01 Jun 2021 16:35:18 GMT</pubDate>
            <media:title>AlgoSec Security Management Suite Demo</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Dive deep into this demonstration of the
AlgoSec Security Management Suite.&lt;/p&gt;

&lt;p&gt;See how Firewall Analyzer provides
visibility into your network, visualize applications with AppViz, visualize
automatic network change management with FireFlow and see how you can even make
changes at the business application level with AppChange.&lt;/p&gt;&lt;span&gt;Click
here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/span&gt;&lt;br&gt;&lt;p&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-security-management-suite-11"&gt;&lt;img src="http://video.algosec.com/64968556/65813899/417596c67ace9ab1c01d473b2d959d3f/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=417596c67ace9ab1c01d473b2d959d3f&amp;source=podcast&amp;photo%5fid=65813899" width="625" height="352" type="text/html" medium="video" duration="1323" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968556/65813899/417596c67ace9ab1c01d473b2d959d3f/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>fireflow</category>
            <category>firewalls</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968561/69009133/192a44c3aee0a29583c5cd40d5038a6e/video_medium/the-current-state-of-netops-secops-video.mp4?source=podcast" type="video/mp4" length="16564519"/>
            <title>The current state of NetOps &amp; SecOps</title>
            <link>http://video.algosec.com/the-current-state-of-netops-secops</link>
            <description>&lt;p&gt;Hear from network security experts on the current state of NetOps &amp; SecOps. How are security operations and network operations currently dealing with managing their network security and turning it into a strategic business asset.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-current-state-of-netops-secops"&gt;&lt;img src="http://video.algosec.com/64968561/69009133/192a44c3aee0a29583c5cd40d5038a6e/standard/download-8-thumbnail.jpg" width="569" height="480"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/69009133</guid>
            <pubDate>Tue, 01 Jun 2021 16:07:26 GMT</pubDate>
            <media:title>The current state of NetOps &amp; SecOps</media:title>
            <media:description type="html">&lt;p&gt;Hear from network security experts on the current state of NetOps &amp; SecOps. How are security operations and network operations currently dealing with managing their network security and turning it into a strategic business asset.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-current-state-of-netops-secops"&gt;&lt;img src="http://video.algosec.com/64968561/69009133/192a44c3aee0a29583c5cd40d5038a6e/standard/download-8-thumbnail.jpg" width="569" height="480"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=192a44c3aee0a29583c5cd40d5038a6e&amp;source=podcast&amp;photo%5fid=69009133" width="625" height="527" type="text/html" medium="video" duration="464" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968561/69009133/192a44c3aee0a29583c5cd40d5038a6e/standard/download-8-thumbnail.jpg" width="569" height="480"/>
            <category>cisco</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968567/68673625/ffd88edfe1c19862adf322229253fc69/video_medium/how-to-manage-your-cloud-journey-video.mp4?source=podcast" type="video/mp4" length="105071285"/>
            <title>How to manage your cloud journey</title>
            <link>http://video.algosec.com/how-to-manage-your-cloud-journey</link>
            <description>&lt;p&gt;&lt;h2&gt;Episode 1 of Keeping Up-to-Date with Your Network Security&amp;nbsp;&lt;/h2&gt;&lt;u&gt;Speakers:&lt;/u&gt;&lt;br&gt;Alex Hilton Chief Executive, CIF&amp;nbsp;&lt;div&gt;&lt;p&gt;Oren&amp;nbsp;Amiram&amp;nbsp;Director, Product Management, AlgoSec&amp;nbsp;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Stephen Owen CISO&amp;nbsp;&lt;/p&gt;&lt;/div&gt;Securing your data was once much&amp;nbsp;simpler. It’s&amp;nbsp;grown more complex in recent years.&amp;nbsp;As the workforce becomes more distributed, so does your data. Spreading your data across multiple public and private clouds complicates your&amp;nbsp;network. Today’s&amp;nbsp;data sits in multiple locations and geographies, and is made up of multiple public clouds, private clouds and other on-premises network devices.&amp;nbsp;Therefore,&amp;nbsp;managing your cloud journey can be tiresome and complicated.&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;Enter cloud management.&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;In this episode we’ll discuss:&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- How to manage multiple workloads on the cloud&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- What successful security management looks like for today’s enterprises&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- How to achieve simple, effective security management for your hybrid network&amp;nbsp;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-manage-your-cloud-journey"&gt;&lt;img src="http://video.algosec.com/64968567/68673625/ffd88edfe1c19862adf322229253fc69/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/68673625</guid>
            <pubDate>Wed, 12 May 2021 12:07:03 GMT</pubDate>
            <media:title>How to manage your cloud journey</media:title>
            <media:description type="html">&lt;p&gt;&lt;h2&gt;Episode 1 of Keeping Up-to-Date with Your Network Security&amp;nbsp;&lt;/h2&gt;&lt;u&gt;Speakers:&lt;/u&gt;&lt;br&gt;Alex Hilton Chief Executive, CIF&amp;nbsp;&lt;div&gt;&lt;p&gt;Oren&amp;nbsp;Amiram&amp;nbsp;Director, Product Management, AlgoSec&amp;nbsp;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Stephen Owen CISO&amp;nbsp;&lt;/p&gt;&lt;/div&gt;Securing your data was once much&amp;nbsp;simpler. It’s&amp;nbsp;grown more complex in recent years.&amp;nbsp;As the workforce becomes more distributed, so does your data. Spreading your data across multiple public and private clouds complicates your&amp;nbsp;network. Today’s&amp;nbsp;data sits in multiple locations and geographies, and is made up of multiple public clouds, private clouds and other on-premises network devices.&amp;nbsp;Therefore,&amp;nbsp;managing your cloud journey can be tiresome and complicated.&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;Enter cloud management.&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;In this episode we’ll discuss:&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- How to manage multiple workloads on the cloud&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- What successful security management looks like for today’s enterprises&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- How to achieve simple, effective security management for your hybrid network&amp;nbsp;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-manage-your-cloud-journey"&gt;&lt;img src="http://video.algosec.com/64968567/68673625/ffd88edfe1c19862adf322229253fc69/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ffd88edfe1c19862adf322229253fc69&amp;source=podcast&amp;photo%5fid=68673625" width="625" height="352" type="text/html" medium="video" duration="3036" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968567/68673625/ffd88edfe1c19862adf322229253fc69/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968566/68076664/ef90e0c554cbc0046df6524c071f172c/video_medium/modernize-your-network-and-harness-video.mp4?source=podcast" type="video/mp4" length="14721471"/>
            <title>Modernize your network and Harness the power of Nexus &amp; Cisco ACI with AlgoSec</title>
            <link>http://video.algosec.com/modernize-your-network-and-harness</link>
            <description>&lt;p&gt;Watch this short video and see how you can easily modernize your infrastructure with AlgoSec and upgrading your Cisco nexus switches to ACI&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/modernize-your-network-and-harness"&gt;&lt;img src="http://video.algosec.com/64968566/68076664/ef90e0c554cbc0046df6524c071f172c/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/68076664</guid>
            <pubDate>Tue, 06 Apr 2021 16:18:13 GMT</pubDate>
            <media:title>Modernize your network and Harness the power of Nexus &amp; Cisco ACI with AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;Watch this short video and see how you can easily modernize your infrastructure with AlgoSec and upgrading your Cisco nexus switches to ACI&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/modernize-your-network-and-harness"&gt;&lt;img src="http://video.algosec.com/64968566/68076664/ef90e0c554cbc0046df6524c071f172c/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ef90e0c554cbc0046df6524c071f172c&amp;source=podcast&amp;photo%5fid=68076664" width="625" height="352" type="text/html" medium="video" duration="535" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968566/68076664/ef90e0c554cbc0046df6524c071f172c/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>Change Management</category>
            <category>cisco</category>
            <category>network security</category>
            <category>sdn</category>
            <category>security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/video_medium/cisco-meraki-visibility-risk-video.mp4?source=podcast" type="video/mp4" length="8015397"/>
            <title>Cisco Meraki – Visibility, Risk &amp; Compliance Demo</title>
            <link>http://video.algosec.com/cisco-meraki-visibility-risk</link>
            <description>&lt;p&gt;Product demo - Discover how you can gain visibility, risk and compliance for Cisco Meraki.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-meraki-visibility-risk"&gt;&lt;img src="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/67772640</guid>
            <pubDate>Tue, 16 Mar 2021 19:52:09 GMT</pubDate>
            <media:title>Cisco Meraki – Visibility, Risk &amp; Compliance Demo</media:title>
            <media:description type="html">&lt;p&gt;Product demo - Discover how you can gain visibility, risk and compliance for Cisco Meraki.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-meraki-visibility-risk"&gt;&lt;img src="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=eb8d96ec23be780dc19e998830b76c13&amp;source=podcast&amp;photo%5fid=67772640" width="625" height="352" type="text/html" medium="video" duration="231" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/standard/download-17-thumbnail.jpg" width="75" height=""/>
            <category>Auditing and Compliance</category>
            <category>data center</category>
            <category>information security</category>
            <category>network security</category>
            <category>Risk Analysis</category>
            <category>SD-WAN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968569/66274665/8ec6ebe318a61a9e201db2cb228728b8/video_medium/5-power-tips-to-keep-your-network-video.mp4?source=podcast" type="video/mp4" length="123358882"/>
            <title>5 power tips to keep your network secure in 2021</title>
            <link>http://video.algosec.com/5-power-tips-to-keep-your-network</link>
            <description>&lt;p&gt;&lt;b&gt;Jade Kahn and Asher Benbenisty | Jan 13, 2021&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;b&gt;
&lt;/b&gt;&lt;p&gt;No one could have predicted how unpredictable 2020 would be, so we’re here to help you get prepared for whatever is in store in 2021.&lt;/p&gt;
No matter what happens in the upcoming year – there are five things you can do now to keep your network secure in 2021.&lt;br&gt;&lt;br&gt;Join network security experts Jade Kahn and Asher Benbenisty, and learn how to:&lt;br&gt;&lt;br&gt;&lt;ol&gt;&lt;li&gt;Never fly blind: Ensure visibility across your entire hybrid network&lt;/li&gt;&lt;li&gt;Do more with less: Accelerate digital transformation &amp;amp; avoid misconfigurations with automation&lt;/li&gt;&lt;li&gt;Stay continuously compliant&lt;/li&gt;&lt;li&gt;Fight ransomware with micro-segmentation&lt;/li&gt;&lt;li&gt;Accelerate in the cloud&lt;/li&gt;&lt;/ol&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-power-tips-to-keep-your-network"&gt;&lt;img src="http://video.algosec.com/64968569/66274665/8ec6ebe318a61a9e201db2cb228728b8/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/66274665</guid>
            <pubDate>Wed, 13 Jan 2021 18:48:57 GMT</pubDate>
            <media:title>5 power tips to keep your network secure in 2021</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Jade Kahn and Asher Benbenisty | Jan 13, 2021&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;b&gt;
&lt;/b&gt;&lt;p&gt;No one could have predicted how unpredictable 2020 would be, so we’re here to help you get prepared for whatever is in store in 2021.&lt;/p&gt;
No matter what happens in the upcoming year – there are five things you can do now to keep your network secure in 2021.&lt;br&gt;&lt;br&gt;Join network security experts Jade Kahn and Asher Benbenisty, and learn how to:&lt;br&gt;&lt;br&gt;&lt;ol&gt;&lt;li&gt;Never fly blind: Ensure visibility across your entire hybrid network&lt;/li&gt;&lt;li&gt;Do more with less: Accelerate digital transformation &amp;amp; avoid misconfigurations with automation&lt;/li&gt;&lt;li&gt;Stay continuously compliant&lt;/li&gt;&lt;li&gt;Fight ransomware with micro-segmentation&lt;/li&gt;&lt;li&gt;Accelerate in the cloud&lt;/li&gt;&lt;/ol&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-power-tips-to-keep-your-network"&gt;&lt;img src="http://video.algosec.com/64968569/66274665/8ec6ebe318a61a9e201db2cb228728b8/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=8ec6ebe318a61a9e201db2cb228728b8&amp;source=podcast&amp;photo%5fid=66274665" width="625" height="352" type="text/html" medium="video" duration="2286" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968569/66274665/8ec6ebe318a61a9e201db2cb228728b8/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968570/65743138/a95ce97df54ed8d96b5d9fee26f9c2da/video_medium/a-customer-story-the-ncr-journey-to-video.mp4?source=podcast" type="video/mp4" length="152943910"/>
            <title>A Customer Story: The NCR journey to effective and agile network security</title>
            <link>http://video.algosec.com/a-customer-story-the-ncr-journey-to</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Scott Theriault, Global Manager, Network Perimeter Security (NCR Corporation) | Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)&lt;/b&gt;  |  Dec 17, 2020&lt;/p&gt;
&lt;p&gt;Managing security in a multi-billion-dollar enterprise poses many challenges, as well as opportunities. Go inside an S&amp;amp;P 500 company and hear how they manage their network security.&lt;/p&gt;
&lt;p&gt;Join Scott Theriault, Global Manager, Network Perimeter Security at NCR Corporation as he shares his real-world experience managing security in a global organization with Yitzy Tannenbaum, Product Marketing Manager at AlgoSec. Get insights on:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Key factors managing network security in complex organizations&lt;/li&gt;&lt;li&gt;The benefits of network policy optimization&lt;/li&gt;&lt;li&gt;Importance of maintaining and demonstrating compliance&lt;/li&gt;&lt;li&gt;Change management and automation in large, complex networks&lt;/li&gt;&lt;li&gt;Driving alignment of cloud and on-premises security&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/a-customer-story-the-ncr-journey-to"&gt;&lt;img src="http://video.algosec.com/64968570/65743138/a95ce97df54ed8d96b5d9fee26f9c2da/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/65743138</guid>
            <pubDate>Sun, 20 Dec 2020 19:28:39 GMT</pubDate>
            <media:title>A Customer Story: The NCR journey to effective and agile network security</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Scott Theriault, Global Manager, Network Perimeter Security (NCR Corporation) | Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)&lt;/b&gt;  |  Dec 17, 2020&lt;/p&gt;
&lt;p&gt;Managing security in a multi-billion-dollar enterprise poses many challenges, as well as opportunities. Go inside an S&amp;amp;P 500 company and hear how they manage their network security.&lt;/p&gt;
&lt;p&gt;Join Scott Theriault, Global Manager, Network Perimeter Security at NCR Corporation as he shares his real-world experience managing security in a global organization with Yitzy Tannenbaum, Product Marketing Manager at AlgoSec. Get insights on:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Key factors managing network security in complex organizations&lt;/li&gt;&lt;li&gt;The benefits of network policy optimization&lt;/li&gt;&lt;li&gt;Importance of maintaining and demonstrating compliance&lt;/li&gt;&lt;li&gt;Change management and automation in large, complex networks&lt;/li&gt;&lt;li&gt;Driving alignment of cloud and on-premises security&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/a-customer-story-the-ncr-journey-to"&gt;&lt;img src="http://video.algosec.com/64968570/65743138/a95ce97df54ed8d96b5d9fee26f9c2da/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a95ce97df54ed8d96b5d9fee26f9c2da&amp;source=podcast&amp;photo%5fid=65743138" width="625" height="355" type="text/html" medium="video" duration="2924" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968570/65743138/a95ce97df54ed8d96b5d9fee26f9c2da/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>customer story</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445188/64889600/20b747595bfc66082c680695eb8af3a8/video_medium/cloud-migrations-made-simpler-safe-video.mp4?source=podcast" type="video/mp4" length="54888076"/>
            <title>Cloud migrations made simpler: Safe, Secure and Successful Migrations Webinar</title>
            <link>http://video.algosec.com/cloud-migrations-made-simpler-safe</link>
            <description>&lt;p&gt;Migrating applications to the cloud – without creating security holes, application outages or violating compliance – is within reach!&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, Director of Product at AlgoSec, will guide you on how to simplify and accelerate large-scale complex application migration projects.&lt;/p&gt;
&lt;p&gt;The webinar will cover:&lt;br&gt;
   •	Why organizations choose to migrate their applications to the cloud&lt;br&gt;
   •	What is required in order to move the security portion of your application and how long it may take&lt;br&gt;
   •	Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved&lt;br&gt;
   •	How to deliver unified security policy management across the hybrid cloud environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cloud-migrations-made-simpler-safe"&gt;&lt;img src="http://video.algosec.com/60445188/64889600/20b747595bfc66082c680695eb8af3a8/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/64889600</guid>
            <pubDate>Wed, 28 Oct 2020 18:45:32 GMT</pubDate>
            <media:title>Cloud migrations made simpler: Safe, Secure and Successful Migrations Webinar</media:title>
            <media:description type="html">&lt;p&gt;Migrating applications to the cloud – without creating security holes, application outages or violating compliance – is within reach!&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, Director of Product at AlgoSec, will guide you on how to simplify and accelerate large-scale complex application migration projects.&lt;/p&gt;
&lt;p&gt;The webinar will cover:&lt;br&gt;
   •	Why organizations choose to migrate their applications to the cloud&lt;br&gt;
   •	What is required in order to move the security portion of your application and how long it may take&lt;br&gt;
   •	Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved&lt;br&gt;
   •	How to deliver unified security policy management across the hybrid cloud environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cloud-migrations-made-simpler-safe"&gt;&lt;img src="http://video.algosec.com/60445188/64889600/20b747595bfc66082c680695eb8af3a8/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=20b747595bfc66082c680695eb8af3a8&amp;source=podcast&amp;photo%5fid=64889600" width="625" height="352" type="text/html" medium="video" duration="2150" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445188/64889600/20b747595bfc66082c680695eb8af3a8/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>cloud migration</category>
            <category>cloud security</category>
            <category>migrate applications</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445025/64563330/f2e2295e340b972dcb3452a894e31370/video_medium/overcoming-the-challenges-of-video.mp4?source=podcast" type="video/mp4" length="84363803"/>
            <title>Overcoming the Challenges of Managing a Hybrid Environment</title>
            <link>http://video.algosec.com/overcoming-the-challenges-of</link>
            <description>&lt;p&gt;Omer Ganot, Cloud Security Product Manager (AlgoSec), Stuti Deshpande, Partner Solution Architect (AWS) | Sep 2020&lt;/p&gt;
&lt;p&gt;Public clouds such as Amazon Web Services (AWS) are a critical part of your hybrid network. It is important to keep out the bad guys (including untrusted insiders) and proactively secure your entire hybrid network.&lt;/p&gt;
&lt;p&gt;Securing your network is both the responsibility of the cloud providers, as well as your organization’s IT and CISOs – the shared responsibility model. As a result, your organization needs visibility into what needs to be protected, as well as an understanding of the tools that are available to keep them secure.&lt;/p&gt;
&lt;p&gt;In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande's, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment, including how to:&lt;br /&gt;
&lt;br /&gt;
    •	Securely migrate workloads from on-prem to public cloud&lt;br /&gt;
    •	Gain unified visibility into your network topology and traffic flows, including both public cloud and on-premises assets, from a single console.&lt;br /&gt;
    •	Manage/orchestrate multiple layers of security controls and proactively detect misconfigurations&lt;br /&gt;
    •	Protect your data, accounts, and workloads from misconfiguration risks&lt;br /&gt;
    •	Protect web applications in AWS by filtering traffic and blocking common attack patterns, such as SQL injection or cross-site scripting&lt;br /&gt;
    •	Gain a unified view of your compliance status and achieve continuous compliance&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/overcoming-the-challenges-of"&gt;&lt;img src="http://video.algosec.com/60445025/64563330/f2e2295e340b972dcb3452a894e31370/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/64563330</guid>
            <pubDate>Thu, 01 Oct 2020 15:58:19 GMT</pubDate>
            <media:title>Overcoming the Challenges of Managing a Hybrid Environment</media:title>
            <media:description type="html">&lt;p&gt;Omer Ganot, Cloud Security Product Manager (AlgoSec), Stuti Deshpande, Partner Solution Architect (AWS) | Sep 2020&lt;/p&gt;
&lt;p&gt;Public clouds such as Amazon Web Services (AWS) are a critical part of your hybrid network. It is important to keep out the bad guys (including untrusted insiders) and proactively secure your entire hybrid network.&lt;/p&gt;
&lt;p&gt;Securing your network is both the responsibility of the cloud providers, as well as your organization’s IT and CISOs – the shared responsibility model. As a result, your organization needs visibility into what needs to be protected, as well as an understanding of the tools that are available to keep them secure.&lt;/p&gt;
&lt;p&gt;In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande's, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment, including how to:&lt;br /&gt;
&lt;br /&gt;
    •	Securely migrate workloads from on-prem to public cloud&lt;br /&gt;
    •	Gain unified visibility into your network topology and traffic flows, including both public cloud and on-premises assets, from a single console.&lt;br /&gt;
    •	Manage/orchestrate multiple layers of security controls and proactively detect misconfigurations&lt;br /&gt;
    •	Protect your data, accounts, and workloads from misconfiguration risks&lt;br /&gt;
    •	Protect web applications in AWS by filtering traffic and blocking common attack patterns, such as SQL injection or cross-site scripting&lt;br /&gt;
    •	Gain a unified view of your compliance status and achieve continuous compliance&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/overcoming-the-challenges-of"&gt;&lt;img src="http://video.algosec.com/60445025/64563330/f2e2295e340b972dcb3452a894e31370/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f2e2295e340b972dcb3452a894e31370&amp;source=podcast&amp;photo%5fid=64563330" width="625" height="352" type="text/html" medium="video" duration="3330" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445025/64563330/f2e2295e340b972dcb3452a894e31370/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>aws</category>
            <category>cloud security</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650859/64479563/08337be4b8356079adb277355c6a83f5/video_medium/cisco-algosec-achieving-2-video.mp4?source=podcast" type="video/mp4" length="92357004"/>
            <title>Cisco &amp; AlgoSec Achieving application-driven security across your hybrid network</title>
            <link>http://video.algosec.com/cisco-algosec-achieving-2</link>
            <description>&lt;p&gt;&lt;b&gt;Roxana Diaz, Worldwide Technical Solutions Architect (Cisco), Yonatan Klein, Director of Product (AlgoSec)&lt;/b&gt;
&lt;p&gt;Your network extends into hybrid environments and may include private clouds running Cisco ACI, and on-premises devices. Managing network security policies in your multi-vendor estate is complex.&lt;/p&gt;
&lt;p&gt;Because your network is made up of multiple vendors and each part of your network estate is managed in its own silo, it is tough to get centralized management of your entire network. Making changes is a chore and validating security is difficult.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate, and automate your entire network security policy management across your Cisco and multi-vendor estate.&lt;/p&gt;
&lt;p&gt;In this session Roxana Diaz, Worldwide Technical Solutions Architect at Cisco, and Yonatan Klein, AlgoSec’s Director of Product, will discuss how to manage the Cisco and multi-cloud estate and how to:&lt;br&gt;
• Capitalize on your Cisco ACI investment to take advantage of its full capabilities&lt;br&gt;
• Bring centralized visibility, automation, and compliance monitoring into your Cisco and multi-vendor network ecosystem&lt;br&gt;
• Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it, including Cisco firewalls and routers, as well as multi-vendor devices.&lt;br&gt;
• Take advantage of Cisco Tetration Analytics and AlgoSec’s intelligent discovery to get a full picture of your network and application traffic and to design and provision a micro-segmentation network policy design.&lt;br&gt;
• Unify, consolidate, and automate your network security policy management&lt;br&gt;
• Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-algosec-achieving-2"&gt;&lt;img src="http://video.algosec.com/60650859/64479563/08337be4b8356079adb277355c6a83f5/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/64479563</guid>
            <pubDate>Wed, 23 Sep 2020 17:32:39 GMT</pubDate>
            <media:title>Cisco &amp; AlgoSec Achieving application-driven security across your hybrid network</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Roxana Diaz, Worldwide Technical Solutions Architect (Cisco), Yonatan Klein, Director of Product (AlgoSec)&lt;/b&gt;
&lt;p&gt;Your network extends into hybrid environments and may include private clouds running Cisco ACI, and on-premises devices. Managing network security policies in your multi-vendor estate is complex.&lt;/p&gt;
&lt;p&gt;Because your network is made up of multiple vendors and each part of your network estate is managed in its own silo, it is tough to get centralized management of your entire network. Making changes is a chore and validating security is difficult.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate, and automate your entire network security policy management across your Cisco and multi-vendor estate.&lt;/p&gt;
&lt;p&gt;In this session Roxana Diaz, Worldwide Technical Solutions Architect at Cisco, and Yonatan Klein, AlgoSec’s Director of Product, will discuss how to manage the Cisco and multi-cloud estate and how to:&lt;br&gt;
• Capitalize on your Cisco ACI investment to take advantage of its full capabilities&lt;br&gt;
• Bring centralized visibility, automation, and compliance monitoring into your Cisco and multi-vendor network ecosystem&lt;br&gt;
• Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it, including Cisco firewalls and routers, as well as multi-vendor devices.&lt;br&gt;
• Take advantage of Cisco Tetration Analytics and AlgoSec’s intelligent discovery to get a full picture of your network and application traffic and to design and provision a micro-segmentation network policy design.&lt;br&gt;
• Unify, consolidate, and automate your network security policy management&lt;br&gt;
• Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-algosec-achieving-2"&gt;&lt;img src="http://video.algosec.com/60650859/64479563/08337be4b8356079adb277355c6a83f5/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=08337be4b8356079adb277355c6a83f5&amp;source=podcast&amp;photo%5fid=64479563" width="625" height="352" type="text/html" medium="video" duration="3744" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650859/64479563/08337be4b8356079adb277355c6a83f5/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>hybrid cloud</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/video_medium/webcast-build-and-enforce-defense-video.mp4?source=podcast" type="video/mp4" length="88746932"/>
            <title>Webcast: Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</title>
            <link>http://video.algosec.com/webcast-build-and-enforce-defense</link>
            <description>&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;• Understand your business applications to create your microsegmentation policy&lt;br&gt;• Validate your micro-segmentation policy is accurate&lt;br&gt;• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/webcast-build-and-enforce-defense"&gt;&lt;img src="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/64277400</guid>
            <pubDate>Wed, 23 Sep 2020 15:45:44 GMT</pubDate>
            <media:title>Webcast: Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;• Understand your business applications to create your microsegmentation policy&lt;br&gt;• Validate your micro-segmentation policy is accurate&lt;br&gt;• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/webcast-build-and-enforce-defense"&gt;&lt;img src="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c9c6f0f278f999d541c1a492c84e245c&amp;source=podcast&amp;photo%5fid=64277400" width="625" height="352" type="text/html" medium="video" duration="3657" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>data center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/video_medium/panel-discussion-network-security-1-video.mp4?source=podcast" type="video/mp4" length="75817726"/>
            <title>Panel Discussion: Network Security and Compliance best practices for...</title>
            <link>http://video.algosec.com/panel-discussion-network-security-1</link>
            <description>&lt;p&gt;Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy&lt;br /&gt;
management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.&lt;/p&gt;
&lt;p&gt;There’s a better way to manage your network security!&lt;/p&gt;
&lt;p&gt;Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.&lt;/p&gt;
&lt;p&gt;Topics include:&lt;/p&gt;
&lt;p&gt;• How to overcome security management complexities with automation&lt;br /&gt;
• How to pass compliance audits in the face of demanding regulations&lt;br /&gt;
• Key industry metrics that compare security environments within and beyond the finance industry&lt;br /&gt;
• Real financial customers case studies&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/panel-discussion-network-security-1"&gt;&lt;img src="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44415276</guid>
            <pubDate>Tue, 15 Sep 2020 20:06:08 GMT</pubDate>
            <media:title>Panel Discussion: Network Security and Compliance best practices for...</media:title>
            <media:description type="html">&lt;p&gt;Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy&lt;br /&gt;
management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.&lt;/p&gt;
&lt;p&gt;There’s a better way to manage your network security!&lt;/p&gt;
&lt;p&gt;Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.&lt;/p&gt;
&lt;p&gt;Topics include:&lt;/p&gt;
&lt;p&gt;• How to overcome security management complexities with automation&lt;br /&gt;
• How to pass compliance audits in the face of demanding regulations&lt;br /&gt;
• Key industry metrics that compare security environments within and beyond the finance industry&lt;br /&gt;
• Real financial customers case studies&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/panel-discussion-network-security-1"&gt;&lt;img src="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=24cb2f0d85632231cc3bd811592c9758&amp;source=podcast&amp;photo%5fid=44415276" width="625" height="352" type="text/html" medium="video" duration="1355" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>audit</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>fintech</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>firewalls management</category>
            <category>network security</category>
            <category>network security policy management</category>
            <category>security analysis</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445025/63662374/cfb4ba081a83e678c0c8516bef2ce6da/video_medium/micro-segmentation-from-strategy-video.mp4?source=podcast" type="video/mp4" length="78185209"/>
            <title>Micro-segmentation – from Strategy to Execution</title>
            <link>http://video.algosec.com/micro-segmentation-from-strategy</link>
            <description>&lt;p&gt;Avishai Wool, CTO &amp;amp; Co-founder (AlgoSec) | June 2020&lt;br&gt;
&lt;p&gt;Organizations heavily invest in security solutions to keep their networks safe, but still struggle to close the security gaps. Micro-segmentation helps protect against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren’t sure where to begin or what approach to take.&lt;/p&gt;
&lt;p&gt;In this practical webinar, Prof. Avishai Wool, AlgoSec’s CTO and co-founder will guide you through each stage of a micro-segmentation project – from developing the correct micro-segmentation strategy to effectively implementing it and continually maintaining your micro-segmented network.&lt;/p&gt;
&lt;p&gt;Register now for this live webinar and get a practical blueprint to creating your micro-segmentation policy:&lt;/p&gt;
&lt;p&gt;• What is micro-segmentation.&lt;br&gt;
• Common pitfalls in micro-segmentation projects and how to avoid them.&lt;br&gt;
• The stages of a successful micro-segmentation project.&lt;br&gt;
• The role of policy change management and automation in micro-segmentation.&lt;/p&gt;
&lt;p&gt;Don't forget to also click on the links in the Attachments tab.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/micro-segmentation-from-strategy"&gt;&lt;img src="http://video.algosec.com/60445025/63662374/cfb4ba081a83e678c0c8516bef2ce6da/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63662374</guid>
            <pubDate>Wed, 08 Jul 2020 22:48:10 GMT</pubDate>
            <media:title>Micro-segmentation – from Strategy to Execution</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, CTO &amp;amp; Co-founder (AlgoSec) | June 2020&lt;br&gt;
&lt;p&gt;Organizations heavily invest in security solutions to keep their networks safe, but still struggle to close the security gaps. Micro-segmentation helps protect against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren’t sure where to begin or what approach to take.&lt;/p&gt;
&lt;p&gt;In this practical webinar, Prof. Avishai Wool, AlgoSec’s CTO and co-founder will guide you through each stage of a micro-segmentation project – from developing the correct micro-segmentation strategy to effectively implementing it and continually maintaining your micro-segmented network.&lt;/p&gt;
&lt;p&gt;Register now for this live webinar and get a practical blueprint to creating your micro-segmentation policy:&lt;/p&gt;
&lt;p&gt;• What is micro-segmentation.&lt;br&gt;
• Common pitfalls in micro-segmentation projects and how to avoid them.&lt;br&gt;
• The stages of a successful micro-segmentation project.&lt;br&gt;
• The role of policy change management and automation in micro-segmentation.&lt;/p&gt;
&lt;p&gt;Don't forget to also click on the links in the Attachments tab.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/micro-segmentation-from-strategy"&gt;&lt;img src="http://video.algosec.com/60445025/63662374/cfb4ba081a83e678c0c8516bef2ce6da/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cfb4ba081a83e678c0c8516bef2ce6da&amp;source=podcast&amp;photo%5fid=63662374" width="625" height="352" type="text/html" medium="video" duration="3591" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445025/63662374/cfb4ba081a83e678c0c8516bef2ce6da/standard/download-6-thumbnail.jpg" width="600" height="338"/>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445186/63522855/17e31c960ede87ba9ea9027001658292/video_medium/5-practical-steps-to-implementing-a-video.mp4?source=podcast" type="video/mp4" length="117064550"/>
            <title>5 practical Steps to Implementing a Zero-Trust Network</title>
            <link>http://video.algosec.com/5-practical-steps-to-implementing-a</link>
            <description>&lt;p&gt;Chase Cunningham, Principal Analyst (Forrester Research), Prof. Avishai Wool, Co-founder &amp;amp; CTO (AlgoSec) | June 30, 2020
&lt;p&gt;A zero-trust architecture mitigates risk by only providing the minimally required access to your network resources. But implementing zero-trust is easier said than done.&lt;/p&gt;
&lt;p&gt;Get practical tips to successfully implement zero-trust architecture in this webinar featuring Chase Cunningham of Forrester Research and Prof. Avishai Wool, AlgoSec’s co-founder and CTO.&lt;/p&gt;
&lt;p&gt;In this session, they will discuss why zero-trust architecture is the blueprint for an effective security strategy, challenges implementing zero-trust architecture, as well as provide the five practical steps to successfully implementing zero-trust architecture:&lt;/p&gt;
&lt;p&gt;• Taking an inventory of your sensitive data and deciding how to segment it&lt;br&gt;
• Mapping the traffic flows of your sensitive data and associate them to your business applications&lt;br&gt;
• Designing and enforcing your network’s micro-perimeters&lt;br&gt;
• Ensuring all your security ecosystem integrates so you can holistically monitor and adjust your network if threats are detected&lt;br&gt;
• Embracing security automation and orchestration for long-term success&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-practical-steps-to-implementing-a"&gt;&lt;img src="http://video.algosec.com/60445186/63522855/17e31c960ede87ba9ea9027001658292/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63522855</guid>
            <pubDate>Tue, 07 Jul 2020 15:06:45 GMT</pubDate>
            <media:title>5 practical Steps to Implementing a Zero-Trust Network</media:title>
            <media:description type="html">&lt;p&gt;Chase Cunningham, Principal Analyst (Forrester Research), Prof. Avishai Wool, Co-founder &amp;amp; CTO (AlgoSec) | June 30, 2020
&lt;p&gt;A zero-trust architecture mitigates risk by only providing the minimally required access to your network resources. But implementing zero-trust is easier said than done.&lt;/p&gt;
&lt;p&gt;Get practical tips to successfully implement zero-trust architecture in this webinar featuring Chase Cunningham of Forrester Research and Prof. Avishai Wool, AlgoSec’s co-founder and CTO.&lt;/p&gt;
&lt;p&gt;In this session, they will discuss why zero-trust architecture is the blueprint for an effective security strategy, challenges implementing zero-trust architecture, as well as provide the five practical steps to successfully implementing zero-trust architecture:&lt;/p&gt;
&lt;p&gt;• Taking an inventory of your sensitive data and deciding how to segment it&lt;br&gt;
• Mapping the traffic flows of your sensitive data and associate them to your business applications&lt;br&gt;
• Designing and enforcing your network’s micro-perimeters&lt;br&gt;
• Ensuring all your security ecosystem integrates so you can holistically monitor and adjust your network if threats are detected&lt;br&gt;
• Embracing security automation and orchestration for long-term success&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-practical-steps-to-implementing-a"&gt;&lt;img src="http://video.algosec.com/60445186/63522855/17e31c960ede87ba9ea9027001658292/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=17e31c960ede87ba9ea9027001658292&amp;source=podcast&amp;photo%5fid=63522855" width="625" height="352" type="text/html" medium="video" duration="3361" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445186/63522855/17e31c960ede87ba9ea9027001658292/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Analyst</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>Zero Trust</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/59793974/fb58b308520346124ba9d7a22296a816/video_medium/achieving-visibility-and-security-1-video.mp4?source=podcast" type="video/mp4" length="95136379"/>
            <title>Achieving Visibility and Security in AWS and across the Hybrid Network | AWS...</title>
            <link>http://video.algosec.com/achieving-visibility-and-security-1</link>
            <description>&lt;p&gt;&lt;p&gt;As enterprises rapidly migrate data and applications to public clouds such as Amazon Web Services (AWS), they achieve many benefits, including advanced security capabilities, but also face new security challenges.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;AWS lets organizations operate applications in a hybrid deployment mode by providing multiple networking capabilities. To maintain an effective security posture while deploying applications across complex hybrid network environments, security professionals need a holistic view and control from a single source.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Yet, security isn’t just the responsibility of the cloud providers alone. Organizations need to understand the shared responsibility model and their role in maintaining a secure deployment. While AWS’s cloud framework is secured by AWS, the challenge of using the cloud securely is the responsibility of your organization’s IT and CISOs. As multiple DevOps and IT personnel make frequent configuration changes, the shared responsibility model helps achieve visibility and maintain cloud security.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, AlgoSec’s Director of Product, and Ram Dileepan, Amazon Web Service’s Partner Solutions Architect, will share best practices for network security governance in AWS and hybrid network environments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-visibility-and-security-1"&gt;&lt;img src="http://video.algosec.com/49543330/59793974/fb58b308520346124ba9d7a22296a816/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/59793974</guid>
            <pubDate>Tue, 07 Jul 2020 10:39:58 GMT</pubDate>
            <media:title>Achieving Visibility and Security in AWS and across the Hybrid Network | AWS...</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;As enterprises rapidly migrate data and applications to public clouds such as Amazon Web Services (AWS), they achieve many benefits, including advanced security capabilities, but also face new security challenges.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;AWS lets organizations operate applications in a hybrid deployment mode by providing multiple networking capabilities. To maintain an effective security posture while deploying applications across complex hybrid network environments, security professionals need a holistic view and control from a single source.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Yet, security isn’t just the responsibility of the cloud providers alone. Organizations need to understand the shared responsibility model and their role in maintaining a secure deployment. While AWS’s cloud framework is secured by AWS, the challenge of using the cloud securely is the responsibility of your organization’s IT and CISOs. As multiple DevOps and IT personnel make frequent configuration changes, the shared responsibility model helps achieve visibility and maintain cloud security.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, AlgoSec’s Director of Product, and Ram Dileepan, Amazon Web Service’s Partner Solutions Architect, will share best practices for network security governance in AWS and hybrid network environments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-visibility-and-security-1"&gt;&lt;img src="http://video.algosec.com/49543330/59793974/fb58b308520346124ba9d7a22296a816/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fb58b308520346124ba9d7a22296a816&amp;source=podcast&amp;photo%5fid=59793974" width="625" height="352" type="text/html" medium="video" duration="2983" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/59793974/fb58b308520346124ba9d7a22296a816/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>Devops</category>
            <category>network security</category>
            <category>SDN</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/video_medium/application-segmentation-with-cisco-video.mp4?source=podcast" type="video/mp4" length="6735850"/>
            <title>Application Segmentation with Cisco Tetration &amp; AlgoSec</title>
            <link>http://video.algosec.com/application-segmentation-with-cisco</link>
            <description>&lt;p&gt;Application Segmentation with Cisco Tetration &amp;amp; AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-segmentation-with-cisco"&gt;&lt;img src="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63637257</guid>
            <pubDate>Tue, 07 Jul 2020 09:55:35 GMT</pubDate>
            <media:title>Application Segmentation with Cisco Tetration &amp; AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;Application Segmentation with Cisco Tetration &amp;amp; AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-segmentation-with-cisco"&gt;&lt;img src="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7416aee44192b09118730b3bc4cbe9b2&amp;source=podcast&amp;photo%5fid=63637257" width="625" height="352" type="text/html" medium="video" duration="300" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Cisco</category>
            <category>Firewall Migration</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Network Segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/63482263/2f3799da46c54141311ae5eab8144ee2/video_medium/the-first-step-towards-1-video.mp4?source=podcast" type="video/mp4" length="33204485"/>
            <title>The First Step Towards Micro-segmentation: Application Visibility</title>
            <link>http://video.algosec.com/the-first-step-towards-1</link>
            <description>&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect, AlgoSec | June 2020&lt;/b&gt;&lt;br&gt;&lt;br&gt;
As cyber threats become more sophisticated, companies struggle to stay secure. To prevent serious breaches, your network must be internally segmented to stop unauthorized users from moving freely inside the network and exfiltrate data. Network segmentation must be designed and managed properly.&lt;br&gt;&lt;br&gt;
Identifying the business applications on your network is a critical early step to develop and implement your micro-segmentation strategy.&lt;br&gt;&lt;br&gt;
In this webinar, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, will get you started on your micro-segmentation journey. &lt;br&gt;&lt;br&gt;Explore:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Why application mapping is a crucial step in your path to micro-segmentation&lt;/li&gt;&lt;li&gt;Ways to discover and map your network’s business applications using industry's leading solutions&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;How to identify how your micro-segmentation program impacts your business applications&lt;/li&gt;&lt;li&gt;Tips to understand the business impact of your planned segmentation project on your organization&lt;/li&gt;&lt;li&gt;How to succeed with your micro-segmentation project&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-first-step-towards-1"&gt;&lt;img src="http://video.algosec.com/60650861/63482263/2f3799da46c54141311ae5eab8144ee2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63482263</guid>
            <pubDate>Mon, 29 Jun 2020 10:38:21 GMT</pubDate>
            <media:title>The First Step Towards Micro-segmentation: Application Visibility</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect, AlgoSec | June 2020&lt;/b&gt;&lt;br&gt;&lt;br&gt;
As cyber threats become more sophisticated, companies struggle to stay secure. To prevent serious breaches, your network must be internally segmented to stop unauthorized users from moving freely inside the network and exfiltrate data. Network segmentation must be designed and managed properly.&lt;br&gt;&lt;br&gt;
Identifying the business applications on your network is a critical early step to develop and implement your micro-segmentation strategy.&lt;br&gt;&lt;br&gt;
In this webinar, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, will get you started on your micro-segmentation journey. &lt;br&gt;&lt;br&gt;Explore:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Why application mapping is a crucial step in your path to micro-segmentation&lt;/li&gt;&lt;li&gt;Ways to discover and map your network’s business applications using industry's leading solutions&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;How to identify how your micro-segmentation program impacts your business applications&lt;/li&gt;&lt;li&gt;Tips to understand the business impact of your planned segmentation project on your organization&lt;/li&gt;&lt;li&gt;How to succeed with your micro-segmentation project&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-first-step-towards-1"&gt;&lt;img src="http://video.algosec.com/60650861/63482263/2f3799da46c54141311ae5eab8144ee2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2f3799da46c54141311ae5eab8144ee2&amp;source=podcast&amp;photo%5fid=63482263" width="625" height="352" type="text/html" medium="video" duration="1664" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/63482263/2f3799da46c54141311ae5eab8144ee2/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>application discovery</category>
            <category>application visibility</category>
            <category>network security</category>
            <category>network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/video_medium/achieving-intent-based-network-video.mp4?source=podcast" type="video/mp4" length="61107497"/>
            <title>"Achieving intent-based network security across your hybrid network" with...</title>
            <link>http://video.algosec.com/achieving-intent-based-network</link>
            <description>&lt;p&gt;Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-intent-based-network"&gt;&lt;img src="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63415237</guid>
            <pubDate>Wed, 24 Jun 2020 16:49:12 GMT</pubDate>
            <media:title>"Achieving intent-based network security across your hybrid network" with...</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-intent-based-network"&gt;&lt;img src="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d40d0b761aa9153a987b2dffb6cc5060&amp;source=podcast&amp;photo%5fid=63415237" width="625" height="352" type="text/html" medium="video" duration="1824" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cyber Attacks &amp; Incident Response</category>
            <category>events</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Network Segmentation</category>
            <category>Privacy and Security</category>
            <category>prof wool</category>
            <category>Risk Management and Vulnerabilities</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445190/61958404/d314d1bb565386429046d9e11817a60e/video_medium/turning-network-security-alerts-video.mp4?source=podcast" type="video/mp4" length="34851528"/>
            <title>Turning Network Security Alerts into Action: Change Automation to the Rescue</title>
            <link>http://video.algosec.com/turning-network-security-alerts</link>
            <description>&lt;p&gt;&lt;div&gt;&lt;b&gt;Presented by: Dania Ben-Peretz, Product Manager&lt;/b&gt;&lt;/div&gt;&lt;p&gt;You use multiple network security controls in your organization, but they don’t talk to each other. And while you may get alerts that come with tools such as SIEM solutions and vulnerability scanners – in your security landscape, making the necessary changes to proactively react to the myriad of alerts is difficult. Responding to alerts feels like a game of whack-a-mole. Manual changes are also error-prone, resulting in misconfigurations. It’s clear that manual processes are insufficient for your multi-device, multi-vendor, and heterogeneous environment network landscape.&lt;/p&gt;&lt;p&gt;What’s the solution? Network security change automation!&lt;/p&gt;&lt;p&gt;By implementing change automation for your network security policies across your enterprise security landscape you can continue to use your existing business processes while enhancing business agility, accelerate incident response times, and reduce the risk of compliance violations and security misconfigurations.&lt;/p&gt;&lt;p&gt;In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, shows you how to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Automate your network security policy changes without breaking core network connectivity&lt;/li&gt;&lt;li&gt;Analyze and recommend changes to your network security policies&lt;/li&gt;&lt;li&gt;Push network security policy changes with zero-touch automation to your multi-vendor security devices&lt;/li&gt;&lt;li&gt;Maximize the ROI of your existing security controls by automatically analyzing, validating, and implementing network security policy changes – all while seamlessly integrating with your existing business processes&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/turning-network-security-alerts"&gt;&lt;img src="http://video.algosec.com/60445190/61958404/d314d1bb565386429046d9e11817a60e/standard/download-8-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61958404</guid>
            <pubDate>Wed, 03 Jun 2020 17:15:01 GMT</pubDate>
            <media:title>Turning Network Security Alerts into Action: Change Automation to the Rescue</media:title>
            <media:description type="html">&lt;p&gt;&lt;div&gt;&lt;b&gt;Presented by: Dania Ben-Peretz, Product Manager&lt;/b&gt;&lt;/div&gt;&lt;p&gt;You use multiple network security controls in your organization, but they don’t talk to each other. And while you may get alerts that come with tools such as SIEM solutions and vulnerability scanners – in your security landscape, making the necessary changes to proactively react to the myriad of alerts is difficult. Responding to alerts feels like a game of whack-a-mole. Manual changes are also error-prone, resulting in misconfigurations. It’s clear that manual processes are insufficient for your multi-device, multi-vendor, and heterogeneous environment network landscape.&lt;/p&gt;&lt;p&gt;What’s the solution? Network security change automation!&lt;/p&gt;&lt;p&gt;By implementing change automation for your network security policies across your enterprise security landscape you can continue to use your existing business processes while enhancing business agility, accelerate incident response times, and reduce the risk of compliance violations and security misconfigurations.&lt;/p&gt;&lt;p&gt;In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, shows you how to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Automate your network security policy changes without breaking core network connectivity&lt;/li&gt;&lt;li&gt;Analyze and recommend changes to your network security policies&lt;/li&gt;&lt;li&gt;Push network security policy changes with zero-touch automation to your multi-vendor security devices&lt;/li&gt;&lt;li&gt;Maximize the ROI of your existing security controls by automatically analyzing, validating, and implementing network security policy changes – all while seamlessly integrating with your existing business processes&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/turning-network-security-alerts"&gt;&lt;img src="http://video.algosec.com/60445190/61958404/d314d1bb565386429046d9e11817a60e/standard/download-8-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d314d1bb565386429046d9e11817a60e&amp;source=podcast&amp;photo%5fid=61958404" width="625" height="352" type="text/html" medium="video" duration="1694" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/61958404/d314d1bb565386429046d9e11817a60e/standard/download-8-thumbnail.jpg" width="600" height="338"/>
            <category>change automation</category>
            <category>Change Management</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/video_medium/cessation-of-misconfigurations-1-video.mp4?source=podcast" type="video/mp4" length="149127110"/>
            <title>Cessation of Misconfigurations: Common Network Misconfiguration Risks &amp; How...</title>
            <link>http://video.algosec.com/cessation-of-misconfigurations-1</link>
            <description>&lt;p&gt;&lt;p&gt;Misconfigurations aren’t simply inconvenient mistakes but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s list of Top 10 most critical web application security risks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your audits, and cause costly outages that bring your business to a standstill.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, AlgoSec’s Director of Product, will show examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Watch the webinar to learn how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Understand and map your entire network before you make a change&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole and understand the impact of changes to your entire network&amp;nbsp;&lt;/li&gt;&lt;li&gt;Maximize the capabilities of network management automation to avoid common misconfigurations&amp;nbsp;&lt;/li&gt;&lt;li&gt;Avoid common mistakes when making changes to your network security devices&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cessation-of-misconfigurations-1"&gt;&lt;img src="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/60676810</guid>
            <pubDate>Tue, 02 Jun 2020 12:06:41 GMT</pubDate>
            <media:title>Cessation of Misconfigurations: Common Network Misconfiguration Risks &amp; How...</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Misconfigurations aren’t simply inconvenient mistakes but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s list of Top 10 most critical web application security risks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your audits, and cause costly outages that bring your business to a standstill.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, AlgoSec’s Director of Product, will show examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Watch the webinar to learn how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Understand and map your entire network before you make a change&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole and understand the impact of changes to your entire network&amp;nbsp;&lt;/li&gt;&lt;li&gt;Maximize the capabilities of network management automation to avoid common misconfigurations&amp;nbsp;&lt;/li&gt;&lt;li&gt;Avoid common mistakes when making changes to your network security devices&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cessation-of-misconfigurations-1"&gt;&lt;img src="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b0ba8b0b18dbf77de55c855b87c4177d&amp;source=podcast&amp;photo%5fid=60676810" width="625" height="352" type="text/html" medium="video" duration="1940" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/video_medium/reece-group-empowers-business-and-video.mp4?source=podcast" type="video/mp4" length="14692444"/>
            <title>Reece Group empowers business and IT teams with ChatOps – Case Study</title>
            <link>http://video.algosec.com/reece-group-empowers-business-and</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;Reece Group, the leading Australian plumbing and HVAC company,
was able to empower their application developers, get faster response time,
reduce risks and increase compliance and more. Watch the video case study to
find out more or read the
full case study &lt;a href="https://www.algosec.com/customer-success-stories/reece-group/"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;h1&gt;&lt;br&gt;&lt;/h1&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/reece-group-empowers-business-and"&gt;&lt;img src="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/standard/download-12-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61427218</guid>
            <pubDate>Mon, 25 May 2020 14:07:56 GMT</pubDate>
            <media:title>Reece Group empowers business and IT teams with ChatOps – Case Study</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;Reece Group, the leading Australian plumbing and HVAC company,
was able to empower their application developers, get faster response time,
reduce risks and increase compliance and more. Watch the video case study to
find out more or read the
full case study &lt;a href="https://www.algosec.com/customer-success-stories/reece-group/"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;h1&gt;&lt;br&gt;&lt;/h1&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/reece-group-empowers-business-and"&gt;&lt;img src="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/standard/download-12-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2122be8cdfeb52fd29c13de0f710bb86&amp;source=podcast&amp;photo%5fid=61427218" width="625" height="352" type="text/html" medium="video" duration="276" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/standard/download-12-thumbnail.jpg" width="600" height="338"/>
            <category>case study</category>
            <category>chatops</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>Interview</category>
            <category>network security</category>
            <category>success story</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445027/62872524/482d775b27b0982d1e39175dd69cdb56/video_medium/cut-the-clutter-with-chatops-video.mp4?source=podcast" type="video/mp4" length="37067656"/>
            <title>Cut the Clutter with ChatOps &amp; Improve Network Security</title>
            <link>http://video.algosec.com/cut-the-clutter-with-chatops</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Dania Ben Peretz, Product Manager&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;ul&gt;&lt;/ul&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;IT teams’ alerts are overflowing with questions about network status from coworkers. Say no to overwhelming alerts in multiple applications. There is a better way to get critical answers about the state of your network: ChatOps.&lt;br&gt;&lt;br&gt;ChatOps, using your existing chat tools such as Slack or Microsoft Teams, can get the crucial questions answered, and not have to track multiple apps separately.&lt;br&gt;&lt;br&gt;In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, demonstrates the latest in AlgoBot and show how to:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get immediate answers to pressing network traffic questions&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Get immediate answers about whether your business applications are secure&lt;/li&gt;&lt;li&gt;Decrease the time it takes to resolve critical security incidents&lt;/li&gt;&lt;li&gt;Empower your business and application teams to drive innovation&lt;/li&gt;&lt;li&gt;Ensure that your network and security teams are focusing on the most critical issues&lt;/li&gt;&lt;li&gt;Efficiently manage security by transparently collaborating with IT, Security, Network and DevOps teams&lt;/li&gt;&lt;/ul&gt;All while saving time, reducing resources, and cutting the clutter.&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cut-the-clutter-with-chatops"&gt;&lt;img src="http://video.algosec.com/60445027/62872524/482d775b27b0982d1e39175dd69cdb56/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/62872524</guid>
            <pubDate>Wed, 13 May 2020 23:16:25 GMT</pubDate>
            <media:title>Cut the Clutter with ChatOps &amp; Improve Network Security</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Dania Ben Peretz, Product Manager&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;ul&gt;&lt;/ul&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;IT teams’ alerts are overflowing with questions about network status from coworkers. Say no to overwhelming alerts in multiple applications. There is a better way to get critical answers about the state of your network: ChatOps.&lt;br&gt;&lt;br&gt;ChatOps, using your existing chat tools such as Slack or Microsoft Teams, can get the crucial questions answered, and not have to track multiple apps separately.&lt;br&gt;&lt;br&gt;In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, demonstrates the latest in AlgoBot and show how to:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get immediate answers to pressing network traffic questions&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Get immediate answers about whether your business applications are secure&lt;/li&gt;&lt;li&gt;Decrease the time it takes to resolve critical security incidents&lt;/li&gt;&lt;li&gt;Empower your business and application teams to drive innovation&lt;/li&gt;&lt;li&gt;Ensure that your network and security teams are focusing on the most critical issues&lt;/li&gt;&lt;li&gt;Efficiently manage security by transparently collaborating with IT, Security, Network and DevOps teams&lt;/li&gt;&lt;/ul&gt;All while saving time, reducing resources, and cutting the clutter.&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cut-the-clutter-with-chatops"&gt;&lt;img src="http://video.algosec.com/60445027/62872524/482d775b27b0982d1e39175dd69cdb56/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=482d775b27b0982d1e39175dd69cdb56&amp;source=podcast&amp;photo%5fid=62872524" width="625" height="352" type="text/html" medium="video" duration="1548" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445027/62872524/482d775b27b0982d1e39175dd69cdb56/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoBot</category>
            <category>Chatbot</category>
            <category>Devops</category>
            <category>network security</category>
            <category>Security Automation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445028/62300406/eaae98be6a2402fba307019027e312b3/video_medium/algosec-application-discovery-1-video.mp4?source=podcast" type="video/mp4" length="4038105"/>
            <title>AlgoSec Application Discovery - Creating the application documentation...</title>
            <link>http://video.algosec.com/algosec-application-discovery-1</link>
            <description>&lt;p&gt;In this short video learn how to leverage AlgoSec Application&amp;nbsp;Discovery to discover, provision, change and securely decommission connectivity for business applications. &lt;br&gt;&lt;br&gt;AlgoSec Application&amp;nbsp;Discovery discovers and maps application connectivity requirements to the network infrastructure, and then translates requests for connectivity changes into networking terms that security and operations teams can understand, approve, and implement.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-application-discovery-1"&gt;&lt;img src="http://video.algosec.com/60445028/62300406/eaae98be6a2402fba307019027e312b3/standard/download-2-thumbnail.jpg" width="600" height="288"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/62300406</guid>
            <pubDate>Mon, 20 Apr 2020 00:55:05 GMT</pubDate>
            <media:title>AlgoSec Application Discovery - Creating the application documentation...</media:title>
            <media:description type="html">&lt;p&gt;In this short video learn how to leverage AlgoSec Application&amp;nbsp;Discovery to discover, provision, change and securely decommission connectivity for business applications. &lt;br&gt;&lt;br&gt;AlgoSec Application&amp;nbsp;Discovery discovers and maps application connectivity requirements to the network infrastructure, and then translates requests for connectivity changes into networking terms that security and operations teams can understand, approve, and implement.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-application-discovery-1"&gt;&lt;img src="http://video.algosec.com/60445028/62300406/eaae98be6a2402fba307019027e312b3/standard/download-2-thumbnail.jpg" width="600" height="288"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=eaae98be6a2402fba307019027e312b3&amp;source=podcast&amp;photo%5fid=62300406" width="625" height="300" type="text/html" medium="video" duration="187" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445028/62300406/eaae98be6a2402fba307019027e312b3/standard/download-2-thumbnail.jpg" width="600" height="288"/>
            <category>application discovery</category>
            <category>application visibility</category>
            <category>appviz</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/video_medium/optimize-your-juniper-investment-video.mp4?source=podcast" type="video/mp4" length="37937596"/>
            <title>Optimize your Juniper Investment with Intelligent Network Security Automation</title>
            <link>http://video.algosec.com/optimize-your-juniper-investment</link>
            <description>&lt;p&gt;Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/optimize-your-juniper-investment"&gt;&lt;img src="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61650270</guid>
            <pubDate>Wed, 25 Mar 2020 19:30:22 GMT</pubDate>
            <media:title>Optimize your Juniper Investment with Intelligent Network Security Automation</media:title>
            <media:description type="html">&lt;p&gt;Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/optimize-your-juniper-investment"&gt;&lt;img src="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d6c3dac069cd3e89e381907d0133d8cb&amp;source=podcast&amp;photo%5fid=61650270" width="625" height="352" type="text/html" medium="video" duration="1889" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>cloud security</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>juniper</category>
            <category>Network Security</category>
            <category>Network Security Automation</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/video_medium/managing-application-connectivity-video.mp4?source=podcast" type="video/mp4" length="63667594"/>
            <title>Managing Application Connectivity in the World of Network Security</title>
            <link>http://video.algosec.com/managing-application-connectivity</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Asher Benbenisty, Director of Product Marketing |&lt;/b&gt; Feb 27 2018&lt;br&gt;&lt;/p&gt;&lt;p&gt;The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.&amp;nbsp;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;&lt;br&gt;During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, discusses how taking an application-centric approach to security policy management will improve both your security and operational efficiency.&amp;nbsp;&lt;br&gt;&lt;br&gt;Learn how to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Gain insight into your company’s security policy management maturity level&lt;/li&gt;&lt;li&gt;Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows&lt;/li&gt;&lt;li&gt;Identify security risks across your enterprise network and prioritize them based on business criticality&lt;/li&gt;&lt;li&gt;Securely migrate business application connectivity and security devices to a new data center&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-application-connectivity"&gt;&lt;img src="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49721671</guid>
            <pubDate>Wed, 18 Mar 2020 14:05:32 GMT</pubDate>
            <media:title>Managing Application Connectivity in the World of Network Security</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Asher Benbenisty, Director of Product Marketing |&lt;/b&gt; Feb 27 2018&lt;br&gt;&lt;/p&gt;&lt;p&gt;The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.&amp;nbsp;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;&lt;br&gt;During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, discusses how taking an application-centric approach to security policy management will improve both your security and operational efficiency.&amp;nbsp;&lt;br&gt;&lt;br&gt;Learn how to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Gain insight into your company’s security policy management maturity level&lt;/li&gt;&lt;li&gt;Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows&lt;/li&gt;&lt;li&gt;Identify security risks across your enterprise network and prioritize them based on business criticality&lt;/li&gt;&lt;li&gt;Securely migrate business application connectivity and security devices to a new data center&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-application-connectivity"&gt;&lt;img src="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=272968807dfb09156001e7c88b48053c&amp;source=podcast&amp;photo%5fid=49721671" width="625" height="352" type="text/html" medium="video" duration="2192" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>mapping network flows</category>
            <category>network security</category>
            <category>Security Automation</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650858/61410177/51a01c5d725fd4eb72bdabd81b6de876/video_medium/robert-blank-von-algosec-auf-der-video.mp4?source=podcast" type="video/mp4" length="6458800"/>
            <title>Robert Blank von AlgoSec auf der ITSA 2019</title>
            <link>http://video.algosec.com/robert-blank-von-algosec-auf-der</link>
            <description>&lt;p&gt;Robert Blank (Regional Sales Manager DACH von AlgoSec) spricht auf der ITSA 2019 in Nürnberg. Erfahren Sie mehr darüber, wie die Security Policy Change-Automatierung von AlgoSec funktioniert, wie Cisco-Security komplettiert wird, und bekommen Sie hier das neueste Update zur Partnerschaft zwischen AlgoSec mit Cisco.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/robert-blank-von-algosec-auf-der"&gt;&lt;img src="http://video.algosec.com/60650858/61410177/51a01c5d725fd4eb72bdabd81b6de876/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61410177</guid>
            <pubDate>Mon, 16 Mar 2020 14:54:15 GMT</pubDate>
            <media:title>Robert Blank von AlgoSec auf der ITSA 2019</media:title>
            <media:description type="html">&lt;p&gt;Robert Blank (Regional Sales Manager DACH von AlgoSec) spricht auf der ITSA 2019 in Nürnberg. Erfahren Sie mehr darüber, wie die Security Policy Change-Automatierung von AlgoSec funktioniert, wie Cisco-Security komplettiert wird, und bekommen Sie hier das neueste Update zur Partnerschaft zwischen AlgoSec mit Cisco.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/robert-blank-von-algosec-auf-der"&gt;&lt;img src="http://video.algosec.com/60650858/61410177/51a01c5d725fd4eb72bdabd81b6de876/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=51a01c5d725fd4eb72bdabd81b6de876&amp;source=podcast&amp;photo%5fid=61410177" width="625" height="352" type="text/html" medium="video" duration="117" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650858/61410177/51a01c5d725fd4eb72bdabd81b6de876/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>network security</category>
            <category>Netzwerk Sicherheitsrichtlinien</category>
            <category>Netzwerk-Sicherheit visibility</category>
            <category>policy management</category>
            <category>Regelwerk-Management</category>
            <category>security policy</category>
            <category>Sichtbarkeit</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445186/61384023/0035927524dc8ce97134dcdb68abf96e/video_medium/5-ways-to-enrich-your-cisco-video.mp4?source=podcast" type="video/mp4" length="4532074"/>
            <title>5 ways to enrich your Cisco security posture with AlgoSec</title>
            <link>http://video.algosec.com/5-ways-to-enrich-your-cisco</link>
            <description>&lt;p&gt;&lt;span&gt;Discover the benefits of integrating AlgoSec with
your entire &lt;b&gt;Cisco&lt;/b&gt; fabric, multi-cloud and multi-vendor network environments.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-ways-to-enrich-your-cisco"&gt;&lt;img src="http://video.algosec.com/60445186/61384023/0035927524dc8ce97134dcdb68abf96e/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61384023</guid>
            <pubDate>Sun, 15 Mar 2020 12:02:44 GMT</pubDate>
            <media:title>5 ways to enrich your Cisco security posture with AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;&lt;span&gt;Discover the benefits of integrating AlgoSec with
your entire &lt;b&gt;Cisco&lt;/b&gt; fabric, multi-cloud and multi-vendor network environments.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-ways-to-enrich-your-cisco"&gt;&lt;img src="http://video.algosec.com/60445186/61384023/0035927524dc8ce97134dcdb68abf96e/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0035927524dc8ce97134dcdb68abf96e&amp;source=podcast&amp;photo%5fid=61384023" width="625" height="352" type="text/html" medium="video" duration="75" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445186/61384023/0035927524dc8ce97134dcdb68abf96e/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>Cisco SDN</category>
            <category>hybrid cloud</category>
            <category>multicloud</category>
            <category>multivendor</category>
            <category>network security</category>
            <category>Network Security Management</category>
            <category>Policy Management</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/video_medium/network-security-vision-with-video.mp4?source=podcast" type="video/mp4" length="66340639"/>
            <title>Network Security Vision with Application Visibility | Live discussion and demo</title>
            <link>http://video.algosec.com/network-security-vision-with</link>
            <description>&lt;p&gt;Avishai Wool, CTO &amp; Co-founder (AlgoSec) &amp; Yoni Geva, Product Manager (AlgoSec) | March 5, 2020&lt;/p&gt;
&lt;p&gt;You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.&lt;/p&gt;
&lt;p&gt;But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?&lt;/p&gt;
&lt;p&gt;Stop running blind. Expand your vision with application visibility.&lt;/p&gt;
&lt;p&gt;With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.&lt;/p&gt;
&lt;p&gt;In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate – in a live demo - how to overcome these challenges and ensure business continuity through application visibility.&lt;/p&gt;
&lt;p&gt;Join the webinar and learn how to:&lt;br /&gt;
• Associate your business applications with your security policy rules.&lt;br /&gt;
• Identify the network traffic relevant for each application.&lt;br /&gt;
• Identify hidden risks and vulnerabilities in your applications.&lt;br /&gt;
• Associate compliance violations with the relevant business applications.&lt;br /&gt;
• Improve troubleshooting by identifying affected applications.&lt;br /&gt;
• Better document the applications on your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-vision-with"&gt;&lt;img src="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61248183</guid>
            <pubDate>Mon, 09 Mar 2020 15:53:57 GMT</pubDate>
            <media:title>Network Security Vision with Application Visibility | Live discussion and demo</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, CTO &amp; Co-founder (AlgoSec) &amp; Yoni Geva, Product Manager (AlgoSec) | March 5, 2020&lt;/p&gt;
&lt;p&gt;You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.&lt;/p&gt;
&lt;p&gt;But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?&lt;/p&gt;
&lt;p&gt;Stop running blind. Expand your vision with application visibility.&lt;/p&gt;
&lt;p&gt;With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.&lt;/p&gt;
&lt;p&gt;In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate – in a live demo - how to overcome these challenges and ensure business continuity through application visibility.&lt;/p&gt;
&lt;p&gt;Join the webinar and learn how to:&lt;br /&gt;
• Associate your business applications with your security policy rules.&lt;br /&gt;
• Identify the network traffic relevant for each application.&lt;br /&gt;
• Identify hidden risks and vulnerabilities in your applications.&lt;br /&gt;
• Associate compliance violations with the relevant business applications.&lt;br /&gt;
• Improve troubleshooting by identifying affected applications.&lt;br /&gt;
• Better document the applications on your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-vision-with"&gt;&lt;img src="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1337080fb3e4740271e01d66cc24acb6&amp;source=podcast&amp;photo%5fid=61248183" width="625" height="352" type="text/html" medium="video" duration="2991" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>application visibility</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445190/61138011/58389a4b039d6b2d2e436dd09573bd43/video_medium/couchtalk-software-defined-networks-video.mp4?source=podcast" type="video/mp4" length="55478996"/>
            <title>CouchTalk: Software Defined Networks (SDN) – Migration, Security and Management</title>
            <link>http://video.algosec.com/couchtalk-software-defined-networks</link>
            <description>&lt;p&gt;Kyle Wickert, Worldwide Solution Architect, and Yitzy Tannenbaum, Product Marketing Manager, discuss software-defined networks (SDN).&amp;nbsp;&lt;br&gt;&lt;br&gt;As network security moves from a traditional perimeter model to a more granular software-defined model, find out how to simplify network complexity when migrating to SDN.&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/couchtalk-software-defined-networks"&gt;&lt;img src="http://video.algosec.com/60445190/61138011/58389a4b039d6b2d2e436dd09573bd43/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61138011</guid>
            <pubDate>Wed, 04 Mar 2020 14:51:45 GMT</pubDate>
            <media:title>CouchTalk: Software Defined Networks (SDN) – Migration, Security and Management</media:title>
            <media:description type="html">&lt;p&gt;Kyle Wickert, Worldwide Solution Architect, and Yitzy Tannenbaum, Product Marketing Manager, discuss software-defined networks (SDN).&amp;nbsp;&lt;br&gt;&lt;br&gt;As network security moves from a traditional perimeter model to a more granular software-defined model, find out how to simplify network complexity when migrating to SDN.&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/couchtalk-software-defined-networks"&gt;&lt;img src="http://video.algosec.com/60445190/61138011/58389a4b039d6b2d2e436dd09573bd43/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=58389a4b039d6b2d2e436dd09573bd43&amp;source=podcast&amp;photo%5fid=61138011" width="625" height="352" type="text/html" medium="video" duration="476" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/61138011/58389a4b039d6b2d2e436dd09573bd43/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>ACI</category>
            <category>Cisco</category>
            <category>couchtalks</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>SDN</category>
            <category>Tetration</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/video_medium/couchtalk-cisco-aci-and-algosec-video.mp4?source=podcast" type="video/mp4" length="53649200"/>
            <title>CouchTalk: Cisco ACI and AlgoSec – Visibility and Automation</title>
            <link>http://video.algosec.com/couchtalk-cisco-aci-and-algosec</link>
            <description>&lt;p&gt;Kyle Wickert, Worldwide Solution Architect, and Yitzy Tannenbaum, Product Marketing Manager, discuss security policy change management throughout your Cisco and hybrid environment.&amp;nbsp;&lt;br&gt;&lt;br&gt;AlgoSec provides visibility and automation into Cisco ACI, enables intent-based networking with Cisco Tetration, and manages and automates Cisco firewalls&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/couchtalk-cisco-aci-and-algosec"&gt;&lt;img src="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61138007</guid>
            <pubDate>Wed, 04 Mar 2020 14:51:39 GMT</pubDate>
            <media:title>CouchTalk: Cisco ACI and AlgoSec – Visibility and Automation</media:title>
            <media:description type="html">&lt;p&gt;Kyle Wickert, Worldwide Solution Architect, and Yitzy Tannenbaum, Product Marketing Manager, discuss security policy change management throughout your Cisco and hybrid environment.&amp;nbsp;&lt;br&gt;&lt;br&gt;AlgoSec provides visibility and automation into Cisco ACI, enables intent-based networking with Cisco Tetration, and manages and automates Cisco firewalls&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/couchtalk-cisco-aci-and-algosec"&gt;&lt;img src="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=57a06fc9e928eb2ba7b9e17f95f3aa86&amp;source=podcast&amp;photo%5fid=61138007" width="625" height="352" type="text/html" medium="video" duration="456" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>couchtalks</category>
            <category>Firewalls</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>SDN</category>
            <category>security policy</category>
            <category>software defined networking</category>
            <category>VMware NSX</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543316/60236501/7172c25b4f49d0dee344198731ce81d4/video_medium/cisco-aci-algosec-achieving-1-video.mp4?source=podcast" type="video/mp4" length="124838084"/>
            <title>Cisco ACI &amp; AlgoSec: Achieving application-driven security across your hybrid...</title>
            <link>http://video.algosec.com/cisco-aci-algosec-achieving-1</link>
            <description>&lt;p&gt;&lt;p&gt;As your network extends into hybrid and multi-cloud environments, including software-defined networks such as Cisco ACI, managing security policies within your hybrid estate becomes more and more complex.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Because each part of your network estate is managed in its own silo, it’s tough to get a full view of your entire network. Making changes across your entire network is a chore and validating your entire network’s security is virtually impossible.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate, and automate your entire network security policy management including both within the Cisco ACI fabric and elements outside the fabric.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this session Omer Ganot, AlgoSec’s Product Manager, will discuss how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Unify, consolidate, and automate your network security policy management, including elements within and outside of the Cisco ACI fabric.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-algosec-achieving-1"&gt;&lt;img src="http://video.algosec.com/49543316/60236501/7172c25b4f49d0dee344198731ce81d4/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/60236501</guid>
            <pubDate>Mon, 17 Feb 2020 14:42:55 GMT</pubDate>
            <media:title>Cisco ACI &amp; AlgoSec: Achieving application-driven security across your hybrid...</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;As your network extends into hybrid and multi-cloud environments, including software-defined networks such as Cisco ACI, managing security policies within your hybrid estate becomes more and more complex.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Because each part of your network estate is managed in its own silo, it’s tough to get a full view of your entire network. Making changes across your entire network is a chore and validating your entire network’s security is virtually impossible.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate, and automate your entire network security policy management including both within the Cisco ACI fabric and elements outside the fabric.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this session Omer Ganot, AlgoSec’s Product Manager, will discuss how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Unify, consolidate, and automate your network security policy management, including elements within and outside of the Cisco ACI fabric.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-algosec-achieving-1"&gt;&lt;img src="http://video.algosec.com/49543316/60236501/7172c25b4f49d0dee344198731ce81d4/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7172c25b4f49d0dee344198731ce81d4&amp;source=podcast&amp;photo%5fid=60236501" width="625" height="352" type="text/html" medium="video" duration="3811" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543316/60236501/7172c25b4f49d0dee344198731ce81d4/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543312/59063440/0cf5329d5648652f25af77bae364d393/video_medium/interview-tamas-ingram-and-algosec-video.mp4?source=podcast" type="video/mp4" length="8873429"/>
            <title>Interview Tamas Ingram and AlgoSec</title>
            <link>http://video.algosec.com/interview-tamas-ingram-and-algosec</link>
            <description>&lt;p&gt;AlgoSec is a very good choice if you have different vendors in your network and need to manage the policies of their network rules, so you can handle it very easily&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/interview-tamas-ingram-and-algosec"&gt;&lt;img src="http://video.algosec.com/49543312/59063440/0cf5329d5648652f25af77bae364d393/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/59063440</guid>
            <pubDate>Sun, 29 Dec 2019 14:02:50 GMT</pubDate>
            <media:title>Interview Tamas Ingram and AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec is a very good choice if you have different vendors in your network and need to manage the policies of their network rules, so you can handle it very easily&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/interview-tamas-ingram-and-algosec"&gt;&lt;img src="http://video.algosec.com/49543312/59063440/0cf5329d5648652f25af77bae364d393/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0cf5329d5648652f25af77bae364d393&amp;source=podcast&amp;photo%5fid=59063440" width="625" height="352" type="text/html" medium="video" duration="162" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543312/59063440/0cf5329d5648652f25af77bae364d393/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543331/56106036/fa35fd5df120cc07d820fbc124e0e123/video_medium/microsegmentation-for-network-video.mp4?source=podcast" type="video/mp4" length="71244672"/>
            <title>Microsegmentation for Network Security – AlgoSec / SANS Webinar</title>
            <link>http://video.algosec.com/microsegmentation-for-network</link>
            <description>&lt;p&gt;&lt;p&gt;Organizations heavily invest in a mix of security solutions to keep their networks safe, but still, struggle to close the security gaps. Micro-segmentation helps protect the organizations' network against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren't sure where to begin or what approach to take.&lt;/p&gt;&lt;p&gt;Dave Shackleford, the owner and principal consultant of Voodoo Security and a SANS analyst hosts Professor Avishai Wool, AlgoSecs CTO and co-founder, in this practical webinar to unveil why organizations are increasingly micro-segmenting for their networks, and guide you through each stage of a micro-segmentation project from development of the correct micro-segmentation strategy to effective implementation and maintenance of a micro-segmented network.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Register now to this live webinar to learn:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What micro-segmentation is&lt;/li&gt;&lt;li&gt;Why and how micro-segmentation can be part of the equation in protecting your network.&lt;/li&gt;&lt;li&gt;Common pitfalls in microsegmentation projects and how to avoid them.&lt;/li&gt;&lt;li&gt;The stages of a successful microsegmentation project.&lt;/li&gt;&lt;li&gt;How to monitor and maintain your micro-segmented network.&lt;/li&gt;&lt;li&gt;The role of policy management, change management, and automation in micro-segmentation.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4&gt;Speaker Bios&lt;/h4&gt;&lt;p&gt;Dave Shackleford&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.sans.org/instructors/dave-shackleford"&gt;Dave Shackleford&lt;/a&gt;, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security. Dave currently helps lead the Atlanta chapter of the Cloud Security Alliance.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;hr&gt;&lt;p&gt;Avishai Wool&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Prof. Avishai Wool, AlgoSec’s CTO and co-founder, is a world-renowned researcher and security industry veteran. He is a professor in the School of Electrical Engineering at Tel Aviv University and serves as the deputy-director of the Interdisciplinary Cyber Research Center at TAU. Prof. Wool has published more than 110 research papers and holds 13 US Patents, and has served on the program committee of the leading IEEE and ACM conferences on computer and network security. Prof. Wool has a B.Sc. (Cum Laude) in Mathematics and Computer Science, and a M.Sc. and Ph.D. in Computer Science.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-for-network"&gt;&lt;img src="http://video.algosec.com/49543331/56106036/fa35fd5df120cc07d820fbc124e0e123/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/56106036</guid>
            <pubDate>Thu, 26 Sep 2019 13:53:23 GMT</pubDate>
            <media:title>Microsegmentation for Network Security – AlgoSec / SANS Webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Organizations heavily invest in a mix of security solutions to keep their networks safe, but still, struggle to close the security gaps. Micro-segmentation helps protect the organizations' network against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren't sure where to begin or what approach to take.&lt;/p&gt;&lt;p&gt;Dave Shackleford, the owner and principal consultant of Voodoo Security and a SANS analyst hosts Professor Avishai Wool, AlgoSecs CTO and co-founder, in this practical webinar to unveil why organizations are increasingly micro-segmenting for their networks, and guide you through each stage of a micro-segmentation project from development of the correct micro-segmentation strategy to effective implementation and maintenance of a micro-segmented network.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Register now to this live webinar to learn:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What micro-segmentation is&lt;/li&gt;&lt;li&gt;Why and how micro-segmentation can be part of the equation in protecting your network.&lt;/li&gt;&lt;li&gt;Common pitfalls in microsegmentation projects and how to avoid them.&lt;/li&gt;&lt;li&gt;The stages of a successful microsegmentation project.&lt;/li&gt;&lt;li&gt;How to monitor and maintain your micro-segmented network.&lt;/li&gt;&lt;li&gt;The role of policy management, change management, and automation in micro-segmentation.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4&gt;Speaker Bios&lt;/h4&gt;&lt;p&gt;Dave Shackleford&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.sans.org/instructors/dave-shackleford"&gt;Dave Shackleford&lt;/a&gt;, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security. Dave currently helps lead the Atlanta chapter of the Cloud Security Alliance.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;hr&gt;&lt;p&gt;Avishai Wool&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Prof. Avishai Wool, AlgoSec’s CTO and co-founder, is a world-renowned researcher and security industry veteran. He is a professor in the School of Electrical Engineering at Tel Aviv University and serves as the deputy-director of the Interdisciplinary Cyber Research Center at TAU. Prof. Wool has published more than 110 research papers and holds 13 US Patents, and has served on the program committee of the leading IEEE and ACM conferences on computer and network security. Prof. Wool has a B.Sc. (Cum Laude) in Mathematics and Computer Science, and a M.Sc. and Ph.D. in Computer Science.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-for-network"&gt;&lt;img src="http://video.algosec.com/49543331/56106036/fa35fd5df120cc07d820fbc124e0e123/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fa35fd5df120cc07d820fbc124e0e123&amp;source=podcast&amp;photo%5fid=56106036" width="625" height="352" type="text/html" medium="video" duration="3540" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543331/56106036/fa35fd5df120cc07d820fbc124e0e123/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>Prof Wool</category>
            <category>SANS</category>
            <category>security policy</category>
            <category>webinar</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543318/54063027/56e2a192bef466ce0238d02d0ffd0ad1/video_medium/empowering-devops-with-network-video.mp4?source=podcast" type="video/mp4" length="77160149"/>
            <title>Empowering DevOps with Network Security and Application Connectivity Automation</title>
            <link>http://video.algosec.com/empowering-devops-with-network</link>
            <description>&lt;p&gt;&lt;b&gt;Omer Ganot, Product Manager&amp;nbsp;&lt;/b&gt;I Aug 6, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;DevOps methodologies enable agile application development and rapid delivery. However, sometimes network security is an afterthought, leading to bottlenecks before release and security breaches after.&lt;/p&gt;
&lt;p&gt;When it comes to network connectivity, such as whenever a new application needs to connect to an external resource, the continuous delivery process grinds to a halt. Approving and implementing network changes could stall the application provisioning for weeks. The application developer needs to open change requests and wait for approvals, breaking the continuous delivery cycle. As a result, security is in the uncomfortable position of being a bottleneck and an impediment to innovation.&lt;/p&gt;
&lt;br&gt;&lt;br&gt;In this webinar, Omer Ganot, AlgoSec’s Product Manager describes how to seamlessly integrate network security into DevOps, and how the ‘Connectivity as Code’ approach can be implemented to overcome these challenges.&lt;br&gt;&lt;br&gt;This webinar will teach you how to:&lt;ul&gt;&lt;li&gt;Weave network security changes into the existing CI/CD pipeline to fully automate the application delivery process&lt;/li&gt;&lt;li&gt;Seamlessly manage network connectivity as part of the DevOps process for secure, faster, more agile and problem-free application delivery&lt;/li&gt;&lt;li&gt;Ensure continuous compliance and auditability throughout the application delivery process&lt;/li&gt;&lt;li&gt;Get clearly documented application connectivity requirements which help ensure business continuity&lt;/li&gt;&lt;li&gt;Bridge the gap between application developers and network security throughout the entire application lifecycle&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/empowering-devops-with-network"&gt;&lt;img src="http://video.algosec.com/49543318/54063027/56e2a192bef466ce0238d02d0ffd0ad1/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54063027</guid>
            <pubDate>Tue, 06 Aug 2019 17:00:00 GMT</pubDate>
            <media:title>Empowering DevOps with Network Security and Application Connectivity Automation</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Omer Ganot, Product Manager&amp;nbsp;&lt;/b&gt;I Aug 6, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;DevOps methodologies enable agile application development and rapid delivery. However, sometimes network security is an afterthought, leading to bottlenecks before release and security breaches after.&lt;/p&gt;
&lt;p&gt;When it comes to network connectivity, such as whenever a new application needs to connect to an external resource, the continuous delivery process grinds to a halt. Approving and implementing network changes could stall the application provisioning for weeks. The application developer needs to open change requests and wait for approvals, breaking the continuous delivery cycle. As a result, security is in the uncomfortable position of being a bottleneck and an impediment to innovation.&lt;/p&gt;
&lt;br&gt;&lt;br&gt;In this webinar, Omer Ganot, AlgoSec’s Product Manager describes how to seamlessly integrate network security into DevOps, and how the ‘Connectivity as Code’ approach can be implemented to overcome these challenges.&lt;br&gt;&lt;br&gt;This webinar will teach you how to:&lt;ul&gt;&lt;li&gt;Weave network security changes into the existing CI/CD pipeline to fully automate the application delivery process&lt;/li&gt;&lt;li&gt;Seamlessly manage network connectivity as part of the DevOps process for secure, faster, more agile and problem-free application delivery&lt;/li&gt;&lt;li&gt;Ensure continuous compliance and auditability throughout the application delivery process&lt;/li&gt;&lt;li&gt;Get clearly documented application connectivity requirements which help ensure business continuity&lt;/li&gt;&lt;li&gt;Bridge the gap between application developers and network security throughout the entire application lifecycle&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/empowering-devops-with-network"&gt;&lt;img src="http://video.algosec.com/49543318/54063027/56e2a192bef466ce0238d02d0ffd0ad1/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=56e2a192bef466ce0238d02d0ffd0ad1&amp;source=podcast&amp;photo%5fid=54063027" width="625" height="352" type="text/html" medium="video" duration="2151" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543318/54063027/56e2a192bef466ce0238d02d0ffd0ad1/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>DevOps</category>
            <category>NetOps</category>
            <category>Network Security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/video_medium/the-capital-one-breach-how-to-avoid-video.mp4?source=podcast" type="video/mp4" length="10880935"/>
            <title>The Capital One Breach: How to avoid the Misconfiguration danger?</title>
            <link>http://video.algosec.com/the-capital-one-breach-how-to-avoid</link>
            <description>&lt;p&gt;&lt;b&gt;Prof. Avishai Wool explains the Capital One data breach, which exposed the personal information of nearly 106 million people.&lt;/b&gt; &lt;br&gt;&lt;br&gt;The AlgoSec network security policy management solution provides holistic visibility across cloud, on-premise, SDN and hybrid environments, enabling you to proactively analyze risk from the business perspective, intelligently automate security changes, avoid misconfiguration incidents and ensure continuous compliance.
&lt;p&gt;&lt;b&gt;Click &lt;/b&gt;&lt;a href="https://www.algosec.com/lp/see-algosec-action-2/?utm_source=Email&amp;amp;utm_campaign=2019-08-06_The_Capital_One_Breach_Global_%5BEM%5D_%5BQ32019%5Dhttp://"&gt;&lt;b&gt;here &lt;/b&gt;&lt;/a&gt;&lt;b&gt;to learn how.&lt;/b&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-capital-one-breach-how-to-avoid"&gt;&lt;img src="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/standard/download-7-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54506817</guid>
            <pubDate>Tue, 06 Aug 2019 15:36:01 GMT</pubDate>
            <media:title>The Capital One Breach: How to avoid the Misconfiguration danger?</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Prof. Avishai Wool explains the Capital One data breach, which exposed the personal information of nearly 106 million people.&lt;/b&gt; &lt;br&gt;&lt;br&gt;The AlgoSec network security policy management solution provides holistic visibility across cloud, on-premise, SDN and hybrid environments, enabling you to proactively analyze risk from the business perspective, intelligently automate security changes, avoid misconfiguration incidents and ensure continuous compliance.
&lt;p&gt;&lt;b&gt;Click &lt;/b&gt;&lt;a href="https://www.algosec.com/lp/see-algosec-action-2/?utm_source=Email&amp;amp;utm_campaign=2019-08-06_The_Capital_One_Breach_Global_%5BEM%5D_%5BQ32019%5Dhttp://"&gt;&lt;b&gt;here &lt;/b&gt;&lt;/a&gt;&lt;b&gt;to learn how.&lt;/b&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-capital-one-breach-how-to-avoid"&gt;&lt;img src="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/standard/download-7-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9df22f0a0caaa15f1c04a08448676bee&amp;source=podcast&amp;photo%5fid=54506817" width="625" height="352" type="text/html" medium="video" duration="221" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/standard/download-7-thumbnail.jpg" width="600" height="338"/>
            <category>cyber security</category>
            <category>Data breach</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/video_medium/cisco-aci-hybrid-networks-breaking-video.mp4?source=podcast" type="video/mp4" length="103142794"/>
            <title>Cisco ACI &amp; Hybrid Networks Breaking Down Silos with Central Policy Management</title>
            <link>http://video.algosec.com/cisco-aci-hybrid-networks-breaking</link>
            <description>&lt;p&gt;&lt;b&gt;Yonatan Klein, Director of Product Management&lt;/b&gt; | July 30, 2019
&lt;p&gt;While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.&lt;/p&gt;
&lt;p&gt;Each part of your network estate is managed in its own independent silo instead of being holistically managed.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;He covers how to:&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/li&gt;&lt;li&gt;Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices&lt;/li&gt;&lt;li&gt;Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-hybrid-networks-breaking"&gt;&lt;img src="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54329483</guid>
            <pubDate>Tue, 30 Jul 2019 19:56:43 GMT</pubDate>
            <media:title>Cisco ACI &amp; Hybrid Networks Breaking Down Silos with Central Policy Management</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yonatan Klein, Director of Product Management&lt;/b&gt; | July 30, 2019
&lt;p&gt;While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.&lt;/p&gt;
&lt;p&gt;Each part of your network estate is managed in its own independent silo instead of being holistically managed.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;He covers how to:&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/li&gt;&lt;li&gt;Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices&lt;/li&gt;&lt;li&gt;Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-hybrid-networks-breaking"&gt;&lt;img src="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cb75f925661e325e6248fecc17f893d7&amp;source=podcast&amp;photo%5fid=54329483" width="625" height="352" type="text/html" medium="video" duration="3106" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cisco</category>
            <category>Cisco Tetration</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>hybrid environment</category>
            <category>network security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/video_medium/algosec-and-cisco-aci-for-improved-video.mp4?source=podcast" type="video/mp4" length="8705804"/>
            <title>AlgoSec and Cisco ACI for Improved Data Center Security, Compliance and...</title>
            <link>http://video.algosec.com/algosec-and-cisco-aci-for-improved</link>
            <description>&lt;p&gt;AlgoSec and Cisco ACI deliver security policy across the entire network, enables automated security policy change management for multi-vendor devices, provide risk and compliance analysis, and more.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-and-cisco-aci-for-improved"&gt;&lt;img src="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53965291</guid>
            <pubDate>Tue, 30 Jul 2019 09:13:39 GMT</pubDate>
            <media:title>AlgoSec and Cisco ACI for Improved Data Center Security, Compliance and...</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec and Cisco ACI deliver security policy across the entire network, enables automated security policy change management for multi-vendor devices, provide risk and compliance analysis, and more.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-and-cisco-aci-for-improved"&gt;&lt;img src="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9eb3f8c5a573378055ed58b253828b2c&amp;source=podcast&amp;photo%5fid=53965291" width="625" height="352" type="text/html" medium="video" duration="487" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>aci</category>
            <category>algosec</category>
            <category>automated security policy</category>
            <category>cisco</category>
            <category>contracts</category>
            <category>cyber</category>
            <category>juniper</category>
            <category>network security</category>
            <category>policy</category>
            <category>private cloud</category>
            <category>sdn</category>
            <category>security policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/video_medium/avoiding-the-securityagility-video.mp4?source=podcast" type="video/mp4" length="87131096"/>
            <title>Avoiding the Security/Agility Tradeoff with Network Security Policy</title>
            <link>http://video.algosec.com/avoiding-the-securityagility</link>
            <description>&lt;p&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | July 10, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Business application deployments and changes require IT, networking and security teams to be more agile than ever before.&lt;br&gt;
But frequently, this agility comes at the expense of security and compliance and enables network breaches and cyber-attacks.&lt;/p&gt;
&lt;p&gt;In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, covers how network security policy automation helps you avoid this conflict.&lt;/p&gt;
&lt;p&gt;Watch the webinar to learn how to:&lt;br&gt;
•	Plan for the entire network security lifecycle&lt;br&gt;
•	Discover your network topology and traffic flows&lt;br&gt;
•	Ensure continuous compliance and identify risks and compliance violations&lt;br&gt;
•	Easily implement changes across your hybrid network environment&lt;br&gt;
•	Mandate a consistent and unified change process&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/avoiding-the-securityagility"&gt;&lt;img src="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53789320</guid>
            <pubDate>Thu, 11 Jul 2019 12:46:31 GMT</pubDate>
            <media:title>Avoiding the Security/Agility Tradeoff with Network Security Policy</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | July 10, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Business application deployments and changes require IT, networking and security teams to be more agile than ever before.&lt;br&gt;
But frequently, this agility comes at the expense of security and compliance and enables network breaches and cyber-attacks.&lt;/p&gt;
&lt;p&gt;In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, covers how network security policy automation helps you avoid this conflict.&lt;/p&gt;
&lt;p&gt;Watch the webinar to learn how to:&lt;br&gt;
•	Plan for the entire network security lifecycle&lt;br&gt;
•	Discover your network topology and traffic flows&lt;br&gt;
•	Ensure continuous compliance and identify risks and compliance violations&lt;br&gt;
•	Easily implement changes across your hybrid network environment&lt;br&gt;
•	Mandate a consistent and unified change process&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/avoiding-the-securityagility"&gt;&lt;img src="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c9187dd732523aafe8b688e78ccb439d&amp;source=podcast&amp;photo%5fid=53789320" width="625" height="352" type="text/html" medium="video" duration="2613" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>automation</category>
            <category>change management</category>
            <category>compliance</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543314/53546196/4550e2bd0eaabc2660f3861da3d66c3b/video_medium/managing-network-security-with-video.mp4?source=podcast" type="video/mp4" length="7212164"/>
            <title>Managing Network Security with AlgoSec</title>
            <link>http://video.algosec.com/managing-network-security-with</link>
            <description>&lt;p&gt;Managing complex security polices across devices and operations teams is more challenging than ever. It’s time consuming, risky, prone to human error and out of sync with the business.  What if you could automate the entire security policy change process and manage your entire network environment - across  cloud, SDN and on-premise – using a single platform? Now you can. Over 1,800 leading organizations, including 20 of the Fortune 50, have relied on AlgoSec to drive business agility, security and compliance. Sounds intriguing? See it in action: &lt;a href="https://www.algosec.com/lp/see-algosec-action-2/"&gt;https://www.algosec.com/lp/see-algosec-action-2/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-network-security-with"&gt;&lt;img src="http://video.algosec.com/49543314/53546196/4550e2bd0eaabc2660f3861da3d66c3b/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53546196</guid>
            <pubDate>Tue, 02 Jul 2019 11:00:30 GMT</pubDate>
            <media:title>Managing Network Security with AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;Managing complex security polices across devices and operations teams is more challenging than ever. It’s time consuming, risky, prone to human error and out of sync with the business.  What if you could automate the entire security policy change process and manage your entire network environment - across  cloud, SDN and on-premise – using a single platform? Now you can. Over 1,800 leading organizations, including 20 of the Fortune 50, have relied on AlgoSec to drive business agility, security and compliance. Sounds intriguing? See it in action: &lt;a href="https://www.algosec.com/lp/see-algosec-action-2/"&gt;https://www.algosec.com/lp/see-algosec-action-2/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-network-security-with"&gt;&lt;img src="http://video.algosec.com/49543314/53546196/4550e2bd0eaabc2660f3861da3d66c3b/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4550e2bd0eaabc2660f3861da3d66c3b&amp;source=podcast&amp;photo%5fid=53546196" width="625" height="352" type="text/html" medium="video" duration="124" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543314/53546196/4550e2bd0eaabc2660f3861da3d66c3b/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>Network Security</category>
            <category>Science and Technology</category>
            <category>SDN</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/video_medium/effectively-managing-security-video.mp4?source=podcast" type="video/mp4" length="109360914"/>
            <title>Effectively Managing Security Policy | Joint Fortinet &amp; AlgoSec Webinar</title>
            <link>http://video.algosec.com/effectively-managing-security</link>
            <description>&lt;p&gt;&lt;b&gt;Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec)&lt;/b&gt; | Jun 26 2019
&lt;p&gt;In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.&lt;/p&gt;
&lt;p&gt;In this webinar, Satish Veerapuneni, Director of Products and Solutions at Fortinet and Yoav Karnibad, Product Manager at AlgoSec will discuss how joint customers benefit from AlgoSec’s multi-vendor security policy management capabilities while leveraging Fortinet’s industry-leading Security Fabric’s FortiManager &amp;amp; FortiAnalyzer.&lt;/p&gt;
&lt;p&gt;Join this live webinar to learn how to:&lt;br&gt;
• Automate policy optimization and risk assessment across all your security devices.&lt;br&gt;
• Enhance visibility and exercise greater control over your hybrid / heterogeneous network&lt;br&gt;
• Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation&lt;br&gt;
• Assess risk and ensure regulatory compliance across the entire enterprise environment&lt;br&gt;
• Realize single pane of glass management with advanced analysis and management of policy modifications through Fortinet Security Fabric’s FortiManager/FortiAnalyzer&amp;nbsp;and AlgoSec’s Firewall Analyzer, FireFlow and BusinessFlow&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/effectively-managing-security"&gt;&lt;img src="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53517696</guid>
            <pubDate>Mon, 01 Jul 2019 13:56:06 GMT</pubDate>
            <media:title>Effectively Managing Security Policy | Joint Fortinet &amp; AlgoSec Webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec)&lt;/b&gt; | Jun 26 2019
&lt;p&gt;In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.&lt;/p&gt;
&lt;p&gt;In this webinar, Satish Veerapuneni, Director of Products and Solutions at Fortinet and Yoav Karnibad, Product Manager at AlgoSec will discuss how joint customers benefit from AlgoSec’s multi-vendor security policy management capabilities while leveraging Fortinet’s industry-leading Security Fabric’s FortiManager &amp;amp; FortiAnalyzer.&lt;/p&gt;
&lt;p&gt;Join this live webinar to learn how to:&lt;br&gt;
• Automate policy optimization and risk assessment across all your security devices.&lt;br&gt;
• Enhance visibility and exercise greater control over your hybrid / heterogeneous network&lt;br&gt;
• Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation&lt;br&gt;
• Assess risk and ensure regulatory compliance across the entire enterprise environment&lt;br&gt;
• Realize single pane of glass management with advanced analysis and management of policy modifications through Fortinet Security Fabric’s FortiManager/FortiAnalyzer&amp;nbsp;and AlgoSec’s Firewall Analyzer, FireFlow and BusinessFlow&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/effectively-managing-security"&gt;&lt;img src="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b6e522c1eb5123a2a88d100caf162d8b&amp;source=podcast&amp;photo%5fid=53517696" width="625" height="352" type="text/html" medium="video" duration="3334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>cyber Security</category>
            <category>FireFlow</category>
            <category>Firewall Management</category>
            <category>Fortinet</category>
            <category>Network Security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/video_medium/securely-managing-application-video.mp4?source=podcast" type="video/mp4" length="38613866"/>
            <title>Securely Managing Application Connectivity – Best Practices</title>
            <link>http://video.algosec.com/securely-managing-application</link>
            <description>&lt;p&gt;&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securely-managing-application"&gt;&lt;img src="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53083724</guid>
            <pubDate>Sun, 16 Jun 2019 11:42:42 GMT</pubDate>
            <media:title>Securely Managing Application Connectivity – Best Practices</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securely-managing-application"&gt;&lt;img src="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3a53e9daff9a2bc19930ddc029e874d9&amp;source=podcast&amp;photo%5fid=53083724" width="625" height="352" type="text/html" medium="video" duration="1111" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Application Security</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>cloud security</category>
            <category>Connectivity</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/52937927/cd360a9cbec5eb3df886e4d8bb75b927/video_medium/introduction-to-micro-segmentation-video.mp4?source=podcast" type="video/mp4" length="29731433"/>
            <title>Introduction to Micro-segmentation</title>
            <link>http://video.algosec.com/introduction-to-micro-segmentation</link>
            <description>&lt;p&gt;&lt;p&gt;In lesson 1, Prof. Wool introduces
micro-segmentation: reasons for segmenting the data center, challenges, required
steps when deploying a micro-segmentation strategy, and how to future-proof your
policies&lt;/p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/introduction-to-micro-segmentation"&gt;&lt;img src="http://video.algosec.com/49543330/52937927/cd360a9cbec5eb3df886e4d8bb75b927/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52937927</guid>
            <pubDate>Thu, 13 Jun 2019 16:46:15 GMT</pubDate>
            <media:title>Introduction to Micro-segmentation</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;In lesson 1, Prof. Wool introduces
micro-segmentation: reasons for segmenting the data center, challenges, required
steps when deploying a micro-segmentation strategy, and how to future-proof your
policies&lt;/p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/introduction-to-micro-segmentation"&gt;&lt;img src="http://video.algosec.com/49543330/52937927/cd360a9cbec5eb3df886e4d8bb75b927/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cd360a9cbec5eb3df886e4d8bb75b927&amp;source=podcast&amp;photo%5fid=52937927" width="625" height="352" type="text/html" medium="video" duration="460" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/52937927/cd360a9cbec5eb3df886e4d8bb75b927/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/video_medium/microsegmentation-mapping-video.mp4?source=podcast" type="video/mp4" length="13465324"/>
            <title>Microsegmentation - Mapping Existing Applications</title>
            <link>http://video.algosec.com/microsegmentation-mapping</link>
            <description>&lt;p&gt;&lt;p&gt;Watch Prof. Wool as he shares tips on how to
prepare for network segmentation by identifying the segment borders&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-mapping"&gt;&lt;img src="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52938308</guid>
            <pubDate>Thu, 13 Jun 2019 16:46:05 GMT</pubDate>
            <media:title>Microsegmentation - Mapping Existing Applications</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Watch Prof. Wool as he shares tips on how to
prepare for network segmentation by identifying the segment borders&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-mapping"&gt;&lt;img src="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=6c21a30be19567d6b5e00c464942fbeb&amp;source=podcast&amp;photo%5fid=52938308" width="625" height="352" type="text/html" medium="video" duration="252" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543322/52938407/cb103debc3b39af2eb202015d5616b02/video_medium/microsegmentation-defining-logical-video.mp4?source=podcast" type="video/mp4" length="32309746"/>
            <title>Microsegmentation Defining Logical Segments</title>
            <link>http://video.algosec.com/microsegmentation-defining-logical</link>
            <description>&lt;p&gt;In lesson 3, Prof. Wool covers how to define
logical segments within a micro-segmentation project&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-defining-logical"&gt;&lt;img src="http://video.algosec.com/49543322/52938407/cb103debc3b39af2eb202015d5616b02/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52938407</guid>
            <pubDate>Thu, 13 Jun 2019 16:45:53 GMT</pubDate>
            <media:title>Microsegmentation Defining Logical Segments</media:title>
            <media:description type="html">&lt;p&gt;In lesson 3, Prof. Wool covers how to define
logical segments within a micro-segmentation project&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-defining-logical"&gt;&lt;img src="http://video.algosec.com/49543322/52938407/cb103debc3b39af2eb202015d5616b02/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cb103debc3b39af2eb202015d5616b02&amp;source=podcast&amp;photo%5fid=52938407" width="625" height="352" type="text/html" medium="video" duration="459" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543322/52938407/cb103debc3b39af2eb202015d5616b02/standard/download-6-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543318/52938483/8b6d66465a495f960523b89e77416a02/video_medium/microsegmentation-generating-a-video.mp4?source=podcast" type="video/mp4" length="22944465"/>
            <title>Microsegmentation - Generating a Filtering Policy</title>
            <link>http://video.algosec.com/microsegmentation-generating-a</link>
            <description>&lt;p&gt;In lesson 4, Prof. Wool demonstrates how to
generate a filtering policy during a micro-segmentation project&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-generating-a"&gt;&lt;img src="http://video.algosec.com/49543318/52938483/8b6d66465a495f960523b89e77416a02/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52938483</guid>
            <pubDate>Thu, 13 Jun 2019 16:45:39 GMT</pubDate>
            <media:title>Microsegmentation - Generating a Filtering Policy</media:title>
            <media:description type="html">&lt;p&gt;In lesson 4, Prof. Wool demonstrates how to
generate a filtering policy during a micro-segmentation project&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-generating-a"&gt;&lt;img src="http://video.algosec.com/49543318/52938483/8b6d66465a495f960523b89e77416a02/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=8b6d66465a495f960523b89e77416a02&amp;source=podcast&amp;photo%5fid=52938483" width="625" height="352" type="text/html" medium="video" duration="407" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543318/52938483/8b6d66465a495f960523b89e77416a02/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/52938534/8f5caca0feb36d3182e80f341525099d/video_medium/microsegmentation-ongoing-video.mp4?source=podcast" type="video/mp4" length="24837274"/>
            <title>Microsegmentation - Ongoing Maintenance</title>
            <link>http://video.algosec.com/microsegmentation-ongoing</link>
            <description>&lt;p&gt;&lt;p&gt;In lesson 5, Prof. Wool video covers the steps needed to take to ensure ongoing maintenance of your data center upon completion of a micro-segmentation
project&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-ongoing"&gt;&lt;img src="http://video.algosec.com/49543315/52938534/8f5caca0feb36d3182e80f341525099d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52938534</guid>
            <pubDate>Thu, 13 Jun 2019 15:31:12 GMT</pubDate>
            <media:title>Microsegmentation - Ongoing Maintenance</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;In lesson 5, Prof. Wool video covers the steps needed to take to ensure ongoing maintenance of your data center upon completion of a micro-segmentation
project&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-ongoing"&gt;&lt;img src="http://video.algosec.com/49543315/52938534/8f5caca0feb36d3182e80f341525099d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=8f5caca0feb36d3182e80f341525099d&amp;source=podcast&amp;photo%5fid=52938534" width="625" height="352" type="text/html" medium="video" duration="424" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/52938534/8f5caca0feb36d3182e80f341525099d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543328/52282845/e3378bd8e545b4768707ca8b2e9da418/video_medium/asher-webinar-rule-recertification-video.mp4?source=podcast" type="video/mp4" length="1396689"/>
            <title>Asher webinar rule recertification - Promo</title>
            <link>http://video.algosec.com/asher-webinar-rule-recertification</link>
            <description>&lt;p&gt;New webinar! Join Asher Benbenisty, @AlgoSec’s Director of Product Marketing to hear the application-centric approach to #firewall re-certification #networksecurity&lt;br&gt;
&lt;a href="https://www.algosec.com/webinar/firewall-rule-rectierfication-with-application-connectivity/"&gt;https://www.algosec.com/webinar/firewall-rule-rectierfication-with-application-connectivity/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/asher-webinar-rule-recertification"&gt;&lt;img src="http://video.algosec.com/49543328/52282845/e3378bd8e545b4768707ca8b2e9da418/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52282845</guid>
            <pubDate>Sun, 19 May 2019 14:41:06 GMT</pubDate>
            <media:title>Asher webinar rule recertification - Promo</media:title>
            <media:description type="html">&lt;p&gt;New webinar! Join Asher Benbenisty, @AlgoSec’s Director of Product Marketing to hear the application-centric approach to #firewall re-certification #networksecurity&lt;br&gt;
&lt;a href="https://www.algosec.com/webinar/firewall-rule-rectierfication-with-application-connectivity/"&gt;https://www.algosec.com/webinar/firewall-rule-rectierfication-with-application-connectivity/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/asher-webinar-rule-recertification"&gt;&lt;img src="http://video.algosec.com/49543328/52282845/e3378bd8e545b4768707ca8b2e9da418/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e3378bd8e545b4768707ca8b2e9da418&amp;source=podcast&amp;photo%5fid=52282845" width="625" height="352" type="text/html" medium="video" duration="23" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543328/52282845/e3378bd8e545b4768707ca8b2e9da418/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>firewall rule recertification</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/video_medium/firewall-rule-recertification-with-video.mp4?source=podcast" type="video/mp4" length="74582768"/>
            <title>Firewall Rule Recertification with Application Connectivity</title>
            <link>http://video.algosec.com/firewall-rule-recertification-with</link>
            <description>&lt;p&gt;Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/firewall-rule-recertification-with"&gt;&lt;img src="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/51313899</guid>
            <pubDate>Mon, 29 Apr 2019 11:39:25 GMT</pubDate>
            <media:title>Firewall Rule Recertification with Application Connectivity</media:title>
            <media:description type="html">&lt;p&gt;Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/firewall-rule-recertification-with"&gt;&lt;img src="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=28b03ebf89a04b04bfe7ccebae9cb7f5&amp;source=podcast&amp;photo%5fid=51313899" width="625" height="352" type="text/html" medium="video" duration="1197" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/>
            <category> Compliance</category>
            <category> Connectivity</category>
            <category> Cyber Security</category>
            <category> firewall management</category>
            <category> firewall rule recertification</category>
            <category>Firewalls</category>
            <category> Network Security</category>
            <category> Security Management</category>
            <category> security policy</category>
            <category> security tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/50970008/a28b16cd51ce9081093b2ef5a096fae3/video_medium/boosting-network-security-with-video.mp4?source=podcast" type="video/mp4" length="55910015"/>
            <title>Boosting Network Security with ChatOps</title>
            <link>http://video.algosec.com/boosting-network-security-with</link>
            <description>&lt;p&gt;&lt;b&gt;Dania Ben Peretz, Product Manager&lt;/b&gt;&amp;nbsp; | Apr 17 2019&lt;br&gt;&lt;br&gt;
The way we consume content has greatly evolved throughout the years - from text-only collateral to using applications that centralize the content and make it easier to access. However, the number of business applications is rapidly growing, ultimately causing organizations to suffer from “app fatigue”.
&lt;p&gt;Network security stakeholders can benefit from such a shift in content consumption by taking a conversational approach with ChatOps.&lt;/p&gt;
In this webinar, Dania Ben Peretz, Product Manager at AlgoSec covers how ChatOps helps network security and operational staff to:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Shorten resolution time of critical security incidents&lt;/li&gt;&lt;li&gt;Manage security more efficiently through collaboration and transparency between IT, Security, Network and DevOps teams&lt;/li&gt;&lt;li&gt;Ensure ongoing security and compliance&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/boosting-network-security-with"&gt;&lt;img src="http://video.algosec.com/49543315/50970008/a28b16cd51ce9081093b2ef5a096fae3/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/50970008</guid>
            <pubDate>Thu, 25 Apr 2019 12:30:30 GMT</pubDate>
            <media:title>Boosting Network Security with ChatOps</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Dania Ben Peretz, Product Manager&lt;/b&gt;&amp;nbsp; | Apr 17 2019&lt;br&gt;&lt;br&gt;
The way we consume content has greatly evolved throughout the years - from text-only collateral to using applications that centralize the content and make it easier to access. However, the number of business applications is rapidly growing, ultimately causing organizations to suffer from “app fatigue”.
&lt;p&gt;Network security stakeholders can benefit from such a shift in content consumption by taking a conversational approach with ChatOps.&lt;/p&gt;
In this webinar, Dania Ben Peretz, Product Manager at AlgoSec covers how ChatOps helps network security and operational staff to:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Shorten resolution time of critical security incidents&lt;/li&gt;&lt;li&gt;Manage security more efficiently through collaboration and transparency between IT, Security, Network and DevOps teams&lt;/li&gt;&lt;li&gt;Ensure ongoing security and compliance&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/boosting-network-security-with"&gt;&lt;img src="http://video.algosec.com/49543315/50970008/a28b16cd51ce9081093b2ef5a096fae3/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a28b16cd51ce9081093b2ef5a096fae3&amp;source=podcast&amp;photo%5fid=50970008" width="625" height="352" type="text/html" medium="video" duration="1786" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/50970008/a28b16cd51ce9081093b2ef5a096fae3/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Bots</category>
            <category>ChatOps</category>
            <category>Cyber Security</category>
            <category>DevOps</category>
            <category>IT Security</category>
            <category>Network Management</category>
            <category>Network Security</category>
            <category>Security Management</category>
            <category>security tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543326/49614976/bd1f9267d21e8da48f41902a69c86c6d/video_medium/from-antiquity-to-the-cloud-25-video.mp4?source=podcast" type="video/mp4" length="117033892"/>
            <title>From antiquity to the cloud: 25 years of firewalls and network filtering</title>
            <link>http://video.algosec.com/from-antiquity-to-the-cloud-25</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt;&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The first commercial firewall shipped in 1992. 25 years later the firewall is still the core building block of enterprises’ security infrastructures.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this educational webinar on the history of the firewall, Prof. Wool will take you through a riveting 25-year journey of the evolution of the firewall - from the ancient world of the host-based firewalls of the 90s, to today’s cloud-based firewalls, and will explain how each type of firewall works, its advantages and limitations, and provide some tips and best practices for effective network filtering.&lt;br&gt;&lt;br&gt;In this highly informational, and entertaining webinar Professor Wool will cover:&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The Early 90s: Host vs. Network&amp;nbsp;&lt;br&gt;Late 90s: Keeping State&amp;nbsp;&lt;br&gt;2003: Zone-Based firewalls&amp;nbsp;&lt;br&gt;2010: Next-Gen firewalls&amp;nbsp;&lt;br&gt;2015: Virtualized and cloud firewalls&lt;br&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/from-antiquity-to-the-cloud-25"&gt;&lt;img src="http://video.algosec.com/49543326/49614976/bd1f9267d21e8da48f41902a69c86c6d/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49614976</guid>
            <pubDate>Wed, 24 Apr 2019 09:37:26 GMT</pubDate>
            <media:title>From antiquity to the cloud: 25 years of firewalls and network filtering</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt;&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The first commercial firewall shipped in 1992. 25 years later the firewall is still the core building block of enterprises’ security infrastructures.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this educational webinar on the history of the firewall, Prof. Wool will take you through a riveting 25-year journey of the evolution of the firewall - from the ancient world of the host-based firewalls of the 90s, to today’s cloud-based firewalls, and will explain how each type of firewall works, its advantages and limitations, and provide some tips and best practices for effective network filtering.&lt;br&gt;&lt;br&gt;In this highly informational, and entertaining webinar Professor Wool will cover:&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The Early 90s: Host vs. Network&amp;nbsp;&lt;br&gt;Late 90s: Keeping State&amp;nbsp;&lt;br&gt;2003: Zone-Based firewalls&amp;nbsp;&lt;br&gt;2010: Next-Gen firewalls&amp;nbsp;&lt;br&gt;2015: Virtualized and cloud firewalls&lt;br&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/from-antiquity-to-the-cloud-25"&gt;&lt;img src="http://video.algosec.com/49543326/49614976/bd1f9267d21e8da48f41902a69c86c6d/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bd1f9267d21e8da48f41902a69c86c6d&amp;source=podcast&amp;photo%5fid=49614976" width="625" height="352" type="text/html" medium="video" duration="3888" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543326/49614976/bd1f9267d21e8da48f41902a69c86c6d/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>firewall history</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543331/49615205/38f8415e51bb5d766d89582e212bb667/video_medium/network-security-at-the-speed-of-video.mp4?source=podcast" type="video/mp4" length="110834946"/>
            <title>Network security at the speed of DevOps</title>
            <link>http://video.algosec.com/network-security-at-the-speed-of</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Anner Kushnir, VP Technology&lt;/b&gt; | Jul 24 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;DevOps methodologies have become extremely popular to enable agile application development and delivery.&lt;br&gt;Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.&lt;br&gt;&lt;br&gt;In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.&lt;br&gt;&lt;br&gt;This webinar will teach you how to:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery&lt;/li&gt;&lt;li&gt;Avoid external out-of-band network connectivity problems that require separate and manual handling&lt;/li&gt;&lt;li&gt;Ensure continuous compliance and auditability throughout the application delivery process&lt;/li&gt;&lt;li&gt;Get clearly documented application connectivity requirements which help prevent disruptions to the business&lt;/li&gt;&lt;li&gt;Bridge the gap between application developers and network security throughout the entire application lifecycle&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-at-the-speed-of"&gt;&lt;img src="http://video.algosec.com/49543331/49615205/38f8415e51bb5d766d89582e212bb667/standard/download-9-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615205</guid>
            <pubDate>Mon, 15 Apr 2019 17:51:11 GMT</pubDate>
            <media:title>Network security at the speed of DevOps</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Anner Kushnir, VP Technology&lt;/b&gt; | Jul 24 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;DevOps methodologies have become extremely popular to enable agile application development and delivery.&lt;br&gt;Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.&lt;br&gt;&lt;br&gt;In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.&lt;br&gt;&lt;br&gt;This webinar will teach you how to:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery&lt;/li&gt;&lt;li&gt;Avoid external out-of-band network connectivity problems that require separate and manual handling&lt;/li&gt;&lt;li&gt;Ensure continuous compliance and auditability throughout the application delivery process&lt;/li&gt;&lt;li&gt;Get clearly documented application connectivity requirements which help prevent disruptions to the business&lt;/li&gt;&lt;li&gt;Bridge the gap between application developers and network security throughout the entire application lifecycle&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-at-the-speed-of"&gt;&lt;img src="http://video.algosec.com/49543331/49615205/38f8415e51bb5d766d89582e212bb667/standard/download-9-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=38f8415e51bb5d766d89582e212bb667&amp;source=podcast&amp;photo%5fid=49615205" width="625" height="352" type="text/html" medium="video" duration="3309" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543331/49615205/38f8415e51bb5d766d89582e212bb667/standard/download-9-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>devops</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/video_medium/taming-the-storm-clouds-managing-video.mp4?source=podcast" type="video/mp4" length="87142532"/>
            <title>Taming the storm clouds: managing network security across hybrid and multi-cloud</title>
            <link>http://video.algosec.com/taming-the-storm-clouds-managing</link>
            <description>&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49895193</guid>
            <pubDate>Thu, 28 Mar 2019 13:04:00 GMT</pubDate>
            <media:title>Taming the storm clouds: managing network security across hybrid and multi-cloud</media:title>
            <media:description type="html">&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dc4df391a76a089c566104a63f8badf5&amp;source=podcast&amp;photo%5fid=49895193" width="625" height="352" type="text/html" medium="video" duration="2733" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cloud Security</category>
            <category>Cyber Security</category>
            <category>cyber threat</category>
            <category>Cyber Threats</category>
            <category>DevOps</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>IT Security</category>
            <category>Network Security</category>
            <category>Risk Management</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/video_medium/movin-on-up-to-the-cloud-how-to-video.mp4?source=podcast" type="video/mp4" length="48861838"/>
            <title>Movin' On Up to the Cloud: How to Migrate your Application Connectivity</title>
            <link>http://video.algosec.com/movin-on-up-to-the-cloud-how-to</link>
            <description>&lt;p&gt;&lt;span&gt;&lt;b&gt;Avivi Siman-Tov, Product Manager |&lt;/b&gt; Feb 6 2018&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;br&gt;&lt;/span&gt;Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.&lt;br&gt;&lt;br&gt;If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.&amp;nbsp;&lt;br&gt;&lt;br&gt;Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, explores how to simplify and accelerate large-scale complex application migration projects, while making security a priority.&amp;nbsp;&lt;br&gt;&lt;br&gt;Discover best practices to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Automatically discover applications and their existing connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups&amp;nbsp;&lt;/li&gt;&lt;li&gt;Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Assess the risk and ensure compliance throughout the migration process&amp;nbsp;&lt;/li&gt;&lt;li&gt;Deliver unified security policy management across the hybrid enterprise cloud environment&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/movin-on-up-to-the-cloud-how-to"&gt;&lt;img src="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49721659</guid>
            <pubDate>Wed, 20 Mar 2019 10:53:55 GMT</pubDate>
            <media:title>Movin' On Up to the Cloud: How to Migrate your Application Connectivity</media:title>
            <media:description type="html">&lt;p&gt;&lt;span&gt;&lt;b&gt;Avivi Siman-Tov, Product Manager |&lt;/b&gt; Feb 6 2018&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;br&gt;&lt;/span&gt;Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.&lt;br&gt;&lt;br&gt;If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.&amp;nbsp;&lt;br&gt;&lt;br&gt;Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, explores how to simplify and accelerate large-scale complex application migration projects, while making security a priority.&amp;nbsp;&lt;br&gt;&lt;br&gt;Discover best practices to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Automatically discover applications and their existing connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups&amp;nbsp;&lt;/li&gt;&lt;li&gt;Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Assess the risk and ensure compliance throughout the migration process&amp;nbsp;&lt;/li&gt;&lt;li&gt;Deliver unified security policy management across the hybrid enterprise cloud environment&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/movin-on-up-to-the-cloud-how-to"&gt;&lt;img src="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b7638ecd622bb415d654ed299e5208b2&amp;source=podcast&amp;photo%5fid=49721659" width="625" height="352" type="text/html" medium="video" duration="1788" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>application discovery</category>
            <category>cloudsecurity</category>
            <category>Firewall Management</category>
            <category>hybrid</category>
            <category>migrating applications</category>
            <category>networksecurity</category>
            <category>network security</category>
            <category>risk assessment</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/video_medium/algosec-zero-trust-presentation-video.mp4?source=podcast" type="video/mp4" length="95570277"/>
            <title>AlgoSec Zero Trust Presentation @Forrester Event</title>
            <link>http://video.algosec.com/algosec-zero-trust-presentation</link>
            <description>&lt;p&gt;The Forrester Zero Trust Model, when applied to network security, can help organizations develop robust prevention, detection, and incident response capabilities. The session, presented at the Security and Privacy event in Washington DC covered the challenges organizations face and approaches that can be employed, including steps to achieve visibility, policy management automation, application connectivity analysis and network segmentation.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-zero-trust-presentation"&gt;&lt;img src="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181720</guid>
            <pubDate>Thu, 15 Nov 2018 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Zero Trust Presentation @Forrester Event</media:title>
            <media:description type="html">&lt;p&gt;The Forrester Zero Trust Model, when applied to network security, can help organizations develop robust prevention, detection, and incident response capabilities. The session, presented at the Security and Privacy event in Washington DC covered the challenges organizations face and approaches that can be employed, including steps to achieve visibility, policy management automation, application connectivity analysis and network segmentation.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-zero-trust-presentation"&gt;&lt;img src="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fb1c7af2f781806e661e0aef5ae24af4&amp;source=podcast&amp;photo%5fid=44181720" width="625" height="469" type="text/html" medium="video" duration="1640" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>algosec</category>
            <category>automation</category>
            <category>aws</category>
            <category>azure</category>
            <category>checkpoint</category>
            <category>cisco</category>
            <category>forrester</category>
            <category>juniper</category>
            <category>Management</category>
            <category>micro segmentation</category>
            <category>networking</category>
            <category>network security</category>
            <category>palo alto</category>
            <category>security policy</category>
            <category>segmentation</category>
            <category>trust</category>
            <category>visibility</category>
            <category>zero</category>
            <category>zero trust</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/video_medium/selecting-the-right-security-policy-video.mp4?source=podcast" type="video/mp4" length="76996065"/>
            <title>Selecting the right security policy management solution for your organization</title>
            <link>http://video.algosec.com/selecting-the-right-security-policy</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect&amp;nbsp;&lt;/b&gt;&lt;br&gt;&lt;/p&gt;IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.&amp;nbsp;&lt;br&gt;In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.&amp;nbsp;&lt;br&gt;Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.&amp;nbsp;&lt;br&gt;&lt;br&gt;Key topics include:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Intelligent automation is more than just adding policies&lt;/li&gt;&lt;li&gt;Letting a business-centric approach take the lead&amp;nbsp;&lt;/li&gt;&lt;li&gt;Extracting the best from existing automation processes and creating new ones&amp;nbsp;&lt;/li&gt;&lt;li&gt;Managing it all together: cloud, SDN and on-premise&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/selecting-the-right-security-policy"&gt;&lt;img src="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615259</guid>
            <pubDate>Wed, 17 Oct 2018 18:30:00 GMT</pubDate>
            <media:title>Selecting the right security policy management solution for your organization</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect&amp;nbsp;&lt;/b&gt;&lt;br&gt;&lt;/p&gt;IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.&amp;nbsp;&lt;br&gt;In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.&amp;nbsp;&lt;br&gt;Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.&amp;nbsp;&lt;br&gt;&lt;br&gt;Key topics include:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Intelligent automation is more than just adding policies&lt;/li&gt;&lt;li&gt;Letting a business-centric approach take the lead&amp;nbsp;&lt;/li&gt;&lt;li&gt;Extracting the best from existing automation processes and creating new ones&amp;nbsp;&lt;/li&gt;&lt;li&gt;Managing it all together: cloud, SDN and on-premise&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/selecting-the-right-security-policy"&gt;&lt;img src="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=26569be0faf52cc329bf82bf37a909f1&amp;source=podcast&amp;photo%5fid=49615259" width="625" height="352" type="text/html" medium="video" duration="2338" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>cloud security</category>
            <category>Firewall Management</category>
            <category>network security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/video_medium/network-security-audit-passing-your-video.mp4?source=podcast" type="video/mp4" length="97099801"/>
            <title>Network Security Audit? Passing Your Next One with Flying Colors</title>
            <link>http://video.algosec.com/network-security-audit-passing-your</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt; | Sep 6 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are required to maintain an unfailing state of compliance with laws and regulations.&amp;nbsp;&lt;br&gt;&lt;br&gt;Do you know about the upcoming PCI-DSS 3.2.1 standard and what it means for your operation? Are you ready to be audited?&lt;br&gt;&lt;br&gt;Like fire drills, audits can catch us unprepared and expose inadequacies. What should we do now to make sure we pass the next audit with ease?&lt;br&gt;&lt;br&gt;Presented by renowned industry expert, Professor Avishai Wool, this technical webinar imparts best practices and reveals specific techniques to help you make sure that your compliance posture stands up to any audit.&lt;br&gt;&lt;br&gt;In this webinar, Professor Wool discusses:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Know if your network is compliant with the new PCI standard&lt;/li&gt;&lt;li&gt;Upgrade to the secure alternative to SSL to safeguard your payment data&lt;/li&gt;&lt;li&gt;Prepare for the next audit&lt;/li&gt;&lt;li&gt;Assure continuous compliance&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-audit-passing-your"&gt;&lt;img src="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615104</guid>
            <pubDate>Thu, 06 Sep 2018 17:00:00 GMT</pubDate>
            <media:title>Network Security Audit? Passing Your Next One with Flying Colors</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt; | Sep 6 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are required to maintain an unfailing state of compliance with laws and regulations.&amp;nbsp;&lt;br&gt;&lt;br&gt;Do you know about the upcoming PCI-DSS 3.2.1 standard and what it means for your operation? Are you ready to be audited?&lt;br&gt;&lt;br&gt;Like fire drills, audits can catch us unprepared and expose inadequacies. What should we do now to make sure we pass the next audit with ease?&lt;br&gt;&lt;br&gt;Presented by renowned industry expert, Professor Avishai Wool, this technical webinar imparts best practices and reveals specific techniques to help you make sure that your compliance posture stands up to any audit.&lt;br&gt;&lt;br&gt;In this webinar, Professor Wool discusses:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Know if your network is compliant with the new PCI standard&lt;/li&gt;&lt;li&gt;Upgrade to the secure alternative to SSL to safeguard your payment data&lt;/li&gt;&lt;li&gt;Prepare for the next audit&lt;/li&gt;&lt;li&gt;Assure continuous compliance&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-audit-passing-your"&gt;&lt;img src="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=136e59e2afb568e47149553c486bea6e&amp;source=podcast&amp;photo%5fid=49615104" width="625" height="352" type="text/html" medium="video" duration="3379" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>automation</category>
            <category>compliance</category>
            <category>Firewall Management</category>
            <category>network security</category>
            <category>pci</category>
            <category>pci audit</category>
            <category>prof wool</category>
            <category>security audit</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/video_medium/cisco-aci-and-algosec-integration-video.mp4?source=podcast" type="video/mp4" length="7894287"/>
            <title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration</link>
            <description>&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181812</guid>
            <pubDate>Mon, 18 Jun 2018 03:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</media:title>
            <media:description type="html">&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ea3eaaff1b36a7756bfa854f08f6b30&amp;source=podcast&amp;photo%5fid=44181812" width="625" height="352" type="text/html" medium="video" duration="376" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/video_medium/devopsifying-network-security-video.mp4?source=podcast" type="video/mp4" length="11997028"/>
            <title>DevOpsifying Network Security: AlgoSec - Ansible Demo</title>
            <link>http://video.algosec.com/devopsifying-network-security</link>
            <description>&lt;p&gt;This demo describes how developers can seamlessly incorporate network connectivity into their DevOps methodology, using their existing CI tools, in order to fully automate the application delivery process end-to-end.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/devopsifying-network-security"&gt;&lt;img src="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181768</guid>
            <pubDate>Thu, 31 May 2018 03:00:00 GMT</pubDate>
            <media:title>DevOpsifying Network Security: AlgoSec - Ansible Demo</media:title>
            <media:description type="html">&lt;p&gt;This demo describes how developers can seamlessly incorporate network connectivity into their DevOps methodology, using their existing CI tools, in order to fully automate the application delivery process end-to-end.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/devopsifying-network-security"&gt;&lt;img src="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2e5a4dec5e02b94502d7e0baf5c1bb26&amp;source=podcast&amp;photo%5fid=44181768" width="625" height="352" type="text/html" medium="video" duration="584" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>algosec devops</category>
            <category>ansible</category>
            <category>application connectivity'</category>
            <category>chef</category>
            <category>CI tools</category>
            <category>code integration</category>
            <category>DevOps</category>
            <category>firewall management</category>
            <category>Jenkins</category>
            <category>network security</category>
            <category>puppet</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/video_medium/sharing-network-security-video.mp4?source=podcast" type="video/mp4" length="16792470"/>
            <title>Sharing Network Security Information with the Wider IT Community With Team...</title>
            <link>http://video.algosec.com/sharing-network-security</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sharing-network-security"&gt;&lt;img src="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181793</guid>
            <pubDate>Tue, 30 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Sharing Network Security Information with the Wider IT Community With Team...</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sharing-network-security"&gt;&lt;img src="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=82a8e57717222b74b1b7f76f49f5d8aa&amp;source=podcast&amp;photo%5fid=44181793" width="625" height="352" type="text/html" medium="video" duration="287" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>avishai wool</category>
            <category>chatbot</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>ms teams</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>skype for business</category>
            <category>slack</category>
            <category>team collaboration tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/video_medium/the-benefits-of-mapping-firewall-video.mp4?source=podcast" type="video/mp4" length="14101048"/>
            <title>The Benefits of Mapping Firewall Rules to Business Applications</title>
            <link>http://video.algosec.com/the-benefits-of-mapping-firewall</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-benefits-of-mapping-firewall"&gt;&lt;img src="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181854</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>The Benefits of Mapping Firewall Rules to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-benefits-of-mapping-firewall"&gt;&lt;img src="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=72ce166d6692eacad1d4807eb07ea18e&amp;source=podcast&amp;photo%5fid=44181854" width="625" height="352" type="text/html" medium="video" duration="243" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity flows</category>
            <category>businessflow</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rule management</category>
            <category>network connectivity</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/video_medium/new-how-to-manage-dynamic-objects-video.mp4?source=podcast" type="video/mp4" length="19361181"/>
            <title>New! How to Manage Dynamic Objects in Cloud Environments</title>
            <link>http://video.algosec.com/new-how-to-manage-dynamic-objects</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-how-to-manage-dynamic-objects"&gt;&lt;img src="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181841</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>New! How to Manage Dynamic Objects in Cloud Environments</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-how-to-manage-dynamic-objects"&gt;&lt;img src="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0524b2eaa5d233030ef32c3f04935a7b&amp;source=podcast&amp;photo%5fid=44181841" width="625" height="352" type="text/html" medium="video" duration="359" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon web services security</category>
            <category>avishai wool</category>
            <category>aws</category>
            <category>aws security</category>
            <category>cloud security</category>
            <category>dynamic objects aws</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/video_medium/lesson-7-how-to-prepare-for-network-video.mp4?source=podcast" type="video/mp4" length="13749334"/>
            <title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</title>
            <link>http://video.algosec.com/lesson-7-how-to-prepare-for-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181819</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f796f81cc13de312cc8c7bd06b607f5b&amp;source=podcast&amp;photo%5fid=44181819" width="625" height="352" type="text/html" medium="video" duration="247" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>avishai wool</category>
            <category>cloud security</category>
            <category>Data Center</category>
            <category>data center security</category>
            <category>east west traffic</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/video_medium/how-to-intelligently-select-the-video.mp4?source=podcast" type="video/mp4" length="25563649"/>
            <title>How to Intelligently Select the Security Groups to Modify When Managing...</title>
            <link>http://video.algosec.com/how-to-intelligently-select-the</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 7&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-intelligently-select-the"&gt;&lt;img src="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181920</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>How to Intelligently Select the Security Groups to Modify When Managing...</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 7&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-intelligently-select-the"&gt;&lt;img src="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1772ee30e20c98c8d8c7667649d3e7cc&amp;source=podcast&amp;photo%5fid=44181920" width="625" height="352" type="text/html" medium="video" duration="419" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud firewalls</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>hybrid cloud security</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>public cloud security</category>
            <category>publick cloud</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/video_medium/how-to-automatically-identify-video.mp4?source=podcast" type="video/mp4" length="27473196"/>
            <title>How to Automatically Identify Business Application Connectivity Needs from...</title>
            <link>http://video.algosec.com/how-to-automatically-identify</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 5
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-automatically-identify"&gt;&lt;img src="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181877</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>How to Automatically Identify Business Application Connectivity Needs from...</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 5
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-automatically-identify"&gt;&lt;img src="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c2388410abe5deb84379c4ee696b5036&amp;source=podcast&amp;photo%5fid=44181877" width="625" height="352" type="text/html" medium="video" duration="410" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity</category>
            <category>application connectivity management</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center</category>
            <category>firewall rules</category>
            <category>network connectivity flows</category>
            <category>Network Security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/video_medium/lesson-7-how-to-aggregate-network-video.mp4?source=podcast" type="video/mp4" length="21243911"/>
            <title>Lesson 7: How to Aggregate Network Flows Into Application Flows</title>
            <link>http://video.algosec.com/lesson-7-how-to-aggregate-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181876</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Aggregate Network Flows Into Application Flows</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d5894f7ffc54d4f9858292bb6ee2723c&amp;source=podcast&amp;photo%5fid=44181876" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center applications</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/video_medium/lesson-17-pci-linking-video.mp4?source=podcast" type="video/mp4" length="15245868"/>
            <title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</title>
            <link>http://video.algosec.com/lesson-17-pci-linking</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181937</guid>
            <pubDate>Tue, 29 Aug 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fdf0e5036006d18cfb40fc57ac280e8d&amp;source=podcast&amp;photo%5fid=44181937" width="625" height="352" type="text/html" medium="video" duration="281" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>nessus</category>
            <category>Network Security</category>
            <category>pci</category>
            <category>pci dss</category>
            <category>prof wool</category>
            <category>rapid7</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>tenable</category>
            <category>vulnerabilities</category>
            <category>vulnerability scanners</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/video_medium/the-right-way-to-audit-aws-policies-video.mp4?source=podcast" type="video/mp4" length="20476785"/>
            <title>The Right Way to Audit AWS Policies</title>
            <link>http://video.algosec.com/the-right-way-to-audit-aws-policies</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-right-way-to-audit-aws-policies"&gt;&lt;img src="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181993</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>The Right Way to Audit AWS Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-right-way-to-audit-aws-policies"&gt;&lt;img src="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b1c1f67722fb6eb47731b6e174f7b8ae&amp;source=podcast&amp;photo%5fid=44181993" width="625" height="352" type="text/html" medium="video" duration="380" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud firewalls</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>hybrid cloud security</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>public cloud security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/video_medium/how-to-integrate-security-into-the-1-video.mp4?source=podcast" type="video/mp4" length="14040752"/>
            <title>How to Integrate Security into the Test Environment</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the-1</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the-1"&gt;&lt;img src="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181992</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the Test Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the-1"&gt;&lt;img src="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=530e283f33821556fb69c84052c07c98&amp;source=podcast&amp;photo%5fid=44181992" width="625" height="352" type="text/html" medium="video" duration="292" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Devops</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/video_medium/tips-for-adding-capacity-without-video.mp4?source=podcast" type="video/mp4" length="24919436"/>
            <title>Tips for Adding Capacity Without Changing Your Security Policies</title>
            <link>http://video.algosec.com/tips-for-adding-capacity-without</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181948</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>Tips for Adding Capacity Without Changing Your Security Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0ccdc09b741f04206dd36b3f659e9519&amp;source=podcast&amp;photo%5fid=44181948" width="625" height="352" type="text/html" medium="video" duration="446" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/video_medium/how-to-integrate-security-into-the-video.mp4?source=podcast" type="video/mp4" length="16789600"/>
            <title>How to Integrate Security into the CI Process</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181918</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the CI Process</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0181d939b45c1552d4f90366f73e9c01&amp;source=podcast&amp;photo%5fid=44181918" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/video_medium/onboarding-new-firewall-devices-video.mp4?source=podcast" type="video/mp4" length="5986333"/>
            <title>Onboarding New Firewall Devices Using AlgoSec's APIs</title>
            <link>http://video.algosec.com/onboarding-new-firewall-devices</link>
            <description>&lt;p&gt;Security integration is a common requirement for many enterprise customers and MSSPs. This video showcases the process to operationalize this requirements including:&lt;br /&gt;
1. Onboarding new firewall devices through a web portal&lt;br /&gt;
2. Easily get compliance scores for newly onboarded devices&lt;br /&gt;
3. Identify firewall cleanup opportunities&lt;br /&gt;
4. Identify if security policies are blocking application connectivity&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/onboarding-new-firewall-devices"&gt;&lt;img src="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181964</guid>
            <pubDate>Fri, 12 May 2017 03:00:00 GMT</pubDate>
            <media:title>Onboarding New Firewall Devices Using AlgoSec's APIs</media:title>
            <media:description type="html">&lt;p&gt;Security integration is a common requirement for many enterprise customers and MSSPs. This video showcases the process to operationalize this requirements including:&lt;br /&gt;
1. Onboarding new firewall devices through a web portal&lt;br /&gt;
2. Easily get compliance scores for newly onboarded devices&lt;br /&gt;
3. Identify firewall cleanup opportunities&lt;br /&gt;
4. Identify if security policies are blocking application connectivity&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/onboarding-new-firewall-devices"&gt;&lt;img src="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e10b23fea5f80c6a1fe1337d28d4fc53&amp;source=podcast&amp;photo%5fid=44181964" width="625" height="352" type="text/html" medium="video" duration="301" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>mssps</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/video_medium/the-algosec-qradar-app-for-incident-video.mp4?source=podcast" type="video/mp4" length="13528027"/>
            <title>The AlgoSec QRadar App for Incident Response</title>
            <link>http://video.algosec.com/the-algosec-qradar-app-for-incident</link>
            <description>&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-algosec-qradar-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182027</guid>
            <pubDate>Fri, 03 Mar 2017 02:00:00 GMT</pubDate>
            <media:title>The AlgoSec QRadar App for Incident Response</media:title>
            <media:description type="html">&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-algosec-qradar-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=697b47e70fcfbb1d2c48e4c514506a03&amp;source=podcast&amp;photo%5fid=44182027" width="625" height="352" type="text/html" medium="video" duration="388" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attacks</category>
            <category>cyber threats</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>IBM QRadar</category>
            <category>incident response</category>
            <category>network security</category>
            <category>security intelligence</category>
            <category>security intelligence platform</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/video_medium/demo-algosecs-cisco-aci-app-center-video.mp4?source=podcast" type="video/mp4" length="12747509"/>
            <title>Demo: AlgoSec's Cisco ACI App Center</title>
            <link>http://video.algosec.com/demo-algosecs-cisco-aci-app-center</link>
            <description>&lt;p&gt;The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosecs-cisco-aci-app-center"&gt;&lt;img src="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181981</guid>
            <pubDate>Fri, 03 Mar 2017 02:00:00 GMT</pubDate>
            <media:title>Demo: AlgoSec's Cisco ACI App Center</media:title>
            <media:description type="html">&lt;p&gt;The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosecs-cisco-aci-app-center"&gt;&lt;img src="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cd6ffbb3cb4ab2fd653726f5bec24c85&amp;source=podcast&amp;photo%5fid=44181981" width="625" height="352" type="text/html" medium="video" duration="385" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>ACI Fabric</category>
            <category>AlgoSec Cisco ACI App</category>
            <category>Audit and Compliance</category>
            <category>cisco</category>
            <category>Cisco ACI App</category>
            <category>epgs</category>
            <category>Firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182073/a56a7b4cd02011edfe60a8dc31f51281/video_medium/lesson-1-how-to-bring-business-video.mp4?source=podcast" type="video/mp4" length="17546952"/>
            <title>Lesson 1: How to Bring Business Context into Incident Response</title>
            <link>http://video.algosec.com/lesson-1-how-to-bring-business</link>
            <description>&lt;p&gt;Advanced Cyber Threat and Incident Management: Lesson 1&lt;/p&gt;
&lt;p&gt;SIEM solutions collect and analyze logs generated by the technology infrastructure, security systems and business applications. The Security Operations Center (SOC) team uses this information to identify and flag suspicious activity for further investigation. In this lesson, Professor Wool explains why it’s important to connect the information collected by the SIEM with other databases that provide information on application connectivity, in order to make informed decisions on the level of risk to the business, and the steps the SOC needs to take to neutralize the attack.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-bring-business"&gt;&lt;img src="http://video.algosec.com/4465660/44182073/a56a7b4cd02011edfe60a8dc31f51281/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182073</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 1: How to Bring Business Context into Incident Response</media:title>
            <media:description type="html">&lt;p&gt;Advanced Cyber Threat and Incident Management: Lesson 1&lt;/p&gt;
&lt;p&gt;SIEM solutions collect and analyze logs generated by the technology infrastructure, security systems and business applications. The Security Operations Center (SOC) team uses this information to identify and flag suspicious activity for further investigation. In this lesson, Professor Wool explains why it’s important to connect the information collected by the SIEM with other databases that provide information on application connectivity, in order to make informed decisions on the level of risk to the business, and the steps the SOC needs to take to neutralize the attack.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-bring-business"&gt;&lt;img src="http://video.algosec.com/4465660/44182073/a56a7b4cd02011edfe60a8dc31f51281/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a56a7b4cd02011edfe60a8dc31f51281&amp;source=podcast&amp;photo%5fid=44182073" width="625" height="352" type="text/html" medium="video" duration="334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182073/a56a7b4cd02011edfe60a8dc31f51281/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyberattack</category>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>incident resonse</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>Security Incident and Event Magement</category>
            <category>security management</category>
            <category>siem</category>
            <category>splunk</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/video_medium/lesson-14-synchronized-object-video.mp4?source=podcast" type="video/mp4" length="20074623"/>
            <title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</title>
            <link>http://video.algosec.com/lesson-14-synchronized-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182061</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=21c66ed92e36977f79bf555977f026be&amp;source=podcast&amp;photo%5fid=44182061" width="625" height="352" type="text/html" medium="video" duration="399" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>network management</category>
            <category>network objects</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/video_medium/lesson-16-how-to-take-control-of-a-video.mp4?source=podcast" type="video/mp4" length="18241089"/>
            <title>Lesson 16: How to Take Control of a Firewall Migration Project</title>
            <link>http://video.algosec.com/lesson-16-how-to-take-control-of-a</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182049</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 16: How to Take Control of a Firewall Migration Project</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4cf23ef44547986e20b5679b559b1b5e&amp;source=podcast&amp;photo%5fid=44182049" width="625" height="352" type="text/html" medium="video" duration="379" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall migration</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/video_medium/lesson-2-bringing-reachability-video.mp4?source=podcast" type="video/mp4" length="17727360"/>
            <title>Lesson 2: Bringing Reachability Analysis into Incident Response</title>
            <link>http://video.algosec.com/lesson-2-bringing-reachability</link>
            <description>&lt;p&gt;Advanced Cyber Threat and Incident Management: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool discusses the need for reachability analysis in order to assess the severity of the threat and potential impact of an incident. Professor Wool explains how to use traffic simulations to map connectivity paths to/from compromised servers and to/from the internet. By mapping the potential lateral movement paths of an attacker across the network, the SOC team can, for example, proactively take action to prevent data exfiltration or block incoming communications with Command and Control servers.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-bringing-reachability"&gt;&lt;img src="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182021</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 2: Bringing Reachability Analysis into Incident Response</media:title>
            <media:description type="html">&lt;p&gt;Advanced Cyber Threat and Incident Management: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool discusses the need for reachability analysis in order to assess the severity of the threat and potential impact of an incident. Professor Wool explains how to use traffic simulations to map connectivity paths to/from compromised servers and to/from the internet. By mapping the potential lateral movement paths of an attacker across the network, the SOC team can, for example, proactively take action to prevent data exfiltration or block incoming communications with Command and Control servers.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-bringing-reachability"&gt;&lt;img src="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b0d85fa329b1dfbdd446266c8b43a5f3&amp;source=podcast&amp;photo%5fid=44182021" width="625" height="352" type="text/html" medium="video" duration="336" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyberattack</category>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>incident response</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security incident and event management</category>
            <category>security management</category>
            <category>security policy</category>
            <category>siem</category>
            <category>splunk</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/video_medium/lesson-15-how-to-synchronize-object-video.mp4?source=podcast" type="video/mp4" length="13414169"/>
            <title>Lesson 15: How to Synchronize Object Management with a CMDB</title>
            <link>http://video.algosec.com/lesson-15-how-to-synchronize-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182008</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 15: How to Synchronize Object Management with a CMDB</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=13a6814f2c37052c1fb387ad7ea20522&amp;source=podcast&amp;photo%5fid=44182008" width="625" height="352" type="text/html" medium="video" duration="298" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cmdb</category>
            <category>firewall changes</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network management</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/video_medium/algosec-splunk-app-for-incident-video.mp4?source=podcast" type="video/mp4" length="6902436"/>
            <title>AlgoSec Splunk App for Incident Response</title>
            <link>http://video.algosec.com/algosec-splunk-app-for-incident</link>
            <description>&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-splunk-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182052</guid>
            <pubDate>Mon, 28 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Splunk App for Incident Response</media:title>
            <media:description type="html">&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-splunk-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0c4d10edf34317e11d28581651e31def&amp;source=podcast&amp;photo%5fid=44182052" width="625" height="352" type="text/html" medium="video" duration="214" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>incident response</category>
            <category>network security</category>
            <category>security information and event management</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>SIEM</category>
            <category>Splunk</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/video_medium/lesson-13-zero-touch-change-video.mp4?source=podcast" type="video/mp4" length="23188821"/>
            <title>Lesson 13: Zero-Touch Change Management with Checks and Balances</title>
            <link>http://video.algosec.com/lesson-13-zero-touch-change</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182144</guid>
            <pubDate>Tue, 15 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>Lesson 13: Zero-Touch Change Management with Checks and Balances</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e254cfe4860678b02481a8ea15c6745f&amp;source=podcast&amp;photo%5fid=44182144" width="625" height="352" type="text/html" medium="video" duration="423" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network operations</category>
            <category>Network Security</category>
            <category>professor wool</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>security policy change management</category>
            <category>zero touch automation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/video_medium/cisco-aci-and-algosec-integration-1-video.mp4?source=podcast" type="video/mp4" length="8871061"/>
            <title>Cisco ACI and AlgoSec Integration (Overview and Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration-1</link>
            <description>&lt;p&gt;Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration-1"&gt;&lt;img src="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182087</guid>
            <pubDate>Mon, 31 Oct 2016 02:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (Overview and Demo)</media:title>
            <media:description type="html">&lt;p&gt;Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration-1"&gt;&lt;img src="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dcd1a526c8336ca642a67e763c8639bd&amp;source=podcast&amp;photo%5fid=44182087" width="625" height="352" type="text/html" medium="video" duration="458" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/video_medium/combining-security-groups-and-video.mp4?source=podcast" type="video/mp4" length="20330009"/>
            <title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</title>
            <link>http://video.algosec.com/combining-security-groups-and</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/combining-security-groups-and"&gt;&lt;img src="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182148</guid>
            <pubDate>Thu, 29 Sep 2016 03:00:00 GMT</pubDate>
            <media:title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/combining-security-groups-and"&gt;&lt;img src="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=92cd6dd9ebc61271a4111bbc26bec00d&amp;source=podcast&amp;photo%5fid=44182148" width="625" height="352" type="text/html" medium="video" duration="393" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>firewalls</category>
            <category>nacl</category>
            <category>network access control lists</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/video_medium/using-aws-network-acls-for-enhanced-video.mp4?source=podcast" type="video/mp4" length="21725729"/>
            <title>Using AWS Network ACLs for Enhanced Traffic Filtering</title>
            <link>http://video.algosec.com/using-aws-network-acls-for-enhanced</link>
            <description>&lt;p&gt;In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/using-aws-network-acls-for-enhanced"&gt;&lt;img src="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182088</guid>
            <pubDate>Mon, 26 Sep 2016 03:00:00 GMT</pubDate>
            <media:title>Using AWS Network ACLs for Enhanced Traffic Filtering</media:title>
            <media:description type="html">&lt;p&gt;In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/using-aws-network-acls-for-enhanced"&gt;&lt;img src="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c3e563d70dbfbdadd99c127bdbee633d&amp;source=podcast&amp;photo%5fid=44182088" width="625" height="352" type="text/html" medium="video" duration="420" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>aws</category>
            <category>aws security</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>Firewalls</category>
            <category>nacl</category>
            <category>nacls</category>
            <category>network access control lists</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/video_medium/lesson-3-best-practices-for-video.mp4?source=podcast" type="video/mp4" length="15731335"/>
            <title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the...</title>
            <link>http://video.algosec.com/lesson-3-best-practices-for</link>
            <description>&lt;p&gt;Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-best-practices-for"&gt;&lt;img src="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182196</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the...</media:title>
            <media:description type="html">&lt;p&gt;Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-best-practices-for"&gt;&lt;img src="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9215d82e7075332ada9014679d1d6b7b&amp;source=podcast&amp;photo%5fid=44182196" width="625" height="352" type="text/html" medium="video" duration="297" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>auditing</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/video_medium/lesson-1-migrating-to-nsx-video.mp4?source=podcast" type="video/mp4" length="17310417"/>
            <title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</title>
            <link>http://video.algosec.com/lesson-1-migrating-to-nsx</link>
            <description>&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182155</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</media:title>
            <media:description type="html">&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=def81240212859275a1a7e8e49361dd8&amp;source=podcast&amp;photo%5fid=44182155" width="625" height="352" type="text/html" medium="video" duration="319" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/video_medium/lesson-2-tips-on-how-to-create-video.mp4?source=podcast" type="video/mp4" length="19480685"/>
            <title>Lesson 2: Tips on How to Create Filtering Policies for NSX</title>
            <link>http://video.algosec.com/lesson-2-tips-on-how-to-create</link>
            <description>&lt;p&gt;Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-tips-on-how-to-create"&gt;&lt;img src="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182098</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: Tips on How to Create Filtering Policies for NSX</media:title>
            <media:description type="html">&lt;p&gt;Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-tips-on-how-to-create"&gt;&lt;img src="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ce089eaa3bad2d6123444b73d7e938e8&amp;source=podcast&amp;photo%5fid=44182098" width="625" height="352" type="text/html" medium="video" duration="381" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/video_medium/lesson-4-using-next-generation-video.mp4?source=podcast" type="video/mp4" length="17536828"/>
            <title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</title>
            <link>http://video.algosec.com/lesson-4-using-next-generation</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182238</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dab3bab204d4a15a112afe579c826e2d&amp;source=podcast&amp;photo%5fid=44182238" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>cyber threat detection</category>
            <category>cyber threat prevention</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Next-Generation Firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/video_medium/lesson-3-managing-your-security-video.mp4?source=podcast" type="video/mp4" length="16089357"/>
            <title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</title>
            <link>http://video.algosec.com/lesson-3-managing-your-security</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182171</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b9e12ad72654514540985c604cfa8e53&amp;source=podcast&amp;photo%5fid=44182171" width="625" height="352" type="text/html" medium="video" duration="351" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>next generation firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
    </channel>
</rss>
