<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/rss/tag/Algosec"/>
        <atom:link rel="next" href="https://video.algosec.com/rss/tag/Algosec?tag=Algosec&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/video_medium/case-study-ncr-corporations-network-video.mp4?source=podcast" type="video/mp4" length="18029591"/>
            <title>Case Study: NCR Corporation's Network Security Transformation with AlgoSec</title>
            <link>http://video.algosec.com/case-study-ncr-corporations-network</link>
            <description>&lt;p&gt;Discover how NCR Corporation successfully integrated AlgoSec's Security Policy Management Solution into their network infrastructure. Learn how AlgoSec Firewall Analyzer, FireFlow, AppViz, and AppChange enabled NCR to automate security policy changes, improve visibility, streamline auditing, and achieve zero trust. Explore the benefits of AlgoSec's comprehensive suite of tools in enhancing network security for a global organization like NCR.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/case-study-ncr-corporations-network"&gt;&lt;img src="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/86775576</guid>
            <pubDate>Tue, 04 Jul 2023 16:59:33 GMT</pubDate>
            <media:title>Case Study: NCR Corporation's Network Security Transformation with AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;Discover how NCR Corporation successfully integrated AlgoSec's Security Policy Management Solution into their network infrastructure. Learn how AlgoSec Firewall Analyzer, FireFlow, AppViz, and AppChange enabled NCR to automate security policy changes, improve visibility, streamline auditing, and achieve zero trust. Explore the benefits of AlgoSec's comprehensive suite of tools in enhancing network security for a global organization like NCR.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/case-study-ncr-corporations-network"&gt;&lt;img src="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=328e01b63f7c400ea2da69de572ce8f5&amp;source=podcast&amp;photo%5fid=86775576" width="625" height="355" type="text/html" medium="video" duration="120" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>AlgoSec</category>
            <category> application connectivity</category>
            <category> auditing</category>
            <category> automation</category>
            <category> Cisco ACI</category>
            <category> container security.</category>
            <category>container security</category>
            <category> firewall management</category>
            <category> microsegmentation</category>
            <category>NCR Corporation</category>
            <category>network security</category>
            <category> risk analysis</category>
            <category> security policy management</category>
            <category> visibility</category>
            <category> zero trust</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968578/83680647/ae0b89466b93f07eaa5c107a5968a957/video_medium/algosec-community-video.mp4?source=podcast" type="video/mp4" length="4770575"/>
            <title>AlgoSec Community</title>
            <link>http://video.algosec.com/algosec-community</link>
            <description>&lt;p&gt;AlgoSec Community platform is designed to help you connect and collaborate with other network security professionals who use AlgoSec products.&lt;br&gt;
The community will provide a space to share best practices, ask questions, and stay up-to-date on the latest Algosec product developments.&lt;br&gt;
Additionally, community members can participate in exclusive webinars, events, and training sessions. &lt;br&gt;&lt;a href="https://community.algosec.com/"&gt;&lt;b&gt;Visit the AlgoSec Community&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-community"&gt;&lt;img src="http://video.algosec.com/64968578/83680647/ae0b89466b93f07eaa5c107a5968a957/standard/download-4-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/83680647</guid>
            <pubDate>Sun, 05 Mar 2023 15:13:05 GMT</pubDate>
            <media:title>AlgoSec Community</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec Community platform is designed to help you connect and collaborate with other network security professionals who use AlgoSec products.&lt;br&gt;
The community will provide a space to share best practices, ask questions, and stay up-to-date on the latest Algosec product developments.&lt;br&gt;
Additionally, community members can participate in exclusive webinars, events, and training sessions. &lt;br&gt;&lt;a href="https://community.algosec.com/"&gt;&lt;b&gt;Visit the AlgoSec Community&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-community"&gt;&lt;img src="http://video.algosec.com/64968578/83680647/ae0b89466b93f07eaa5c107a5968a957/standard/download-4-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ae0b89466b93f07eaa5c107a5968a957&amp;source=podcast&amp;photo%5fid=83680647" width="625" height="352" type="text/html" medium="video" duration="60" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968578/83680647/ae0b89466b93f07eaa5c107a5968a957/standard/download-4-thumbnail.jpg" width="75" height=""/>
            <category>algosec</category>
            <category>Community</category>
            <category>Knowledge</category>
            <category>Self-Service</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968580/82977669/5411bae16e8cc868a7b4b3fa8e5de2bb/video_medium/algosec-money-back-guarantee-video.mp4?source=podcast" type="video/mp4" length="4516167"/>
            <title>AlgoSec money back guarantee</title>
            <link>http://video.algosec.com/algosec-money-back-guarantee</link>
            <description>&lt;p&gt;AlgoSec CEO and Co-founder, Yuval Baron, explains the company's unique money-back guarantee policy and customers-first approach.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-money-back-guarantee"&gt;&lt;img src="http://video.algosec.com/64968580/82977669/5411bae16e8cc868a7b4b3fa8e5de2bb/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/82977669</guid>
            <pubDate>Tue, 31 Jan 2023 09:55:32 GMT</pubDate>
            <media:title>AlgoSec money back guarantee</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec CEO and Co-founder, Yuval Baron, explains the company's unique money-back guarantee policy and customers-first approach.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-money-back-guarantee"&gt;&lt;img src="http://video.algosec.com/64968580/82977669/5411bae16e8cc868a7b4b3fa8e5de2bb/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=5411bae16e8cc868a7b4b3fa8e5de2bb&amp;source=podcast&amp;photo%5fid=82977669" width="625" height="352" type="text/html" medium="video" duration="54" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968580/82977669/5411bae16e8cc868a7b4b3fa8e5de2bb/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>algosec</category>
            <category>yuval baron</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968576/82977232/3b7f3f30d50391972877c89ad01fb996/video_medium/yuval-baron-why-secure-video.mp4?source=podcast" type="video/mp4" length="4570158"/>
            <title>Yuval Baron - why secure application connectivity</title>
            <link>http://video.algosec.com/yuval-baron-why-secure</link>
            <description>&lt;p&gt;AlgoSec CEO and Co-founder, Yuval Baron, explains the criticality of securing application connectivity in today's competitive business environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/yuval-baron-why-secure"&gt;&lt;img src="http://video.algosec.com/64968576/82977232/3b7f3f30d50391972877c89ad01fb996/standard/download-25-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/82977232</guid>
            <pubDate>Tue, 31 Jan 2023 09:39:39 GMT</pubDate>
            <media:title>Yuval Baron - why secure application connectivity</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec CEO and Co-founder, Yuval Baron, explains the criticality of securing application connectivity in today's competitive business environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/yuval-baron-why-secure"&gt;&lt;img src="http://video.algosec.com/64968576/82977232/3b7f3f30d50391972877c89ad01fb996/standard/download-25-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3b7f3f30d50391972877c89ad01fb996&amp;source=podcast&amp;photo%5fid=82977232" width="625" height="352" type="text/html" medium="video" duration="59" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968576/82977232/3b7f3f30d50391972877c89ad01fb996/standard/download-25-thumbnail.jpg" width="75" height=""/>
            <category>algosec</category>
            <category>application connectivity</category>
            <category>business applications</category>
            <category>Yuval Baron</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968560/72682148/6d48f83f95ff6aa6ad93b990fddf0501/video_medium/the-employee-perspective-on-video.mp4?source=podcast" type="video/mp4" length="42211461"/>
            <title>The employee perspective on AlgoSec’s new vision</title>
            <link>http://video.algosec.com/the-employee-perspective-on</link>
            <description>&lt;p&gt;&lt;p&gt;Family, new adventures, and the highest of heights.
These are just a few of the things that help AlgoSec securely accelerate the
lives of our employees.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-employee-perspective-on"&gt;&lt;img src="http://video.algosec.com/64968560/72682148/6d48f83f95ff6aa6ad93b990fddf0501/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/72682148</guid>
            <pubDate>Wed, 15 Dec 2021 12:21:45 GMT</pubDate>
            <media:title>The employee perspective on AlgoSec’s new vision</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Family, new adventures, and the highest of heights.
These are just a few of the things that help AlgoSec securely accelerate the
lives of our employees.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-employee-perspective-on"&gt;&lt;img src="http://video.algosec.com/64968560/72682148/6d48f83f95ff6aa6ad93b990fddf0501/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=6d48f83f95ff6aa6ad93b990fddf0501&amp;source=podcast&amp;photo%5fid=72682148" width="625" height="352" type="text/html" medium="video" duration="385" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968560/72682148/6d48f83f95ff6aa6ad93b990fddf0501/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>algosec</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968580/72483697/62142dbf76f3375b6fa8f65b72868036/video_medium/working-at-algosec-video.mp4?source=podcast" type="video/mp4" length="6155882"/>
            <title>Working at AlgoSec </title>
            <link>http://video.algosec.com/working-at-algosec</link>
            <description>&lt;p&gt;Sergey Kalikin, R&amp;D (Belarus)&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/working-at-algosec"&gt;&lt;img src="http://video.algosec.com/64968580/72483697/62142dbf76f3375b6fa8f65b72868036/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/72483697</guid>
            <pubDate>Mon, 06 Dec 2021 13:57:45 GMT</pubDate>
            <media:title>Working at AlgoSec </media:title>
            <media:description type="html">&lt;p&gt;Sergey Kalikin, R&amp;D (Belarus)&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/working-at-algosec"&gt;&lt;img src="http://video.algosec.com/64968580/72483697/62142dbf76f3375b6fa8f65b72868036/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=62142dbf76f3375b6fa8f65b72868036&amp;source=podcast&amp;photo%5fid=72483697" width="625" height="352" type="text/html" medium="video" duration="45" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968580/72483697/62142dbf76f3375b6fa8f65b72868036/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>algosec</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543327/59788891/49176c3921ba35ae9f8486c0eb96a4ad/video_medium/sko-2020-video.mp4?source=podcast" type="video/mp4" length="81129665"/>
            <title>SKO 2020</title>
            <link>http://video.algosec.com/sko-2020</link>
            <description>&lt;p&gt;AlgoBand performs at the AlgoSec SKO annual company celebration&lt;br&gt;Band Members include&amp;nbsp;Yuval Baron, Shay Weiss, Eli Shay, Tali Waisel, Matan Moyal and Eli Cohen !!!&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sko-2020"&gt;&lt;img src="http://video.algosec.com/49543327/59788891/49176c3921ba35ae9f8486c0eb96a4ad/standard/download-11-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/59788891</guid>
            <pubDate>Wed, 22 Jan 2020 13:54:30 GMT</pubDate>
            <media:title>SKO 2020</media:title>
            <media:description type="html">&lt;p&gt;AlgoBand performs at the AlgoSec SKO annual company celebration&lt;br&gt;Band Members include&amp;nbsp;Yuval Baron, Shay Weiss, Eli Shay, Tali Waisel, Matan Moyal and Eli Cohen !!!&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sko-2020"&gt;&lt;img src="http://video.algosec.com/49543327/59788891/49176c3921ba35ae9f8486c0eb96a4ad/standard/download-11-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=49176c3921ba35ae9f8486c0eb96a4ad&amp;source=podcast&amp;photo%5fid=59788891" width="625" height="352" type="text/html" medium="video" duration="515" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543327/59788891/49176c3921ba35ae9f8486c0eb96a4ad/standard/download-11-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/video_medium/algosec-and-cisco-aci-for-improved-video.mp4?source=podcast" type="video/mp4" length="8705804"/>
            <title>AlgoSec and Cisco ACI for Improved Data Center Security, Compliance and...</title>
            <link>http://video.algosec.com/algosec-and-cisco-aci-for-improved</link>
            <description>&lt;p&gt;AlgoSec and Cisco ACI deliver security policy across the entire network, enables automated security policy change management for multi-vendor devices, provide risk and compliance analysis, and more.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-and-cisco-aci-for-improved"&gt;&lt;img src="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53965291</guid>
            <pubDate>Tue, 30 Jul 2019 09:13:39 GMT</pubDate>
            <media:title>AlgoSec and Cisco ACI for Improved Data Center Security, Compliance and...</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec and Cisco ACI deliver security policy across the entire network, enables automated security policy change management for multi-vendor devices, provide risk and compliance analysis, and more.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-and-cisco-aci-for-improved"&gt;&lt;img src="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9eb3f8c5a573378055ed58b253828b2c&amp;source=podcast&amp;photo%5fid=53965291" width="625" height="352" type="text/html" medium="video" duration="487" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>aci</category>
            <category>algosec</category>
            <category>automated security policy</category>
            <category>cisco</category>
            <category>contracts</category>
            <category>cyber</category>
            <category>juniper</category>
            <category>network security</category>
            <category>policy</category>
            <category>private cloud</category>
            <category>sdn</category>
            <category>security policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/video_medium/avoiding-the-securityagility-video.mp4?source=podcast" type="video/mp4" length="87131096"/>
            <title>Avoiding the Security/Agility Tradeoff with Network Security Policy</title>
            <link>http://video.algosec.com/avoiding-the-securityagility</link>
            <description>&lt;p&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | July 10, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Business application deployments and changes require IT, networking and security teams to be more agile than ever before.&lt;br&gt;
But frequently, this agility comes at the expense of security and compliance and enables network breaches and cyber-attacks.&lt;/p&gt;
&lt;p&gt;In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, covers how network security policy automation helps you avoid this conflict.&lt;/p&gt;
&lt;p&gt;Watch the webinar to learn how to:&lt;br&gt;
•	Plan for the entire network security lifecycle&lt;br&gt;
•	Discover your network topology and traffic flows&lt;br&gt;
•	Ensure continuous compliance and identify risks and compliance violations&lt;br&gt;
•	Easily implement changes across your hybrid network environment&lt;br&gt;
•	Mandate a consistent and unified change process&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/avoiding-the-securityagility"&gt;&lt;img src="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53789320</guid>
            <pubDate>Thu, 11 Jul 2019 12:46:31 GMT</pubDate>
            <media:title>Avoiding the Security/Agility Tradeoff with Network Security Policy</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | July 10, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Business application deployments and changes require IT, networking and security teams to be more agile than ever before.&lt;br&gt;
But frequently, this agility comes at the expense of security and compliance and enables network breaches and cyber-attacks.&lt;/p&gt;
&lt;p&gt;In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, covers how network security policy automation helps you avoid this conflict.&lt;/p&gt;
&lt;p&gt;Watch the webinar to learn how to:&lt;br&gt;
•	Plan for the entire network security lifecycle&lt;br&gt;
•	Discover your network topology and traffic flows&lt;br&gt;
•	Ensure continuous compliance and identify risks and compliance violations&lt;br&gt;
•	Easily implement changes across your hybrid network environment&lt;br&gt;
•	Mandate a consistent and unified change process&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/avoiding-the-securityagility"&gt;&lt;img src="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c9187dd732523aafe8b688e78ccb439d&amp;source=podcast&amp;photo%5fid=53789320" width="625" height="352" type="text/html" medium="video" duration="2613" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>automation</category>
            <category>change management</category>
            <category>compliance</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543331/54117795/bf23554e7908a685f2b82cc9915e1ab4/video_medium/algosec-cisco-aci-epg-creation-video.mp4?source=podcast" type="video/mp4" length="24425334"/>
            <title>AlgoSec  - Cisco ACI EPG Creation Demo</title>
            <link>http://video.algosec.com/algosec-cisco-aci-epg-creation</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cisco-aci-epg-creation"&gt;&lt;img src="http://video.algosec.com/49543331/54117795/bf23554e7908a685f2b82cc9915e1ab4/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54117795</guid>
            <pubDate>Thu, 11 Jul 2019 00:00:00 GMT</pubDate>
            <media:title>AlgoSec  - Cisco ACI EPG Creation Demo</media:title>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cisco-aci-epg-creation"&gt;&lt;img src="http://video.algosec.com/49543331/54117795/bf23554e7908a685f2b82cc9915e1ab4/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bf23554e7908a685f2b82cc9915e1ab4&amp;source=podcast&amp;photo%5fid=54117795" width="625" height="352" type="text/html" medium="video" duration="917" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543331/54117795/bf23554e7908a685f2b82cc9915e1ab4/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>aci</category>
            <category>algosec</category>
            <category>cisco</category>
            <category>contract</category>
            <category>cyber</category>
            <category>epg</category>
            <category>managment</category>
            <category>policy</category>
            <category>sdn</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543314/53546196/4550e2bd0eaabc2660f3861da3d66c3b/video_medium/managing-network-security-with-video.mp4?source=podcast" type="video/mp4" length="7212164"/>
            <title>Managing Network Security with AlgoSec</title>
            <link>http://video.algosec.com/managing-network-security-with</link>
            <description>&lt;p&gt;Managing complex security polices across devices and operations teams is more challenging than ever. It’s time consuming, risky, prone to human error and out of sync with the business.  What if you could automate the entire security policy change process and manage your entire network environment - across  cloud, SDN and on-premise – using a single platform? Now you can. Over 1,800 leading organizations, including 20 of the Fortune 50, have relied on AlgoSec to drive business agility, security and compliance. Sounds intriguing? See it in action: &lt;a href="https://www.algosec.com/lp/see-algosec-action-2/"&gt;https://www.algosec.com/lp/see-algosec-action-2/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-network-security-with"&gt;&lt;img src="http://video.algosec.com/49543314/53546196/4550e2bd0eaabc2660f3861da3d66c3b/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53546196</guid>
            <pubDate>Tue, 02 Jul 2019 11:00:30 GMT</pubDate>
            <media:title>Managing Network Security with AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;Managing complex security polices across devices and operations teams is more challenging than ever. It’s time consuming, risky, prone to human error and out of sync with the business.  What if you could automate the entire security policy change process and manage your entire network environment - across  cloud, SDN and on-premise – using a single platform? Now you can. Over 1,800 leading organizations, including 20 of the Fortune 50, have relied on AlgoSec to drive business agility, security and compliance. Sounds intriguing? See it in action: &lt;a href="https://www.algosec.com/lp/see-algosec-action-2/"&gt;https://www.algosec.com/lp/see-algosec-action-2/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-network-security-with"&gt;&lt;img src="http://video.algosec.com/49543314/53546196/4550e2bd0eaabc2660f3861da3d66c3b/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4550e2bd0eaabc2660f3861da3d66c3b&amp;source=podcast&amp;photo%5fid=53546196" width="625" height="352" type="text/html" medium="video" duration="124" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543314/53546196/4550e2bd0eaabc2660f3861da3d66c3b/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>Network Security</category>
            <category>Science and Technology</category>
            <category>SDN</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543318/53465208/d44b783d4b0714fe16128a7b51981508/video_medium/algosec-ceo-yuval-baron-video.mp4?source=podcast" type="video/mp4" length="1183917"/>
            <title>AlgoSec CEO, Yuval Baron - Invitation to AlgoSummit Americas 2019</title>
            <link>http://video.algosec.com/algosec-ceo-yuval-baron</link>
            <description>&lt;p&gt;&lt;span&gt;AlgoSec Co-founder and CEO,&amp;nbsp;Yuval Baron,&amp;nbsp;invites customers and partners to AlgoSummit Americas 2019 taking place in
Dallas, Texas from October 21-24, 2019.&lt;br&gt;&lt;/span&gt;&lt;p&gt;For more information or to sign up &lt;a href="https://www.algosec.com/algosummit/"&gt;https://www.algosec.com/algosummit/&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-ceo-yuval-baron"&gt;&lt;img src="http://video.algosec.com/49543318/53465208/d44b783d4b0714fe16128a7b51981508/standard/download-10-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53465208</guid>
            <pubDate>Sun, 30 Jun 2019 10:18:13 GMT</pubDate>
            <media:title>AlgoSec CEO, Yuval Baron - Invitation to AlgoSummit Americas 2019</media:title>
            <media:description type="html">&lt;p&gt;&lt;span&gt;AlgoSec Co-founder and CEO,&amp;nbsp;Yuval Baron,&amp;nbsp;invites customers and partners to AlgoSummit Americas 2019 taking place in
Dallas, Texas from October 21-24, 2019.&lt;br&gt;&lt;/span&gt;&lt;p&gt;For more information or to sign up &lt;a href="https://www.algosec.com/algosummit/"&gt;https://www.algosec.com/algosummit/&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-ceo-yuval-baron"&gt;&lt;img src="http://video.algosec.com/49543318/53465208/d44b783d4b0714fe16128a7b51981508/standard/download-10-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d44b783d4b0714fe16128a7b51981508&amp;source=podcast&amp;photo%5fid=53465208" width="625" height="352" type="text/html" medium="video" duration="24" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543318/53465208/d44b783d4b0714fe16128a7b51981508/standard/download-10-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>AlgoSummit</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/video_medium/migration-to-cisco-firepower-video.mp4?source=podcast" type="video/mp4" length="3602179"/>
            <title>Migration to Cisco Firepower</title>
            <link>http://video.algosec.com/migration-to-cisco-firepower</link>
            <description>&lt;p&gt;How to utilize the AlgoSec solution to migrate to Cisco Firepower&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migration-to-cisco-firepower"&gt;&lt;img src="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54117797</guid>
            <pubDate>Wed, 10 Apr 2019 00:00:00 GMT</pubDate>
            <media:title>Migration to Cisco Firepower</media:title>
            <media:description type="html">&lt;p&gt;How to utilize the AlgoSec solution to migrate to Cisco Firepower&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migration-to-cisco-firepower"&gt;&lt;img src="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0534c3a48e8560e33c68423031611e30&amp;source=podcast&amp;photo%5fid=54117797" width="625" height="352" type="text/html" medium="video" duration="69" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>asa</category>
            <category>cisco</category>
            <category>firepower</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>juniper</category>
            <category>managment</category>
            <category>policy</category>
            <category>Security Policy</category>
            <category>visibility</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181693/ab08e40eb5ce9c0c1465ae6c4f9de8b4/video_medium/demo-algosec-incident-response-video.mp4?source=podcast" type="video/mp4" length="5304201"/>
            <title>Demo: AlgoSec Incident Response Extension for IBM Resilient</title>
            <link>http://video.algosec.com/demo-algosec-incident-response</link>
            <description>&lt;p&gt;&lt;p&gt;Resilient is an intelligent orchestration and
case management system that enables security teams to respond to security
incidents quickly and effectively.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosec-incident-response"&gt;&lt;img src="http://video.algosec.com/4465660/44181693/ab08e40eb5ce9c0c1465ae6c4f9de8b4/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181693</guid>
            <pubDate>Sun, 09 Dec 2018 02:00:00 GMT</pubDate>
            <media:title>Demo: AlgoSec Incident Response Extension for IBM Resilient</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Resilient is an intelligent orchestration and
case management system that enables security teams to respond to security
incidents quickly and effectively.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosec-incident-response"&gt;&lt;img src="http://video.algosec.com/4465660/44181693/ab08e40eb5ce9c0c1465ae6c4f9de8b4/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ab08e40eb5ce9c0c1465ae6c4f9de8b4&amp;source=podcast&amp;photo%5fid=44181693" width="625" height="469" type="text/html" medium="video" duration="285" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181693/ab08e40eb5ce9c0c1465ae6c4f9de8b4/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>algosec</category>
            <category>ibm</category>
            <category>managment</category>
            <category>network</category>
            <category>policy</category>
            <category>resilient</category>
            <category>security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/video_medium/algosec-zero-trust-presentation-video.mp4?source=podcast" type="video/mp4" length="95570277"/>
            <title>AlgoSec Zero Trust Presentation @Forrester Event</title>
            <link>http://video.algosec.com/algosec-zero-trust-presentation</link>
            <description>&lt;p&gt;The Forrester Zero Trust Model, when applied to network security, can help organizations develop robust prevention, detection, and incident response capabilities. The session, presented at the Security and Privacy event in Washington DC covered the challenges organizations face and approaches that can be employed, including steps to achieve visibility, policy management automation, application connectivity analysis and network segmentation.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-zero-trust-presentation"&gt;&lt;img src="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181720</guid>
            <pubDate>Thu, 15 Nov 2018 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Zero Trust Presentation @Forrester Event</media:title>
            <media:description type="html">&lt;p&gt;The Forrester Zero Trust Model, when applied to network security, can help organizations develop robust prevention, detection, and incident response capabilities. The session, presented at the Security and Privacy event in Washington DC covered the challenges organizations face and approaches that can be employed, including steps to achieve visibility, policy management automation, application connectivity analysis and network segmentation.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-zero-trust-presentation"&gt;&lt;img src="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fb1c7af2f781806e661e0aef5ae24af4&amp;source=podcast&amp;photo%5fid=44181720" width="625" height="469" type="text/html" medium="video" duration="1640" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>algosec</category>
            <category>automation</category>
            <category>aws</category>
            <category>azure</category>
            <category>checkpoint</category>
            <category>cisco</category>
            <category>forrester</category>
            <category>juniper</category>
            <category>Management</category>
            <category>micro segmentation</category>
            <category>networking</category>
            <category>network security</category>
            <category>palo alto</category>
            <category>security policy</category>
            <category>segmentation</category>
            <category>trust</category>
            <category>visibility</category>
            <category>zero</category>
            <category>zero trust</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/video_medium/cisco-aci-and-algosec-integration-video.mp4?source=podcast" type="video/mp4" length="7894287"/>
            <title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration</link>
            <description>&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181812</guid>
            <pubDate>Mon, 18 Jun 2018 03:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</media:title>
            <media:description type="html">&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ea3eaaff1b36a7756bfa854f08f6b30&amp;source=podcast&amp;photo%5fid=44181812" width="625" height="352" type="text/html" medium="video" duration="376" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/video_medium/devopsifying-network-security-video.mp4?source=podcast" type="video/mp4" length="11997028"/>
            <title>DevOpsifying Network Security: AlgoSec - Ansible Demo</title>
            <link>http://video.algosec.com/devopsifying-network-security</link>
            <description>&lt;p&gt;This demo describes how developers can seamlessly incorporate network connectivity into their DevOps methodology, using their existing CI tools, in order to fully automate the application delivery process end-to-end.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/devopsifying-network-security"&gt;&lt;img src="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181768</guid>
            <pubDate>Thu, 31 May 2018 03:00:00 GMT</pubDate>
            <media:title>DevOpsifying Network Security: AlgoSec - Ansible Demo</media:title>
            <media:description type="html">&lt;p&gt;This demo describes how developers can seamlessly incorporate network connectivity into their DevOps methodology, using their existing CI tools, in order to fully automate the application delivery process end-to-end.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/devopsifying-network-security"&gt;&lt;img src="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2e5a4dec5e02b94502d7e0baf5c1bb26&amp;source=podcast&amp;photo%5fid=44181768" width="625" height="352" type="text/html" medium="video" duration="584" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>algosec devops</category>
            <category>ansible</category>
            <category>application connectivity'</category>
            <category>chef</category>
            <category>CI tools</category>
            <category>code integration</category>
            <category>DevOps</category>
            <category>firewall management</category>
            <category>Jenkins</category>
            <category>network security</category>
            <category>puppet</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/video_medium/the-benefits-of-mapping-firewall-video.mp4?source=podcast" type="video/mp4" length="14101048"/>
            <title>The Benefits of Mapping Firewall Rules to Business Applications</title>
            <link>http://video.algosec.com/the-benefits-of-mapping-firewall</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-benefits-of-mapping-firewall"&gt;&lt;img src="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181854</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>The Benefits of Mapping Firewall Rules to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-benefits-of-mapping-firewall"&gt;&lt;img src="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=72ce166d6692eacad1d4807eb07ea18e&amp;source=podcast&amp;photo%5fid=44181854" width="625" height="352" type="text/html" medium="video" duration="243" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity flows</category>
            <category>businessflow</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rule management</category>
            <category>network connectivity</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/video_medium/lesson-7-how-to-prepare-for-network-video.mp4?source=podcast" type="video/mp4" length="13749334"/>
            <title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</title>
            <link>http://video.algosec.com/lesson-7-how-to-prepare-for-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181819</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f796f81cc13de312cc8c7bd06b607f5b&amp;source=podcast&amp;photo%5fid=44181819" width="625" height="352" type="text/html" medium="video" duration="247" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>avishai wool</category>
            <category>cloud security</category>
            <category>Data Center</category>
            <category>data center security</category>
            <category>east west traffic</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/video_medium/how-to-automatically-identify-video.mp4?source=podcast" type="video/mp4" length="27473196"/>
            <title>How to Automatically Identify Business Application Connectivity Needs from...</title>
            <link>http://video.algosec.com/how-to-automatically-identify</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 5
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-automatically-identify"&gt;&lt;img src="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181877</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>How to Automatically Identify Business Application Connectivity Needs from...</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 5
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-automatically-identify"&gt;&lt;img src="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c2388410abe5deb84379c4ee696b5036&amp;source=podcast&amp;photo%5fid=44181877" width="625" height="352" type="text/html" medium="video" duration="410" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity</category>
            <category>application connectivity management</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center</category>
            <category>firewall rules</category>
            <category>network connectivity flows</category>
            <category>Network Security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/video_medium/lesson-7-how-to-aggregate-network-video.mp4?source=podcast" type="video/mp4" length="21243911"/>
            <title>Lesson 7: How to Aggregate Network Flows Into Application Flows</title>
            <link>http://video.algosec.com/lesson-7-how-to-aggregate-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181876</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Aggregate Network Flows Into Application Flows</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d5894f7ffc54d4f9858292bb6ee2723c&amp;source=podcast&amp;photo%5fid=44181876" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center applications</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/video_medium/lesson-11-tips-for-filtering-video.mp4?source=podcast" type="video/mp4" length="17295313"/>
            <title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</title>
            <link>http://video.algosec.com/lesson-11-tips-for-filtering</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182282</guid>
            <pubDate>Fri, 01 May 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0a24cf40bd28e90e374321d72e5140a&amp;source=podcast&amp;photo%5fid=44182282" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>private cloud</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>virtual data center</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/video_medium/lesson-3-using-object-naming-video.mp4?source=podcast" type="video/mp4" length="17490787"/>
            <title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</title>
            <link>http://video.algosec.com/lesson-3-using-object-naming</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182290</guid>
            <pubDate>Thu, 10 Apr 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4797ebe9fab50b0c575eb5e0b6dac4eb&amp;source=podcast&amp;photo%5fid=44182290" width="625" height="352" type="text/html" medium="video" duration="323" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>AlgoSec</category>
            <category>firewall management</category>
            <category>firewall object naming</category>
            <category>firewall objects</category>
            <category>firewall policy management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>object naming conventions</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/video_medium/application-centric-vulnerability-video.mp4?source=podcast" type="video/mp4" length="7848940"/>
            <title>Application-Centric Vulnerability Management</title>
            <link>http://video.algosec.com/application-centric-vulnerability</link>
            <description>&lt;p&gt;&lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; - Vulnerability management continues to be an important cornerstone of any cyber security program. But the unfortunate reality is that every organization has more vulnerabilities than they can realistically address. Traditionally, security teams have prioritized vulnerabilities in a very technology-centric fashion -- based on IP addresses, CVSS scores and threat path analysis -- this is not the language that business stakeholders speak or even understand.&lt;/p&gt;
&lt;p&gt;Application-Centric Vulnerability Management finally changes this paradigm -- for the first time, security teams can understand the risk in an entire business service -- complete with all its servers, databases, middleware, and the complex connectivity that's enabled by the underlying security infrastructure.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-centric-vulnerability"&gt;&lt;img src="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182367</guid>
            <pubDate>Mon, 17 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Application-Centric Vulnerability Management</media:title>
            <media:description type="html">&lt;p&gt;&lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; - Vulnerability management continues to be an important cornerstone of any cyber security program. But the unfortunate reality is that every organization has more vulnerabilities than they can realistically address. Traditionally, security teams have prioritized vulnerabilities in a very technology-centric fashion -- based on IP addresses, CVSS scores and threat path analysis -- this is not the language that business stakeholders speak or even understand.&lt;/p&gt;
&lt;p&gt;Application-Centric Vulnerability Management finally changes this paradigm -- for the first time, security teams can understand the risk in an entire business service -- complete with all its servers, databases, middleware, and the complex connectivity that's enabled by the underlying security infrastructure.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/application-centric-vulnerability"&gt;&lt;img src="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=72365f6bd62eb3ef670bda01ab75deac&amp;source=podcast&amp;photo%5fid=44182367" width="625" height="469" type="text/html" medium="video" duration="139" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>AlgoSec</category>
            <category>application-centric vulnerability management</category>
            <category>application connectivity</category>
            <category>CVSS scores</category>
            <category>cyber security</category>
            <category>network security</category>
            <category>Qualys</category>
            <category>security</category>
            <category>security infrastructure</category>
            <category>vulnerabilities</category>
            <category>Vulnerability Management</category>
            <category>vulnerability scanner</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/video_medium/tips-for-secure-decommissioning-of-video.mp4?source=podcast" type="video/mp4" length="30751680"/>
            <title>Tips for Secure Decommissioning of Business Applications</title>
            <link>http://video.algosec.com/tips-for-secure-decommissioning-of</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-secure-decommissioning-of"&gt;&lt;img src="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182331</guid>
            <pubDate>Fri, 14 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Tips for Secure Decommissioning of Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-secure-decommissioning-of"&gt;&lt;img src="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d3adefaf0577207562515ea8e3018ec9&amp;source=podcast&amp;photo%5fid=44182331" width="625" height="352" type="text/html" medium="video" duration="499" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>applications</category>
            <category>decommission</category>
            <category>decommissioning</category>
            <category>firewall management</category>
            <category>firewall operations management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network operations</category>
            <category>Professor Wool</category>
            <category>secure</category>
            <category>security</category>
            <category>security change management</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/video_medium/tips-to-discover-business-video.mp4?source=podcast" type="video/mp4" length="33032006"/>
            <title>Tips to Discover Business Application Connectivity Requirements</title>
            <link>http://video.algosec.com/tips-to-discover-business</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 3&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines how to leverage firewall rules for discovering the connectivity requirements of data center applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-to-discover-business"&gt;&lt;img src="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182417</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Tips to Discover Business Application Connectivity Requirements</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 3&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines how to leverage firewall rules for discovering the connectivity requirements of data center applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-to-discover-business"&gt;&lt;img src="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=80bdfba340732544d4906f71bfe7c61c&amp;source=podcast&amp;photo%5fid=44182417" width="625" height="352" type="text/html" medium="video" duration="424" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity</category>
            <category>application connectivity management</category>
            <category>business applications</category>
            <category>data center</category>
            <category>data center applications</category>
            <category>datacenter applications</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/video_medium/examining-the-need-for-video.mp4?source=podcast" type="video/mp4" length="17810477"/>
            <title>Examining the Need for Application-Centric Security Policy Management</title>
            <link>http://video.algosec.com/examining-the-need-for</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/examining-the-need-for"&gt;&lt;img src="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182409</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Examining the Need for Application-Centric Security Policy Management</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/examining-the-need-for"&gt;&lt;img src="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=5f1d0c698cae1c93e39648727d821d53&amp;source=podcast&amp;photo%5fid=44182409" width="625" height="352" type="text/html" medium="video" duration="289" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>business applications</category>
            <category>data center</category>
            <category>data center applications</category>
            <category>decommission application</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/video_medium/lesson-7-examining-the-challenges-video.mp4?source=podcast" type="video/mp4" length="40171738"/>
            <title>Lesson 7: Examining the Challenges of Accurately Simulating Network Routing</title>
            <link>http://video.algosec.com/lesson-7-examining-the-challenges</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 7&lt;br /&gt;
In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-examining-the-challenges"&gt;&lt;img src="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182374</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: Examining the Challenges of Accurately Simulating Network Routing</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 7&lt;br /&gt;
In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-examining-the-challenges"&gt;&lt;img src="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=11f3ec0bd4c2c56ab1b60ec291133dd3&amp;source=podcast&amp;photo%5fid=44182374" width="625" height="352" type="text/html" medium="video" duration="487" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>Firewalls</category>
            <category>HSRP</category>
            <category>network routing</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>routing</category>
            <category>security management</category>
            <category>SNMP</category>
            <category>SSH</category>
            <category>VRPP</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/video_medium/managing-the-security-policy-in-video.mp4?source=podcast" type="video/mp4" length="10604809"/>
            <title>Managing the Security Policy in Your Data Center and Network</title>
            <link>http://video.algosec.com/managing-the-security-policy-in</link>
            <description>&lt;p&gt;Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-the-security-policy-in"&gt;&lt;img src="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182430</guid>
            <pubDate>Thu, 06 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Managing the Security Policy in Your Data Center and Network</media:title>
            <media:description type="html">&lt;p&gt;Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-the-security-policy-in"&gt;&lt;img src="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3980f51228641374a2c44937715ee7cd&amp;source=podcast&amp;photo%5fid=44182430" width="625" height="352" type="text/html" medium="video" duration="142" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity management</category>
            <category>Audit and Compliance</category>
            <category>data center</category>
            <category>firewall audit</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security change management</category>
            <category>security policy</category>
        </item>
    </channel>
</rss>
