<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/rss/tag/Firewall management"/>
        <atom:link rel="next" href="https://video.algosec.com/rss/tag/Firewall management?tag=Firewall+management&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/64968560/95331285/f35208454fde47b4a7e060c3af652780/video_medium/intelligent-change-management-from-video.mp4?source=podcast" type="video/mp4" length="89096036"/>
            <title>Intelligent change management from Fortinet and AlgoSec</title>
            <link>http://video.algosec.com/intelligent-change-management-from</link>
            <description>&lt;p&gt;&lt;br&gt;
In this webinar we will walk through a live demo and highlight how the Fortinet solutions and the integrations with AlgoSec help companies add a range of intelligent automation to speed up the change request process and improve accuracy.
&lt;p&gt;In this webinar, we will cover:&lt;br&gt;
•	An overview of the Fortinet and AlgoSec partnership&lt;br&gt;
•	Security policy change management using intelligent automation&lt;br&gt;
•	Use-cases and demos of our joint solutions&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/intelligent-change-management-from"&gt;&lt;img src="http://video.algosec.com/64968560/95331285/f35208454fde47b4a7e060c3af652780/standard/download-18-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/95331285</guid>
            <pubDate>Fri, 29 Mar 2024 06:00:00 GMT</pubDate>
            <media:title>Intelligent change management from Fortinet and AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;&lt;br&gt;
In this webinar we will walk through a live demo and highlight how the Fortinet solutions and the integrations with AlgoSec help companies add a range of intelligent automation to speed up the change request process and improve accuracy.
&lt;p&gt;In this webinar, we will cover:&lt;br&gt;
•	An overview of the Fortinet and AlgoSec partnership&lt;br&gt;
•	Security policy change management using intelligent automation&lt;br&gt;
•	Use-cases and demos of our joint solutions&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/intelligent-change-management-from"&gt;&lt;img src="http://video.algosec.com/64968560/95331285/f35208454fde47b4a7e060c3af652780/standard/download-18-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f35208454fde47b4a7e060c3af652780&amp;source=podcast&amp;photo%5fid=95331285" width="625" height="352" type="text/html" medium="video" duration="2403" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968560/95331285/f35208454fde47b4a7e060c3af652780/standard/download-18-thumbnail.jpg" width="75" height=""/>
            <category>fireflow</category>
            <category>firewall changes</category>
            <category>firewall management</category>
            <category>fortinet</category>
            <category>intelligent automation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/video_medium/case-study-ncr-corporations-network-video.mp4?source=podcast" type="video/mp4" length="18029591"/>
            <title>Case Study: NCR Corporation's Network Security Transformation with AlgoSec</title>
            <link>http://video.algosec.com/case-study-ncr-corporations-network</link>
            <description>&lt;p&gt;Discover how NCR Corporation successfully integrated AlgoSec's Security Policy Management Solution into their network infrastructure. Learn how AlgoSec Firewall Analyzer, FireFlow, AppViz, and AppChange enabled NCR to automate security policy changes, improve visibility, streamline auditing, and achieve zero trust. Explore the benefits of AlgoSec's comprehensive suite of tools in enhancing network security for a global organization like NCR.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/case-study-ncr-corporations-network"&gt;&lt;img src="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/86775576</guid>
            <pubDate>Tue, 04 Jul 2023 16:59:33 GMT</pubDate>
            <media:title>Case Study: NCR Corporation's Network Security Transformation with AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;Discover how NCR Corporation successfully integrated AlgoSec's Security Policy Management Solution into their network infrastructure. Learn how AlgoSec Firewall Analyzer, FireFlow, AppViz, and AppChange enabled NCR to automate security policy changes, improve visibility, streamline auditing, and achieve zero trust. Explore the benefits of AlgoSec's comprehensive suite of tools in enhancing network security for a global organization like NCR.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/case-study-ncr-corporations-network"&gt;&lt;img src="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/standard/download-7-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=328e01b63f7c400ea2da69de572ce8f5&amp;source=podcast&amp;photo%5fid=86775576" width="625" height="355" type="text/html" medium="video" duration="120" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/standard/download-7-thumbnail.jpg" width="75" height=""/>
            <category>AlgoSec</category>
            <category> application connectivity</category>
            <category> auditing</category>
            <category> automation</category>
            <category> Cisco ACI</category>
            <category> container security.</category>
            <category>container security</category>
            <category> firewall management</category>
            <category> microsegmentation</category>
            <category>NCR Corporation</category>
            <category>network security</category>
            <category> risk analysis</category>
            <category> security policy management</category>
            <category> visibility</category>
            <category> zero trust</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/video_medium/simplifying-firewall-audits-and-video.mp4?source=podcast" type="video/mp4" length="5045870"/>
            <title>Simplifying Firewall Audits and Demonstrating Compliance</title>
            <link>http://video.algosec.com/simplifying-firewall-audits-and</link>
            <description>&lt;p&gt;AlgoSec Firewall Analyzer delivers out-of-the-box compliance reports for the widest range of industry standards including PCI-DSS, ISO 27001, Sarbanes Oxley and more. These reports help you dramatically reduce the time and effort required to prepare for audits - by as much as 80%.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/simplifying-firewall-audits-and"&gt;&lt;img src="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182646</guid>
            <pubDate>Tue, 22 Mar 2022 11:15:34 GMT</pubDate>
            <media:title>Simplifying Firewall Audits and Demonstrating Compliance</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec Firewall Analyzer delivers out-of-the-box compliance reports for the widest range of industry standards including PCI-DSS, ISO 27001, Sarbanes Oxley and more. These reports help you dramatically reduce the time and effort required to prepare for audits - by as much as 80%.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/simplifying-firewall-audits-and"&gt;&lt;img src="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7288f88413432a2d88381591c13209ee&amp;source=podcast&amp;photo%5fid=44182646" width="625" height="352" type="text/html" medium="video" duration="124" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>Firewall analyzer</category>
            <category>firewall audit</category>
            <category>firewall compliance</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>ISO 27001</category>
            <category>IT audit</category>
            <category>PCI</category>
            <category>PCI audit</category>
            <category>PCI compliance</category>
            <category>PCI-DSS</category>
            <category>Sarbanes-Oxley compliance</category>
            <category>security audit</category>
            <category>Security Policy</category>
            <category>SOX</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182814/a11d96807c3e30dcf1fb2fdce4712ee1/video_medium/algosec-fireflows-seamless-video.mp4?source=podcast" type="video/mp4" length="7593264"/>
            <title>AlgoSec FireFlow's Seamless Integration with Remedy</title>
            <link>http://video.algosec.com/algosec-fireflows-seamless</link>
            <description>&lt;p&gt;AlgoSec FireFlow complements existing change management systems with intelligent automation that enables IT to process firewall changes more quickly and with less risk.&lt;br /&gt;
This video examines how AlgoSec FireFlow seamlessly integrates with BMC Remedy to eliminate the need for opening and tracking change requests in multiple systems.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-fireflows-seamless"&gt;&lt;img src="http://video.algosec.com/16107560/44182814/a11d96807c3e30dcf1fb2fdce4712ee1/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182814</guid>
            <pubDate>Mon, 21 Mar 2022 09:44:51 GMT</pubDate>
            <media:title>AlgoSec FireFlow's Seamless Integration with Remedy</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec FireFlow complements existing change management systems with intelligent automation that enables IT to process firewall changes more quickly and with less risk.&lt;br /&gt;
This video examines how AlgoSec FireFlow seamlessly integrates with BMC Remedy to eliminate the need for opening and tracking change requests in multiple systems.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-fireflows-seamless"&gt;&lt;img src="http://video.algosec.com/16107560/44182814/a11d96807c3e30dcf1fb2fdce4712ee1/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a11d96807c3e30dcf1fb2fdce4712ee1&amp;source=podcast&amp;photo%5fid=44182814" width="625" height="352" type="text/html" medium="video" duration="232" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182814/a11d96807c3e30dcf1fb2fdce4712ee1/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>BMC Remedy</category>
            <category>change management</category>
            <category>change management system</category>
            <category>change workflow</category>
            <category>FireFlow</category>
            <category>firewall changes</category>
            <category>Firewall Management</category>
            <category>Remedy</category>
            <category>ticketing system</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182791/a1e882f1caba905fbc634760da08b808/video_medium/algosec-fireflow-cms-integration-video.mp4?source=podcast" type="video/mp4" length="5498587"/>
            <title>AlgoSec FireFlow CMS Integration</title>
            <link>http://video.algosec.com/algosec-fireflow-cms-integration</link>
            <description>&lt;p&gt;A demonstration of how AlgoSec FireFlow integrates with change management systems (in this case HP Service Manager) to add intelligent automation to the security change workflow.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-fireflow-cms-integration"&gt;&lt;img src="http://video.algosec.com/16107560/44182791/a1e882f1caba905fbc634760da08b808/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182791</guid>
            <pubDate>Mon, 21 Mar 2022 09:44:24 GMT</pubDate>
            <media:title>AlgoSec FireFlow CMS Integration</media:title>
            <media:description type="html">&lt;p&gt;A demonstration of how AlgoSec FireFlow integrates with change management systems (in this case HP Service Manager) to add intelligent automation to the security change workflow.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-fireflow-cms-integration"&gt;&lt;img src="http://video.algosec.com/16107560/44182791/a1e882f1caba905fbc634760da08b808/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a1e882f1caba905fbc634760da08b808&amp;source=podcast&amp;photo%5fid=44182791" width="625" height="352" type="text/html" medium="video" duration="192" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182791/a1e882f1caba905fbc634760da08b808/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>FireFlow</category>
            <category>Firewall Management</category>
            <category>firewall managment</category>
            <category>firewall rules</category>
            <category>security change management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/video_medium/top-5-predictions-best-practices-video.mp4?source=podcast" type="video/mp4" length="46819234"/>
            <title>Top 5 Predictions &amp; Best Practices for 2022</title>
            <link>http://video.algosec.com/top-5-predictions-best-practices</link>
            <description>&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/72839921</guid>
            <pubDate>Tue, 21 Dec 2021 14:09:54 GMT</pubDate>
            <media:title>Top 5 Predictions &amp; Best Practices for 2022</media:title>
            <media:description type="html">&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7644f86b455465ff65ca0eb3f8bfa109&amp;source=podcast&amp;photo%5fid=72839921" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>microsegmentation</category>
            <category>network security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/video_medium/gain-control-of-your-network-video.mp4?source=podcast" type="video/mp4" length="43586546"/>
            <title>Gain control of your network security with complete visibility: An AlgoSec...</title>
            <link>http://video.algosec.com/gain-control-of-your-network</link>
            <description>&lt;p&gt;In this technical demo of the AlgoSec Security Management Solution, we will show you how network security visibility is an important part of your security arsenal.
&lt;p&gt;Join the session and discover how to:&lt;br&gt;
   •	Gain visibility of your multi-vendor devices and traffic flows throughout your entire network – on-premises and in the cloud.&lt;br&gt;
   •	Ensure continuous compliance and reduce the effort needed to prepare for audits with out-of-the-box regulatory compliance reports.&lt;br&gt;
   •	Visualize and map firewall rulesets.&lt;br&gt;
   •	Identify and mitigate risky rules and provide intelligent recommendations to remediate the risks.&lt;/p&gt;
&lt;p&gt;Gain control of your network security policies with complete visibility.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/gain-control-of-your-network"&gt;&lt;img src="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/standard/download-9-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/62192775</guid>
            <pubDate>Thu, 29 Jul 2021 12:53:13 GMT</pubDate>
            <media:title>Gain control of your network security with complete visibility: An AlgoSec...</media:title>
            <media:description type="html">&lt;p&gt;In this technical demo of the AlgoSec Security Management Solution, we will show you how network security visibility is an important part of your security arsenal.
&lt;p&gt;Join the session and discover how to:&lt;br&gt;
   •	Gain visibility of your multi-vendor devices and traffic flows throughout your entire network – on-premises and in the cloud.&lt;br&gt;
   •	Ensure continuous compliance and reduce the effort needed to prepare for audits with out-of-the-box regulatory compliance reports.&lt;br&gt;
   •	Visualize and map firewall rulesets.&lt;br&gt;
   •	Identify and mitigate risky rules and provide intelligent recommendations to remediate the risks.&lt;/p&gt;
&lt;p&gt;Gain control of your network security policies with complete visibility.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/gain-control-of-your-network"&gt;&lt;img src="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/standard/download-9-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2c40c999839ca34d57f5f7e7edfcdbb7&amp;source=podcast&amp;photo%5fid=62192775" width="625" height="352" type="text/html" medium="video" duration="1993" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/standard/download-9-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>Live Demo Webcast</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/video_medium/the-6-best-practices-to-stay-secure-video.mp4?source=podcast" type="video/mp4" length="46529949"/>
            <title>The 6 best practices to stay secure in the hybrid cloud</title>
            <link>http://video.algosec.com/the-6-best-practices-to-stay-secure</link>
            <description>&lt;p&gt;&lt;p&gt;Omer Ganot(AlgoSec) | April 2021&lt;/p&gt;Doug Hurd (Cisco) Henrik Skovfoged (Conscia) Oren Amiram (AlgoSec) Tsippi Dach (AlgoSec)&lt;br&gt;What if we told you that there were just six things that you can start doing to be more secure in your hybrid cloud environment?&lt;br&gt;
In this session, you’ll get clear insight on what you can do right away to tighten your hybrid cloud network security.  From visibility through network management, to risk and cleanup – security expert Omer Ganot will guide you through the steps to help you stay secure.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-6-best-practices-to-stay-secure"&gt;&lt;img src="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/68518614</guid>
            <pubDate>Sun, 02 May 2021 16:13:13 GMT</pubDate>
            <media:title>The 6 best practices to stay secure in the hybrid cloud</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Omer Ganot(AlgoSec) | April 2021&lt;/p&gt;Doug Hurd (Cisco) Henrik Skovfoged (Conscia) Oren Amiram (AlgoSec) Tsippi Dach (AlgoSec)&lt;br&gt;What if we told you that there were just six things that you can start doing to be more secure in your hybrid cloud environment?&lt;br&gt;
In this session, you’ll get clear insight on what you can do right away to tighten your hybrid cloud network security.  From visibility through network management, to risk and cleanup – security expert Omer Ganot will guide you through the steps to help you stay secure.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-6-best-practices-to-stay-secure"&gt;&lt;img src="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=629c798b0006a3bc66c9e695b31bf6bc&amp;source=podcast&amp;photo%5fid=68518614" width="625" height="352" type="text/html" medium="video" duration="2100" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>cyber security</category>
            <category>firewall management</category>
            <category>security management</category>
            <category>security policy change management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968580/67177052/c8639a446544eae2d8489400d9486652/video_medium/customer-story-mark-grady-from-video.mp4?source=podcast" type="video/mp4" length="8913579"/>
            <title>Customer Story - Mark Grady from Leading payment solutions company</title>
            <link>http://video.algosec.com/customer-story-mark-grady-from</link>
            <description>&lt;p&gt;Leading payment solutions company credits AlgoSec for increasing security and compliance.&lt;br&gt;&lt;div&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;/div&gt;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/customer-story-mark-grady-from"&gt;&lt;img src="http://video.algosec.com/64968580/67177052/c8639a446544eae2d8489400d9486652/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/67177052</guid>
            <pubDate>Tue, 16 Feb 2021 22:22:25 GMT</pubDate>
            <media:title>Customer Story - Mark Grady from Leading payment solutions company</media:title>
            <media:description type="html">&lt;p&gt;Leading payment solutions company credits AlgoSec for increasing security and compliance.&lt;br&gt;&lt;div&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;/div&gt;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/customer-story-mark-grady-from"&gt;&lt;img src="http://video.algosec.com/64968580/67177052/c8639a446544eae2d8489400d9486652/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c8639a446544eae2d8489400d9486652&amp;source=podcast&amp;photo%5fid=67177052" width="625" height="352" type="text/html" medium="video" duration="189" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968580/67177052/c8639a446544eae2d8489400d9486652/standard/download-6-thumbnail.jpg" width="600" height="338"/>
            <category>customer story</category>
            <category>firewall management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/video_medium/panel-discussion-network-security-1-video.mp4?source=podcast" type="video/mp4" length="75817726"/>
            <title>Panel Discussion: Network Security and Compliance best practices for...</title>
            <link>http://video.algosec.com/panel-discussion-network-security-1</link>
            <description>&lt;p&gt;Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy&lt;br /&gt;
management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.&lt;/p&gt;
&lt;p&gt;There’s a better way to manage your network security!&lt;/p&gt;
&lt;p&gt;Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.&lt;/p&gt;
&lt;p&gt;Topics include:&lt;/p&gt;
&lt;p&gt;• How to overcome security management complexities with automation&lt;br /&gt;
• How to pass compliance audits in the face of demanding regulations&lt;br /&gt;
• Key industry metrics that compare security environments within and beyond the finance industry&lt;br /&gt;
• Real financial customers case studies&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/panel-discussion-network-security-1"&gt;&lt;img src="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44415276</guid>
            <pubDate>Tue, 15 Sep 2020 20:06:08 GMT</pubDate>
            <media:title>Panel Discussion: Network Security and Compliance best practices for...</media:title>
            <media:description type="html">&lt;p&gt;Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy&lt;br /&gt;
management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.&lt;/p&gt;
&lt;p&gt;There’s a better way to manage your network security!&lt;/p&gt;
&lt;p&gt;Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.&lt;/p&gt;
&lt;p&gt;Topics include:&lt;/p&gt;
&lt;p&gt;• How to overcome security management complexities with automation&lt;br /&gt;
• How to pass compliance audits in the face of demanding regulations&lt;br /&gt;
• Key industry metrics that compare security environments within and beyond the finance industry&lt;br /&gt;
• Real financial customers case studies&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/panel-discussion-network-security-1"&gt;&lt;img src="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=24cb2f0d85632231cc3bd811592c9758&amp;source=podcast&amp;photo%5fid=44415276" width="625" height="352" type="text/html" medium="video" duration="1355" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>audit</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>fintech</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>firewalls management</category>
            <category>network security</category>
            <category>network security policy management</category>
            <category>security analysis</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/video_medium/achieving-intent-based-network-video.mp4?source=podcast" type="video/mp4" length="61107497"/>
            <title>"Achieving intent-based network security across your hybrid network" with...</title>
            <link>http://video.algosec.com/achieving-intent-based-network</link>
            <description>&lt;p&gt;Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-intent-based-network"&gt;&lt;img src="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63415237</guid>
            <pubDate>Wed, 24 Jun 2020 16:49:12 GMT</pubDate>
            <media:title>"Achieving intent-based network security across your hybrid network" with...</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-intent-based-network"&gt;&lt;img src="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d40d0b761aa9153a987b2dffb6cc5060&amp;source=podcast&amp;photo%5fid=63415237" width="625" height="352" type="text/html" medium="video" duration="1824" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cyber Attacks &amp; Incident Response</category>
            <category>events</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Network Segmentation</category>
            <category>Privacy and Security</category>
            <category>prof wool</category>
            <category>Risk Management and Vulnerabilities</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/video_medium/policy-optimization-1-video.mp4?source=podcast" type="video/mp4" length="4940058"/>
            <title>Policy Optimization</title>
            <link>http://video.algosec.com/policy-optimization-1</link>
            <description>&lt;p&gt;Learn how to clean up and optimize your firewall policies with the AlgoSec solution&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/policy-optimization-1"&gt;&lt;img src="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63393273</guid>
            <pubDate>Mon, 22 Jun 2020 11:01:54 GMT</pubDate>
            <media:title>Policy Optimization</media:title>
            <media:description type="html">&lt;p&gt;Learn how to clean up and optimize your firewall policies with the AlgoSec solution&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/policy-optimization-1"&gt;&lt;img src="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4585141ecbda5b81d608818932b27fba&amp;source=podcast&amp;photo%5fid=63393273" width="625" height="352" type="text/html" medium="video" duration="148" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/video_medium/cessation-of-misconfigurations-1-video.mp4?source=podcast" type="video/mp4" length="149127110"/>
            <title>Cessation of Misconfigurations: Common Network Misconfiguration Risks &amp; How...</title>
            <link>http://video.algosec.com/cessation-of-misconfigurations-1</link>
            <description>&lt;p&gt;&lt;p&gt;Misconfigurations aren’t simply inconvenient mistakes but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s list of Top 10 most critical web application security risks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your audits, and cause costly outages that bring your business to a standstill.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, AlgoSec’s Director of Product, will show examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Watch the webinar to learn how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Understand and map your entire network before you make a change&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole and understand the impact of changes to your entire network&amp;nbsp;&lt;/li&gt;&lt;li&gt;Maximize the capabilities of network management automation to avoid common misconfigurations&amp;nbsp;&lt;/li&gt;&lt;li&gt;Avoid common mistakes when making changes to your network security devices&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cessation-of-misconfigurations-1"&gt;&lt;img src="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/60676810</guid>
            <pubDate>Tue, 02 Jun 2020 12:06:41 GMT</pubDate>
            <media:title>Cessation of Misconfigurations: Common Network Misconfiguration Risks &amp; How...</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Misconfigurations aren’t simply inconvenient mistakes but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s list of Top 10 most critical web application security risks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your audits, and cause costly outages that bring your business to a standstill.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, AlgoSec’s Director of Product, will show examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Watch the webinar to learn how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Understand and map your entire network before you make a change&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole and understand the impact of changes to your entire network&amp;nbsp;&lt;/li&gt;&lt;li&gt;Maximize the capabilities of network management automation to avoid common misconfigurations&amp;nbsp;&lt;/li&gt;&lt;li&gt;Avoid common mistakes when making changes to your network security devices&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cessation-of-misconfigurations-1"&gt;&lt;img src="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b0ba8b0b18dbf77de55c855b87c4177d&amp;source=podcast&amp;photo%5fid=60676810" width="625" height="352" type="text/html" medium="video" duration="1940" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/video_medium/reece-group-empowers-business-and-video.mp4?source=podcast" type="video/mp4" length="14692444"/>
            <title>Reece Group empowers business and IT teams with ChatOps – Case Study</title>
            <link>http://video.algosec.com/reece-group-empowers-business-and</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;Reece Group, the leading Australian plumbing and HVAC company,
was able to empower their application developers, get faster response time,
reduce risks and increase compliance and more. Watch the video case study to
find out more or read the
full case study &lt;a href="https://www.algosec.com/customer-success-stories/reece-group/"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;h1&gt;&lt;br&gt;&lt;/h1&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/reece-group-empowers-business-and"&gt;&lt;img src="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/standard/download-12-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61427218</guid>
            <pubDate>Mon, 25 May 2020 14:07:56 GMT</pubDate>
            <media:title>Reece Group empowers business and IT teams with ChatOps – Case Study</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;Reece Group, the leading Australian plumbing and HVAC company,
was able to empower their application developers, get faster response time,
reduce risks and increase compliance and more. Watch the video case study to
find out more or read the
full case study &lt;a href="https://www.algosec.com/customer-success-stories/reece-group/"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;h1&gt;&lt;br&gt;&lt;/h1&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/reece-group-empowers-business-and"&gt;&lt;img src="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/standard/download-12-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2122be8cdfeb52fd29c13de0f710bb86&amp;source=podcast&amp;photo%5fid=61427218" width="625" height="352" type="text/html" medium="video" duration="276" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/standard/download-12-thumbnail.jpg" width="600" height="338"/>
            <category>case study</category>
            <category>chatops</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>Interview</category>
            <category>network security</category>
            <category>success story</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/video_medium/optimize-your-juniper-investment-video.mp4?source=podcast" type="video/mp4" length="37937596"/>
            <title>Optimize your Juniper Investment with Intelligent Network Security Automation</title>
            <link>http://video.algosec.com/optimize-your-juniper-investment</link>
            <description>&lt;p&gt;Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/optimize-your-juniper-investment"&gt;&lt;img src="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61650270</guid>
            <pubDate>Wed, 25 Mar 2020 19:30:22 GMT</pubDate>
            <media:title>Optimize your Juniper Investment with Intelligent Network Security Automation</media:title>
            <media:description type="html">&lt;p&gt;Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/optimize-your-juniper-investment"&gt;&lt;img src="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d6c3dac069cd3e89e381907d0133d8cb&amp;source=podcast&amp;photo%5fid=61650270" width="625" height="352" type="text/html" medium="video" duration="1889" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>cloud security</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>juniper</category>
            <category>Network Security</category>
            <category>Network Security Automation</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/video_medium/managing-effective-security-video.mp4?source=podcast" type="video/mp4" length="86148630"/>
            <title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</title>
            <link>http://video.algosec.com/managing-effective-security</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-effective-security"&gt;&lt;img src="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615359</guid>
            <pubDate>Wed, 18 Mar 2020 14:04:50 GMT</pubDate>
            <media:title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-effective-security"&gt;&lt;img src="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a61b1227849251e32a2981784acbc6a7&amp;source=podcast&amp;photo%5fid=49615359" width="625" height="352" type="text/html" medium="video" duration="2630" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>cloud security</category>
            <category>compliance</category>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>hybrid environment</category>
            <category>IDC</category>
            <category>migrating applications</category>
            <category>multi-cloud</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/video_medium/network-security-vision-with-video.mp4?source=podcast" type="video/mp4" length="66340639"/>
            <title>Network Security Vision with Application Visibility | Live discussion and demo</title>
            <link>http://video.algosec.com/network-security-vision-with</link>
            <description>&lt;p&gt;Avishai Wool, CTO &amp; Co-founder (AlgoSec) &amp; Yoni Geva, Product Manager (AlgoSec) | March 5, 2020&lt;/p&gt;
&lt;p&gt;You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.&lt;/p&gt;
&lt;p&gt;But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?&lt;/p&gt;
&lt;p&gt;Stop running blind. Expand your vision with application visibility.&lt;/p&gt;
&lt;p&gt;With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.&lt;/p&gt;
&lt;p&gt;In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate – in a live demo - how to overcome these challenges and ensure business continuity through application visibility.&lt;/p&gt;
&lt;p&gt;Join the webinar and learn how to:&lt;br /&gt;
• Associate your business applications with your security policy rules.&lt;br /&gt;
• Identify the network traffic relevant for each application.&lt;br /&gt;
• Identify hidden risks and vulnerabilities in your applications.&lt;br /&gt;
• Associate compliance violations with the relevant business applications.&lt;br /&gt;
• Improve troubleshooting by identifying affected applications.&lt;br /&gt;
• Better document the applications on your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-vision-with"&gt;&lt;img src="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61248183</guid>
            <pubDate>Mon, 09 Mar 2020 15:53:57 GMT</pubDate>
            <media:title>Network Security Vision with Application Visibility | Live discussion and demo</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, CTO &amp; Co-founder (AlgoSec) &amp; Yoni Geva, Product Manager (AlgoSec) | March 5, 2020&lt;/p&gt;
&lt;p&gt;You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.&lt;/p&gt;
&lt;p&gt;But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?&lt;/p&gt;
&lt;p&gt;Stop running blind. Expand your vision with application visibility.&lt;/p&gt;
&lt;p&gt;With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.&lt;/p&gt;
&lt;p&gt;In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate – in a live demo - how to overcome these challenges and ensure business continuity through application visibility.&lt;/p&gt;
&lt;p&gt;Join the webinar and learn how to:&lt;br /&gt;
• Associate your business applications with your security policy rules.&lt;br /&gt;
• Identify the network traffic relevant for each application.&lt;br /&gt;
• Identify hidden risks and vulnerabilities in your applications.&lt;br /&gt;
• Associate compliance violations with the relevant business applications.&lt;br /&gt;
• Improve troubleshooting by identifying affected applications.&lt;br /&gt;
• Better document the applications on your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-vision-with"&gt;&lt;img src="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1337080fb3e4740271e01d66cc24acb6&amp;source=podcast&amp;photo%5fid=61248183" width="625" height="352" type="text/html" medium="video" duration="2991" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>application visibility</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/video_medium/5-dinge-von-denen-sie-sicherlich-video.mp4?source=podcast" type="video/mp4" length="66147965"/>
            <title>5 Dinge, von denen Sie sicherlich nicht gewusst haben, die Sie mit einer...</title>
            <link>http://video.algosec.com/5-dinge-von-denen-sie-sicherlich</link>
            <description>&lt;p&gt;Dietmar Wyhs, Regional Sales Manager DACH |  Oct 9 2017&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Die heutigen Unternehmen entwickeln sich kontinuierlich weiter, um neue Anwendungen, Transformationsinitiativen wie Cloud und SDN zu unterstützen und täglich neue und anspruchsvollere Cyber-Attacken abzuwehren. Aber die Sicherheits- und Netzwerk-Mitarbeiter haben Schwierigkeiten mitzuhalten. Dies wirkt sich nicht nur auf die Business-Agilität aus, sondern setzt Ihr Unternehmen Risiken aus und behindert dessen Fähigkeit, sich der modernen Bedrohungslandschaft zu stellen.&lt;/p&gt;
&lt;p&gt;Viele Fachleute sind der Meinung, dass sie die neuesten Anwendungen brauchen, um diese Herausforderungen zu bewältigen. Aber was, wenn Sie bereits haben, was Sie brauchen und diese Anwendung in Ihrem Unternehmen genutzt wird: Ihre Security Policy Management Lösung?&lt;/p&gt;
&lt;p&gt;Die heutigen Sicherheitsrichtlinien-Management-Lösungen machen weit mehr als die Automatisierung von traditionellen Änderungsmanagement Aufgaben. In diesem technischen Webinar zeigt Ihnen Dietmar Wyhs fünf wichtige Sicherheitsmanagement-Herausforderungen, denen Unternehmensorganisationen sich heutzutage stellen. Gleichzeitig erklärt er, wie die Lösung von AlgoSec Ihnen helfen kann, Sicherheitsbedrohungen zu bewältigen, Risiken zu verringern, und schnell auf Ausfällen zu reagieren, bei gleichzeitiger Maximierung der Geschäftsagibilität und Sicherstellung der Compliance in den unterschiedlichen, sich ständig verändernden Hybridnetzwerken.&lt;/p&gt;
&lt;p&gt;Dieses technische Webinar konzentriert sich auf:&lt;/p&gt;
&lt;p&gt;•Verwalten von Sicherheitsrichtlinien von End-to-End-Lösungen öffentlicher und privater Clouds einschließlich Microsoft Azure, Amazon Web Services AWS, Cisco ACI und VMWare NSX&lt;br&gt;
•Zuordnung von Sicherheitslücken zu Anwendungen, zur Bewertung und Priorisierung des Risikos&lt;br&gt;
•Möglichkeit Cyber-Attacken mit Geschäftsprozesse zu korrelieren&lt;br&gt;
•Migration von Firewall-Richtlinien zwischen Firewall-Herstellern&lt;br&gt;
•Durchführung einer vollautomatischen, Zero-Touch-Sicherheitsregelwerksänderung&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-dinge-von-denen-sie-sicherlich"&gt;&lt;img src="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61166183</guid>
            <pubDate>Thu, 05 Mar 2020 14:08:47 GMT</pubDate>
            <media:title>5 Dinge, von denen Sie sicherlich nicht gewusst haben, die Sie mit einer...</media:title>
            <media:description type="html">&lt;p&gt;Dietmar Wyhs, Regional Sales Manager DACH |  Oct 9 2017&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Die heutigen Unternehmen entwickeln sich kontinuierlich weiter, um neue Anwendungen, Transformationsinitiativen wie Cloud und SDN zu unterstützen und täglich neue und anspruchsvollere Cyber-Attacken abzuwehren. Aber die Sicherheits- und Netzwerk-Mitarbeiter haben Schwierigkeiten mitzuhalten. Dies wirkt sich nicht nur auf die Business-Agilität aus, sondern setzt Ihr Unternehmen Risiken aus und behindert dessen Fähigkeit, sich der modernen Bedrohungslandschaft zu stellen.&lt;/p&gt;
&lt;p&gt;Viele Fachleute sind der Meinung, dass sie die neuesten Anwendungen brauchen, um diese Herausforderungen zu bewältigen. Aber was, wenn Sie bereits haben, was Sie brauchen und diese Anwendung in Ihrem Unternehmen genutzt wird: Ihre Security Policy Management Lösung?&lt;/p&gt;
&lt;p&gt;Die heutigen Sicherheitsrichtlinien-Management-Lösungen machen weit mehr als die Automatisierung von traditionellen Änderungsmanagement Aufgaben. In diesem technischen Webinar zeigt Ihnen Dietmar Wyhs fünf wichtige Sicherheitsmanagement-Herausforderungen, denen Unternehmensorganisationen sich heutzutage stellen. Gleichzeitig erklärt er, wie die Lösung von AlgoSec Ihnen helfen kann, Sicherheitsbedrohungen zu bewältigen, Risiken zu verringern, und schnell auf Ausfällen zu reagieren, bei gleichzeitiger Maximierung der Geschäftsagibilität und Sicherstellung der Compliance in den unterschiedlichen, sich ständig verändernden Hybridnetzwerken.&lt;/p&gt;
&lt;p&gt;Dieses technische Webinar konzentriert sich auf:&lt;/p&gt;
&lt;p&gt;•Verwalten von Sicherheitsrichtlinien von End-to-End-Lösungen öffentlicher und privater Clouds einschließlich Microsoft Azure, Amazon Web Services AWS, Cisco ACI und VMWare NSX&lt;br&gt;
•Zuordnung von Sicherheitslücken zu Anwendungen, zur Bewertung und Priorisierung des Risikos&lt;br&gt;
•Möglichkeit Cyber-Attacken mit Geschäftsprozesse zu korrelieren&lt;br&gt;
•Migration von Firewall-Richtlinien zwischen Firewall-Herstellern&lt;br&gt;
•Durchführung einer vollautomatischen, Zero-Touch-Sicherheitsregelwerksänderung&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-dinge-von-denen-sie-sicherlich"&gt;&lt;img src="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=242de32ae12a997510189ac9d08bc971&amp;source=podcast&amp;photo%5fid=61166183" width="625" height="352" type="text/html" medium="video" duration="2068" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543327/57181222/bcc926c39ddfdc95bb0c18d5c31b98b5/video_medium/stop-putting-out-fires-pass-network-1-video.mp4?source=podcast" type="video/mp4" length="75780022"/>
            <title>Stop putting out fires. Pass network security audits – every time</title>
            <link>http://video.algosec.com/stop-putting-out-fires-pass-network-1</link>
            <description>&lt;p&gt;&lt;p&gt;Compliance with network and data security regulations and internal standards is vital and mission-critical. But with increasing global regulations and network complexities, it’s harder than ever to keep up.  &lt;br&gt;&lt;br&gt;Firewall management and network security policies are critical components in achieving compliance. Firewall audits are complex and demanding and documentation of current rules is lacking. There’s no time and resources to find, organize, and inspect all your firewall rules. Instead of being proactive and preventative, network security teams are constantly putting out fires.&lt;br&gt;&lt;br&gt;In this webinar, you will learn:&lt;br&gt;&lt;br&gt;   • The golden rules for passing a network security audit&lt;br&gt;   • Best practices to maintain continuous compliance&lt;br&gt;   • How to conduct a risk assessment and fix issues&lt;br&gt;&lt;br&gt;Learn how to prevent fires and pass network security audits every time.&lt;br&gt;&lt;br&gt;Tal Dayan, AlgoSec’s product manager, will reveal the Firewall Audit Checklist, the six best practices to ensure successful audits.&lt;br&gt;&lt;br&gt;By adopting these best practices, security teams will significantly improve their network’s security posture and reduce the pain of ensuring compliance with regulations, industry standards and corporate policies.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/stop-putting-out-fires-pass-network-1"&gt;&lt;img src="http://video.algosec.com/49543327/57181222/bcc926c39ddfdc95bb0c18d5c31b98b5/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/57181222</guid>
            <pubDate>Tue, 29 Oct 2019 17:37:31 GMT</pubDate>
            <media:title>Stop putting out fires. Pass network security audits – every time</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Compliance with network and data security regulations and internal standards is vital and mission-critical. But with increasing global regulations and network complexities, it’s harder than ever to keep up.  &lt;br&gt;&lt;br&gt;Firewall management and network security policies are critical components in achieving compliance. Firewall audits are complex and demanding and documentation of current rules is lacking. There’s no time and resources to find, organize, and inspect all your firewall rules. Instead of being proactive and preventative, network security teams are constantly putting out fires.&lt;br&gt;&lt;br&gt;In this webinar, you will learn:&lt;br&gt;&lt;br&gt;   • The golden rules for passing a network security audit&lt;br&gt;   • Best practices to maintain continuous compliance&lt;br&gt;   • How to conduct a risk assessment and fix issues&lt;br&gt;&lt;br&gt;Learn how to prevent fires and pass network security audits every time.&lt;br&gt;&lt;br&gt;Tal Dayan, AlgoSec’s product manager, will reveal the Firewall Audit Checklist, the six best practices to ensure successful audits.&lt;br&gt;&lt;br&gt;By adopting these best practices, security teams will significantly improve their network’s security posture and reduce the pain of ensuring compliance with regulations, industry standards and corporate policies.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/stop-putting-out-fires-pass-network-1"&gt;&lt;img src="http://video.algosec.com/49543327/57181222/bcc926c39ddfdc95bb0c18d5c31b98b5/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bcc926c39ddfdc95bb0c18d5c31b98b5&amp;source=podcast&amp;photo%5fid=57181222" width="625" height="352" type="text/html" medium="video" duration="2224" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543327/57181222/bcc926c39ddfdc95bb0c18d5c31b98b5/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>audit and compliance</category>
            <category>Firewall management</category>
            <category>Firewalls</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/video_medium/cisco-aci-hybrid-networks-breaking-video.mp4?source=podcast" type="video/mp4" length="103142794"/>
            <title>Cisco ACI &amp; Hybrid Networks Breaking Down Silos with Central Policy Management</title>
            <link>http://video.algosec.com/cisco-aci-hybrid-networks-breaking</link>
            <description>&lt;p&gt;&lt;b&gt;Yonatan Klein, Director of Product Management&lt;/b&gt; | July 30, 2019
&lt;p&gt;While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.&lt;/p&gt;
&lt;p&gt;Each part of your network estate is managed in its own independent silo instead of being holistically managed.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;He covers how to:&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/li&gt;&lt;li&gt;Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices&lt;/li&gt;&lt;li&gt;Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-hybrid-networks-breaking"&gt;&lt;img src="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54329483</guid>
            <pubDate>Tue, 30 Jul 2019 19:56:43 GMT</pubDate>
            <media:title>Cisco ACI &amp; Hybrid Networks Breaking Down Silos with Central Policy Management</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yonatan Klein, Director of Product Management&lt;/b&gt; | July 30, 2019
&lt;p&gt;While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.&lt;/p&gt;
&lt;p&gt;Each part of your network estate is managed in its own independent silo instead of being holistically managed.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;He covers how to:&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/li&gt;&lt;li&gt;Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices&lt;/li&gt;&lt;li&gt;Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-hybrid-networks-breaking"&gt;&lt;img src="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cb75f925661e325e6248fecc17f893d7&amp;source=podcast&amp;photo%5fid=54329483" width="625" height="352" type="text/html" medium="video" duration="3106" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cisco</category>
            <category>Cisco Tetration</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>hybrid environment</category>
            <category>network security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/video_medium/effectively-managing-security-video.mp4?source=podcast" type="video/mp4" length="109360914"/>
            <title>Effectively Managing Security Policy | Joint Fortinet &amp; AlgoSec Webinar</title>
            <link>http://video.algosec.com/effectively-managing-security</link>
            <description>&lt;p&gt;&lt;b&gt;Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec)&lt;/b&gt; | Jun 26 2019
&lt;p&gt;In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.&lt;/p&gt;
&lt;p&gt;In this webinar, Satish Veerapuneni, Director of Products and Solutions at Fortinet and Yoav Karnibad, Product Manager at AlgoSec will discuss how joint customers benefit from AlgoSec’s multi-vendor security policy management capabilities while leveraging Fortinet’s industry-leading Security Fabric’s FortiManager &amp;amp; FortiAnalyzer.&lt;/p&gt;
&lt;p&gt;Join this live webinar to learn how to:&lt;br&gt;
• Automate policy optimization and risk assessment across all your security devices.&lt;br&gt;
• Enhance visibility and exercise greater control over your hybrid / heterogeneous network&lt;br&gt;
• Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation&lt;br&gt;
• Assess risk and ensure regulatory compliance across the entire enterprise environment&lt;br&gt;
• Realize single pane of glass management with advanced analysis and management of policy modifications through Fortinet Security Fabric’s FortiManager/FortiAnalyzer&amp;nbsp;and AlgoSec’s Firewall Analyzer, FireFlow and BusinessFlow&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/effectively-managing-security"&gt;&lt;img src="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53517696</guid>
            <pubDate>Mon, 01 Jul 2019 13:56:06 GMT</pubDate>
            <media:title>Effectively Managing Security Policy | Joint Fortinet &amp; AlgoSec Webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec)&lt;/b&gt; | Jun 26 2019
&lt;p&gt;In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.&lt;/p&gt;
&lt;p&gt;In this webinar, Satish Veerapuneni, Director of Products and Solutions at Fortinet and Yoav Karnibad, Product Manager at AlgoSec will discuss how joint customers benefit from AlgoSec’s multi-vendor security policy management capabilities while leveraging Fortinet’s industry-leading Security Fabric’s FortiManager &amp;amp; FortiAnalyzer.&lt;/p&gt;
&lt;p&gt;Join this live webinar to learn how to:&lt;br&gt;
• Automate policy optimization and risk assessment across all your security devices.&lt;br&gt;
• Enhance visibility and exercise greater control over your hybrid / heterogeneous network&lt;br&gt;
• Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation&lt;br&gt;
• Assess risk and ensure regulatory compliance across the entire enterprise environment&lt;br&gt;
• Realize single pane of glass management with advanced analysis and management of policy modifications through Fortinet Security Fabric’s FortiManager/FortiAnalyzer&amp;nbsp;and AlgoSec’s Firewall Analyzer, FireFlow and BusinessFlow&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/effectively-managing-security"&gt;&lt;img src="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b6e522c1eb5123a2a88d100caf162d8b&amp;source=podcast&amp;photo%5fid=53517696" width="625" height="352" type="text/html" medium="video" duration="3334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>cyber Security</category>
            <category>FireFlow</category>
            <category>Firewall Management</category>
            <category>Fortinet</category>
            <category>Network Security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/video_medium/securely-managing-application-video.mp4?source=podcast" type="video/mp4" length="38613866"/>
            <title>Securely Managing Application Connectivity – Best Practices</title>
            <link>http://video.algosec.com/securely-managing-application</link>
            <description>&lt;p&gt;&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securely-managing-application"&gt;&lt;img src="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53083724</guid>
            <pubDate>Sun, 16 Jun 2019 11:42:42 GMT</pubDate>
            <media:title>Securely Managing Application Connectivity – Best Practices</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securely-managing-application"&gt;&lt;img src="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3a53e9daff9a2bc19930ddc029e874d9&amp;source=podcast&amp;photo%5fid=53083724" width="625" height="352" type="text/html" medium="video" duration="1111" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Application Security</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>cloud security</category>
            <category>Connectivity</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/video_medium/firewall-rule-recertification-with-video.mp4?source=podcast" type="video/mp4" length="74582768"/>
            <title>Firewall Rule Recertification with Application Connectivity</title>
            <link>http://video.algosec.com/firewall-rule-recertification-with</link>
            <description>&lt;p&gt;Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/firewall-rule-recertification-with"&gt;&lt;img src="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/51313899</guid>
            <pubDate>Mon, 29 Apr 2019 11:39:25 GMT</pubDate>
            <media:title>Firewall Rule Recertification with Application Connectivity</media:title>
            <media:description type="html">&lt;p&gt;Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/firewall-rule-recertification-with"&gt;&lt;img src="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=28b03ebf89a04b04bfe7ccebae9cb7f5&amp;source=podcast&amp;photo%5fid=51313899" width="625" height="352" type="text/html" medium="video" duration="1197" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/>
            <category> Compliance</category>
            <category> Connectivity</category>
            <category> Cyber Security</category>
            <category> firewall management</category>
            <category> firewall rule recertification</category>
            <category>Firewalls</category>
            <category> Network Security</category>
            <category> Security Management</category>
            <category> security policy</category>
            <category> security tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/video_medium/migration-to-cisco-firepower-video.mp4?source=podcast" type="video/mp4" length="3602179"/>
            <title>Migration to Cisco Firepower</title>
            <link>http://video.algosec.com/migration-to-cisco-firepower</link>
            <description>&lt;p&gt;How to utilize the AlgoSec solution to migrate to Cisco Firepower&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migration-to-cisco-firepower"&gt;&lt;img src="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54117797</guid>
            <pubDate>Wed, 10 Apr 2019 00:00:00 GMT</pubDate>
            <media:title>Migration to Cisco Firepower</media:title>
            <media:description type="html">&lt;p&gt;How to utilize the AlgoSec solution to migrate to Cisco Firepower&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migration-to-cisco-firepower"&gt;&lt;img src="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0534c3a48e8560e33c68423031611e30&amp;source=podcast&amp;photo%5fid=54117797" width="625" height="352" type="text/html" medium="video" duration="69" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>asa</category>
            <category>cisco</category>
            <category>firepower</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>juniper</category>
            <category>managment</category>
            <category>policy</category>
            <category>Security Policy</category>
            <category>visibility</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/video_medium/taming-the-storm-clouds-managing-video.mp4?source=podcast" type="video/mp4" length="87142532"/>
            <title>Taming the storm clouds: managing network security across hybrid and multi-cloud</title>
            <link>http://video.algosec.com/taming-the-storm-clouds-managing</link>
            <description>&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49895193</guid>
            <pubDate>Thu, 28 Mar 2019 13:04:00 GMT</pubDate>
            <media:title>Taming the storm clouds: managing network security across hybrid and multi-cloud</media:title>
            <media:description type="html">&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dc4df391a76a089c566104a63f8badf5&amp;source=podcast&amp;photo%5fid=49895193" width="625" height="352" type="text/html" medium="video" duration="2733" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cloud Security</category>
            <category>Cyber Security</category>
            <category>cyber threat</category>
            <category>Cyber Threats</category>
            <category>DevOps</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>IT Security</category>
            <category>Network Security</category>
            <category>Risk Management</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/video_medium/movin-on-up-to-the-cloud-how-to-video.mp4?source=podcast" type="video/mp4" length="48861838"/>
            <title>Movin' On Up to the Cloud: How to Migrate your Application Connectivity</title>
            <link>http://video.algosec.com/movin-on-up-to-the-cloud-how-to</link>
            <description>&lt;p&gt;&lt;span&gt;&lt;b&gt;Avivi Siman-Tov, Product Manager |&lt;/b&gt; Feb 6 2018&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;br&gt;&lt;/span&gt;Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.&lt;br&gt;&lt;br&gt;If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.&amp;nbsp;&lt;br&gt;&lt;br&gt;Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, explores how to simplify and accelerate large-scale complex application migration projects, while making security a priority.&amp;nbsp;&lt;br&gt;&lt;br&gt;Discover best practices to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Automatically discover applications and their existing connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups&amp;nbsp;&lt;/li&gt;&lt;li&gt;Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Assess the risk and ensure compliance throughout the migration process&amp;nbsp;&lt;/li&gt;&lt;li&gt;Deliver unified security policy management across the hybrid enterprise cloud environment&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/movin-on-up-to-the-cloud-how-to"&gt;&lt;img src="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49721659</guid>
            <pubDate>Wed, 20 Mar 2019 10:53:55 GMT</pubDate>
            <media:title>Movin' On Up to the Cloud: How to Migrate your Application Connectivity</media:title>
            <media:description type="html">&lt;p&gt;&lt;span&gt;&lt;b&gt;Avivi Siman-Tov, Product Manager |&lt;/b&gt; Feb 6 2018&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;br&gt;&lt;/span&gt;Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.&lt;br&gt;&lt;br&gt;If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.&amp;nbsp;&lt;br&gt;&lt;br&gt;Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, explores how to simplify and accelerate large-scale complex application migration projects, while making security a priority.&amp;nbsp;&lt;br&gt;&lt;br&gt;Discover best practices to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Automatically discover applications and their existing connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups&amp;nbsp;&lt;/li&gt;&lt;li&gt;Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Assess the risk and ensure compliance throughout the migration process&amp;nbsp;&lt;/li&gt;&lt;li&gt;Deliver unified security policy management across the hybrid enterprise cloud environment&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/movin-on-up-to-the-cloud-how-to"&gt;&lt;img src="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b7638ecd622bb415d654ed299e5208b2&amp;source=podcast&amp;photo%5fid=49721659" width="625" height="352" type="text/html" medium="video" duration="1788" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>application discovery</category>
            <category>cloudsecurity</category>
            <category>Firewall Management</category>
            <category>hybrid</category>
            <category>migrating applications</category>
            <category>networksecurity</category>
            <category>network security</category>
            <category>risk assessment</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543313/54117880/a341e94d6b1a623cbc15aaa05805cc59/video_medium/algosec-firewall-analyzer-afa-demo-video.mp4?source=podcast" type="video/mp4" length="10813084"/>
            <title>AlgoSec Firewall Analyzer (AFA) Demo</title>
            <link>http://video.algosec.com/algosec-firewall-analyzer-afa-demo</link>
            <description>&lt;p&gt;&lt;p&gt;Watch this demo of AlgoSec Firewall Analyzer (AFA). See how
AFA delivers visibility and analysis of complex network security policies
across on-premise and cloud networks.&amp;nbsp;Discover how AlgoSec Firewall
Analyzer lets you view your multi-vendor network topology, and offers
audit-ready compliance reports. Learn more at &lt;a href="https://www.algosec.com/firewall-analyzer/"&gt;https://www.algosec.com/firewall-analyzer/&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-firewall-analyzer-afa-demo"&gt;&lt;img src="http://video.algosec.com/49543313/54117880/a341e94d6b1a623cbc15aaa05805cc59/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54117880</guid>
            <pubDate>Wed, 20 Mar 2019 00:00:00 GMT</pubDate>
            <media:title>AlgoSec Firewall Analyzer (AFA) Demo</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Watch this demo of AlgoSec Firewall Analyzer (AFA). See how
AFA delivers visibility and analysis of complex network security policies
across on-premise and cloud networks.&amp;nbsp;Discover how AlgoSec Firewall
Analyzer lets you view your multi-vendor network topology, and offers
audit-ready compliance reports. Learn more at &lt;a href="https://www.algosec.com/firewall-analyzer/"&gt;https://www.algosec.com/firewall-analyzer/&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-firewall-analyzer-afa-demo"&gt;&lt;img src="http://video.algosec.com/49543313/54117880/a341e94d6b1a623cbc15aaa05805cc59/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a341e94d6b1a623cbc15aaa05805cc59&amp;source=podcast&amp;photo%5fid=54117880" width="625" height="469" type="text/html" medium="video" duration="370" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543313/54117880/a341e94d6b1a623cbc15aaa05805cc59/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>AFA</category>
            <category>Audit and Compliance</category>
            <category>Demo</category>
            <category>Firewall Analyzer</category>
            <category>Firewall Management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/video_medium/selecting-the-right-security-policy-video.mp4?source=podcast" type="video/mp4" length="76996065"/>
            <title>Selecting the right security policy management solution for your organization</title>
            <link>http://video.algosec.com/selecting-the-right-security-policy</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect&amp;nbsp;&lt;/b&gt;&lt;br&gt;&lt;/p&gt;IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.&amp;nbsp;&lt;br&gt;In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.&amp;nbsp;&lt;br&gt;Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.&amp;nbsp;&lt;br&gt;&lt;br&gt;Key topics include:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Intelligent automation is more than just adding policies&lt;/li&gt;&lt;li&gt;Letting a business-centric approach take the lead&amp;nbsp;&lt;/li&gt;&lt;li&gt;Extracting the best from existing automation processes and creating new ones&amp;nbsp;&lt;/li&gt;&lt;li&gt;Managing it all together: cloud, SDN and on-premise&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/selecting-the-right-security-policy"&gt;&lt;img src="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615259</guid>
            <pubDate>Wed, 17 Oct 2018 18:30:00 GMT</pubDate>
            <media:title>Selecting the right security policy management solution for your organization</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect&amp;nbsp;&lt;/b&gt;&lt;br&gt;&lt;/p&gt;IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.&amp;nbsp;&lt;br&gt;In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.&amp;nbsp;&lt;br&gt;Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.&amp;nbsp;&lt;br&gt;&lt;br&gt;Key topics include:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Intelligent automation is more than just adding policies&lt;/li&gt;&lt;li&gt;Letting a business-centric approach take the lead&amp;nbsp;&lt;/li&gt;&lt;li&gt;Extracting the best from existing automation processes and creating new ones&amp;nbsp;&lt;/li&gt;&lt;li&gt;Managing it all together: cloud, SDN and on-premise&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/selecting-the-right-security-policy"&gt;&lt;img src="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=26569be0faf52cc329bf82bf37a909f1&amp;source=podcast&amp;photo%5fid=49615259" width="625" height="352" type="text/html" medium="video" duration="2338" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>cloud security</category>
            <category>Firewall Management</category>
            <category>network security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/video_medium/network-security-audit-passing-your-video.mp4?source=podcast" type="video/mp4" length="97099801"/>
            <title>Network Security Audit? Passing Your Next One with Flying Colors</title>
            <link>http://video.algosec.com/network-security-audit-passing-your</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt; | Sep 6 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are required to maintain an unfailing state of compliance with laws and regulations.&amp;nbsp;&lt;br&gt;&lt;br&gt;Do you know about the upcoming PCI-DSS 3.2.1 standard and what it means for your operation? Are you ready to be audited?&lt;br&gt;&lt;br&gt;Like fire drills, audits can catch us unprepared and expose inadequacies. What should we do now to make sure we pass the next audit with ease?&lt;br&gt;&lt;br&gt;Presented by renowned industry expert, Professor Avishai Wool, this technical webinar imparts best practices and reveals specific techniques to help you make sure that your compliance posture stands up to any audit.&lt;br&gt;&lt;br&gt;In this webinar, Professor Wool discusses:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Know if your network is compliant with the new PCI standard&lt;/li&gt;&lt;li&gt;Upgrade to the secure alternative to SSL to safeguard your payment data&lt;/li&gt;&lt;li&gt;Prepare for the next audit&lt;/li&gt;&lt;li&gt;Assure continuous compliance&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-audit-passing-your"&gt;&lt;img src="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615104</guid>
            <pubDate>Thu, 06 Sep 2018 17:00:00 GMT</pubDate>
            <media:title>Network Security Audit? Passing Your Next One with Flying Colors</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt; | Sep 6 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are required to maintain an unfailing state of compliance with laws and regulations.&amp;nbsp;&lt;br&gt;&lt;br&gt;Do you know about the upcoming PCI-DSS 3.2.1 standard and what it means for your operation? Are you ready to be audited?&lt;br&gt;&lt;br&gt;Like fire drills, audits can catch us unprepared and expose inadequacies. What should we do now to make sure we pass the next audit with ease?&lt;br&gt;&lt;br&gt;Presented by renowned industry expert, Professor Avishai Wool, this technical webinar imparts best practices and reveals specific techniques to help you make sure that your compliance posture stands up to any audit.&lt;br&gt;&lt;br&gt;In this webinar, Professor Wool discusses:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Know if your network is compliant with the new PCI standard&lt;/li&gt;&lt;li&gt;Upgrade to the secure alternative to SSL to safeguard your payment data&lt;/li&gt;&lt;li&gt;Prepare for the next audit&lt;/li&gt;&lt;li&gt;Assure continuous compliance&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-audit-passing-your"&gt;&lt;img src="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=136e59e2afb568e47149553c486bea6e&amp;source=podcast&amp;photo%5fid=49615104" width="625" height="352" type="text/html" medium="video" duration="3379" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>automation</category>
            <category>compliance</category>
            <category>Firewall Management</category>
            <category>network security</category>
            <category>pci</category>
            <category>pci audit</category>
            <category>prof wool</category>
            <category>security audit</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/video_medium/cisco-aci-and-algosec-integration-video.mp4?source=podcast" type="video/mp4" length="7894287"/>
            <title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration</link>
            <description>&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181812</guid>
            <pubDate>Mon, 18 Jun 2018 03:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</media:title>
            <media:description type="html">&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ea3eaaff1b36a7756bfa854f08f6b30&amp;source=podcast&amp;photo%5fid=44181812" width="625" height="352" type="text/html" medium="video" duration="376" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/video_medium/devopsifying-network-security-video.mp4?source=podcast" type="video/mp4" length="11997028"/>
            <title>DevOpsifying Network Security: AlgoSec - Ansible Demo</title>
            <link>http://video.algosec.com/devopsifying-network-security</link>
            <description>&lt;p&gt;This demo describes how developers can seamlessly incorporate network connectivity into their DevOps methodology, using their existing CI tools, in order to fully automate the application delivery process end-to-end.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/devopsifying-network-security"&gt;&lt;img src="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181768</guid>
            <pubDate>Thu, 31 May 2018 03:00:00 GMT</pubDate>
            <media:title>DevOpsifying Network Security: AlgoSec - Ansible Demo</media:title>
            <media:description type="html">&lt;p&gt;This demo describes how developers can seamlessly incorporate network connectivity into their DevOps methodology, using their existing CI tools, in order to fully automate the application delivery process end-to-end.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/devopsifying-network-security"&gt;&lt;img src="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2e5a4dec5e02b94502d7e0baf5c1bb26&amp;source=podcast&amp;photo%5fid=44181768" width="625" height="352" type="text/html" medium="video" duration="584" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>algosec devops</category>
            <category>ansible</category>
            <category>application connectivity'</category>
            <category>chef</category>
            <category>CI tools</category>
            <category>code integration</category>
            <category>DevOps</category>
            <category>firewall management</category>
            <category>Jenkins</category>
            <category>network security</category>
            <category>puppet</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/video_medium/sharing-network-security-video.mp4?source=podcast" type="video/mp4" length="16792470"/>
            <title>Sharing Network Security Information with the Wider IT Community With Team...</title>
            <link>http://video.algosec.com/sharing-network-security</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sharing-network-security"&gt;&lt;img src="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181793</guid>
            <pubDate>Tue, 30 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Sharing Network Security Information with the Wider IT Community With Team...</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sharing-network-security"&gt;&lt;img src="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=82a8e57717222b74b1b7f76f49f5d8aa&amp;source=podcast&amp;photo%5fid=44181793" width="625" height="352" type="text/html" medium="video" duration="287" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>avishai wool</category>
            <category>chatbot</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>ms teams</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>skype for business</category>
            <category>slack</category>
            <category>team collaboration tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/video_medium/the-benefits-of-mapping-firewall-video.mp4?source=podcast" type="video/mp4" length="14101048"/>
            <title>The Benefits of Mapping Firewall Rules to Business Applications</title>
            <link>http://video.algosec.com/the-benefits-of-mapping-firewall</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-benefits-of-mapping-firewall"&gt;&lt;img src="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181854</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>The Benefits of Mapping Firewall Rules to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-benefits-of-mapping-firewall"&gt;&lt;img src="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=72ce166d6692eacad1d4807eb07ea18e&amp;source=podcast&amp;photo%5fid=44181854" width="625" height="352" type="text/html" medium="video" duration="243" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity flows</category>
            <category>businessflow</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rule management</category>
            <category>network connectivity</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/video_medium/new-how-to-manage-dynamic-objects-video.mp4?source=podcast" type="video/mp4" length="19361181"/>
            <title>New! How to Manage Dynamic Objects in Cloud Environments</title>
            <link>http://video.algosec.com/new-how-to-manage-dynamic-objects</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-how-to-manage-dynamic-objects"&gt;&lt;img src="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181841</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>New! How to Manage Dynamic Objects in Cloud Environments</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-how-to-manage-dynamic-objects"&gt;&lt;img src="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0524b2eaa5d233030ef32c3f04935a7b&amp;source=podcast&amp;photo%5fid=44181841" width="625" height="352" type="text/html" medium="video" duration="359" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon web services security</category>
            <category>avishai wool</category>
            <category>aws</category>
            <category>aws security</category>
            <category>cloud security</category>
            <category>dynamic objects aws</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/video_medium/lesson-7-how-to-prepare-for-network-video.mp4?source=podcast" type="video/mp4" length="13749334"/>
            <title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</title>
            <link>http://video.algosec.com/lesson-7-how-to-prepare-for-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181819</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f796f81cc13de312cc8c7bd06b607f5b&amp;source=podcast&amp;photo%5fid=44181819" width="625" height="352" type="text/html" medium="video" duration="247" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>avishai wool</category>
            <category>cloud security</category>
            <category>Data Center</category>
            <category>data center security</category>
            <category>east west traffic</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/video_medium/how-to-intelligently-select-the-video.mp4?source=podcast" type="video/mp4" length="25563649"/>
            <title>How to Intelligently Select the Security Groups to Modify When Managing...</title>
            <link>http://video.algosec.com/how-to-intelligently-select-the</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 7&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-intelligently-select-the"&gt;&lt;img src="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181920</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>How to Intelligently Select the Security Groups to Modify When Managing...</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 7&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-intelligently-select-the"&gt;&lt;img src="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1772ee30e20c98c8d8c7667649d3e7cc&amp;source=podcast&amp;photo%5fid=44181920" width="625" height="352" type="text/html" medium="video" duration="419" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud firewalls</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>hybrid cloud security</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>public cloud security</category>
            <category>publick cloud</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/video_medium/lesson-7-how-to-aggregate-network-video.mp4?source=podcast" type="video/mp4" length="21243911"/>
            <title>Lesson 7: How to Aggregate Network Flows Into Application Flows</title>
            <link>http://video.algosec.com/lesson-7-how-to-aggregate-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181876</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Aggregate Network Flows Into Application Flows</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d5894f7ffc54d4f9858292bb6ee2723c&amp;source=podcast&amp;photo%5fid=44181876" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center applications</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/video_medium/lesson-17-pci-linking-video.mp4?source=podcast" type="video/mp4" length="15245868"/>
            <title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</title>
            <link>http://video.algosec.com/lesson-17-pci-linking</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181937</guid>
            <pubDate>Tue, 29 Aug 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fdf0e5036006d18cfb40fc57ac280e8d&amp;source=podcast&amp;photo%5fid=44181937" width="625" height="352" type="text/html" medium="video" duration="281" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>nessus</category>
            <category>Network Security</category>
            <category>pci</category>
            <category>pci dss</category>
            <category>prof wool</category>
            <category>rapid7</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>tenable</category>
            <category>vulnerabilities</category>
            <category>vulnerability scanners</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/video_medium/the-right-way-to-audit-aws-policies-video.mp4?source=podcast" type="video/mp4" length="20476785"/>
            <title>The Right Way to Audit AWS Policies</title>
            <link>http://video.algosec.com/the-right-way-to-audit-aws-policies</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-right-way-to-audit-aws-policies"&gt;&lt;img src="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181993</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>The Right Way to Audit AWS Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-right-way-to-audit-aws-policies"&gt;&lt;img src="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b1c1f67722fb6eb47731b6e174f7b8ae&amp;source=podcast&amp;photo%5fid=44181993" width="625" height="352" type="text/html" medium="video" duration="380" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud firewalls</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>hybrid cloud security</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>public cloud security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/video_medium/how-to-integrate-security-into-the-1-video.mp4?source=podcast" type="video/mp4" length="14040752"/>
            <title>How to Integrate Security into the Test Environment</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the-1</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the-1"&gt;&lt;img src="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181992</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the Test Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the-1"&gt;&lt;img src="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=530e283f33821556fb69c84052c07c98&amp;source=podcast&amp;photo%5fid=44181992" width="625" height="352" type="text/html" medium="video" duration="292" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Devops</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/video_medium/tips-for-adding-capacity-without-video.mp4?source=podcast" type="video/mp4" length="24919436"/>
            <title>Tips for Adding Capacity Without Changing Your Security Policies</title>
            <link>http://video.algosec.com/tips-for-adding-capacity-without</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181948</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>Tips for Adding Capacity Without Changing Your Security Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0ccdc09b741f04206dd36b3f659e9519&amp;source=podcast&amp;photo%5fid=44181948" width="625" height="352" type="text/html" medium="video" duration="446" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/video_medium/how-to-integrate-security-into-the-video.mp4?source=podcast" type="video/mp4" length="16789600"/>
            <title>How to Integrate Security into the CI Process</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181918</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the CI Process</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0181d939b45c1552d4f90366f73e9c01&amp;source=podcast&amp;photo%5fid=44181918" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/video_medium/onboarding-new-firewall-devices-video.mp4?source=podcast" type="video/mp4" length="5986333"/>
            <title>Onboarding New Firewall Devices Using AlgoSec's APIs</title>
            <link>http://video.algosec.com/onboarding-new-firewall-devices</link>
            <description>&lt;p&gt;Security integration is a common requirement for many enterprise customers and MSSPs. This video showcases the process to operationalize this requirements including:&lt;br /&gt;
1. Onboarding new firewall devices through a web portal&lt;br /&gt;
2. Easily get compliance scores for newly onboarded devices&lt;br /&gt;
3. Identify firewall cleanup opportunities&lt;br /&gt;
4. Identify if security policies are blocking application connectivity&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/onboarding-new-firewall-devices"&gt;&lt;img src="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181964</guid>
            <pubDate>Fri, 12 May 2017 03:00:00 GMT</pubDate>
            <media:title>Onboarding New Firewall Devices Using AlgoSec's APIs</media:title>
            <media:description type="html">&lt;p&gt;Security integration is a common requirement for many enterprise customers and MSSPs. This video showcases the process to operationalize this requirements including:&lt;br /&gt;
1. Onboarding new firewall devices through a web portal&lt;br /&gt;
2. Easily get compliance scores for newly onboarded devices&lt;br /&gt;
3. Identify firewall cleanup opportunities&lt;br /&gt;
4. Identify if security policies are blocking application connectivity&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/onboarding-new-firewall-devices"&gt;&lt;img src="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e10b23fea5f80c6a1fe1337d28d4fc53&amp;source=podcast&amp;photo%5fid=44181964" width="625" height="352" type="text/html" medium="video" duration="301" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>mssps</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/video_medium/the-algosec-qradar-app-for-incident-video.mp4?source=podcast" type="video/mp4" length="13528027"/>
            <title>The AlgoSec QRadar App for Incident Response</title>
            <link>http://video.algosec.com/the-algosec-qradar-app-for-incident</link>
            <description>&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-algosec-qradar-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182027</guid>
            <pubDate>Fri, 03 Mar 2017 02:00:00 GMT</pubDate>
            <media:title>The AlgoSec QRadar App for Incident Response</media:title>
            <media:description type="html">&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-algosec-qradar-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=697b47e70fcfbb1d2c48e4c514506a03&amp;source=podcast&amp;photo%5fid=44182027" width="625" height="352" type="text/html" medium="video" duration="388" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attacks</category>
            <category>cyber threats</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>IBM QRadar</category>
            <category>incident response</category>
            <category>network security</category>
            <category>security intelligence</category>
            <category>security intelligence platform</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/video_medium/demo-algosecs-cisco-aci-app-center-video.mp4?source=podcast" type="video/mp4" length="12747509"/>
            <title>Demo: AlgoSec's Cisco ACI App Center</title>
            <link>http://video.algosec.com/demo-algosecs-cisco-aci-app-center</link>
            <description>&lt;p&gt;The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosecs-cisco-aci-app-center"&gt;&lt;img src="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181981</guid>
            <pubDate>Fri, 03 Mar 2017 02:00:00 GMT</pubDate>
            <media:title>Demo: AlgoSec's Cisco ACI App Center</media:title>
            <media:description type="html">&lt;p&gt;The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosecs-cisco-aci-app-center"&gt;&lt;img src="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cd6ffbb3cb4ab2fd653726f5bec24c85&amp;source=podcast&amp;photo%5fid=44181981" width="625" height="352" type="text/html" medium="video" duration="385" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>ACI Fabric</category>
            <category>AlgoSec Cisco ACI App</category>
            <category>Audit and Compliance</category>
            <category>cisco</category>
            <category>Cisco ACI App</category>
            <category>epgs</category>
            <category>Firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/video_medium/lesson-14-synchronized-object-video.mp4?source=podcast" type="video/mp4" length="20074623"/>
            <title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</title>
            <link>http://video.algosec.com/lesson-14-synchronized-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182061</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=21c66ed92e36977f79bf555977f026be&amp;source=podcast&amp;photo%5fid=44182061" width="625" height="352" type="text/html" medium="video" duration="399" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>network management</category>
            <category>network objects</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/video_medium/lesson-16-how-to-take-control-of-a-video.mp4?source=podcast" type="video/mp4" length="18241089"/>
            <title>Lesson 16: How to Take Control of a Firewall Migration Project</title>
            <link>http://video.algosec.com/lesson-16-how-to-take-control-of-a</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182049</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 16: How to Take Control of a Firewall Migration Project</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4cf23ef44547986e20b5679b559b1b5e&amp;source=podcast&amp;photo%5fid=44182049" width="625" height="352" type="text/html" medium="video" duration="379" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall migration</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/video_medium/lesson-15-how-to-synchronize-object-video.mp4?source=podcast" type="video/mp4" length="13414169"/>
            <title>Lesson 15: How to Synchronize Object Management with a CMDB</title>
            <link>http://video.algosec.com/lesson-15-how-to-synchronize-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182008</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 15: How to Synchronize Object Management with a CMDB</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=13a6814f2c37052c1fb387ad7ea20522&amp;source=podcast&amp;photo%5fid=44182008" width="625" height="352" type="text/html" medium="video" duration="298" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cmdb</category>
            <category>firewall changes</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network management</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/video_medium/algosec-splunk-app-for-incident-video.mp4?source=podcast" type="video/mp4" length="6902436"/>
            <title>AlgoSec Splunk App for Incident Response</title>
            <link>http://video.algosec.com/algosec-splunk-app-for-incident</link>
            <description>&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-splunk-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182052</guid>
            <pubDate>Mon, 28 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Splunk App for Incident Response</media:title>
            <media:description type="html">&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-splunk-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0c4d10edf34317e11d28581651e31def&amp;source=podcast&amp;photo%5fid=44182052" width="625" height="352" type="text/html" medium="video" duration="214" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>incident response</category>
            <category>network security</category>
            <category>security information and event management</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>SIEM</category>
            <category>Splunk</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/video_medium/best-practices-for-incorporating-video.mp4?source=podcast" type="video/mp4" length="22799886"/>
            <title>Best Practices for Incorporating Security Automation into the DevOps Lifecycle</title>
            <link>http://video.algosec.com/best-practices-for-incorporating</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the need for and the process of adjusting application connectivity throughout each stage of the DevOps lifecycle.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/best-practices-for-incorporating"&gt;&lt;img src="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182114</guid>
            <pubDate>Wed, 16 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>Best Practices for Incorporating Security Automation into the DevOps Lifecycle</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the need for and the process of adjusting application connectivity throughout each stage of the DevOps lifecycle.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/best-practices-for-incorporating"&gt;&lt;img src="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c49b17648815f3daa2a78afe31fd3ad6&amp;source=podcast&amp;photo%5fid=44182114" width="625" height="352" type="text/html" medium="video" duration="387" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Devops</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>security policy change management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/video_medium/lesson-13-zero-touch-change-video.mp4?source=podcast" type="video/mp4" length="23188821"/>
            <title>Lesson 13: Zero-Touch Change Management with Checks and Balances</title>
            <link>http://video.algosec.com/lesson-13-zero-touch-change</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182144</guid>
            <pubDate>Tue, 15 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>Lesson 13: Zero-Touch Change Management with Checks and Balances</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e254cfe4860678b02481a8ea15c6745f&amp;source=podcast&amp;photo%5fid=44182144" width="625" height="352" type="text/html" medium="video" duration="423" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network operations</category>
            <category>Network Security</category>
            <category>professor wool</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>security policy change management</category>
            <category>zero touch automation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/video_medium/cisco-aci-and-algosec-integration-1-video.mp4?source=podcast" type="video/mp4" length="8871061"/>
            <title>Cisco ACI and AlgoSec Integration (Overview and Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration-1</link>
            <description>&lt;p&gt;Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration-1"&gt;&lt;img src="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182087</guid>
            <pubDate>Mon, 31 Oct 2016 02:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (Overview and Demo)</media:title>
            <media:description type="html">&lt;p&gt;Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration-1"&gt;&lt;img src="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dcd1a526c8336ca642a67e763c8639bd&amp;source=podcast&amp;photo%5fid=44182087" width="625" height="352" type="text/html" medium="video" duration="458" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/video_medium/combining-security-groups-and-video.mp4?source=podcast" type="video/mp4" length="20330009"/>
            <title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</title>
            <link>http://video.algosec.com/combining-security-groups-and</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/combining-security-groups-and"&gt;&lt;img src="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182148</guid>
            <pubDate>Thu, 29 Sep 2016 03:00:00 GMT</pubDate>
            <media:title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/combining-security-groups-and"&gt;&lt;img src="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=92cd6dd9ebc61271a4111bbc26bec00d&amp;source=podcast&amp;photo%5fid=44182148" width="625" height="352" type="text/html" medium="video" duration="393" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>firewalls</category>
            <category>nacl</category>
            <category>network access control lists</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/video_medium/using-aws-network-acls-for-enhanced-video.mp4?source=podcast" type="video/mp4" length="21725729"/>
            <title>Using AWS Network ACLs for Enhanced Traffic Filtering</title>
            <link>http://video.algosec.com/using-aws-network-acls-for-enhanced</link>
            <description>&lt;p&gt;In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/using-aws-network-acls-for-enhanced"&gt;&lt;img src="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182088</guid>
            <pubDate>Mon, 26 Sep 2016 03:00:00 GMT</pubDate>
            <media:title>Using AWS Network ACLs for Enhanced Traffic Filtering</media:title>
            <media:description type="html">&lt;p&gt;In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/using-aws-network-acls-for-enhanced"&gt;&lt;img src="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c3e563d70dbfbdadd99c127bdbee633d&amp;source=podcast&amp;photo%5fid=44182088" width="625" height="352" type="text/html" medium="video" duration="420" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>aws</category>
            <category>aws security</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>Firewalls</category>
            <category>nacl</category>
            <category>nacls</category>
            <category>network access control lists</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/video_medium/lesson-3-best-practices-for-video.mp4?source=podcast" type="video/mp4" length="15731335"/>
            <title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the...</title>
            <link>http://video.algosec.com/lesson-3-best-practices-for</link>
            <description>&lt;p&gt;Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-best-practices-for"&gt;&lt;img src="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182196</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the...</media:title>
            <media:description type="html">&lt;p&gt;Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-best-practices-for"&gt;&lt;img src="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9215d82e7075332ada9014679d1d6b7b&amp;source=podcast&amp;photo%5fid=44182196" width="625" height="352" type="text/html" medium="video" duration="297" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>auditing</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/video_medium/lesson-1-migrating-to-nsx-video.mp4?source=podcast" type="video/mp4" length="17310417"/>
            <title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</title>
            <link>http://video.algosec.com/lesson-1-migrating-to-nsx</link>
            <description>&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182155</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</media:title>
            <media:description type="html">&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=def81240212859275a1a7e8e49361dd8&amp;source=podcast&amp;photo%5fid=44182155" width="625" height="352" type="text/html" medium="video" duration="319" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/video_medium/lesson-2-tips-on-how-to-create-video.mp4?source=podcast" type="video/mp4" length="19480685"/>
            <title>Lesson 2: Tips on How to Create Filtering Policies for NSX</title>
            <link>http://video.algosec.com/lesson-2-tips-on-how-to-create</link>
            <description>&lt;p&gt;Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-tips-on-how-to-create"&gt;&lt;img src="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182098</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: Tips on How to Create Filtering Policies for NSX</media:title>
            <media:description type="html">&lt;p&gt;Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-tips-on-how-to-create"&gt;&lt;img src="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ce089eaa3bad2d6123444b73d7e938e8&amp;source=podcast&amp;photo%5fid=44182098" width="625" height="352" type="text/html" medium="video" duration="381" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/video_medium/lesson-4-using-next-generation-video.mp4?source=podcast" type="video/mp4" length="17536828"/>
            <title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</title>
            <link>http://video.algosec.com/lesson-4-using-next-generation</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182238</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dab3bab204d4a15a112afe579c826e2d&amp;source=podcast&amp;photo%5fid=44182238" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>cyber threat detection</category>
            <category>cyber threat prevention</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Next-Generation Firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/video_medium/lesson-3-managing-your-security-video.mp4?source=podcast" type="video/mp4" length="16089357"/>
            <title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</title>
            <link>http://video.algosec.com/lesson-3-managing-your-security</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182171</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b9e12ad72654514540985c604cfa8e53&amp;source=podcast&amp;photo%5fid=44182171" width="625" height="352" type="text/html" medium="video" duration="351" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>next generation firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/video_medium/lesson-12-managing-your-security-video.mp4?source=podcast" type="video/mp4" length="17164651"/>
            <title>Lesson 12: Managing Your Security Policy for Disaster Recovery</title>
            <link>http://video.algosec.com/lesson-12-managing-your-security</link>
            <description>&lt;p&gt;In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-12-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182154</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 12: Managing Your Security Policy for Disaster Recovery</media:title>
            <media:description type="html">&lt;p&gt;In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-12-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ab2e958faa7e5fa8581da3380b0a834&amp;source=podcast&amp;photo%5fid=44182154" width="625" height="352" type="text/html" medium="video" duration="318" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Disaster Recovery</category>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/video_medium/protect-outbound-traffic-in-an-aws-video.mp4?source=podcast" type="video/mp4" length="14118781"/>
            <title>Protect Outbound Traffic in an AWS Hybrid Environment</title>
            <link>http://video.algosec.com/protect-outbound-traffic-in-an-aws</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 2&lt;/p&gt;
&lt;p&gt;Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/protect-outbound-traffic-in-an-aws"&gt;&lt;img src="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182267</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>Protect Outbound Traffic in an AWS Hybrid Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 2&lt;/p&gt;
&lt;p&gt;Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/protect-outbound-traffic-in-an-aws"&gt;&lt;img src="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=03b144c5631b7e1579c2666d1136adab&amp;source=podcast&amp;photo%5fid=44182267" width="625" height="352" type="text/html" medium="video" duration="263" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AWS</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/video_medium/the-fundamentals-of-aws-security-video.mp4?source=podcast" type="video/mp4" length="17302266"/>
            <title>The Fundamentals of AWS Security Groups</title>
            <link>http://video.algosec.com/the-fundamentals-of-aws-security</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides an overview of Amazon Web Services (AWS) Security Groups and highlights some of the differences between Security Groups and traditional firewalls. The lesson continues by explaining some of the unique features of AWS and the challenges and benefits of being able to apply multiple Security Groups to a single instance.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-fundamentals-of-aws-security"&gt;&lt;img src="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182199</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>The Fundamentals of AWS Security Groups</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides an overview of Amazon Web Services (AWS) Security Groups and highlights some of the differences between Security Groups and traditional firewalls. The lesson continues by explaining some of the unique features of AWS and the challenges and benefits of being able to apply multiple Security Groups to a single instance.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-fundamentals-of-aws-security"&gt;&lt;img src="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e55f13e53dac1f9b30c7fc1ff4de07da&amp;source=podcast&amp;photo%5fid=44182199" width="625" height="352" type="text/html" medium="video" duration="298" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Amazon Web Services (Website)</category>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall policy management</category>
            <category>firewalls</category>
            <category>hybrid cloud</category>
            <category>hybrid environment</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/video_medium/change-management-auditing-and-video.mp4?source=podcast" type="video/mp4" length="22440983"/>
            <title>Change Management, Auditing and Compliance in an AWS Hybrid Environment</title>
            <link>http://video.algosec.com/change-management-auditing-and</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 3&lt;/p&gt;
&lt;p&gt;Once you start using AWS for production applications, auditing and compliance considerations come into play, especially if these applications are processing data that is subject to regulations such as PCI, HIPAA, SOX etc. In this lesson, Professor Wool reviews AWS’s own auditing tools, CloudWatch and CloudTrail, which are useful for cloud-based applications. However if you are running a hybrid data center, you will likely need to augment these tools with solutions that can provide reporting, visibility and change monitoring across the entire environment. Professor Wool provides some recommendations for key features and functionally you’ll need to ensure compliance, and tips on what the auditors are looking for.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/change-management-auditing-and"&gt;&lt;img src="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182182</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>Change Management, Auditing and Compliance in an AWS Hybrid Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 3&lt;/p&gt;
&lt;p&gt;Once you start using AWS for production applications, auditing and compliance considerations come into play, especially if these applications are processing data that is subject to regulations such as PCI, HIPAA, SOX etc. In this lesson, Professor Wool reviews AWS’s own auditing tools, CloudWatch and CloudTrail, which are useful for cloud-based applications. However if you are running a hybrid data center, you will likely need to augment these tools with solutions that can provide reporting, visibility and change monitoring across the entire environment. Professor Wool provides some recommendations for key features and functionally you’ll need to ensure compliance, and tips on what the auditors are looking for.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/change-management-auditing-and"&gt;&lt;img src="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0cea2f1b49838b5d93d68f90d8d099e&amp;source=podcast&amp;photo%5fid=44182182" width="625" height="352" type="text/html" medium="video" duration="382" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>hipaa</category>
            <category>hybrid cloud</category>
            <category>hybrid environments</category>
            <category>network security</category>
            <category>pci</category>
            <category>prof wool</category>
            <category>Regulatory Compliance</category>
            <category>SDN</category>
            <category>sox</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/video_medium/algosec-case-study-bmfbovespa-video.mp4?source=podcast" type="video/mp4" length="15258261"/>
            <title>AlgoSec Case Study: BM&amp;FBOVESPA (English)</title>
            <link>http://video.algosec.com/algosec-case-study-bmfbovespa</link>
            <description>&lt;p&gt;Hear Wellington Vita, Information Security Manager, explain how AlgoSec helps BM&amp;FBOVESPA maintain a secure, compliant trading environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-case-study-bmfbovespa"&gt;&lt;img src="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182218</guid>
            <pubDate>Wed, 01 Apr 2015 03:00:00 GMT</pubDate>
            <media:title>AlgoSec Case Study: BM&amp;FBOVESPA (English)</media:title>
            <media:description type="html">&lt;p&gt;Hear Wellington Vita, Information Security Manager, explain how AlgoSec helps BM&amp;FBOVESPA maintain a secure, compliant trading environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-case-study-bmfbovespa"&gt;&lt;img src="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=da4aa7916a2a3d8d1db6908cd39cc56f&amp;source=podcast&amp;photo%5fid=44182218" width="625" height="469" type="text/html" medium="video" duration="281" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>AlgoSec (Business Operation)</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security policy</category>
            <category>security software</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/video_medium/lesson-9-how-to-structure-network-video.mp4?source=podcast" type="video/mp4" length="20686665"/>
            <title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</title>
            <link>http://video.algosec.com/lesson-9-how-to-structure-network</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182306</guid>
            <pubDate>Mon, 08 Dec 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f008f7c1f97aa3aa33a02182c9c550d8&amp;source=podcast&amp;photo%5fid=44182306" width="625" height="352" type="text/html" medium="video" duration="334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>security software</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/video_medium/lesson-8-nat-considerations-when-video.mp4?source=podcast" type="video/mp4" length="22584967"/>
            <title>Lesson 8: NAT Considerations When Managing Your Security Policy</title>
            <link>http://video.algosec.com/lesson-8-nat-considerations-when</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 8&lt;br /&gt;
A business owner makes a simple change request to allow traffic to a new application. You now need to figure out the right firewall rules to change. This should be pretty simple… but what if you’re using NAT (Network Address Translation) in your environment? In this lesson, Professor Wool explains some key principles of NATing and why it’s critical to understand your NAT policy in order to identify the right paths for network traffic, which firewalls rules really need to be modified, and how to write your security policy correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-8-nat-considerations-when"&gt;&lt;img src="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182234</guid>
            <pubDate>Tue, 11 Nov 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 8: NAT Considerations When Managing Your Security Policy</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 8&lt;br /&gt;
A business owner makes a simple change request to allow traffic to a new application. You now need to figure out the right firewall rules to change. This should be pretty simple… but what if you’re using NAT (Network Address Translation) in your environment? In this lesson, Professor Wool explains some key principles of NATing and why it’s critical to understand your NAT policy in order to identify the right paths for network traffic, which firewalls rules really need to be modified, and how to write your security policy correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-8-nat-considerations-when"&gt;&lt;img src="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c4e501a5254536aa42ad741dacb80d20&amp;source=podcast&amp;photo%5fid=44182234" width="625" height="352" type="text/html" medium="video" duration="397" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network address translation</category>
            <category>Network Security</category>
            <category>network security policy</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/video_medium/algosec-overview-managing-security-video.mp4?source=podcast" type="video/mp4" length="6679131"/>
            <title>AlgoSec Overview: Managing Security Policies in Your Data Center</title>
            <link>http://video.algosec.com/algosec-overview-managing-security</link>
            <description>&lt;p&gt;As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-overview-managing-security"&gt;&lt;img src="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182317</guid>
            <pubDate>Wed, 29 Oct 2014 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Overview: Managing Security Policies in Your Data Center</media:title>
            <media:description type="html">&lt;p&gt;As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-overview-managing-security"&gt;&lt;img src="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c689444345c25371b1dc1dc245a12deb&amp;source=podcast&amp;photo%5fid=44182317" width="625" height="352" type="text/html" medium="video" duration="132" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec businessflor</category>
            <category>algosec fireflow</category>
            <category>AlgoSec Security Policy Management</category>
            <category>Audit and Compliance</category>
            <category>Data Center</category>
            <category>Datacenters</category>
            <category>firewall auditing</category>
            <category>Firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>security</category>
            <category>Security Policy</category>
            <category>virtual datacenter</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543319/54117893/cbceedb300483c1bcd32b02036cdd14f/video_medium/segmenting-your-network-for-1-video.mp4?source=podcast" type="video/mp4" length="76178104"/>
            <title>Segmenting your Network for Security - The Good, the Bad, and the Ugly</title>
            <link>http://video.algosec.com/segmenting-your-network-for-1</link>
            <description>&lt;p&gt;Segmenting your network is one of the foundations of a sound security strategy. It limits the movements of an attacker, and therefore limits the overall impact of a security breach.&lt;br&gt;
So why is it that most organizations struggle when it comes to defining, implementing and enforcing effective network segmentation?&lt;br&gt;
In this webcast, AlgoSec and expert penetration tester Mark Wolfgang examine common segmentation mistakes and review best practices for defining and enforcing effective network segmentation.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/segmenting-your-network-for-1"&gt;&lt;img src="http://video.algosec.com/49543319/54117893/cbceedb300483c1bcd32b02036cdd14f/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54117893</guid>
            <pubDate>Wed, 16 Jul 2014 00:00:00 GMT</pubDate>
            <media:title>Segmenting your Network for Security - The Good, the Bad, and the Ugly</media:title>
            <media:description type="html">&lt;p&gt;Segmenting your network is one of the foundations of a sound security strategy. It limits the movements of an attacker, and therefore limits the overall impact of a security breach.&lt;br&gt;
So why is it that most organizations struggle when it comes to defining, implementing and enforcing effective network segmentation?&lt;br&gt;
In this webcast, AlgoSec and expert penetration tester Mark Wolfgang examine common segmentation mistakes and review best practices for defining and enforcing effective network segmentation.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/segmenting-your-network-for-1"&gt;&lt;img src="http://video.algosec.com/49543319/54117893/cbceedb300483c1bcd32b02036cdd14f/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cbceedb300483c1bcd32b02036cdd14f&amp;source=podcast&amp;photo%5fid=54117893" width="625" height="469" type="text/html" medium="video" duration="3706" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543319/54117893/cbceedb300483c1bcd32b02036cdd14f/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>Computer Network (Industry)</category>
            <category>Computer Security (Software Genre)</category>
            <category>firewall management</category>
            <category>network security</category>
            <category>Network Security (Literature Subject)</category>
            <category>Security Policy</category>
            <category>segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/video_medium/lesson-3-using-object-naming-video.mp4?source=podcast" type="video/mp4" length="17490787"/>
            <title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</title>
            <link>http://video.algosec.com/lesson-3-using-object-naming</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182290</guid>
            <pubDate>Thu, 10 Apr 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4797ebe9fab50b0c575eb5e0b6dac4eb&amp;source=podcast&amp;photo%5fid=44182290" width="625" height="352" type="text/html" medium="video" duration="323" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>AlgoSec</category>
            <category>firewall management</category>
            <category>firewall object naming</category>
            <category>firewall objects</category>
            <category>firewall policy management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>object naming conventions</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/video_medium/tips-for-secure-decommissioning-of-video.mp4?source=podcast" type="video/mp4" length="30751680"/>
            <title>Tips for Secure Decommissioning of Business Applications</title>
            <link>http://video.algosec.com/tips-for-secure-decommissioning-of</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-secure-decommissioning-of"&gt;&lt;img src="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182331</guid>
            <pubDate>Fri, 14 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Tips for Secure Decommissioning of Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-secure-decommissioning-of"&gt;&lt;img src="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d3adefaf0577207562515ea8e3018ec9&amp;source=podcast&amp;photo%5fid=44182331" width="625" height="352" type="text/html" medium="video" duration="499" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>applications</category>
            <category>decommission</category>
            <category>decommissioning</category>
            <category>firewall management</category>
            <category>firewall operations management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network operations</category>
            <category>Professor Wool</category>
            <category>secure</category>
            <category>security</category>
            <category>security change management</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/video_medium/managing-the-security-policy-in-video.mp4?source=podcast" type="video/mp4" length="10604809"/>
            <title>Managing the Security Policy in Your Data Center and Network</title>
            <link>http://video.algosec.com/managing-the-security-policy-in</link>
            <description>&lt;p&gt;Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-the-security-policy-in"&gt;&lt;img src="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182430</guid>
            <pubDate>Thu, 06 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Managing the Security Policy in Your Data Center and Network</media:title>
            <media:description type="html">&lt;p&gt;Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-the-security-policy-in"&gt;&lt;img src="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3980f51228641374a2c44937715ee7cd&amp;source=podcast&amp;photo%5fid=44182430" width="625" height="352" type="text/html" medium="video" duration="142" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity management</category>
            <category>Audit and Compliance</category>
            <category>data center</category>
            <category>firewall audit</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security change management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/video_medium/mitigating-risk-in-your-firewall-video.mp4?source=podcast" type="video/mp4" length="8306240"/>
            <title>Mitigating Risk in Your Firewall Policy</title>
            <link>http://video.algosec.com/mitigating-risk-in-your-firewall</link>
            <description>&lt;p&gt;&lt;a href="http://www.algosec.com/"&gt;http://www.algosec.com/&lt;/a&gt; - AlgoSec Firewall Analyzer helps you understand the level of risk in your network security policy, providing complete visibility of your security posture and enabling you to mitigate risk across traditional and next-generation firewalls as well as routers. Firewall Analyzer analyzes your policy against the broadest database, which can also be customized to address your corporate policies, of more than 120 industry best practices, which includes application-based risks.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/mitigating-risk-in-your-firewall"&gt;&lt;img src="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182584</guid>
            <pubDate>Fri, 21 Dec 2012 02:00:00 GMT</pubDate>
            <media:title>Mitigating Risk in Your Firewall Policy</media:title>
            <media:description type="html">&lt;p&gt;&lt;a href="http://www.algosec.com/"&gt;http://www.algosec.com/&lt;/a&gt; - AlgoSec Firewall Analyzer helps you understand the level of risk in your network security policy, providing complete visibility of your security posture and enabling you to mitigate risk across traditional and next-generation firewalls as well as routers. Firewall Analyzer analyzes your policy against the broadest database, which can also be customized to address your corporate policies, of more than 120 industry best practices, which includes application-based risks.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/mitigating-risk-in-your-firewall"&gt;&lt;img src="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e810eb26140987749e5de78ef9aa7b26&amp;source=podcast&amp;photo%5fid=44182584" width="625" height="352" type="text/html" medium="video" duration="221" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall analyzer</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>mitigate risk</category>
            <category>network risk</category>
            <category>network security policy</category>
            <category>next-generation firewalls</category>
            <category>policy analysis</category>
            <category>risk assessment</category>
            <category>routers</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/video_medium/lesson-4-tips-for-firewall-rule-video.mp4?source=podcast" type="video/mp4" length="23075092"/>
            <title>Lesson 4: Tips for Firewall Rule Recertification</title>
            <link>http://video.algosec.com/lesson-4-tips-for-firewall-rule</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 4&lt;br /&gt;
In this lesson, Professor Wool examines some tips for including firewall rule recertification as part of your change management process, including questions you should be asking and be able to answer as well as guidance on how to effectively recertify firewall rules.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-tips-for-firewall-rule"&gt;&lt;img src="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182607</guid>
            <pubDate>Thu, 18 Oct 2012 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Tips for Firewall Rule Recertification</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 4&lt;br /&gt;
In this lesson, Professor Wool examines some tips for including firewall rule recertification as part of your change management process, including questions you should be asking and be able to answer as well as guidance on how to effectively recertify firewall rules.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-tips-for-firewall-rule"&gt;&lt;img src="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dc89d0b912300da27e034e544e2dc875&amp;source=podcast&amp;photo%5fid=44182607" width="625" height="352" type="text/html" medium="video" duration="395" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>change management</category>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewall rule</category>
            <category>firewall rule recertification</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>rule recertification</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/video_medium/lesson-6-analyzing-routers-as-part-video.mp4?source=podcast" type="video/mp4" length="20495387"/>
            <title>Lesson 6: Analyzing Routers as Part of Your Security Policy</title>
            <link>http://video.algosec.com/lesson-6-analyzing-routers-as-part</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 6&lt;br /&gt;
In this lesson, Professor Wool examines some of the challenges when it comes to managing routers and access control lists (ACLs) and provides recommendations for including routers as part of your overall security policy with tips on change management, auditing and ACL optimization.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-analyzing-routers-as-part"&gt;&lt;img src="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182766</guid>
            <pubDate>Tue, 25 Sep 2012 02:00:00 GMT</pubDate>
            <media:title>Lesson 6: Analyzing Routers as Part of Your Security Policy</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 6&lt;br /&gt;
In this lesson, Professor Wool examines some of the challenges when it comes to managing routers and access control lists (ACLs) and provides recommendations for including routers as part of your overall security policy with tips on change management, auditing and ACL optimization.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-analyzing-routers-as-part"&gt;&lt;img src="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2f024d96dd0d23aa74a2f8fa6a4ac0c5&amp;source=podcast&amp;photo%5fid=44182766" width="625" height="352" type="text/html" medium="video" duration="289" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>access control lists</category>
            <category>ACLs</category>
            <category>Audit and Compliance</category>
            <category>fire wall change management</category>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewall management software</category>
            <category>firewall management tools</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>router ACLs</category>
            <category>routers</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/video_medium/lesson-1-examining-the-most-common-video.mp4?source=podcast" type="video/mp4" length="26405122"/>
            <title>Lesson 1: Examining the Most Common Firewall Misconfigurations</title>
            <link>http://video.algosec.com/lesson-1-examining-the-most-common</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool discusses his research on different firewall misconfigurations and provides tips for preventing the most common risks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-examining-the-most-common"&gt;&lt;img src="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182624</guid>
            <pubDate>Mon, 17 Sep 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Examining the Most Common Firewall Misconfigurations</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool discusses his research on different firewall misconfigurations and provides tips for preventing the most common risks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-examining-the-most-common"&gt;&lt;img src="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0b0094e9616d6c9f528a648df323567&amp;source=podcast&amp;photo%5fid=44182624" width="625" height="352" type="text/html" medium="video" duration="389" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall management software</category>
            <category>firewall misconfigurations</category>
            <category>firewall risk</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/video_medium/new-customer-collection-video-video.mp4?source=podcast" type="video/mp4" length="8022600"/>
            <title>New Customer Collection Video</title>
            <link>http://video.algosec.com/new-customer-collection-video</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-customer-collection-video"&gt;&lt;img src="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182680</guid>
            <pubDate>Tue, 07 Aug 2012 03:00:00 GMT</pubDate>
            <media:title>New Customer Collection Video</media:title>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-customer-collection-video"&gt;&lt;img src="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=956a98b36cc3219b003c721a696b5053&amp;source=podcast&amp;photo%5fid=44182680" width="625" height="469" type="text/html" medium="video" duration="166" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>fire wall change management</category>
            <category>Firewall Management</category>
            <category>firewall management software</category>
            <category>firewall management tools</category>
            <category>Firewalls</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/video_medium/lesson-2-automating-the-firewall-video.mp4?source=podcast" type="video/mp4" length="30272598"/>
            <title>Lesson 2: Automating the Firewall Change Control Process</title>
            <link>http://video.algosec.com/lesson-2-automating-the-firewall</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-automating-the-firewall"&gt;&lt;img src="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182690</guid>
            <pubDate>Thu, 28 Jun 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: Automating the Firewall Change Control Process</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-automating-the-firewall"&gt;&lt;img src="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=da5caa63acf663010badf236bea69325&amp;source=podcast&amp;photo%5fid=44182690" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>automate firewall changes</category>
            <category>firewall change control</category>
            <category>firewall change workflow</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/video_medium/lesson-2-ngfws-whitelisting-video.mp4?source=podcast" type="video/mp4" length="40617652"/>
            <title>Lesson 2: NGFWs - Whitelisting &amp; Blacklisting Policy Considerations</title>
            <link>http://video.algosec.com/lesson-2-ngfws-whitelisting</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the pros and cons of whitelisting and blacklisting policies and offers some recommendations on policy considerations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-ngfws-whitelisting"&gt;&lt;img src="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182711</guid>
            <pubDate>Wed, 06 Jun 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: NGFWs - Whitelisting &amp; Blacklisting Policy Considerations</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the pros and cons of whitelisting and blacklisting policies and offers some recommendations on policy considerations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-ngfws-whitelisting"&gt;&lt;img src="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=aa2c6bbe57878bf5156d1ea06e0353f3&amp;source=podcast&amp;photo%5fid=44182711" width="625" height="352" type="text/html" medium="video" duration="635" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>blacklisting</category>
            <category>firewall management</category>
            <category>firewall policies</category>
            <category>firewalls</category>
            <category>Network Security</category>
            <category>next-generation firewalls</category>
            <category>policy</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>whitelisting</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/video_medium/lesson-1-next-generation-firewalls-video.mp4?source=podcast" type="video/mp4" length="31036106"/>
            <title>Lesson 1: Next-Generation Firewalls: Overview of Application and User-Aware...</title>
            <link>http://video.algosec.com/lesson-1-next-generation-firewalls</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 1&lt;br&gt;
In this lesson, Professor Wool examines next-generation firewalls and the granular capabilities they provide for improved control over applications and users.
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-next-generation-firewalls"&gt;&lt;img src="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182727</guid>
            <pubDate>Mon, 21 May 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Next-Generation Firewalls: Overview of Application and User-Aware...</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 1&lt;br&gt;
In this lesson, Professor Wool examines next-generation firewalls and the granular capabilities they provide for improved control over applications and users.
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-next-generation-firewalls"&gt;&lt;img src="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ac281d49577cafce8bc246ba69434e3&amp;source=podcast&amp;photo%5fid=44182727" width="625" height="352" type="text/html" medium="video" duration="544" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewalls</category>
            <category>next-generation firewalls</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>Technology</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/video_medium/lesson-5-managing-firewall-policies-video.mp4?source=podcast" type="video/mp4" length="19797888"/>
            <title>Lesson 5: Managing Firewall Policies in a Disappearing Network Perimeter</title>
            <link>http://video.algosec.com/lesson-5-managing-firewall-policies</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 5&lt;br /&gt;
In this lesson, Professor Wool examines how virtualization, outsourcing of data centers, worker mobility and the consumerization of IT have all played a role in dissolving the network perimeter and what you can do to regain control.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-managing-firewall-policies"&gt;&lt;img src="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182901</guid>
            <pubDate>Mon, 07 May 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 5: Managing Firewall Policies in a Disappearing Network Perimeter</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 5&lt;br /&gt;
In this lesson, Professor Wool examines how virtualization, outsourcing of data centers, worker mobility and the consumerization of IT have all played a role in dissolving the network perimeter and what you can do to regain control.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-managing-firewall-policies"&gt;&lt;img src="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4e056f684aafa0ce814606197c80924b&amp;source=podcast&amp;photo%5fid=44182901" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>firewall management</category>
            <category>firewall policies</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>Software Technology Security</category>
            <category>virtualization</category>
        </item>
    </channel>
</rss>
