<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/rss/tag/data center"/>
        <atom:link rel="next" href="https://video.algosec.com/rss/tag/data center?tag=data+center&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/video_medium/build-and-enforce-defense-in-depth-video.mp4?source=podcast" type="video/mp4" length="88746932"/>
            <title>Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</title>
            <link>http://video.algosec.com/build-and-enforce-defense-in-depth</link>
            <description>&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;/b&gt;
&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;
&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;
&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;
• Understand your business applications to create your microsegmentation policy&lt;br&gt;
• Validate your micro-segmentation policy is accurate&lt;br&gt;
• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;
• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;
• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/build-and-enforce-defense-in-depth"&gt;&lt;img src="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63855367</guid>
            <pubDate>Sun, 28 Nov 2021 15:39:29 GMT</pubDate>
            <media:title>Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;/b&gt;
&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;
&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;
&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;
• Understand your business applications to create your microsegmentation policy&lt;br&gt;
• Validate your micro-segmentation policy is accurate&lt;br&gt;
• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;
• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;
• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/build-and-enforce-defense-in-depth"&gt;&lt;img src="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=95152215d0dafd06be978cd6f5cb488d&amp;source=podcast&amp;photo%5fid=63855367" width="625" height="352" type="text/html" medium="video" duration="3657" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/video_medium/cisco-meraki-visibility-risk-video.mp4?source=podcast" type="video/mp4" length="8015397"/>
            <title>Cisco Meraki – Visibility, Risk &amp; Compliance Demo</title>
            <link>http://video.algosec.com/cisco-meraki-visibility-risk</link>
            <description>&lt;p&gt;Product demo - Discover how you can gain visibility, risk and compliance for Cisco Meraki.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-meraki-visibility-risk"&gt;&lt;img src="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/67772640</guid>
            <pubDate>Tue, 16 Mar 2021 19:52:09 GMT</pubDate>
            <media:title>Cisco Meraki – Visibility, Risk &amp; Compliance Demo</media:title>
            <media:description type="html">&lt;p&gt;Product demo - Discover how you can gain visibility, risk and compliance for Cisco Meraki.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-meraki-visibility-risk"&gt;&lt;img src="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=eb8d96ec23be780dc19e998830b76c13&amp;source=podcast&amp;photo%5fid=67772640" width="625" height="352" type="text/html" medium="video" duration="231" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/standard/download-17-thumbnail.jpg" width="75" height=""/>
            <category>Auditing and Compliance</category>
            <category>data center</category>
            <category>information security</category>
            <category>network security</category>
            <category>Risk Analysis</category>
            <category>SD-WAN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968556/67772645/45eafb9f9aa239ba4e0c03c278b670ba/video_medium/manage-your-network-security-with-video.mp4?source=podcast" type="video/mp4" length="5560547"/>
            <title>Manage your network security with AlgoSec &amp; VMWare</title>
            <link>http://video.algosec.com/manage-your-network-security-with</link>
            <description>&lt;p&gt;Watch this demo and see how you can tighten your security and get increased visibility with AlgoSec and VMWare.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/manage-your-network-security-with"&gt;&lt;img src="http://video.algosec.com/64968556/67772645/45eafb9f9aa239ba4e0c03c278b670ba/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/67772645</guid>
            <pubDate>Tue, 16 Mar 2021 19:50:24 GMT</pubDate>
            <media:title>Manage your network security with AlgoSec &amp; VMWare</media:title>
            <media:description type="html">&lt;p&gt;Watch this demo and see how you can tighten your security and get increased visibility with AlgoSec and VMWare.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/manage-your-network-security-with"&gt;&lt;img src="http://video.algosec.com/64968556/67772645/45eafb9f9aa239ba4e0c03c278b670ba/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=45eafb9f9aa239ba4e0c03c278b670ba&amp;source=podcast&amp;photo%5fid=67772645" width="625" height="352" type="text/html" medium="video" duration="290" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968556/67772645/45eafb9f9aa239ba4e0c03c278b670ba/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Auditing and Compliance</category>
            <category>data center</category>
            <category>information security</category>
            <category>risk analysis</category>
            <category>Security Policy</category>
            <category>vmware nsx</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/video_medium/webcast-build-and-enforce-defense-video.mp4?source=podcast" type="video/mp4" length="88746932"/>
            <title>Webcast: Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</title>
            <link>http://video.algosec.com/webcast-build-and-enforce-defense</link>
            <description>&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;• Understand your business applications to create your microsegmentation policy&lt;br&gt;• Validate your micro-segmentation policy is accurate&lt;br&gt;• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/webcast-build-and-enforce-defense"&gt;&lt;img src="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/64277400</guid>
            <pubDate>Wed, 23 Sep 2020 15:45:44 GMT</pubDate>
            <media:title>Webcast: Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;• Understand your business applications to create your microsegmentation policy&lt;br&gt;• Validate your micro-segmentation policy is accurate&lt;br&gt;• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/webcast-build-and-enforce-defense"&gt;&lt;img src="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c9c6f0f278f999d541c1a492c84e245c&amp;source=podcast&amp;photo%5fid=64277400" width="625" height="352" type="text/html" medium="video" duration="3657" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>data center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/video_medium/managing-application-connectivity-video.mp4?source=podcast" type="video/mp4" length="63667594"/>
            <title>Managing Application Connectivity in the World of Network Security</title>
            <link>http://video.algosec.com/managing-application-connectivity</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Asher Benbenisty, Director of Product Marketing |&lt;/b&gt; Feb 27 2018&lt;br&gt;&lt;/p&gt;&lt;p&gt;The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.&amp;nbsp;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;&lt;br&gt;During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, discusses how taking an application-centric approach to security policy management will improve both your security and operational efficiency.&amp;nbsp;&lt;br&gt;&lt;br&gt;Learn how to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Gain insight into your company’s security policy management maturity level&lt;/li&gt;&lt;li&gt;Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows&lt;/li&gt;&lt;li&gt;Identify security risks across your enterprise network and prioritize them based on business criticality&lt;/li&gt;&lt;li&gt;Securely migrate business application connectivity and security devices to a new data center&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-application-connectivity"&gt;&lt;img src="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49721671</guid>
            <pubDate>Wed, 18 Mar 2020 14:05:32 GMT</pubDate>
            <media:title>Managing Application Connectivity in the World of Network Security</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Asher Benbenisty, Director of Product Marketing |&lt;/b&gt; Feb 27 2018&lt;br&gt;&lt;/p&gt;&lt;p&gt;The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.&amp;nbsp;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;&lt;br&gt;During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, discusses how taking an application-centric approach to security policy management will improve both your security and operational efficiency.&amp;nbsp;&lt;br&gt;&lt;br&gt;Learn how to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Gain insight into your company’s security policy management maturity level&lt;/li&gt;&lt;li&gt;Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows&lt;/li&gt;&lt;li&gt;Identify security risks across your enterprise network and prioritize them based on business criticality&lt;/li&gt;&lt;li&gt;Securely migrate business application connectivity and security devices to a new data center&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-application-connectivity"&gt;&lt;img src="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=272968807dfb09156001e7c88b48053c&amp;source=podcast&amp;photo%5fid=49721671" width="625" height="352" type="text/html" medium="video" duration="2192" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>mapping network flows</category>
            <category>network security</category>
            <category>Security Automation</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/video_medium/managing-effective-security-video.mp4?source=podcast" type="video/mp4" length="86148630"/>
            <title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</title>
            <link>http://video.algosec.com/managing-effective-security</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-effective-security"&gt;&lt;img src="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615359</guid>
            <pubDate>Wed, 18 Mar 2020 14:04:50 GMT</pubDate>
            <media:title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-effective-security"&gt;&lt;img src="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a61b1227849251e32a2981784acbc6a7&amp;source=podcast&amp;photo%5fid=49615359" width="625" height="352" type="text/html" medium="video" duration="2630" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>cloud security</category>
            <category>compliance</category>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>hybrid environment</category>
            <category>IDC</category>
            <category>migrating applications</category>
            <category>multi-cloud</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/52937927/cd360a9cbec5eb3df886e4d8bb75b927/video_medium/introduction-to-micro-segmentation-video.mp4?source=podcast" type="video/mp4" length="29731433"/>
            <title>Introduction to Micro-segmentation</title>
            <link>http://video.algosec.com/introduction-to-micro-segmentation</link>
            <description>&lt;p&gt;&lt;p&gt;In lesson 1, Prof. Wool introduces
micro-segmentation: reasons for segmenting the data center, challenges, required
steps when deploying a micro-segmentation strategy, and how to future-proof your
policies&lt;/p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/introduction-to-micro-segmentation"&gt;&lt;img src="http://video.algosec.com/49543330/52937927/cd360a9cbec5eb3df886e4d8bb75b927/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52937927</guid>
            <pubDate>Thu, 13 Jun 2019 16:46:15 GMT</pubDate>
            <media:title>Introduction to Micro-segmentation</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;In lesson 1, Prof. Wool introduces
micro-segmentation: reasons for segmenting the data center, challenges, required
steps when deploying a micro-segmentation strategy, and how to future-proof your
policies&lt;/p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/introduction-to-micro-segmentation"&gt;&lt;img src="http://video.algosec.com/49543330/52937927/cd360a9cbec5eb3df886e4d8bb75b927/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cd360a9cbec5eb3df886e4d8bb75b927&amp;source=podcast&amp;photo%5fid=52937927" width="625" height="352" type="text/html" medium="video" duration="460" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/52937927/cd360a9cbec5eb3df886e4d8bb75b927/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/video_medium/microsegmentation-mapping-video.mp4?source=podcast" type="video/mp4" length="13465324"/>
            <title>Microsegmentation - Mapping Existing Applications</title>
            <link>http://video.algosec.com/microsegmentation-mapping</link>
            <description>&lt;p&gt;&lt;p&gt;Watch Prof. Wool as he shares tips on how to
prepare for network segmentation by identifying the segment borders&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-mapping"&gt;&lt;img src="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52938308</guid>
            <pubDate>Thu, 13 Jun 2019 16:46:05 GMT</pubDate>
            <media:title>Microsegmentation - Mapping Existing Applications</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Watch Prof. Wool as he shares tips on how to
prepare for network segmentation by identifying the segment borders&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-mapping"&gt;&lt;img src="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=6c21a30be19567d6b5e00c464942fbeb&amp;source=podcast&amp;photo%5fid=52938308" width="625" height="352" type="text/html" medium="video" duration="252" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543322/52938407/cb103debc3b39af2eb202015d5616b02/video_medium/microsegmentation-defining-logical-video.mp4?source=podcast" type="video/mp4" length="32309746"/>
            <title>Microsegmentation Defining Logical Segments</title>
            <link>http://video.algosec.com/microsegmentation-defining-logical</link>
            <description>&lt;p&gt;In lesson 3, Prof. Wool covers how to define
logical segments within a micro-segmentation project&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-defining-logical"&gt;&lt;img src="http://video.algosec.com/49543322/52938407/cb103debc3b39af2eb202015d5616b02/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52938407</guid>
            <pubDate>Thu, 13 Jun 2019 16:45:53 GMT</pubDate>
            <media:title>Microsegmentation Defining Logical Segments</media:title>
            <media:description type="html">&lt;p&gt;In lesson 3, Prof. Wool covers how to define
logical segments within a micro-segmentation project&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-defining-logical"&gt;&lt;img src="http://video.algosec.com/49543322/52938407/cb103debc3b39af2eb202015d5616b02/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cb103debc3b39af2eb202015d5616b02&amp;source=podcast&amp;photo%5fid=52938407" width="625" height="352" type="text/html" medium="video" duration="459" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543322/52938407/cb103debc3b39af2eb202015d5616b02/standard/download-6-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543318/52938483/8b6d66465a495f960523b89e77416a02/video_medium/microsegmentation-generating-a-video.mp4?source=podcast" type="video/mp4" length="22944465"/>
            <title>Microsegmentation - Generating a Filtering Policy</title>
            <link>http://video.algosec.com/microsegmentation-generating-a</link>
            <description>&lt;p&gt;In lesson 4, Prof. Wool demonstrates how to
generate a filtering policy during a micro-segmentation project&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-generating-a"&gt;&lt;img src="http://video.algosec.com/49543318/52938483/8b6d66465a495f960523b89e77416a02/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52938483</guid>
            <pubDate>Thu, 13 Jun 2019 16:45:39 GMT</pubDate>
            <media:title>Microsegmentation - Generating a Filtering Policy</media:title>
            <media:description type="html">&lt;p&gt;In lesson 4, Prof. Wool demonstrates how to
generate a filtering policy during a micro-segmentation project&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-generating-a"&gt;&lt;img src="http://video.algosec.com/49543318/52938483/8b6d66465a495f960523b89e77416a02/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=8b6d66465a495f960523b89e77416a02&amp;source=podcast&amp;photo%5fid=52938483" width="625" height="352" type="text/html" medium="video" duration="407" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543318/52938483/8b6d66465a495f960523b89e77416a02/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/52938534/8f5caca0feb36d3182e80f341525099d/video_medium/microsegmentation-ongoing-video.mp4?source=podcast" type="video/mp4" length="24837274"/>
            <title>Microsegmentation - Ongoing Maintenance</title>
            <link>http://video.algosec.com/microsegmentation-ongoing</link>
            <description>&lt;p&gt;&lt;p&gt;In lesson 5, Prof. Wool video covers the steps needed to take to ensure ongoing maintenance of your data center upon completion of a micro-segmentation
project&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-ongoing"&gt;&lt;img src="http://video.algosec.com/49543315/52938534/8f5caca0feb36d3182e80f341525099d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/52938534</guid>
            <pubDate>Thu, 13 Jun 2019 15:31:12 GMT</pubDate>
            <media:title>Microsegmentation - Ongoing Maintenance</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;In lesson 5, Prof. Wool video covers the steps needed to take to ensure ongoing maintenance of your data center upon completion of a micro-segmentation
project&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-ongoing"&gt;&lt;img src="http://video.algosec.com/49543315/52938534/8f5caca0feb36d3182e80f341525099d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=8f5caca0feb36d3182e80f341525099d&amp;source=podcast&amp;photo%5fid=52938534" width="625" height="352" type="text/html" medium="video" duration="424" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/52938534/8f5caca0feb36d3182e80f341525099d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/video_medium/lesson-7-how-to-prepare-for-network-video.mp4?source=podcast" type="video/mp4" length="13749334"/>
            <title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</title>
            <link>http://video.algosec.com/lesson-7-how-to-prepare-for-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181819</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f796f81cc13de312cc8c7bd06b607f5b&amp;source=podcast&amp;photo%5fid=44181819" width="625" height="352" type="text/html" medium="video" duration="247" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>avishai wool</category>
            <category>cloud security</category>
            <category>Data Center</category>
            <category>data center security</category>
            <category>east west traffic</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/video_medium/the-different-data-sources-for-video.mp4?source=podcast" type="video/mp4" length="21540827"/>
            <title>The Different Data Sources for Application Connectivity Discovery</title>
            <link>http://video.algosec.com/the-different-data-sources-for</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 6
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-different-data-sources-for"&gt;&lt;img src="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181914</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>The Different Data Sources for Application Connectivity Discovery</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 6
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-different-data-sources-for"&gt;&lt;img src="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e939292f9bdaa1169eabd25695c8c0a5&amp;source=podcast&amp;photo%5fid=44181914" width="625" height="352" type="text/html" medium="video" duration="340" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>prof. wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/video_medium/how-to-automatically-identify-video.mp4?source=podcast" type="video/mp4" length="27473196"/>
            <title>How to Automatically Identify Business Application Connectivity Needs from...</title>
            <link>http://video.algosec.com/how-to-automatically-identify</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 5
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-automatically-identify"&gt;&lt;img src="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181877</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>How to Automatically Identify Business Application Connectivity Needs from...</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 5
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-automatically-identify"&gt;&lt;img src="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c2388410abe5deb84379c4ee696b5036&amp;source=podcast&amp;photo%5fid=44181877" width="625" height="352" type="text/html" medium="video" duration="410" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity</category>
            <category>application connectivity management</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center</category>
            <category>firewall rules</category>
            <category>network connectivity flows</category>
            <category>Network Security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/video_medium/lesson-1-migrating-to-nsx-video.mp4?source=podcast" type="video/mp4" length="17310417"/>
            <title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</title>
            <link>http://video.algosec.com/lesson-1-migrating-to-nsx</link>
            <description>&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182155</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</media:title>
            <media:description type="html">&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=def81240212859275a1a7e8e49361dd8&amp;source=podcast&amp;photo%5fid=44182155" width="625" height="352" type="text/html" medium="video" duration="319" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/video_medium/lesson-5-the-challenges-of-east-video.mp4?source=podcast" type="video/mp4" length="13531854"/>
            <title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</title>
            <link>http://video.algosec.com/lesson-5-the-challenges-of-east</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-the-challenges-of-east"&gt;&lt;img src="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182248</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-the-challenges-of-east"&gt;&lt;img src="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=29825a33ac4f02b0fdd0df1d19c6aafc&amp;source=podcast&amp;photo%5fid=44182248" width="625" height="352" type="text/html" medium="video" duration="261" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>network security</category>
            <category>network security segmentation</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/video_medium/lesson-6-how-to-build-firewall-video.mp4?source=podcast" type="video/mp4" length="24591521"/>
            <title>Lesson 6: How to Build Firewall Policies for East West Traffic</title>
            <link>http://video.algosec.com/lesson-6-how-to-build-firewall</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182175</guid>
            <pubDate>Mon, 21 Sep 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 6: How to Build Firewall Policies for East West Traffic</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-how-to-build-firewall"&gt;&lt;img src="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0b703ddeea2e989e3bc350549757ce6a&amp;source=podcast&amp;photo%5fid=44182175" width="625" height="352" type="text/html" medium="video" duration="439" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>application connectivity</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security network segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/video_medium/lesson-11-tips-for-filtering-video.mp4?source=podcast" type="video/mp4" length="17295313"/>
            <title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</title>
            <link>http://video.algosec.com/lesson-11-tips-for-filtering</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182282</guid>
            <pubDate>Fri, 01 May 2015 03:00:00 GMT</pubDate>
            <media:title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-11-tips-for-filtering"&gt;&lt;img src="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0a24cf40bd28e90e374321d72e5140a&amp;source=podcast&amp;photo%5fid=44182282" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>data center</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>private cloud</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>virtual data center</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/video_medium/lesson-4-data-center-segmentation-video.mp4?source=podcast" type="video/mp4" length="16927987"/>
            <title>Lesson 4: Data Center Segmentation Best Practices</title>
            <link>http://video.algosec.com/lesson-4-data-center-segmentation</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-data-center-segmentation"&gt;&lt;img src="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182229</guid>
            <pubDate>Wed, 28 Jan 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Data Center Segmentation Best Practices</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-data-center-segmentation"&gt;&lt;img src="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e7de21fde97412592b2fd22ec86e6e4a&amp;source=podcast&amp;photo%5fid=44182229" width="625" height="352" type="text/html" medium="video" duration="308" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>network security</category>
            <category>network security segmentation</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/video_medium/lesson-9-how-to-structure-network-video.mp4?source=podcast" type="video/mp4" length="20686665"/>
            <title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</title>
            <link>http://video.algosec.com/lesson-9-how-to-structure-network</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182306</guid>
            <pubDate>Mon, 08 Dec 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f008f7c1f97aa3aa33a02182c9c550d8&amp;source=podcast&amp;photo%5fid=44182306" width="625" height="352" type="text/html" medium="video" duration="334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>security software</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/video_medium/algosec-overview-managing-security-video.mp4?source=podcast" type="video/mp4" length="6679131"/>
            <title>AlgoSec Overview: Managing Security Policies in Your Data Center</title>
            <link>http://video.algosec.com/algosec-overview-managing-security</link>
            <description>&lt;p&gt;As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-overview-managing-security"&gt;&lt;img src="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182317</guid>
            <pubDate>Wed, 29 Oct 2014 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Overview: Managing Security Policies in Your Data Center</media:title>
            <media:description type="html">&lt;p&gt;As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-overview-managing-security"&gt;&lt;img src="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c689444345c25371b1dc1dc245a12deb&amp;source=podcast&amp;photo%5fid=44182317" width="625" height="352" type="text/html" medium="video" duration="132" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec businessflor</category>
            <category>algosec fireflow</category>
            <category>AlgoSec Security Policy Management</category>
            <category>Audit and Compliance</category>
            <category>Data Center</category>
            <category>Datacenters</category>
            <category>firewall auditing</category>
            <category>Firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>security</category>
            <category>Security Policy</category>
            <category>virtual datacenter</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/video_medium/lesson-1-how-to-structure-your-video.mp4?source=podcast" type="video/mp4" length="20321042"/>
            <title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</title>
            <link>http://video.algosec.com/lesson-1-how-to-structure-your</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-structure-your"&gt;&lt;img src="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182257</guid>
            <pubDate>Wed, 01 Oct 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-structure-your"&gt;&lt;img src="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f89558d6f367f66d2f7fd246d7b932ed&amp;source=podcast&amp;photo%5fid=44182257" width="625" height="352" type="text/html" medium="video" duration="394" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/video_medium/tips-to-discover-business-video.mp4?source=podcast" type="video/mp4" length="33032006"/>
            <title>Tips to Discover Business Application Connectivity Requirements</title>
            <link>http://video.algosec.com/tips-to-discover-business</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 3&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines how to leverage firewall rules for discovering the connectivity requirements of data center applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-to-discover-business"&gt;&lt;img src="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182417</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Tips to Discover Business Application Connectivity Requirements</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 3&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines how to leverage firewall rules for discovering the connectivity requirements of data center applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-to-discover-business"&gt;&lt;img src="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=80bdfba340732544d4906f71bfe7c61c&amp;source=podcast&amp;photo%5fid=44182417" width="625" height="352" type="text/html" medium="video" duration="424" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity</category>
            <category>application connectivity management</category>
            <category>business applications</category>
            <category>data center</category>
            <category>data center applications</category>
            <category>datacenter applications</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>prof wool</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/video_medium/examining-the-need-for-video.mp4?source=podcast" type="video/mp4" length="17810477"/>
            <title>Examining the Need for Application-Centric Security Policy Management</title>
            <link>http://video.algosec.com/examining-the-need-for</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/examining-the-need-for"&gt;&lt;img src="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182409</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Examining the Need for Application-Centric Security Policy Management</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/examining-the-need-for"&gt;&lt;img src="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=5f1d0c698cae1c93e39648727d821d53&amp;source=podcast&amp;photo%5fid=44182409" width="625" height="352" type="text/html" medium="video" duration="289" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>business applications</category>
            <category>data center</category>
            <category>data center applications</category>
            <category>decommission application</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/video_medium/lesson-10-tips-to-simplify-video.mp4?source=podcast" type="video/mp4" length="17136234"/>
            <title>Lesson 10: Tips to Simplify Migrations to a Virtual Data Center</title>
            <link>http://video.algosec.com/lesson-10-tips-to-simplify</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 10&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of migrating business applications and physical data centers to a private cloud and offers tips to conduct these migrations without the risk of outages.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-10-tips-to-simplify"&gt;&lt;img src="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182380</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 10: Tips to Simplify Migrations to a Virtual Data Center</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 10&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of migrating business applications and physical data centers to a private cloud and offers tips to conduct these migrations without the risk of outages.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-10-tips-to-simplify"&gt;&lt;img src="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e32f091cc2c3304f4ce552d35b7a0ccc&amp;source=podcast&amp;photo%5fid=44182380" width="625" height="352" type="text/html" medium="video" duration="293" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>business applications</category>
            <category>cloud migration</category>
            <category>data center</category>
            <category>data center application</category>
            <category>data center consolidation</category>
            <category>datacenter consolidation</category>
            <category>data center migration</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>physical data center</category>
            <category>private cloud</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>virtual data center</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/video_medium/managing-the-security-policy-in-video.mp4?source=podcast" type="video/mp4" length="10604809"/>
            <title>Managing the Security Policy in Your Data Center and Network</title>
            <link>http://video.algosec.com/managing-the-security-policy-in</link>
            <description>&lt;p&gt;Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-the-security-policy-in"&gt;&lt;img src="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182430</guid>
            <pubDate>Thu, 06 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Managing the Security Policy in Your Data Center and Network</media:title>
            <media:description type="html">&lt;p&gt;Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-the-security-policy-in"&gt;&lt;img src="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3980f51228641374a2c44937715ee7cd&amp;source=podcast&amp;photo%5fid=44182430" width="625" height="352" type="text/html" medium="video" duration="142" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity management</category>
            <category>Audit and Compliance</category>
            <category>data center</category>
            <category>firewall audit</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security change management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/video_medium/lesson-5-managing-firewall-policies-video.mp4?source=podcast" type="video/mp4" length="19797888"/>
            <title>Lesson 5: Managing Firewall Policies in a Disappearing Network Perimeter</title>
            <link>http://video.algosec.com/lesson-5-managing-firewall-policies</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 5&lt;br /&gt;
In this lesson, Professor Wool examines how virtualization, outsourcing of data centers, worker mobility and the consumerization of IT have all played a role in dissolving the network perimeter and what you can do to regain control.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-managing-firewall-policies"&gt;&lt;img src="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182901</guid>
            <pubDate>Mon, 07 May 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 5: Managing Firewall Policies in a Disappearing Network Perimeter</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 5&lt;br /&gt;
In this lesson, Professor Wool examines how virtualization, outsourcing of data centers, worker mobility and the consumerization of IT have all played a role in dissolving the network perimeter and what you can do to regain control.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-managing-firewall-policies"&gt;&lt;img src="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4e056f684aafa0ce814606197c80924b&amp;source=podcast&amp;photo%5fid=44182901" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>firewall management</category>
            <category>firewall policies</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>Software Technology Security</category>
            <category>virtualization</category>
        </item>
    </channel>
</rss>
