<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AlgoSec</title>
        <link>https://video.algosec.com</link>
        <description>AlgoSec simplifies and automates network security policy management across on-prem firewalls and cloud security controls. </description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <image>
            <url>https://video.algosec.com/files/rv1.24/siteicon.png</url>
            <title>AlgoSec</title>
            <link>https://video.algosec.com</link>
        </image>
        <atom:link rel="self" href="https://video.algosec.com/rss/tag/security policy"/>
        <atom:link rel="next" href="https://video.algosec.com/rss/tag/security policy?tag=security+policy&amp;p=2&amp;podcast%5fp=f&amp;https="/>
        <item>
            <enclosure url="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/video_medium/master-the-zero-trust-strategy-for-video.mp4?source=podcast" type="video/mp4" length="79096815"/>
            <title>Master the Zero Trust Strategy for Improved Cybersecurity</title>
            <link>http://video.algosec.com/master-the-zero-trust-strategy-for</link>
            <description>&lt;p&gt;In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/master-the-zero-trust-strategy-for"&gt;&lt;img src="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/84210327</guid>
            <pubDate>Wed, 08 Mar 2023 17:01:07 GMT</pubDate>
            <media:title>Master the Zero Trust Strategy for Improved Cybersecurity</media:title>
            <media:description type="html">&lt;p&gt;In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/master-the-zero-trust-strategy-for"&gt;&lt;img src="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f244c9bfea16f9a9b492ce8a5122a148&amp;source=podcast&amp;photo%5fid=84210327" width="625" height="352" type="text/html" medium="video" duration="1180" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>cyberattack</category>
            <category>cyber threats</category>
            <category>micro-segmentatio</category>
            <category>micro-segmentation</category>
            <category>network managemen</category>
            <category>network management</category>
            <category>network securit</category>
            <category>network security</category>
            <category>ransomware</category>
            <category>risk management</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
            <category>security policy management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/video_medium/zero-trust-framework-for-network-video.mp4?source=podcast" type="video/mp4" length="108886012"/>
            <title>Zero Trust Framework for Network Security</title>
            <link>http://video.algosec.com/zero-trust-framework-for-network</link>
            <description>&lt;p&gt;With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zero-trust-framework-for-network"&gt;&lt;img src="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/83004257</guid>
            <pubDate>Thu, 02 Feb 2023 10:11:27 GMT</pubDate>
            <media:title>Zero Trust Framework for Network Security</media:title>
            <media:description type="html">&lt;p&gt;With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/zero-trust-framework-for-network"&gt;&lt;img src="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=bfa44d66208c73afcdb215c88f01464d&amp;source=podcast&amp;photo%5fid=83004257" width="625" height="391" type="text/html" medium="video" duration="2681" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>cyberattack</category>
            <category>cyber threats</category>
            <category>micro segmentation</category>
            <category>micro-segmentation</category>
            <category>network management</category>
            <category>network security</category>
            <category>ransomware</category>
            <category>risk management</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
            <category>security policy management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/video_medium/simplifying-firewall-audits-and-video.mp4?source=podcast" type="video/mp4" length="5045870"/>
            <title>Simplifying Firewall Audits and Demonstrating Compliance</title>
            <link>http://video.algosec.com/simplifying-firewall-audits-and</link>
            <description>&lt;p&gt;AlgoSec Firewall Analyzer delivers out-of-the-box compliance reports for the widest range of industry standards including PCI-DSS, ISO 27001, Sarbanes Oxley and more. These reports help you dramatically reduce the time and effort required to prepare for audits - by as much as 80%.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/simplifying-firewall-audits-and"&gt;&lt;img src="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182646</guid>
            <pubDate>Tue, 22 Mar 2022 11:15:34 GMT</pubDate>
            <media:title>Simplifying Firewall Audits and Demonstrating Compliance</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec Firewall Analyzer delivers out-of-the-box compliance reports for the widest range of industry standards including PCI-DSS, ISO 27001, Sarbanes Oxley and more. These reports help you dramatically reduce the time and effort required to prepare for audits - by as much as 80%.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/simplifying-firewall-audits-and"&gt;&lt;img src="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7288f88413432a2d88381591c13209ee&amp;source=podcast&amp;photo%5fid=44182646" width="625" height="352" type="text/html" medium="video" duration="124" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>Firewall analyzer</category>
            <category>firewall audit</category>
            <category>firewall compliance</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>ISO 27001</category>
            <category>IT audit</category>
            <category>PCI</category>
            <category>PCI audit</category>
            <category>PCI compliance</category>
            <category>PCI-DSS</category>
            <category>Sarbanes-Oxley compliance</category>
            <category>security audit</category>
            <category>Security Policy</category>
            <category>SOX</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/video_medium/top-5-predictions-best-practices-video.mp4?source=podcast" type="video/mp4" length="46819234"/>
            <title>Top 5 Predictions &amp; Best Practices for 2022</title>
            <link>http://video.algosec.com/top-5-predictions-best-practices</link>
            <description>&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/72839921</guid>
            <pubDate>Tue, 21 Dec 2021 14:09:54 GMT</pubDate>
            <media:title>Top 5 Predictions &amp; Best Practices for 2022</media:title>
            <media:description type="html">&lt;p&gt;In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/top-5-predictions-best-practices"&gt;&lt;img src="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7644f86b455465ff65ca0eb3f8bfa109&amp;source=podcast&amp;photo%5fid=72839921" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <category>application connectivity</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>microsegmentation</category>
            <category>network security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/video_medium/build-and-enforce-defense-in-depth-video.mp4?source=podcast" type="video/mp4" length="88746932"/>
            <title>Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</title>
            <link>http://video.algosec.com/build-and-enforce-defense-in-depth</link>
            <description>&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;/b&gt;
&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;
&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;
&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;
• Understand your business applications to create your microsegmentation policy&lt;br&gt;
• Validate your micro-segmentation policy is accurate&lt;br&gt;
• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;
• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;
• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/build-and-enforce-defense-in-depth"&gt;&lt;img src="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63855367</guid>
            <pubDate>Sun, 28 Nov 2021 15:39:29 GMT</pubDate>
            <media:title>Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;/b&gt;
&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;
&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;
&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;
• Understand your business applications to create your microsegmentation policy&lt;br&gt;
• Validate your micro-segmentation policy is accurate&lt;br&gt;
• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;
• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;
• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/build-and-enforce-defense-in-depth"&gt;&lt;img src="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=95152215d0dafd06be978cd6f5cb488d&amp;source=podcast&amp;photo%5fid=63855367" width="625" height="352" type="text/html" medium="video" duration="3657" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>Data Center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182880/25bb94d15fdd364530a2f0dfa6d23057/video_medium/algosecs-baseline-compliance-1-video.mp4?source=podcast" type="video/mp4" length="4897138"/>
            <title>AlgoSec's Baseline Compliance Capability</title>
            <link>http://video.algosec.com/algosecs-baseline-compliance-1</link>
            <description>&lt;p&gt;AlgoSec Firewall Analyzer allows security teams to easily and efficiently define baseline hardware and software configurations to which devices must adhere, and generates reports to identify devices that do not comply with the corporate baseline, minimizing system risks.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosecs-baseline-compliance-1"&gt;&lt;img src="http://video.algosec.com/16107557/44182880/25bb94d15fdd364530a2f0dfa6d23057/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182880</guid>
            <pubDate>Thu, 29 Jul 2021 09:50:35 GMT</pubDate>
            <media:title>AlgoSec's Baseline Compliance Capability</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec Firewall Analyzer allows security teams to easily and efficiently define baseline hardware and software configurations to which devices must adhere, and generates reports to identify devices that do not comply with the corporate baseline, minimizing system risks.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosecs-baseline-compliance-1"&gt;&lt;img src="http://video.algosec.com/16107557/44182880/25bb94d15fdd364530a2f0dfa6d23057/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=25bb94d15fdd364530a2f0dfa6d23057&amp;source=podcast&amp;photo%5fid=44182880" width="625" height="352" type="text/html" medium="video" duration="128" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182880/25bb94d15fdd364530a2f0dfa6d23057/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>baseline compliance</category>
            <category>configurations</category>
            <category>corporate policy</category>
            <category>device configurations</category>
            <category>firewalls</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/video_medium/cisco-meraki-visibility-risk-video.mp4?source=podcast" type="video/mp4" length="8015397"/>
            <title>Cisco Meraki – Visibility, Risk &amp; Compliance Demo</title>
            <link>http://video.algosec.com/cisco-meraki-visibility-risk</link>
            <description>&lt;p&gt;Product demo - Discover how you can gain visibility, risk and compliance for Cisco Meraki.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-meraki-visibility-risk"&gt;&lt;img src="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/67772640</guid>
            <pubDate>Tue, 16 Mar 2021 19:52:09 GMT</pubDate>
            <media:title>Cisco Meraki – Visibility, Risk &amp; Compliance Demo</media:title>
            <media:description type="html">&lt;p&gt;Product demo - Discover how you can gain visibility, risk and compliance for Cisco Meraki.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-meraki-visibility-risk"&gt;&lt;img src="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=eb8d96ec23be780dc19e998830b76c13&amp;source=podcast&amp;photo%5fid=67772640" width="625" height="352" type="text/html" medium="video" duration="231" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/standard/download-17-thumbnail.jpg" width="75" height=""/>
            <category>Auditing and Compliance</category>
            <category>data center</category>
            <category>information security</category>
            <category>network security</category>
            <category>Risk Analysis</category>
            <category>SD-WAN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968556/67772645/45eafb9f9aa239ba4e0c03c278b670ba/video_medium/manage-your-network-security-with-video.mp4?source=podcast" type="video/mp4" length="5560547"/>
            <title>Manage your network security with AlgoSec &amp; VMWare</title>
            <link>http://video.algosec.com/manage-your-network-security-with</link>
            <description>&lt;p&gt;Watch this demo and see how you can tighten your security and get increased visibility with AlgoSec and VMWare.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/manage-your-network-security-with"&gt;&lt;img src="http://video.algosec.com/64968556/67772645/45eafb9f9aa239ba4e0c03c278b670ba/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/67772645</guid>
            <pubDate>Tue, 16 Mar 2021 19:50:24 GMT</pubDate>
            <media:title>Manage your network security with AlgoSec &amp; VMWare</media:title>
            <media:description type="html">&lt;p&gt;Watch this demo and see how you can tighten your security and get increased visibility with AlgoSec and VMWare.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/manage-your-network-security-with"&gt;&lt;img src="http://video.algosec.com/64968556/67772645/45eafb9f9aa239ba4e0c03c278b670ba/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=45eafb9f9aa239ba4e0c03c278b670ba&amp;source=podcast&amp;photo%5fid=67772645" width="625" height="352" type="text/html" medium="video" duration="290" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968556/67772645/45eafb9f9aa239ba4e0c03c278b670ba/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Auditing and Compliance</category>
            <category>data center</category>
            <category>information security</category>
            <category>risk analysis</category>
            <category>Security Policy</category>
            <category>vmware nsx</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/64968580/67177052/c8639a446544eae2d8489400d9486652/video_medium/customer-story-mark-grady-from-video.mp4?source=podcast" type="video/mp4" length="8913579"/>
            <title>Customer Story - Mark Grady from Leading payment solutions company</title>
            <link>http://video.algosec.com/customer-story-mark-grady-from</link>
            <description>&lt;p&gt;Leading payment solutions company credits AlgoSec for increasing security and compliance.&lt;br&gt;&lt;div&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;/div&gt;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/customer-story-mark-grady-from"&gt;&lt;img src="http://video.algosec.com/64968580/67177052/c8639a446544eae2d8489400d9486652/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/67177052</guid>
            <pubDate>Tue, 16 Feb 2021 22:22:25 GMT</pubDate>
            <media:title>Customer Story - Mark Grady from Leading payment solutions company</media:title>
            <media:description type="html">&lt;p&gt;Leading payment solutions company credits AlgoSec for increasing security and compliance.&lt;br&gt;&lt;div&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;/div&gt;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/customer-story-mark-grady-from"&gt;&lt;img src="http://video.algosec.com/64968580/67177052/c8639a446544eae2d8489400d9486652/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c8639a446544eae2d8489400d9486652&amp;source=podcast&amp;photo%5fid=67177052" width="625" height="352" type="text/html" medium="video" duration="189" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/64968580/67177052/c8639a446544eae2d8489400d9486652/standard/download-6-thumbnail.jpg" width="600" height="338"/>
            <category>customer story</category>
            <category>firewall management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445190/64477064/a2bdc0764be04af46bfd775faa7abde5/video_medium/panel-how-to-solve-the-hybrid-cloud-video.mp4?source=podcast" type="video/mp4" length="121997575"/>
            <title>[Panel] How to Solve the Hybrid Cloud Policy Management Challenge</title>
            <link>http://video.algosec.com/panel-how-to-solve-the-hybrid-cloud</link>
            <description>&lt;p&gt;&lt;b&gt;Yonatan Klein, Director of Product, Omer Ganot, Product Manager and Yitzy Tannenbaurm, Product Marketing Manager (AlgoSec)&lt;br&gt;&lt;/b&gt;&lt;br&gt;Today, your network is complex, extending beyond the perimeter in multiple locations, made up of multiple public and private clouds, SDNs, as well as on-premises data centers. Security controls are a “black box.” IT and security staff find it difficult to gain visibility, and maintain security in the hybrid cloud.&lt;br&gt;&lt;br&gt;Join a panel discussion with Yonatan Klein and Omer Ganot from AlgoSec’s product management team, along with moderator Yitzy Tannenbaum as they debate the hybrid management cloud challenge.&lt;br&gt;&lt;br&gt;They will discuss how to solve complex challenges securing hybrid networks, including:&lt;br&gt;• Gaining full policy and network visibility for their hybrid, multi-cloud network&lt;br&gt;• Multiple clouds with emphasis on the hybrid network - private and public&lt;br&gt;• Effective communication among multiple business, IT and security stakeholders to save time, reduce risk, and avoid misconfigurations&lt;br&gt;• Managing network security controls in a heterogeneous network environment&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/panel-how-to-solve-the-hybrid-cloud"&gt;&lt;img src="http://video.algosec.com/60445190/64477064/a2bdc0764be04af46bfd775faa7abde5/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/64477064</guid>
            <pubDate>Wed, 23 Sep 2020 16:38:07 GMT</pubDate>
            <media:title>[Panel] How to Solve the Hybrid Cloud Policy Management Challenge</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yonatan Klein, Director of Product, Omer Ganot, Product Manager and Yitzy Tannenbaurm, Product Marketing Manager (AlgoSec)&lt;br&gt;&lt;/b&gt;&lt;br&gt;Today, your network is complex, extending beyond the perimeter in multiple locations, made up of multiple public and private clouds, SDNs, as well as on-premises data centers. Security controls are a “black box.” IT and security staff find it difficult to gain visibility, and maintain security in the hybrid cloud.&lt;br&gt;&lt;br&gt;Join a panel discussion with Yonatan Klein and Omer Ganot from AlgoSec’s product management team, along with moderator Yitzy Tannenbaum as they debate the hybrid management cloud challenge.&lt;br&gt;&lt;br&gt;They will discuss how to solve complex challenges securing hybrid networks, including:&lt;br&gt;• Gaining full policy and network visibility for their hybrid, multi-cloud network&lt;br&gt;• Multiple clouds with emphasis on the hybrid network - private and public&lt;br&gt;• Effective communication among multiple business, IT and security stakeholders to save time, reduce risk, and avoid misconfigurations&lt;br&gt;• Managing network security controls in a heterogeneous network environment&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/panel-how-to-solve-the-hybrid-cloud"&gt;&lt;img src="http://video.algosec.com/60445190/64477064/a2bdc0764be04af46bfd775faa7abde5/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a2bdc0764be04af46bfd775faa7abde5&amp;source=podcast&amp;photo%5fid=64477064" width="625" height="352" type="text/html" medium="video" duration="3281" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/64477064/a2bdc0764be04af46bfd775faa7abde5/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>hybrid cloud</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/video_medium/webcast-build-and-enforce-defense-video.mp4?source=podcast" type="video/mp4" length="88746932"/>
            <title>Webcast: Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</title>
            <link>http://video.algosec.com/webcast-build-and-enforce-defense</link>
            <description>&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;• Understand your business applications to create your microsegmentation policy&lt;br&gt;• Validate your micro-segmentation policy is accurate&lt;br&gt;• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/webcast-build-and-enforce-defense"&gt;&lt;img src="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/64277400</guid>
            <pubDate>Wed, 23 Sep 2020 15:45:44 GMT</pubDate>
            <media:title>Webcast: Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;• Understand your business applications to create your microsegmentation policy&lt;br&gt;• Validate your micro-segmentation policy is accurate&lt;br&gt;• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/webcast-build-and-enforce-defense"&gt;&lt;img src="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c9c6f0f278f999d541c1a492c84e245c&amp;source=podcast&amp;photo%5fid=64277400" width="625" height="352" type="text/html" medium="video" duration="3657" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>data center</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/video_medium/panel-discussion-network-security-1-video.mp4?source=podcast" type="video/mp4" length="75817726"/>
            <title>Panel Discussion: Network Security and Compliance best practices for...</title>
            <link>http://video.algosec.com/panel-discussion-network-security-1</link>
            <description>&lt;p&gt;Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy&lt;br /&gt;
management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.&lt;/p&gt;
&lt;p&gt;There’s a better way to manage your network security!&lt;/p&gt;
&lt;p&gt;Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.&lt;/p&gt;
&lt;p&gt;Topics include:&lt;/p&gt;
&lt;p&gt;• How to overcome security management complexities with automation&lt;br /&gt;
• How to pass compliance audits in the face of demanding regulations&lt;br /&gt;
• Key industry metrics that compare security environments within and beyond the finance industry&lt;br /&gt;
• Real financial customers case studies&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/panel-discussion-network-security-1"&gt;&lt;img src="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44415276</guid>
            <pubDate>Tue, 15 Sep 2020 20:06:08 GMT</pubDate>
            <media:title>Panel Discussion: Network Security and Compliance best practices for...</media:title>
            <media:description type="html">&lt;p&gt;Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy&lt;br /&gt;
management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.&lt;/p&gt;
&lt;p&gt;There’s a better way to manage your network security!&lt;/p&gt;
&lt;p&gt;Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.&lt;/p&gt;
&lt;p&gt;Topics include:&lt;/p&gt;
&lt;p&gt;• How to overcome security management complexities with automation&lt;br /&gt;
• How to pass compliance audits in the face of demanding regulations&lt;br /&gt;
• Key industry metrics that compare security environments within and beyond the finance industry&lt;br /&gt;
• Real financial customers case studies&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/panel-discussion-network-security-1"&gt;&lt;img src="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=24cb2f0d85632231cc3bd811592c9758&amp;source=podcast&amp;photo%5fid=44415276" width="625" height="352" type="text/html" medium="video" duration="1355" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>audit</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>fintech</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>firewalls management</category>
            <category>network security</category>
            <category>network security policy management</category>
            <category>security analysis</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445026/63911625/171c1e0547c4d0eba7546366ddb1162d/video_medium/algosec-cloud-central-policy-video.mp4?source=podcast" type="video/mp4" length="2546382"/>
            <title>AlgoSec cloud central Policy Management</title>
            <link>http://video.algosec.com/algosec-cloud-central-policy</link>
            <description>&lt;p&gt;In this video we will demonstrate the power of central policy management of cloud security controls.&lt;br&gt;
Save time, identify and prevent human error and risk by managing a single policy set instead of doing the same for multiple similar security controls.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cloud-central-policy"&gt;&lt;img src="http://video.algosec.com/60445026/63911625/171c1e0547c4d0eba7546366ddb1162d/standard/download-2-thumbnail.jpg" width="600" height="324"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63911625</guid>
            <pubDate>Tue, 08 Sep 2020 23:06:11 GMT</pubDate>
            <media:title>AlgoSec cloud central Policy Management</media:title>
            <media:description type="html">&lt;p&gt;In this video we will demonstrate the power of central policy management of cloud security controls.&lt;br&gt;
Save time, identify and prevent human error and risk by managing a single policy set instead of doing the same for multiple similar security controls.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-cloud-central-policy"&gt;&lt;img src="http://video.algosec.com/60445026/63911625/171c1e0547c4d0eba7546366ddb1162d/standard/download-2-thumbnail.jpg" width="600" height="324"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=171c1e0547c4d0eba7546366ddb1162d&amp;source=podcast&amp;photo%5fid=63911625" width="625" height="338" type="text/html" medium="video" duration="135" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445026/63911625/171c1e0547c4d0eba7546366ddb1162d/standard/download-2-thumbnail.jpg" width="600" height="324"/>
            <category>change management</category>
            <category>cloud security</category>
            <category>policy management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445025/63662374/cfb4ba081a83e678c0c8516bef2ce6da/video_medium/micro-segmentation-from-strategy-video.mp4?source=podcast" type="video/mp4" length="78185209"/>
            <title>Micro-segmentation – from Strategy to Execution</title>
            <link>http://video.algosec.com/micro-segmentation-from-strategy</link>
            <description>&lt;p&gt;Avishai Wool, CTO &amp;amp; Co-founder (AlgoSec) | June 2020&lt;br&gt;
&lt;p&gt;Organizations heavily invest in security solutions to keep their networks safe, but still struggle to close the security gaps. Micro-segmentation helps protect against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren’t sure where to begin or what approach to take.&lt;/p&gt;
&lt;p&gt;In this practical webinar, Prof. Avishai Wool, AlgoSec’s CTO and co-founder will guide you through each stage of a micro-segmentation project – from developing the correct micro-segmentation strategy to effectively implementing it and continually maintaining your micro-segmented network.&lt;/p&gt;
&lt;p&gt;Register now for this live webinar and get a practical blueprint to creating your micro-segmentation policy:&lt;/p&gt;
&lt;p&gt;• What is micro-segmentation.&lt;br&gt;
• Common pitfalls in micro-segmentation projects and how to avoid them.&lt;br&gt;
• The stages of a successful micro-segmentation project.&lt;br&gt;
• The role of policy change management and automation in micro-segmentation.&lt;/p&gt;
&lt;p&gt;Don't forget to also click on the links in the Attachments tab.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/micro-segmentation-from-strategy"&gt;&lt;img src="http://video.algosec.com/60445025/63662374/cfb4ba081a83e678c0c8516bef2ce6da/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63662374</guid>
            <pubDate>Wed, 08 Jul 2020 22:48:10 GMT</pubDate>
            <media:title>Micro-segmentation – from Strategy to Execution</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, CTO &amp;amp; Co-founder (AlgoSec) | June 2020&lt;br&gt;
&lt;p&gt;Organizations heavily invest in security solutions to keep their networks safe, but still struggle to close the security gaps. Micro-segmentation helps protect against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren’t sure where to begin or what approach to take.&lt;/p&gt;
&lt;p&gt;In this practical webinar, Prof. Avishai Wool, AlgoSec’s CTO and co-founder will guide you through each stage of a micro-segmentation project – from developing the correct micro-segmentation strategy to effectively implementing it and continually maintaining your micro-segmented network.&lt;/p&gt;
&lt;p&gt;Register now for this live webinar and get a practical blueprint to creating your micro-segmentation policy:&lt;/p&gt;
&lt;p&gt;• What is micro-segmentation.&lt;br&gt;
• Common pitfalls in micro-segmentation projects and how to avoid them.&lt;br&gt;
• The stages of a successful micro-segmentation project.&lt;br&gt;
• The role of policy change management and automation in micro-segmentation.&lt;/p&gt;
&lt;p&gt;Don't forget to also click on the links in the Attachments tab.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/micro-segmentation-from-strategy"&gt;&lt;img src="http://video.algosec.com/60445025/63662374/cfb4ba081a83e678c0c8516bef2ce6da/standard/download-6-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cfb4ba081a83e678c0c8516bef2ce6da&amp;source=podcast&amp;photo%5fid=63662374" width="625" height="352" type="text/html" medium="video" duration="3591" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445025/63662374/cfb4ba081a83e678c0c8516bef2ce6da/standard/download-6-thumbnail.jpg" width="600" height="338"/>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/video_medium/achieving-intent-based-network-video.mp4?source=podcast" type="video/mp4" length="61107497"/>
            <title>"Achieving intent-based network security across your hybrid network" with...</title>
            <link>http://video.algosec.com/achieving-intent-based-network</link>
            <description>&lt;p&gt;Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-intent-based-network"&gt;&lt;img src="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63415237</guid>
            <pubDate>Wed, 24 Jun 2020 16:49:12 GMT</pubDate>
            <media:title>"Achieving intent-based network security across your hybrid network" with...</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/achieving-intent-based-network"&gt;&lt;img src="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d40d0b761aa9153a987b2dffb6cc5060&amp;source=podcast&amp;photo%5fid=63415237" width="625" height="352" type="text/html" medium="video" duration="1824" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cyber Attacks &amp; Incident Response</category>
            <category>events</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Network Segmentation</category>
            <category>Privacy and Security</category>
            <category>prof wool</category>
            <category>Risk Management and Vulnerabilities</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/video_medium/policy-optimization-1-video.mp4?source=podcast" type="video/mp4" length="4940058"/>
            <title>Policy Optimization</title>
            <link>http://video.algosec.com/policy-optimization-1</link>
            <description>&lt;p&gt;Learn how to clean up and optimize your firewall policies with the AlgoSec solution&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/policy-optimization-1"&gt;&lt;img src="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/63393273</guid>
            <pubDate>Mon, 22 Jun 2020 11:01:54 GMT</pubDate>
            <media:title>Policy Optimization</media:title>
            <media:description type="html">&lt;p&gt;Learn how to clean up and optimize your firewall policies with the AlgoSec solution&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/policy-optimization-1"&gt;&lt;img src="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4585141ecbda5b81d608818932b27fba&amp;source=podcast&amp;photo%5fid=63393273" width="625" height="352" type="text/html" medium="video" duration="148" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/video_medium/optimize-your-juniper-investment-video.mp4?source=podcast" type="video/mp4" length="37937596"/>
            <title>Optimize your Juniper Investment with Intelligent Network Security Automation</title>
            <link>http://video.algosec.com/optimize-your-juniper-investment</link>
            <description>&lt;p&gt;Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/optimize-your-juniper-investment"&gt;&lt;img src="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61650270</guid>
            <pubDate>Wed, 25 Mar 2020 19:30:22 GMT</pubDate>
            <media:title>Optimize your Juniper Investment with Intelligent Network Security Automation</media:title>
            <media:description type="html">&lt;p&gt;Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/optimize-your-juniper-investment"&gt;&lt;img src="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d6c3dac069cd3e89e381907d0133d8cb&amp;source=podcast&amp;photo%5fid=61650270" width="625" height="352" type="text/html" medium="video" duration="1889" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>cloud security</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>juniper</category>
            <category>Network Security</category>
            <category>Network Security Automation</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/video_medium/managing-application-connectivity-video.mp4?source=podcast" type="video/mp4" length="63667594"/>
            <title>Managing Application Connectivity in the World of Network Security</title>
            <link>http://video.algosec.com/managing-application-connectivity</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Asher Benbenisty, Director of Product Marketing |&lt;/b&gt; Feb 27 2018&lt;br&gt;&lt;/p&gt;&lt;p&gt;The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.&amp;nbsp;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;&lt;br&gt;During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, discusses how taking an application-centric approach to security policy management will improve both your security and operational efficiency.&amp;nbsp;&lt;br&gt;&lt;br&gt;Learn how to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Gain insight into your company’s security policy management maturity level&lt;/li&gt;&lt;li&gt;Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows&lt;/li&gt;&lt;li&gt;Identify security risks across your enterprise network and prioritize them based on business criticality&lt;/li&gt;&lt;li&gt;Securely migrate business application connectivity and security devices to a new data center&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-application-connectivity"&gt;&lt;img src="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49721671</guid>
            <pubDate>Wed, 18 Mar 2020 14:05:32 GMT</pubDate>
            <media:title>Managing Application Connectivity in the World of Network Security</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Asher Benbenisty, Director of Product Marketing |&lt;/b&gt; Feb 27 2018&lt;br&gt;&lt;/p&gt;&lt;p&gt;The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.&amp;nbsp;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;&lt;br&gt;During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, discusses how taking an application-centric approach to security policy management will improve both your security and operational efficiency.&amp;nbsp;&lt;br&gt;&lt;br&gt;Learn how to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Gain insight into your company’s security policy management maturity level&lt;/li&gt;&lt;li&gt;Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows&lt;/li&gt;&lt;li&gt;Identify security risks across your enterprise network and prioritize them based on business criticality&lt;/li&gt;&lt;li&gt;Securely migrate business application connectivity and security devices to a new data center&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-application-connectivity"&gt;&lt;img src="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=272968807dfb09156001e7c88b48053c&amp;source=podcast&amp;photo%5fid=49721671" width="625" height="352" type="text/html" medium="video" duration="2192" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>mapping network flows</category>
            <category>network security</category>
            <category>Security Automation</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/video_medium/managing-effective-security-video.mp4?source=podcast" type="video/mp4" length="86148630"/>
            <title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</title>
            <link>http://video.algosec.com/managing-effective-security</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-effective-security"&gt;&lt;img src="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615359</guid>
            <pubDate>Wed, 18 Mar 2020 14:04:50 GMT</pubDate>
            <media:title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-effective-security"&gt;&lt;img src="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=a61b1227849251e32a2981784acbc6a7&amp;source=podcast&amp;photo%5fid=49615359" width="625" height="352" type="text/html" medium="video" duration="2630" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>cloud security</category>
            <category>compliance</category>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>hybrid environment</category>
            <category>IDC</category>
            <category>migrating applications</category>
            <category>multi-cloud</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650858/61410177/51a01c5d725fd4eb72bdabd81b6de876/video_medium/robert-blank-von-algosec-auf-der-video.mp4?source=podcast" type="video/mp4" length="6458800"/>
            <title>Robert Blank von AlgoSec auf der ITSA 2019</title>
            <link>http://video.algosec.com/robert-blank-von-algosec-auf-der</link>
            <description>&lt;p&gt;Robert Blank (Regional Sales Manager DACH von AlgoSec) spricht auf der ITSA 2019 in Nürnberg. Erfahren Sie mehr darüber, wie die Security Policy Change-Automatierung von AlgoSec funktioniert, wie Cisco-Security komplettiert wird, und bekommen Sie hier das neueste Update zur Partnerschaft zwischen AlgoSec mit Cisco.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/robert-blank-von-algosec-auf-der"&gt;&lt;img src="http://video.algosec.com/60650858/61410177/51a01c5d725fd4eb72bdabd81b6de876/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61410177</guid>
            <pubDate>Mon, 16 Mar 2020 14:54:15 GMT</pubDate>
            <media:title>Robert Blank von AlgoSec auf der ITSA 2019</media:title>
            <media:description type="html">&lt;p&gt;Robert Blank (Regional Sales Manager DACH von AlgoSec) spricht auf der ITSA 2019 in Nürnberg. Erfahren Sie mehr darüber, wie die Security Policy Change-Automatierung von AlgoSec funktioniert, wie Cisco-Security komplettiert wird, und bekommen Sie hier das neueste Update zur Partnerschaft zwischen AlgoSec mit Cisco.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/robert-blank-von-algosec-auf-der"&gt;&lt;img src="http://video.algosec.com/60650858/61410177/51a01c5d725fd4eb72bdabd81b6de876/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=51a01c5d725fd4eb72bdabd81b6de876&amp;source=podcast&amp;photo%5fid=61410177" width="625" height="352" type="text/html" medium="video" duration="117" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650858/61410177/51a01c5d725fd4eb72bdabd81b6de876/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>network security</category>
            <category>Netzwerk Sicherheitsrichtlinien</category>
            <category>Netzwerk-Sicherheit visibility</category>
            <category>policy management</category>
            <category>Regelwerk-Management</category>
            <category>security policy</category>
            <category>Sichtbarkeit</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60445186/61384023/0035927524dc8ce97134dcdb68abf96e/video_medium/5-ways-to-enrich-your-cisco-video.mp4?source=podcast" type="video/mp4" length="4532074"/>
            <title>5 ways to enrich your Cisco security posture with AlgoSec</title>
            <link>http://video.algosec.com/5-ways-to-enrich-your-cisco</link>
            <description>&lt;p&gt;&lt;span&gt;Discover the benefits of integrating AlgoSec with
your entire &lt;b&gt;Cisco&lt;/b&gt; fabric, multi-cloud and multi-vendor network environments.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-ways-to-enrich-your-cisco"&gt;&lt;img src="http://video.algosec.com/60445186/61384023/0035927524dc8ce97134dcdb68abf96e/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61384023</guid>
            <pubDate>Sun, 15 Mar 2020 12:02:44 GMT</pubDate>
            <media:title>5 ways to enrich your Cisco security posture with AlgoSec</media:title>
            <media:description type="html">&lt;p&gt;&lt;span&gt;Discover the benefits of integrating AlgoSec with
your entire &lt;b&gt;Cisco&lt;/b&gt; fabric, multi-cloud and multi-vendor network environments.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-ways-to-enrich-your-cisco"&gt;&lt;img src="http://video.algosec.com/60445186/61384023/0035927524dc8ce97134dcdb68abf96e/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0035927524dc8ce97134dcdb68abf96e&amp;source=podcast&amp;photo%5fid=61384023" width="625" height="352" type="text/html" medium="video" duration="75" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60445186/61384023/0035927524dc8ce97134dcdb68abf96e/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>Cisco SDN</category>
            <category>hybrid cloud</category>
            <category>multicloud</category>
            <category>multivendor</category>
            <category>network security</category>
            <category>Network Security Management</category>
            <category>Policy Management</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/video_medium/network-security-vision-with-video.mp4?source=podcast" type="video/mp4" length="66340639"/>
            <title>Network Security Vision with Application Visibility | Live discussion and demo</title>
            <link>http://video.algosec.com/network-security-vision-with</link>
            <description>&lt;p&gt;Avishai Wool, CTO &amp; Co-founder (AlgoSec) &amp; Yoni Geva, Product Manager (AlgoSec) | March 5, 2020&lt;/p&gt;
&lt;p&gt;You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.&lt;/p&gt;
&lt;p&gt;But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?&lt;/p&gt;
&lt;p&gt;Stop running blind. Expand your vision with application visibility.&lt;/p&gt;
&lt;p&gt;With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.&lt;/p&gt;
&lt;p&gt;In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate – in a live demo - how to overcome these challenges and ensure business continuity through application visibility.&lt;/p&gt;
&lt;p&gt;Join the webinar and learn how to:&lt;br /&gt;
• Associate your business applications with your security policy rules.&lt;br /&gt;
• Identify the network traffic relevant for each application.&lt;br /&gt;
• Identify hidden risks and vulnerabilities in your applications.&lt;br /&gt;
• Associate compliance violations with the relevant business applications.&lt;br /&gt;
• Improve troubleshooting by identifying affected applications.&lt;br /&gt;
• Better document the applications on your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-vision-with"&gt;&lt;img src="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61248183</guid>
            <pubDate>Mon, 09 Mar 2020 15:53:57 GMT</pubDate>
            <media:title>Network Security Vision with Application Visibility | Live discussion and demo</media:title>
            <media:description type="html">&lt;p&gt;Avishai Wool, CTO &amp; Co-founder (AlgoSec) &amp; Yoni Geva, Product Manager (AlgoSec) | March 5, 2020&lt;/p&gt;
&lt;p&gt;You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.&lt;/p&gt;
&lt;p&gt;But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?&lt;/p&gt;
&lt;p&gt;Stop running blind. Expand your vision with application visibility.&lt;/p&gt;
&lt;p&gt;With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.&lt;/p&gt;
&lt;p&gt;In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate – in a live demo - how to overcome these challenges and ensure business continuity through application visibility.&lt;/p&gt;
&lt;p&gt;Join the webinar and learn how to:&lt;br /&gt;
• Associate your business applications with your security policy rules.&lt;br /&gt;
• Identify the network traffic relevant for each application.&lt;br /&gt;
• Identify hidden risks and vulnerabilities in your applications.&lt;br /&gt;
• Associate compliance violations with the relevant business applications.&lt;br /&gt;
• Improve troubleshooting by identifying affected applications.&lt;br /&gt;
• Better document the applications on your network.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-vision-with"&gt;&lt;img src="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1337080fb3e4740271e01d66cc24acb6&amp;source=podcast&amp;photo%5fid=61248183" width="625" height="352" type="text/html" medium="video" duration="2991" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>application visibility</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/video_medium/5-dinge-von-denen-sie-sicherlich-video.mp4?source=podcast" type="video/mp4" length="66147965"/>
            <title>5 Dinge, von denen Sie sicherlich nicht gewusst haben, die Sie mit einer...</title>
            <link>http://video.algosec.com/5-dinge-von-denen-sie-sicherlich</link>
            <description>&lt;p&gt;Dietmar Wyhs, Regional Sales Manager DACH |  Oct 9 2017&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Die heutigen Unternehmen entwickeln sich kontinuierlich weiter, um neue Anwendungen, Transformationsinitiativen wie Cloud und SDN zu unterstützen und täglich neue und anspruchsvollere Cyber-Attacken abzuwehren. Aber die Sicherheits- und Netzwerk-Mitarbeiter haben Schwierigkeiten mitzuhalten. Dies wirkt sich nicht nur auf die Business-Agilität aus, sondern setzt Ihr Unternehmen Risiken aus und behindert dessen Fähigkeit, sich der modernen Bedrohungslandschaft zu stellen.&lt;/p&gt;
&lt;p&gt;Viele Fachleute sind der Meinung, dass sie die neuesten Anwendungen brauchen, um diese Herausforderungen zu bewältigen. Aber was, wenn Sie bereits haben, was Sie brauchen und diese Anwendung in Ihrem Unternehmen genutzt wird: Ihre Security Policy Management Lösung?&lt;/p&gt;
&lt;p&gt;Die heutigen Sicherheitsrichtlinien-Management-Lösungen machen weit mehr als die Automatisierung von traditionellen Änderungsmanagement Aufgaben. In diesem technischen Webinar zeigt Ihnen Dietmar Wyhs fünf wichtige Sicherheitsmanagement-Herausforderungen, denen Unternehmensorganisationen sich heutzutage stellen. Gleichzeitig erklärt er, wie die Lösung von AlgoSec Ihnen helfen kann, Sicherheitsbedrohungen zu bewältigen, Risiken zu verringern, und schnell auf Ausfällen zu reagieren, bei gleichzeitiger Maximierung der Geschäftsagibilität und Sicherstellung der Compliance in den unterschiedlichen, sich ständig verändernden Hybridnetzwerken.&lt;/p&gt;
&lt;p&gt;Dieses technische Webinar konzentriert sich auf:&lt;/p&gt;
&lt;p&gt;•Verwalten von Sicherheitsrichtlinien von End-to-End-Lösungen öffentlicher und privater Clouds einschließlich Microsoft Azure, Amazon Web Services AWS, Cisco ACI und VMWare NSX&lt;br&gt;
•Zuordnung von Sicherheitslücken zu Anwendungen, zur Bewertung und Priorisierung des Risikos&lt;br&gt;
•Möglichkeit Cyber-Attacken mit Geschäftsprozesse zu korrelieren&lt;br&gt;
•Migration von Firewall-Richtlinien zwischen Firewall-Herstellern&lt;br&gt;
•Durchführung einer vollautomatischen, Zero-Touch-Sicherheitsregelwerksänderung&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-dinge-von-denen-sie-sicherlich"&gt;&lt;img src="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61166183</guid>
            <pubDate>Thu, 05 Mar 2020 14:08:47 GMT</pubDate>
            <media:title>5 Dinge, von denen Sie sicherlich nicht gewusst haben, die Sie mit einer...</media:title>
            <media:description type="html">&lt;p&gt;Dietmar Wyhs, Regional Sales Manager DACH |  Oct 9 2017&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Die heutigen Unternehmen entwickeln sich kontinuierlich weiter, um neue Anwendungen, Transformationsinitiativen wie Cloud und SDN zu unterstützen und täglich neue und anspruchsvollere Cyber-Attacken abzuwehren. Aber die Sicherheits- und Netzwerk-Mitarbeiter haben Schwierigkeiten mitzuhalten. Dies wirkt sich nicht nur auf die Business-Agilität aus, sondern setzt Ihr Unternehmen Risiken aus und behindert dessen Fähigkeit, sich der modernen Bedrohungslandschaft zu stellen.&lt;/p&gt;
&lt;p&gt;Viele Fachleute sind der Meinung, dass sie die neuesten Anwendungen brauchen, um diese Herausforderungen zu bewältigen. Aber was, wenn Sie bereits haben, was Sie brauchen und diese Anwendung in Ihrem Unternehmen genutzt wird: Ihre Security Policy Management Lösung?&lt;/p&gt;
&lt;p&gt;Die heutigen Sicherheitsrichtlinien-Management-Lösungen machen weit mehr als die Automatisierung von traditionellen Änderungsmanagement Aufgaben. In diesem technischen Webinar zeigt Ihnen Dietmar Wyhs fünf wichtige Sicherheitsmanagement-Herausforderungen, denen Unternehmensorganisationen sich heutzutage stellen. Gleichzeitig erklärt er, wie die Lösung von AlgoSec Ihnen helfen kann, Sicherheitsbedrohungen zu bewältigen, Risiken zu verringern, und schnell auf Ausfällen zu reagieren, bei gleichzeitiger Maximierung der Geschäftsagibilität und Sicherstellung der Compliance in den unterschiedlichen, sich ständig verändernden Hybridnetzwerken.&lt;/p&gt;
&lt;p&gt;Dieses technische Webinar konzentriert sich auf:&lt;/p&gt;
&lt;p&gt;•Verwalten von Sicherheitsrichtlinien von End-to-End-Lösungen öffentlicher und privater Clouds einschließlich Microsoft Azure, Amazon Web Services AWS, Cisco ACI und VMWare NSX&lt;br&gt;
•Zuordnung von Sicherheitslücken zu Anwendungen, zur Bewertung und Priorisierung des Risikos&lt;br&gt;
•Möglichkeit Cyber-Attacken mit Geschäftsprozesse zu korrelieren&lt;br&gt;
•Migration von Firewall-Richtlinien zwischen Firewall-Herstellern&lt;br&gt;
•Durchführung einer vollautomatischen, Zero-Touch-Sicherheitsregelwerksänderung&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/5-dinge-von-denen-sie-sicherlich"&gt;&lt;img src="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=242de32ae12a997510189ac9d08bc971&amp;source=podcast&amp;photo%5fid=61166183" width="625" height="352" type="text/html" medium="video" duration="2068" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/video_medium/couchtalk-cisco-aci-and-algosec-video.mp4?source=podcast" type="video/mp4" length="53649200"/>
            <title>CouchTalk: Cisco ACI and AlgoSec – Visibility and Automation</title>
            <link>http://video.algosec.com/couchtalk-cisco-aci-and-algosec</link>
            <description>&lt;p&gt;Kyle Wickert, Worldwide Solution Architect, and Yitzy Tannenbaum, Product Marketing Manager, discuss security policy change management throughout your Cisco and hybrid environment.&amp;nbsp;&lt;br&gt;&lt;br&gt;AlgoSec provides visibility and automation into Cisco ACI, enables intent-based networking with Cisco Tetration, and manages and automates Cisco firewalls&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/couchtalk-cisco-aci-and-algosec"&gt;&lt;img src="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/61138007</guid>
            <pubDate>Wed, 04 Mar 2020 14:51:39 GMT</pubDate>
            <media:title>CouchTalk: Cisco ACI and AlgoSec – Visibility and Automation</media:title>
            <media:description type="html">&lt;p&gt;Kyle Wickert, Worldwide Solution Architect, and Yitzy Tannenbaum, Product Marketing Manager, discuss security policy change management throughout your Cisco and hybrid environment.&amp;nbsp;&lt;br&gt;&lt;br&gt;AlgoSec provides visibility and automation into Cisco ACI, enables intent-based networking with Cisco Tetration, and manages and automates Cisco firewalls&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/couchtalk-cisco-aci-and-algosec"&gt;&lt;img src="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=57a06fc9e928eb2ba7b9e17f95f3aa86&amp;source=podcast&amp;photo%5fid=61138007" width="625" height="352" type="text/html" medium="video" duration="456" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>couchtalks</category>
            <category>Firewalls</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>SDN</category>
            <category>security policy</category>
            <category>software defined networking</category>
            <category>VMware NSX</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543316/60236501/7172c25b4f49d0dee344198731ce81d4/video_medium/cisco-aci-algosec-achieving-1-video.mp4?source=podcast" type="video/mp4" length="124838084"/>
            <title>Cisco ACI &amp; AlgoSec: Achieving application-driven security across your hybrid...</title>
            <link>http://video.algosec.com/cisco-aci-algosec-achieving-1</link>
            <description>&lt;p&gt;&lt;p&gt;As your network extends into hybrid and multi-cloud environments, including software-defined networks such as Cisco ACI, managing security policies within your hybrid estate becomes more and more complex.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Because each part of your network estate is managed in its own silo, it’s tough to get a full view of your entire network. Making changes across your entire network is a chore and validating your entire network’s security is virtually impossible.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate, and automate your entire network security policy management including both within the Cisco ACI fabric and elements outside the fabric.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this session Omer Ganot, AlgoSec’s Product Manager, will discuss how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Unify, consolidate, and automate your network security policy management, including elements within and outside of the Cisco ACI fabric.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-algosec-achieving-1"&gt;&lt;img src="http://video.algosec.com/49543316/60236501/7172c25b4f49d0dee344198731ce81d4/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/60236501</guid>
            <pubDate>Mon, 17 Feb 2020 14:42:55 GMT</pubDate>
            <media:title>Cisco ACI &amp; AlgoSec: Achieving application-driven security across your hybrid...</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;As your network extends into hybrid and multi-cloud environments, including software-defined networks such as Cisco ACI, managing security policies within your hybrid estate becomes more and more complex.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Because each part of your network estate is managed in its own silo, it’s tough to get a full view of your entire network. Making changes across your entire network is a chore and validating your entire network’s security is virtually impossible.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate, and automate your entire network security policy management including both within the Cisco ACI fabric and elements outside the fabric.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this session Omer Ganot, AlgoSec’s Product Manager, will discuss how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Unify, consolidate, and automate your network security policy management, including elements within and outside of the Cisco ACI fabric.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-algosec-achieving-1"&gt;&lt;img src="http://video.algosec.com/49543316/60236501/7172c25b4f49d0dee344198731ce81d4/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=7172c25b4f49d0dee344198731ce81d4&amp;source=podcast&amp;photo%5fid=60236501" width="625" height="352" type="text/html" medium="video" duration="3811" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543316/60236501/7172c25b4f49d0dee344198731ce81d4/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543331/56106036/fa35fd5df120cc07d820fbc124e0e123/video_medium/microsegmentation-for-network-video.mp4?source=podcast" type="video/mp4" length="71244672"/>
            <title>Microsegmentation for Network Security – AlgoSec / SANS Webinar</title>
            <link>http://video.algosec.com/microsegmentation-for-network</link>
            <description>&lt;p&gt;&lt;p&gt;Organizations heavily invest in a mix of security solutions to keep their networks safe, but still, struggle to close the security gaps. Micro-segmentation helps protect the organizations' network against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren't sure where to begin or what approach to take.&lt;/p&gt;&lt;p&gt;Dave Shackleford, the owner and principal consultant of Voodoo Security and a SANS analyst hosts Professor Avishai Wool, AlgoSecs CTO and co-founder, in this practical webinar to unveil why organizations are increasingly micro-segmenting for their networks, and guide you through each stage of a micro-segmentation project from development of the correct micro-segmentation strategy to effective implementation and maintenance of a micro-segmented network.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Register now to this live webinar to learn:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What micro-segmentation is&lt;/li&gt;&lt;li&gt;Why and how micro-segmentation can be part of the equation in protecting your network.&lt;/li&gt;&lt;li&gt;Common pitfalls in microsegmentation projects and how to avoid them.&lt;/li&gt;&lt;li&gt;The stages of a successful microsegmentation project.&lt;/li&gt;&lt;li&gt;How to monitor and maintain your micro-segmented network.&lt;/li&gt;&lt;li&gt;The role of policy management, change management, and automation in micro-segmentation.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4&gt;Speaker Bios&lt;/h4&gt;&lt;p&gt;Dave Shackleford&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.sans.org/instructors/dave-shackleford"&gt;Dave Shackleford&lt;/a&gt;, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security. Dave currently helps lead the Atlanta chapter of the Cloud Security Alliance.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;hr&gt;&lt;p&gt;Avishai Wool&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Prof. Avishai Wool, AlgoSec’s CTO and co-founder, is a world-renowned researcher and security industry veteran. He is a professor in the School of Electrical Engineering at Tel Aviv University and serves as the deputy-director of the Interdisciplinary Cyber Research Center at TAU. Prof. Wool has published more than 110 research papers and holds 13 US Patents, and has served on the program committee of the leading IEEE and ACM conferences on computer and network security. Prof. Wool has a B.Sc. (Cum Laude) in Mathematics and Computer Science, and a M.Sc. and Ph.D. in Computer Science.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-for-network"&gt;&lt;img src="http://video.algosec.com/49543331/56106036/fa35fd5df120cc07d820fbc124e0e123/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/56106036</guid>
            <pubDate>Thu, 26 Sep 2019 13:53:23 GMT</pubDate>
            <media:title>Microsegmentation for Network Security – AlgoSec / SANS Webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;Organizations heavily invest in a mix of security solutions to keep their networks safe, but still, struggle to close the security gaps. Micro-segmentation helps protect the organizations' network against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren't sure where to begin or what approach to take.&lt;/p&gt;&lt;p&gt;Dave Shackleford, the owner and principal consultant of Voodoo Security and a SANS analyst hosts Professor Avishai Wool, AlgoSecs CTO and co-founder, in this practical webinar to unveil why organizations are increasingly micro-segmenting for their networks, and guide you through each stage of a micro-segmentation project from development of the correct micro-segmentation strategy to effective implementation and maintenance of a micro-segmented network.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Register now to this live webinar to learn:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What micro-segmentation is&lt;/li&gt;&lt;li&gt;Why and how micro-segmentation can be part of the equation in protecting your network.&lt;/li&gt;&lt;li&gt;Common pitfalls in microsegmentation projects and how to avoid them.&lt;/li&gt;&lt;li&gt;The stages of a successful microsegmentation project.&lt;/li&gt;&lt;li&gt;How to monitor and maintain your micro-segmented network.&lt;/li&gt;&lt;li&gt;The role of policy management, change management, and automation in micro-segmentation.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4&gt;Speaker Bios&lt;/h4&gt;&lt;p&gt;Dave Shackleford&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.sans.org/instructors/dave-shackleford"&gt;Dave Shackleford&lt;/a&gt;, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security. Dave currently helps lead the Atlanta chapter of the Cloud Security Alliance.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;hr&gt;&lt;p&gt;Avishai Wool&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Prof. Avishai Wool, AlgoSec’s CTO and co-founder, is a world-renowned researcher and security industry veteran. He is a professor in the School of Electrical Engineering at Tel Aviv University and serves as the deputy-director of the Interdisciplinary Cyber Research Center at TAU. Prof. Wool has published more than 110 research papers and holds 13 US Patents, and has served on the program committee of the leading IEEE and ACM conferences on computer and network security. Prof. Wool has a B.Sc. (Cum Laude) in Mathematics and Computer Science, and a M.Sc. and Ph.D. in Computer Science.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/microsegmentation-for-network"&gt;&lt;img src="http://video.algosec.com/49543331/56106036/fa35fd5df120cc07d820fbc124e0e123/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fa35fd5df120cc07d820fbc124e0e123&amp;source=podcast&amp;photo%5fid=56106036" width="625" height="352" type="text/html" medium="video" duration="3540" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543331/56106036/fa35fd5df120cc07d820fbc124e0e123/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>Prof Wool</category>
            <category>SANS</category>
            <category>security policy</category>
            <category>webinar</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/video_medium/the-capital-one-breach-how-to-avoid-video.mp4?source=podcast" type="video/mp4" length="10880935"/>
            <title>The Capital One Breach: How to avoid the Misconfiguration danger?</title>
            <link>http://video.algosec.com/the-capital-one-breach-how-to-avoid</link>
            <description>&lt;p&gt;&lt;b&gt;Prof. Avishai Wool explains the Capital One data breach, which exposed the personal information of nearly 106 million people.&lt;/b&gt; &lt;br&gt;&lt;br&gt;The AlgoSec network security policy management solution provides holistic visibility across cloud, on-premise, SDN and hybrid environments, enabling you to proactively analyze risk from the business perspective, intelligently automate security changes, avoid misconfiguration incidents and ensure continuous compliance.
&lt;p&gt;&lt;b&gt;Click &lt;/b&gt;&lt;a href="https://www.algosec.com/lp/see-algosec-action-2/?utm_source=Email&amp;amp;utm_campaign=2019-08-06_The_Capital_One_Breach_Global_%5BEM%5D_%5BQ32019%5Dhttp://"&gt;&lt;b&gt;here &lt;/b&gt;&lt;/a&gt;&lt;b&gt;to learn how.&lt;/b&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-capital-one-breach-how-to-avoid"&gt;&lt;img src="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/standard/download-7-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54506817</guid>
            <pubDate>Tue, 06 Aug 2019 15:36:01 GMT</pubDate>
            <media:title>The Capital One Breach: How to avoid the Misconfiguration danger?</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Prof. Avishai Wool explains the Capital One data breach, which exposed the personal information of nearly 106 million people.&lt;/b&gt; &lt;br&gt;&lt;br&gt;The AlgoSec network security policy management solution provides holistic visibility across cloud, on-premise, SDN and hybrid environments, enabling you to proactively analyze risk from the business perspective, intelligently automate security changes, avoid misconfiguration incidents and ensure continuous compliance.
&lt;p&gt;&lt;b&gt;Click &lt;/b&gt;&lt;a href="https://www.algosec.com/lp/see-algosec-action-2/?utm_source=Email&amp;amp;utm_campaign=2019-08-06_The_Capital_One_Breach_Global_%5BEM%5D_%5BQ32019%5Dhttp://"&gt;&lt;b&gt;here &lt;/b&gt;&lt;/a&gt;&lt;b&gt;to learn how.&lt;/b&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-capital-one-breach-how-to-avoid"&gt;&lt;img src="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/standard/download-7-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9df22f0a0caaa15f1c04a08448676bee&amp;source=podcast&amp;photo%5fid=54506817" width="625" height="352" type="text/html" medium="video" duration="221" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/standard/download-7-thumbnail.jpg" width="600" height="338"/>
            <category>cyber security</category>
            <category>Data breach</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/video_medium/cisco-aci-hybrid-networks-breaking-video.mp4?source=podcast" type="video/mp4" length="103142794"/>
            <title>Cisco ACI &amp; Hybrid Networks Breaking Down Silos with Central Policy Management</title>
            <link>http://video.algosec.com/cisco-aci-hybrid-networks-breaking</link>
            <description>&lt;p&gt;&lt;b&gt;Yonatan Klein, Director of Product Management&lt;/b&gt; | July 30, 2019
&lt;p&gt;While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.&lt;/p&gt;
&lt;p&gt;Each part of your network estate is managed in its own independent silo instead of being holistically managed.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;He covers how to:&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/li&gt;&lt;li&gt;Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices&lt;/li&gt;&lt;li&gt;Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-hybrid-networks-breaking"&gt;&lt;img src="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54329483</guid>
            <pubDate>Tue, 30 Jul 2019 19:56:43 GMT</pubDate>
            <media:title>Cisco ACI &amp; Hybrid Networks Breaking Down Silos with Central Policy Management</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yonatan Klein, Director of Product Management&lt;/b&gt; | July 30, 2019
&lt;p&gt;While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.&lt;/p&gt;
&lt;p&gt;Each part of your network estate is managed in its own independent silo instead of being holistically managed.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;He covers how to:&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/li&gt;&lt;li&gt;Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices&lt;/li&gt;&lt;li&gt;Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-hybrid-networks-breaking"&gt;&lt;img src="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cb75f925661e325e6248fecc17f893d7&amp;source=podcast&amp;photo%5fid=54329483" width="625" height="352" type="text/html" medium="video" duration="3106" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cisco</category>
            <category>Cisco Tetration</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>hybrid environment</category>
            <category>network security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/video_medium/algosec-and-cisco-aci-for-improved-video.mp4?source=podcast" type="video/mp4" length="8705804"/>
            <title>AlgoSec and Cisco ACI for Improved Data Center Security, Compliance and...</title>
            <link>http://video.algosec.com/algosec-and-cisco-aci-for-improved</link>
            <description>&lt;p&gt;AlgoSec and Cisco ACI deliver security policy across the entire network, enables automated security policy change management for multi-vendor devices, provide risk and compliance analysis, and more.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-and-cisco-aci-for-improved"&gt;&lt;img src="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53965291</guid>
            <pubDate>Tue, 30 Jul 2019 09:13:39 GMT</pubDate>
            <media:title>AlgoSec and Cisco ACI for Improved Data Center Security, Compliance and...</media:title>
            <media:description type="html">&lt;p&gt;AlgoSec and Cisco ACI deliver security policy across the entire network, enables automated security policy change management for multi-vendor devices, provide risk and compliance analysis, and more.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-and-cisco-aci-for-improved"&gt;&lt;img src="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9eb3f8c5a573378055ed58b253828b2c&amp;source=podcast&amp;photo%5fid=53965291" width="625" height="352" type="text/html" medium="video" duration="487" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>aci</category>
            <category>algosec</category>
            <category>automated security policy</category>
            <category>cisco</category>
            <category>contracts</category>
            <category>cyber</category>
            <category>juniper</category>
            <category>network security</category>
            <category>policy</category>
            <category>private cloud</category>
            <category>sdn</category>
            <category>security policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/video_medium/avoiding-the-securityagility-video.mp4?source=podcast" type="video/mp4" length="87131096"/>
            <title>Avoiding the Security/Agility Tradeoff with Network Security Policy</title>
            <link>http://video.algosec.com/avoiding-the-securityagility</link>
            <description>&lt;p&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | July 10, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Business application deployments and changes require IT, networking and security teams to be more agile than ever before.&lt;br&gt;
But frequently, this agility comes at the expense of security and compliance and enables network breaches and cyber-attacks.&lt;/p&gt;
&lt;p&gt;In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, covers how network security policy automation helps you avoid this conflict.&lt;/p&gt;
&lt;p&gt;Watch the webinar to learn how to:&lt;br&gt;
•	Plan for the entire network security lifecycle&lt;br&gt;
•	Discover your network topology and traffic flows&lt;br&gt;
•	Ensure continuous compliance and identify risks and compliance violations&lt;br&gt;
•	Easily implement changes across your hybrid network environment&lt;br&gt;
•	Mandate a consistent and unified change process&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/avoiding-the-securityagility"&gt;&lt;img src="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53789320</guid>
            <pubDate>Thu, 11 Jul 2019 12:46:31 GMT</pubDate>
            <media:title>Avoiding the Security/Agility Tradeoff with Network Security Policy</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | July 10, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Business application deployments and changes require IT, networking and security teams to be more agile than ever before.&lt;br&gt;
But frequently, this agility comes at the expense of security and compliance and enables network breaches and cyber-attacks.&lt;/p&gt;
&lt;p&gt;In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, covers how network security policy automation helps you avoid this conflict.&lt;/p&gt;
&lt;p&gt;Watch the webinar to learn how to:&lt;br&gt;
•	Plan for the entire network security lifecycle&lt;br&gt;
•	Discover your network topology and traffic flows&lt;br&gt;
•	Ensure continuous compliance and identify risks and compliance violations&lt;br&gt;
•	Easily implement changes across your hybrid network environment&lt;br&gt;
•	Mandate a consistent and unified change process&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/avoiding-the-securityagility"&gt;&lt;img src="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c9187dd732523aafe8b688e78ccb439d&amp;source=podcast&amp;photo%5fid=53789320" width="625" height="352" type="text/html" medium="video" duration="2613" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>automation</category>
            <category>change management</category>
            <category>compliance</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/video_medium/effectively-managing-security-video.mp4?source=podcast" type="video/mp4" length="109360914"/>
            <title>Effectively Managing Security Policy | Joint Fortinet &amp; AlgoSec Webinar</title>
            <link>http://video.algosec.com/effectively-managing-security</link>
            <description>&lt;p&gt;&lt;b&gt;Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec)&lt;/b&gt; | Jun 26 2019
&lt;p&gt;In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.&lt;/p&gt;
&lt;p&gt;In this webinar, Satish Veerapuneni, Director of Products and Solutions at Fortinet and Yoav Karnibad, Product Manager at AlgoSec will discuss how joint customers benefit from AlgoSec’s multi-vendor security policy management capabilities while leveraging Fortinet’s industry-leading Security Fabric’s FortiManager &amp;amp; FortiAnalyzer.&lt;/p&gt;
&lt;p&gt;Join this live webinar to learn how to:&lt;br&gt;
• Automate policy optimization and risk assessment across all your security devices.&lt;br&gt;
• Enhance visibility and exercise greater control over your hybrid / heterogeneous network&lt;br&gt;
• Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation&lt;br&gt;
• Assess risk and ensure regulatory compliance across the entire enterprise environment&lt;br&gt;
• Realize single pane of glass management with advanced analysis and management of policy modifications through Fortinet Security Fabric’s FortiManager/FortiAnalyzer&amp;nbsp;and AlgoSec’s Firewall Analyzer, FireFlow and BusinessFlow&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/effectively-managing-security"&gt;&lt;img src="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53517696</guid>
            <pubDate>Mon, 01 Jul 2019 13:56:06 GMT</pubDate>
            <media:title>Effectively Managing Security Policy | Joint Fortinet &amp; AlgoSec Webinar</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec)&lt;/b&gt; | Jun 26 2019
&lt;p&gt;In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.&lt;/p&gt;
&lt;p&gt;In this webinar, Satish Veerapuneni, Director of Products and Solutions at Fortinet and Yoav Karnibad, Product Manager at AlgoSec will discuss how joint customers benefit from AlgoSec’s multi-vendor security policy management capabilities while leveraging Fortinet’s industry-leading Security Fabric’s FortiManager &amp;amp; FortiAnalyzer.&lt;/p&gt;
&lt;p&gt;Join this live webinar to learn how to:&lt;br&gt;
• Automate policy optimization and risk assessment across all your security devices.&lt;br&gt;
• Enhance visibility and exercise greater control over your hybrid / heterogeneous network&lt;br&gt;
• Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation&lt;br&gt;
• Assess risk and ensure regulatory compliance across the entire enterprise environment&lt;br&gt;
• Realize single pane of glass management with advanced analysis and management of policy modifications through Fortinet Security Fabric’s FortiManager/FortiAnalyzer&amp;nbsp;and AlgoSec’s Firewall Analyzer, FireFlow and BusinessFlow&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/effectively-managing-security"&gt;&lt;img src="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b6e522c1eb5123a2a88d100caf162d8b&amp;source=podcast&amp;photo%5fid=53517696" width="625" height="352" type="text/html" medium="video" duration="3334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>cyber Security</category>
            <category>FireFlow</category>
            <category>Firewall Management</category>
            <category>Fortinet</category>
            <category>Network Security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/video_medium/securely-managing-application-video.mp4?source=podcast" type="video/mp4" length="38613866"/>
            <title>Securely Managing Application Connectivity – Best Practices</title>
            <link>http://video.algosec.com/securely-managing-application</link>
            <description>&lt;p&gt;&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securely-managing-application"&gt;&lt;img src="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/53083724</guid>
            <pubDate>Sun, 16 Jun 2019 11:42:42 GMT</pubDate>
            <media:title>Securely Managing Application Connectivity – Best Practices</media:title>
            <media:description type="html">&lt;p&gt;&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/securely-managing-application"&gt;&lt;img src="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3a53e9daff9a2bc19930ddc029e874d9&amp;source=podcast&amp;photo%5fid=53083724" width="625" height="352" type="text/html" medium="video" duration="1111" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Application Security</category>
            <category>Audit and Compliance</category>
            <category>change management</category>
            <category>cloud security</category>
            <category>Connectivity</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/video_medium/firewall-rule-recertification-with-video.mp4?source=podcast" type="video/mp4" length="74582768"/>
            <title>Firewall Rule Recertification with Application Connectivity</title>
            <link>http://video.algosec.com/firewall-rule-recertification-with</link>
            <description>&lt;p&gt;Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/firewall-rule-recertification-with"&gt;&lt;img src="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/51313899</guid>
            <pubDate>Mon, 29 Apr 2019 11:39:25 GMT</pubDate>
            <media:title>Firewall Rule Recertification with Application Connectivity</media:title>
            <media:description type="html">&lt;p&gt;Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/firewall-rule-recertification-with"&gt;&lt;img src="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=28b03ebf89a04b04bfe7ccebae9cb7f5&amp;source=podcast&amp;photo%5fid=51313899" width="625" height="352" type="text/html" medium="video" duration="1197" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/standard/download-13-thumbnail.jpg" width="600" height="338"/>
            <category> Compliance</category>
            <category> Connectivity</category>
            <category> Cyber Security</category>
            <category> firewall management</category>
            <category> firewall rule recertification</category>
            <category>Firewalls</category>
            <category> Network Security</category>
            <category> Security Management</category>
            <category> security policy</category>
            <category> security tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543331/49615205/38f8415e51bb5d766d89582e212bb667/video_medium/network-security-at-the-speed-of-video.mp4?source=podcast" type="video/mp4" length="110834946"/>
            <title>Network security at the speed of DevOps</title>
            <link>http://video.algosec.com/network-security-at-the-speed-of</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Anner Kushnir, VP Technology&lt;/b&gt; | Jul 24 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;DevOps methodologies have become extremely popular to enable agile application development and delivery.&lt;br&gt;Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.&lt;br&gt;&lt;br&gt;In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.&lt;br&gt;&lt;br&gt;This webinar will teach you how to:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery&lt;/li&gt;&lt;li&gt;Avoid external out-of-band network connectivity problems that require separate and manual handling&lt;/li&gt;&lt;li&gt;Ensure continuous compliance and auditability throughout the application delivery process&lt;/li&gt;&lt;li&gt;Get clearly documented application connectivity requirements which help prevent disruptions to the business&lt;/li&gt;&lt;li&gt;Bridge the gap between application developers and network security throughout the entire application lifecycle&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-at-the-speed-of"&gt;&lt;img src="http://video.algosec.com/49543331/49615205/38f8415e51bb5d766d89582e212bb667/standard/download-9-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615205</guid>
            <pubDate>Mon, 15 Apr 2019 17:51:11 GMT</pubDate>
            <media:title>Network security at the speed of DevOps</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Anner Kushnir, VP Technology&lt;/b&gt; | Jul 24 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;DevOps methodologies have become extremely popular to enable agile application development and delivery.&lt;br&gt;Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.&lt;br&gt;&lt;br&gt;In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.&lt;br&gt;&lt;br&gt;This webinar will teach you how to:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery&lt;/li&gt;&lt;li&gt;Avoid external out-of-band network connectivity problems that require separate and manual handling&lt;/li&gt;&lt;li&gt;Ensure continuous compliance and auditability throughout the application delivery process&lt;/li&gt;&lt;li&gt;Get clearly documented application connectivity requirements which help prevent disruptions to the business&lt;/li&gt;&lt;li&gt;Bridge the gap between application developers and network security throughout the entire application lifecycle&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-at-the-speed-of"&gt;&lt;img src="http://video.algosec.com/49543331/49615205/38f8415e51bb5d766d89582e212bb667/standard/download-9-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=38f8415e51bb5d766d89582e212bb667&amp;source=podcast&amp;photo%5fid=49615205" width="625" height="352" type="text/html" medium="video" duration="3309" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543331/49615205/38f8415e51bb5d766d89582e212bb667/standard/download-9-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>devops</category>
            <category>network security</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/video_medium/migration-to-cisco-firepower-video.mp4?source=podcast" type="video/mp4" length="3602179"/>
            <title>Migration to Cisco Firepower</title>
            <link>http://video.algosec.com/migration-to-cisco-firepower</link>
            <description>&lt;p&gt;How to utilize the AlgoSec solution to migrate to Cisco Firepower&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migration-to-cisco-firepower"&gt;&lt;img src="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54117797</guid>
            <pubDate>Wed, 10 Apr 2019 00:00:00 GMT</pubDate>
            <media:title>Migration to Cisco Firepower</media:title>
            <media:description type="html">&lt;p&gt;How to utilize the AlgoSec solution to migrate to Cisco Firepower&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/migration-to-cisco-firepower"&gt;&lt;img src="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0534c3a48e8560e33c68423031611e30&amp;source=podcast&amp;photo%5fid=54117797" width="625" height="352" type="text/html" medium="video" duration="69" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>asa</category>
            <category>cisco</category>
            <category>firepower</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>juniper</category>
            <category>managment</category>
            <category>policy</category>
            <category>Security Policy</category>
            <category>visibility</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/video_medium/taming-the-storm-clouds-managing-video.mp4?source=podcast" type="video/mp4" length="87142532"/>
            <title>Taming the storm clouds: managing network security across hybrid and multi-cloud</title>
            <link>http://video.algosec.com/taming-the-storm-clouds-managing</link>
            <description>&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49895193</guid>
            <pubDate>Thu, 28 Mar 2019 13:04:00 GMT</pubDate>
            <media:title>Taming the storm clouds: managing network security across hybrid and multi-cloud</media:title>
            <media:description type="html">&lt;p&gt;Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/taming-the-storm-clouds-managing"&gt;&lt;img src="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dc4df391a76a089c566104a63f8badf5&amp;source=podcast&amp;photo%5fid=49895193" width="625" height="352" type="text/html" medium="video" duration="2733" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Cloud Security</category>
            <category>Cyber Security</category>
            <category>cyber threat</category>
            <category>Cyber Threats</category>
            <category>DevOps</category>
            <category>Firewall Management</category>
            <category>Firewalls</category>
            <category>IT Security</category>
            <category>Network Security</category>
            <category>Risk Management</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/video_medium/movin-on-up-to-the-cloud-how-to-video.mp4?source=podcast" type="video/mp4" length="48861838"/>
            <title>Movin' On Up to the Cloud: How to Migrate your Application Connectivity</title>
            <link>http://video.algosec.com/movin-on-up-to-the-cloud-how-to</link>
            <description>&lt;p&gt;&lt;span&gt;&lt;b&gt;Avivi Siman-Tov, Product Manager |&lt;/b&gt; Feb 6 2018&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;br&gt;&lt;/span&gt;Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.&lt;br&gt;&lt;br&gt;If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.&amp;nbsp;&lt;br&gt;&lt;br&gt;Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, explores how to simplify and accelerate large-scale complex application migration projects, while making security a priority.&amp;nbsp;&lt;br&gt;&lt;br&gt;Discover best practices to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Automatically discover applications and their existing connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups&amp;nbsp;&lt;/li&gt;&lt;li&gt;Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Assess the risk and ensure compliance throughout the migration process&amp;nbsp;&lt;/li&gt;&lt;li&gt;Deliver unified security policy management across the hybrid enterprise cloud environment&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/movin-on-up-to-the-cloud-how-to"&gt;&lt;img src="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49721659</guid>
            <pubDate>Wed, 20 Mar 2019 10:53:55 GMT</pubDate>
            <media:title>Movin' On Up to the Cloud: How to Migrate your Application Connectivity</media:title>
            <media:description type="html">&lt;p&gt;&lt;span&gt;&lt;b&gt;Avivi Siman-Tov, Product Manager |&lt;/b&gt; Feb 6 2018&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;br&gt;&lt;/span&gt;Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.&lt;br&gt;&lt;br&gt;If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.&amp;nbsp;&lt;br&gt;&lt;br&gt;Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, explores how to simplify and accelerate large-scale complex application migration projects, while making security a priority.&amp;nbsp;&lt;br&gt;&lt;br&gt;Discover best practices to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Automatically discover applications and their existing connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups&amp;nbsp;&lt;/li&gt;&lt;li&gt;Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Assess the risk and ensure compliance throughout the migration process&amp;nbsp;&lt;/li&gt;&lt;li&gt;Deliver unified security policy management across the hybrid enterprise cloud environment&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/movin-on-up-to-the-cloud-how-to"&gt;&lt;img src="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b7638ecd622bb415d654ed299e5208b2&amp;source=podcast&amp;photo%5fid=49721659" width="625" height="352" type="text/html" medium="video" duration="1788" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>application discovery</category>
            <category>cloudsecurity</category>
            <category>Firewall Management</category>
            <category>hybrid</category>
            <category>migrating applications</category>
            <category>networksecurity</category>
            <category>network security</category>
            <category>risk assessment</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/video_medium/algosec-zero-trust-presentation-video.mp4?source=podcast" type="video/mp4" length="95570277"/>
            <title>AlgoSec Zero Trust Presentation @Forrester Event</title>
            <link>http://video.algosec.com/algosec-zero-trust-presentation</link>
            <description>&lt;p&gt;The Forrester Zero Trust Model, when applied to network security, can help organizations develop robust prevention, detection, and incident response capabilities. The session, presented at the Security and Privacy event in Washington DC covered the challenges organizations face and approaches that can be employed, including steps to achieve visibility, policy management automation, application connectivity analysis and network segmentation.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-zero-trust-presentation"&gt;&lt;img src="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181720</guid>
            <pubDate>Thu, 15 Nov 2018 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Zero Trust Presentation @Forrester Event</media:title>
            <media:description type="html">&lt;p&gt;The Forrester Zero Trust Model, when applied to network security, can help organizations develop robust prevention, detection, and incident response capabilities. The session, presented at the Security and Privacy event in Washington DC covered the challenges organizations face and approaches that can be employed, including steps to achieve visibility, policy management automation, application connectivity analysis and network segmentation.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-zero-trust-presentation"&gt;&lt;img src="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fb1c7af2f781806e661e0aef5ae24af4&amp;source=podcast&amp;photo%5fid=44181720" width="625" height="469" type="text/html" medium="video" duration="1640" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>algosec</category>
            <category>automation</category>
            <category>aws</category>
            <category>azure</category>
            <category>checkpoint</category>
            <category>cisco</category>
            <category>forrester</category>
            <category>juniper</category>
            <category>Management</category>
            <category>micro segmentation</category>
            <category>networking</category>
            <category>network security</category>
            <category>palo alto</category>
            <category>security policy</category>
            <category>segmentation</category>
            <category>trust</category>
            <category>visibility</category>
            <category>zero</category>
            <category>zero trust</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/video_medium/selecting-the-right-security-policy-video.mp4?source=podcast" type="video/mp4" length="76996065"/>
            <title>Selecting the right security policy management solution for your organization</title>
            <link>http://video.algosec.com/selecting-the-right-security-policy</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect&amp;nbsp;&lt;/b&gt;&lt;br&gt;&lt;/p&gt;IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.&amp;nbsp;&lt;br&gt;In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.&amp;nbsp;&lt;br&gt;Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.&amp;nbsp;&lt;br&gt;&lt;br&gt;Key topics include:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Intelligent automation is more than just adding policies&lt;/li&gt;&lt;li&gt;Letting a business-centric approach take the lead&amp;nbsp;&lt;/li&gt;&lt;li&gt;Extracting the best from existing automation processes and creating new ones&amp;nbsp;&lt;/li&gt;&lt;li&gt;Managing it all together: cloud, SDN and on-premise&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/selecting-the-right-security-policy"&gt;&lt;img src="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615259</guid>
            <pubDate>Wed, 17 Oct 2018 18:30:00 GMT</pubDate>
            <media:title>Selecting the right security policy management solution for your organization</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect&amp;nbsp;&lt;/b&gt;&lt;br&gt;&lt;/p&gt;IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.&amp;nbsp;&lt;br&gt;In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.&amp;nbsp;&lt;br&gt;Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.&amp;nbsp;&lt;br&gt;&lt;br&gt;Key topics include:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Intelligent automation is more than just adding policies&lt;/li&gt;&lt;li&gt;Letting a business-centric approach take the lead&amp;nbsp;&lt;/li&gt;&lt;li&gt;Extracting the best from existing automation processes and creating new ones&amp;nbsp;&lt;/li&gt;&lt;li&gt;Managing it all together: cloud, SDN and on-premise&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/selecting-the-right-security-policy"&gt;&lt;img src="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=26569be0faf52cc329bf82bf37a909f1&amp;source=podcast&amp;photo%5fid=49615259" width="625" height="352" type="text/html" medium="video" duration="2338" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>automation</category>
            <category>cloud security</category>
            <category>Firewall Management</category>
            <category>network security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/video_medium/network-security-audit-passing-your-video.mp4?source=podcast" type="video/mp4" length="97099801"/>
            <title>Network Security Audit? Passing Your Next One with Flying Colors</title>
            <link>http://video.algosec.com/network-security-audit-passing-your</link>
            <description>&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt; | Sep 6 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are required to maintain an unfailing state of compliance with laws and regulations.&amp;nbsp;&lt;br&gt;&lt;br&gt;Do you know about the upcoming PCI-DSS 3.2.1 standard and what it means for your operation? Are you ready to be audited?&lt;br&gt;&lt;br&gt;Like fire drills, audits can catch us unprepared and expose inadequacies. What should we do now to make sure we pass the next audit with ease?&lt;br&gt;&lt;br&gt;Presented by renowned industry expert, Professor Avishai Wool, this technical webinar imparts best practices and reveals specific techniques to help you make sure that your compliance posture stands up to any audit.&lt;br&gt;&lt;br&gt;In this webinar, Professor Wool discusses:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Know if your network is compliant with the new PCI standard&lt;/li&gt;&lt;li&gt;Upgrade to the secure alternative to SSL to safeguard your payment data&lt;/li&gt;&lt;li&gt;Prepare for the next audit&lt;/li&gt;&lt;li&gt;Assure continuous compliance&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-audit-passing-your"&gt;&lt;img src="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/49615104</guid>
            <pubDate>Thu, 06 Sep 2018 17:00:00 GMT</pubDate>
            <media:title>Network Security Audit? Passing Your Next One with Flying Colors</media:title>
            <media:description type="html">&lt;p&gt;&lt;p&gt;&lt;span&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt; | Sep 6 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are required to maintain an unfailing state of compliance with laws and regulations.&amp;nbsp;&lt;br&gt;&lt;br&gt;Do you know about the upcoming PCI-DSS 3.2.1 standard and what it means for your operation? Are you ready to be audited?&lt;br&gt;&lt;br&gt;Like fire drills, audits can catch us unprepared and expose inadequacies. What should we do now to make sure we pass the next audit with ease?&lt;br&gt;&lt;br&gt;Presented by renowned industry expert, Professor Avishai Wool, this technical webinar imparts best practices and reveals specific techniques to help you make sure that your compliance posture stands up to any audit.&lt;br&gt;&lt;br&gt;In this webinar, Professor Wool discusses:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Know if your network is compliant with the new PCI standard&lt;/li&gt;&lt;li&gt;Upgrade to the secure alternative to SSL to safeguard your payment data&lt;/li&gt;&lt;li&gt;Prepare for the next audit&lt;/li&gt;&lt;li&gt;Assure continuous compliance&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/network-security-audit-passing-your"&gt;&lt;img src="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/standard/download-2-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=136e59e2afb568e47149553c486bea6e&amp;source=podcast&amp;photo%5fid=49615104" width="625" height="352" type="text/html" medium="video" duration="3379" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/standard/download-2-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>automation</category>
            <category>compliance</category>
            <category>Firewall Management</category>
            <category>network security</category>
            <category>pci</category>
            <category>pci audit</category>
            <category>prof wool</category>
            <category>security audit</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/video_medium/cisco-aci-and-algosec-integration-video.mp4?source=podcast" type="video/mp4" length="7894287"/>
            <title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration</link>
            <description>&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181812</guid>
            <pubDate>Mon, 18 Jun 2018 03:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</media:title>
            <media:description type="html">&lt;p&gt;nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration"&gt;&lt;img src="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ea3eaaff1b36a7756bfa854f08f6b30&amp;source=podcast&amp;photo%5fid=44181812" width="625" height="352" type="text/html" medium="video" duration="376" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181789/8e65c6e94a22668a3b93501df11ec734/video_medium/automate-the-entire-security-policy-video.mp4?source=podcast" type="video/mp4" length="4722702"/>
            <title>Automate the entire security policy change management process   with zero touch</title>
            <link>http://video.algosec.com/automate-the-entire-security-policy</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/automate-the-entire-security-policy"&gt;&lt;img src="http://video.algosec.com/4465660/44181789/8e65c6e94a22668a3b93501df11ec734/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181789</guid>
            <pubDate>Sun, 22 Apr 2018 03:00:00 GMT</pubDate>
            <media:title>Automate the entire security policy change management process   with zero touch</media:title>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/automate-the-entire-security-policy"&gt;&lt;img src="http://video.algosec.com/4465660/44181789/8e65c6e94a22668a3b93501df11ec734/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=8e65c6e94a22668a3b93501df11ec734&amp;source=podcast&amp;photo%5fid=44181789" width="625" height="469" type="text/html" medium="video" duration="314" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181789/8e65c6e94a22668a3b93501df11ec734/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>automate security policy</category>
            <category>security policy</category>
            <category>security policy automation</category>
            <category>security policy change management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/video_medium/sharing-network-security-video.mp4?source=podcast" type="video/mp4" length="16792470"/>
            <title>Sharing Network Security Information with the Wider IT Community With Team...</title>
            <link>http://video.algosec.com/sharing-network-security</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sharing-network-security"&gt;&lt;img src="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181793</guid>
            <pubDate>Tue, 30 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Sharing Network Security Information with the Wider IT Community With Team...</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/sharing-network-security"&gt;&lt;img src="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=82a8e57717222b74b1b7f76f49f5d8aa&amp;source=podcast&amp;photo%5fid=44181793" width="625" height="352" type="text/html" medium="video" duration="287" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>avishai wool</category>
            <category>chatbot</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>ms teams</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>skype for business</category>
            <category>slack</category>
            <category>team collaboration tools</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/video_medium/the-benefits-of-mapping-firewall-video.mp4?source=podcast" type="video/mp4" length="14101048"/>
            <title>The Benefits of Mapping Firewall Rules to Business Applications</title>
            <link>http://video.algosec.com/the-benefits-of-mapping-firewall</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-benefits-of-mapping-firewall"&gt;&lt;img src="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181854</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>The Benefits of Mapping Firewall Rules to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-benefits-of-mapping-firewall"&gt;&lt;img src="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=72ce166d6692eacad1d4807eb07ea18e&amp;source=podcast&amp;photo%5fid=44181854" width="625" height="352" type="text/html" medium="video" duration="243" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity flows</category>
            <category>businessflow</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rule management</category>
            <category>network connectivity</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/video_medium/new-how-to-manage-dynamic-objects-video.mp4?source=podcast" type="video/mp4" length="19361181"/>
            <title>New! How to Manage Dynamic Objects in Cloud Environments</title>
            <link>http://video.algosec.com/new-how-to-manage-dynamic-objects</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-how-to-manage-dynamic-objects"&gt;&lt;img src="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181841</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>New! How to Manage Dynamic Objects in Cloud Environments</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-how-to-manage-dynamic-objects"&gt;&lt;img src="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0524b2eaa5d233030ef32c3f04935a7b&amp;source=podcast&amp;photo%5fid=44181841" width="625" height="352" type="text/html" medium="video" duration="359" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon web services security</category>
            <category>avishai wool</category>
            <category>aws</category>
            <category>aws security</category>
            <category>cloud security</category>
            <category>dynamic objects aws</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/video_medium/lesson-7-how-to-prepare-for-network-video.mp4?source=podcast" type="video/mp4" length="13749334"/>
            <title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</title>
            <link>http://video.algosec.com/lesson-7-how-to-prepare-for-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181819</guid>
            <pubDate>Fri, 05 Jan 2018 02:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment...</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-prepare-for-network"&gt;&lt;img src="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f796f81cc13de312cc8c7bd06b607f5b&amp;source=podcast&amp;photo%5fid=44181819" width="625" height="352" type="text/html" medium="video" duration="247" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>avishai wool</category>
            <category>cloud security</category>
            <category>Data Center</category>
            <category>data center security</category>
            <category>east west traffic</category>
            <category>Firewall Management</category>
            <category>firewall rule management</category>
            <category>firewall rules</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>prof. wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/video_medium/how-to-intelligently-select-the-video.mp4?source=podcast" type="video/mp4" length="25563649"/>
            <title>How to Intelligently Select the Security Groups to Modify When Managing...</title>
            <link>http://video.algosec.com/how-to-intelligently-select-the</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 7&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-intelligently-select-the"&gt;&lt;img src="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181920</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>How to Intelligently Select the Security Groups to Modify When Managing...</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 7&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-intelligently-select-the"&gt;&lt;img src="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1772ee30e20c98c8d8c7667649d3e7cc&amp;source=podcast&amp;photo%5fid=44181920" width="625" height="352" type="text/html" medium="video" duration="419" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud firewalls</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>hybrid cloud security</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>public cloud security</category>
            <category>publick cloud</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/video_medium/lesson-7-how-to-aggregate-network-video.mp4?source=podcast" type="video/mp4" length="21243911"/>
            <title>Lesson 7: How to Aggregate Network Flows Into Application Flows</title>
            <link>http://video.algosec.com/lesson-7-how-to-aggregate-network</link>
            <description>&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181876</guid>
            <pubDate>Tue, 26 Sep 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 7: How to Aggregate Network Flows Into Application Flows</media:title>
            <media:description type="html">&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-7-how-to-aggregate-network"&gt;&lt;img src="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d5894f7ffc54d4f9858292bb6ee2723c&amp;source=podcast&amp;photo%5fid=44181876" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec</category>
            <category>application connectivity</category>
            <category>application discovery</category>
            <category>application flows</category>
            <category>cloud security</category>
            <category>data center applications</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network connectivity flows</category>
            <category>network security</category>
            <category>network sniffers</category>
            <category>network traffic</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/video_medium/lesson-17-pci-linking-video.mp4?source=podcast" type="video/mp4" length="15245868"/>
            <title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</title>
            <link>http://video.algosec.com/lesson-17-pci-linking</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181937</guid>
            <pubDate>Tue, 29 Aug 2017 03:00:00 GMT</pubDate>
            <media:title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-17-pci-linking"&gt;&lt;img src="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=fdf0e5036006d18cfb40fc57ac280e8d&amp;source=podcast&amp;photo%5fid=44181937" width="625" height="352" type="text/html" medium="video" duration="281" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>nessus</category>
            <category>Network Security</category>
            <category>pci</category>
            <category>pci dss</category>
            <category>prof wool</category>
            <category>rapid7</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>tenable</category>
            <category>vulnerabilities</category>
            <category>vulnerability scanners</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/video_medium/the-right-way-to-audit-aws-policies-video.mp4?source=podcast" type="video/mp4" length="20476785"/>
            <title>The Right Way to Audit AWS Policies</title>
            <link>http://video.algosec.com/the-right-way-to-audit-aws-policies</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-right-way-to-audit-aws-policies"&gt;&lt;img src="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181993</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>The Right Way to Audit AWS Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-right-way-to-audit-aws-policies"&gt;&lt;img src="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b1c1f67722fb6eb47731b6e174f7b8ae&amp;source=podcast&amp;photo%5fid=44181993" width="625" height="352" type="text/html" medium="video" duration="380" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud firewalls</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>hybrid cloud security</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>public cloud security</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/video_medium/how-to-integrate-security-into-the-1-video.mp4?source=podcast" type="video/mp4" length="14040752"/>
            <title>How to Integrate Security into the Test Environment</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the-1</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the-1"&gt;&lt;img src="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181992</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the Test Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the-1"&gt;&lt;img src="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=530e283f33821556fb69c84052c07c98&amp;source=podcast&amp;photo%5fid=44181992" width="625" height="352" type="text/html" medium="video" duration="292" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Devops</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/video_medium/tips-for-adding-capacity-without-video.mp4?source=podcast" type="video/mp4" length="24919436"/>
            <title>Tips for Adding Capacity Without Changing Your Security Policies</title>
            <link>http://video.algosec.com/tips-for-adding-capacity-without</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181948</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>Tips for Adding Capacity Without Changing Your Security Policies</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/tips-for-adding-capacity-without"&gt;&lt;img src="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0ccdc09b741f04206dd36b3f659e9519&amp;source=podcast&amp;photo%5fid=44181948" width="625" height="352" type="text/html" medium="video" duration="446" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/video_medium/how-to-integrate-security-into-the-video.mp4?source=podcast" type="video/mp4" length="16789600"/>
            <title>How to Integrate Security into the CI Process</title>
            <link>http://video.algosec.com/how-to-integrate-security-into-the</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181918</guid>
            <pubDate>Wed, 12 Jul 2017 03:00:00 GMT</pubDate>
            <media:title>How to Integrate Security into the CI Process</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/how-to-integrate-security-into-the"&gt;&lt;img src="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0181d939b45c1552d4f90366f73e9c01&amp;source=podcast&amp;photo%5fid=44181918" width="625" height="352" type="text/html" medium="video" duration="329" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>cloud security</category>
            <category>DevOps</category>
            <category>Firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>Security Management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/video_medium/onboarding-new-firewall-devices-video.mp4?source=podcast" type="video/mp4" length="5986333"/>
            <title>Onboarding New Firewall Devices Using AlgoSec's APIs</title>
            <link>http://video.algosec.com/onboarding-new-firewall-devices</link>
            <description>&lt;p&gt;Security integration is a common requirement for many enterprise customers and MSSPs. This video showcases the process to operationalize this requirements including:&lt;br /&gt;
1. Onboarding new firewall devices through a web portal&lt;br /&gt;
2. Easily get compliance scores for newly onboarded devices&lt;br /&gt;
3. Identify firewall cleanup opportunities&lt;br /&gt;
4. Identify if security policies are blocking application connectivity&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/onboarding-new-firewall-devices"&gt;&lt;img src="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181964</guid>
            <pubDate>Fri, 12 May 2017 03:00:00 GMT</pubDate>
            <media:title>Onboarding New Firewall Devices Using AlgoSec's APIs</media:title>
            <media:description type="html">&lt;p&gt;Security integration is a common requirement for many enterprise customers and MSSPs. This video showcases the process to operationalize this requirements including:&lt;br /&gt;
1. Onboarding new firewall devices through a web portal&lt;br /&gt;
2. Easily get compliance scores for newly onboarded devices&lt;br /&gt;
3. Identify firewall cleanup opportunities&lt;br /&gt;
4. Identify if security policies are blocking application connectivity&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/onboarding-new-firewall-devices"&gt;&lt;img src="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e10b23fea5f80c6a1fe1337d28d4fc53&amp;source=podcast&amp;photo%5fid=44181964" width="625" height="352" type="text/html" medium="video" duration="301" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>mssps</category>
            <category>network security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/video_medium/the-algosec-qradar-app-for-incident-video.mp4?source=podcast" type="video/mp4" length="13528027"/>
            <title>The AlgoSec QRadar App for Incident Response</title>
            <link>http://video.algosec.com/the-algosec-qradar-app-for-incident</link>
            <description>&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-algosec-qradar-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182027</guid>
            <pubDate>Fri, 03 Mar 2017 02:00:00 GMT</pubDate>
            <media:title>The AlgoSec QRadar App for Incident Response</media:title>
            <media:description type="html">&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-algosec-qradar-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=697b47e70fcfbb1d2c48e4c514506a03&amp;source=podcast&amp;photo%5fid=44182027" width="625" height="352" type="text/html" medium="video" duration="388" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attacks</category>
            <category>cyber threats</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>IBM QRadar</category>
            <category>incident response</category>
            <category>network security</category>
            <category>security intelligence</category>
            <category>security intelligence platform</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/video_medium/demo-algosecs-cisco-aci-app-center-video.mp4?source=podcast" type="video/mp4" length="12747509"/>
            <title>Demo: AlgoSec's Cisco ACI App Center</title>
            <link>http://video.algosec.com/demo-algosecs-cisco-aci-app-center</link>
            <description>&lt;p&gt;The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosecs-cisco-aci-app-center"&gt;&lt;img src="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44181981</guid>
            <pubDate>Fri, 03 Mar 2017 02:00:00 GMT</pubDate>
            <media:title>Demo: AlgoSec's Cisco ACI App Center</media:title>
            <media:description type="html">&lt;p&gt;The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/demo-algosecs-cisco-aci-app-center"&gt;&lt;img src="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cd6ffbb3cb4ab2fd653726f5bec24c85&amp;source=podcast&amp;photo%5fid=44181981" width="625" height="352" type="text/html" medium="video" duration="385" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>ACI Fabric</category>
            <category>AlgoSec Cisco ACI App</category>
            <category>Audit and Compliance</category>
            <category>cisco</category>
            <category>Cisco ACI App</category>
            <category>epgs</category>
            <category>Firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/video_medium/lesson-14-synchronized-object-video.mp4?source=podcast" type="video/mp4" length="20074623"/>
            <title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</title>
            <link>http://video.algosec.com/lesson-14-synchronized-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182061</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-14-synchronized-object"&gt;&lt;img src="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=21c66ed92e36977f79bf555977f026be&amp;source=podcast&amp;photo%5fid=44182061" width="625" height="352" type="text/html" medium="video" duration="399" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>network management</category>
            <category>network objects</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/video_medium/lesson-16-how-to-take-control-of-a-video.mp4?source=podcast" type="video/mp4" length="18241089"/>
            <title>Lesson 16: How to Take Control of a Firewall Migration Project</title>
            <link>http://video.algosec.com/lesson-16-how-to-take-control-of-a</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182049</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 16: How to Take Control of a Firewall Migration Project</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-16-how-to-take-control-of-a"&gt;&lt;img src="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4cf23ef44547986e20b5679b559b1b5e&amp;source=podcast&amp;photo%5fid=44182049" width="625" height="352" type="text/html" medium="video" duration="379" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall migration</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/video_medium/lesson-2-bringing-reachability-video.mp4?source=podcast" type="video/mp4" length="17727360"/>
            <title>Lesson 2: Bringing Reachability Analysis into Incident Response</title>
            <link>http://video.algosec.com/lesson-2-bringing-reachability</link>
            <description>&lt;p&gt;Advanced Cyber Threat and Incident Management: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool discusses the need for reachability analysis in order to assess the severity of the threat and potential impact of an incident. Professor Wool explains how to use traffic simulations to map connectivity paths to/from compromised servers and to/from the internet. By mapping the potential lateral movement paths of an attacker across the network, the SOC team can, for example, proactively take action to prevent data exfiltration or block incoming communications with Command and Control servers.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-bringing-reachability"&gt;&lt;img src="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182021</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 2: Bringing Reachability Analysis into Incident Response</media:title>
            <media:description type="html">&lt;p&gt;Advanced Cyber Threat and Incident Management: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool discusses the need for reachability analysis in order to assess the severity of the threat and potential impact of an incident. Professor Wool explains how to use traffic simulations to map connectivity paths to/from compromised servers and to/from the internet. By mapping the potential lateral movement paths of an attacker across the network, the SOC team can, for example, proactively take action to prevent data exfiltration or block incoming communications with Command and Control servers.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-bringing-reachability"&gt;&lt;img src="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b0d85fa329b1dfbdd446266c8b43a5f3&amp;source=podcast&amp;photo%5fid=44182021" width="625" height="352" type="text/html" medium="video" duration="336" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyberattack</category>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>incident response</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security incident and event management</category>
            <category>security management</category>
            <category>security policy</category>
            <category>siem</category>
            <category>splunk</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/video_medium/lesson-15-how-to-synchronize-object-video.mp4?source=podcast" type="video/mp4" length="13414169"/>
            <title>Lesson 15: How to Synchronize Object Management with a CMDB</title>
            <link>http://video.algosec.com/lesson-15-how-to-synchronize-object</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182008</guid>
            <pubDate>Fri, 10 Feb 2017 02:00:00 GMT</pubDate>
            <media:title>Lesson 15: How to Synchronize Object Management with a CMDB</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-15-how-to-synchronize-object"&gt;&lt;img src="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=13a6814f2c37052c1fb387ad7ea20522&amp;source=podcast&amp;photo%5fid=44182008" width="625" height="352" type="text/html" medium="video" duration="298" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cmdb</category>
            <category>firewall changes</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network management</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/video_medium/algosec-splunk-app-for-incident-video.mp4?source=podcast" type="video/mp4" length="6902436"/>
            <title>AlgoSec Splunk App for Incident Response</title>
            <link>http://video.algosec.com/algosec-splunk-app-for-incident</link>
            <description>&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-splunk-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182052</guid>
            <pubDate>Mon, 28 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Splunk App for Incident Response</media:title>
            <media:description type="html">&lt;p&gt;This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-splunk-app-for-incident"&gt;&lt;img src="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=0c4d10edf34317e11d28581651e31def&amp;source=podcast&amp;photo%5fid=44182052" width="625" height="352" type="text/html" medium="video" duration="214" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>incident response</category>
            <category>network security</category>
            <category>security information and event management</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>SIEM</category>
            <category>Splunk</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/video_medium/best-practices-for-incorporating-video.mp4?source=podcast" type="video/mp4" length="22799886"/>
            <title>Best Practices for Incorporating Security Automation into the DevOps Lifecycle</title>
            <link>http://video.algosec.com/best-practices-for-incorporating</link>
            <description>&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the need for and the process of adjusting application connectivity throughout each stage of the DevOps lifecycle.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/best-practices-for-incorporating"&gt;&lt;img src="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182114</guid>
            <pubDate>Wed, 16 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>Best Practices for Incorporating Security Automation into the DevOps Lifecycle</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the need for and the process of adjusting application connectivity throughout each stage of the DevOps lifecycle.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/best-practices-for-incorporating"&gt;&lt;img src="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c49b17648815f3daa2a78afe31fd3ad6&amp;source=podcast&amp;photo%5fid=44182114" width="625" height="352" type="text/html" medium="video" duration="387" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Devops</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>security policy change management</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/video_medium/lesson-13-zero-touch-change-video.mp4?source=podcast" type="video/mp4" length="23188821"/>
            <title>Lesson 13: Zero-Touch Change Management with Checks and Balances</title>
            <link>http://video.algosec.com/lesson-13-zero-touch-change</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182144</guid>
            <pubDate>Tue, 15 Nov 2016 02:00:00 GMT</pubDate>
            <media:title>Lesson 13: Zero-Touch Change Management with Checks and Balances</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-13-zero-touch-change"&gt;&lt;img src="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e254cfe4860678b02481a8ea15c6745f&amp;source=podcast&amp;photo%5fid=44182144" width="625" height="352" type="text/html" medium="video" duration="423" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network operations</category>
            <category>Network Security</category>
            <category>professor wool</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
            <category>security policy change management</category>
            <category>zero touch automation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/video_medium/cisco-aci-and-algosec-integration-1-video.mp4?source=podcast" type="video/mp4" length="8871061"/>
            <title>Cisco ACI and AlgoSec Integration (Overview and Demo)</title>
            <link>http://video.algosec.com/cisco-aci-and-algosec-integration-1</link>
            <description>&lt;p&gt;Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration-1"&gt;&lt;img src="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182087</guid>
            <pubDate>Mon, 31 Oct 2016 02:00:00 GMT</pubDate>
            <media:title>Cisco ACI and AlgoSec Integration (Overview and Demo)</media:title>
            <media:description type="html">&lt;p&gt;Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/cisco-aci-and-algosec-integration-1"&gt;&lt;img src="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dcd1a526c8336ca642a67e763c8639bd&amp;source=podcast&amp;photo%5fid=44182087" width="625" height="352" type="text/html" medium="video" duration="458" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cisco</category>
            <category>epgs</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/video_medium/combining-security-groups-and-video.mp4?source=podcast" type="video/mp4" length="20330009"/>
            <title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</title>
            <link>http://video.algosec.com/combining-security-groups-and</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/combining-security-groups-and"&gt;&lt;img src="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182148</guid>
            <pubDate>Thu, 29 Sep 2016 03:00:00 GMT</pubDate>
            <media:title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/combining-security-groups-and"&gt;&lt;img src="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=92cd6dd9ebc61271a4111bbc26bec00d&amp;source=podcast&amp;photo%5fid=44182148" width="625" height="352" type="text/html" medium="video" duration="393" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>amazon security</category>
            <category>amazon security groups</category>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>firewalls</category>
            <category>nacl</category>
            <category>network access control lists</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/video_medium/using-aws-network-acls-for-enhanced-video.mp4?source=podcast" type="video/mp4" length="21725729"/>
            <title>Using AWS Network ACLs for Enhanced Traffic Filtering</title>
            <link>http://video.algosec.com/using-aws-network-acls-for-enhanced</link>
            <description>&lt;p&gt;In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/using-aws-network-acls-for-enhanced"&gt;&lt;img src="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182088</guid>
            <pubDate>Mon, 26 Sep 2016 03:00:00 GMT</pubDate>
            <media:title>Using AWS Network ACLs for Enhanced Traffic Filtering</media:title>
            <media:description type="html">&lt;p&gt;In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/using-aws-network-acls-for-enhanced"&gt;&lt;img src="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c3e563d70dbfbdadd99c127bdbee633d&amp;source=podcast&amp;photo%5fid=44182088" width="625" height="352" type="text/html" medium="video" duration="420" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>aws</category>
            <category>aws security</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>Firewalls</category>
            <category>nacl</category>
            <category>nacls</category>
            <category>network access control lists</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/video_medium/lesson-3-best-practices-for-video.mp4?source=podcast" type="video/mp4" length="15731335"/>
            <title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the...</title>
            <link>http://video.algosec.com/lesson-3-best-practices-for</link>
            <description>&lt;p&gt;Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-best-practices-for"&gt;&lt;img src="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182196</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the...</media:title>
            <media:description type="html">&lt;p&gt;Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-best-practices-for"&gt;&lt;img src="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=9215d82e7075332ada9014679d1d6b7b&amp;source=podcast&amp;photo%5fid=44182196" width="625" height="352" type="text/html" medium="video" duration="297" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Audit and Compliance</category>
            <category>auditing</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/video_medium/lesson-1-migrating-to-nsx-video.mp4?source=podcast" type="video/mp4" length="17310417"/>
            <title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</title>
            <link>http://video.algosec.com/lesson-1-migrating-to-nsx</link>
            <description>&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182155</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</media:title>
            <media:description type="html">&lt;p&gt;VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-migrating-to-nsx"&gt;&lt;img src="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=def81240212859275a1a7e8e49361dd8&amp;source=podcast&amp;photo%5fid=44182155" width="625" height="352" type="text/html" medium="video" duration="319" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>Data Center</category>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/video_medium/lesson-2-tips-on-how-to-create-video.mp4?source=podcast" type="video/mp4" length="19480685"/>
            <title>Lesson 2: Tips on How to Create Filtering Policies for NSX</title>
            <link>http://video.algosec.com/lesson-2-tips-on-how-to-create</link>
            <description>&lt;p&gt;Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-tips-on-how-to-create"&gt;&lt;img src="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182098</guid>
            <pubDate>Mon, 22 Aug 2016 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: Tips on How to Create Filtering Policies for NSX</media:title>
            <media:description type="html">&lt;p&gt;Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-tips-on-how-to-create"&gt;&lt;img src="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=ce089eaa3bad2d6123444b73d7e938e8&amp;source=podcast&amp;photo%5fid=44182098" width="625" height="352" type="text/html" medium="video" duration="381" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>east west traffic</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>firewall security</category>
            <category>micro segmentation</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>nsx</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>vmware</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/video_medium/lesson-4-using-next-generation-video.mp4?source=podcast" type="video/mp4" length="17536828"/>
            <title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</title>
            <link>http://video.algosec.com/lesson-4-using-next-generation</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182238</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-4-using-next-generation"&gt;&lt;img src="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=dab3bab204d4a15a112afe579c826e2d&amp;source=podcast&amp;photo%5fid=44182238" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>cyber attack</category>
            <category>cyber threat</category>
            <category>cyber threat detection</category>
            <category>cyber threat prevention</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>Next-Generation Firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/video_medium/lesson-3-managing-your-security-video.mp4?source=podcast" type="video/mp4" length="16089357"/>
            <title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</title>
            <link>http://video.algosec.com/lesson-3-managing-your-security</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182171</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional...</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=b9e12ad72654514540985c604cfa8e53&amp;source=podcast&amp;photo%5fid=44182171" width="625" height="352" type="text/html" medium="video" duration="351" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>next generation firewall</category>
            <category>ngfw</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/video_medium/lesson-12-managing-your-security-video.mp4?source=podcast" type="video/mp4" length="17164651"/>
            <title>Lesson 12: Managing Your Security Policy for Disaster Recovery</title>
            <link>http://video.algosec.com/lesson-12-managing-your-security</link>
            <description>&lt;p&gt;In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-12-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182154</guid>
            <pubDate>Thu, 19 Nov 2015 02:00:00 GMT</pubDate>
            <media:title>Lesson 12: Managing Your Security Policy for Disaster Recovery</media:title>
            <media:description type="html">&lt;p&gt;In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-12-managing-your-security"&gt;&lt;img src="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ab2e958faa7e5fa8581da3380b0a834&amp;source=podcast&amp;photo%5fid=44182154" width="625" height="352" type="text/html" medium="video" duration="318" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Disaster Recovery</category>
            <category>firewall management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/video_medium/protect-outbound-traffic-in-an-aws-video.mp4?source=podcast" type="video/mp4" length="14118781"/>
            <title>Protect Outbound Traffic in an AWS Hybrid Environment</title>
            <link>http://video.algosec.com/protect-outbound-traffic-in-an-aws</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 2&lt;/p&gt;
&lt;p&gt;Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/protect-outbound-traffic-in-an-aws"&gt;&lt;img src="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182267</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>Protect Outbound Traffic in an AWS Hybrid Environment</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 2&lt;/p&gt;
&lt;p&gt;Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/protect-outbound-traffic-in-an-aws"&gt;&lt;img src="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=03b144c5631b7e1579c2666d1136adab&amp;source=podcast&amp;photo%5fid=44182267" width="625" height="352" type="text/html" medium="video" duration="263" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AWS</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall misconfiguration</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/video_medium/the-fundamentals-of-aws-security-video.mp4?source=podcast" type="video/mp4" length="17302266"/>
            <title>The Fundamentals of AWS Security Groups</title>
            <link>http://video.algosec.com/the-fundamentals-of-aws-security</link>
            <description>&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides an overview of Amazon Web Services (AWS) Security Groups and highlights some of the differences between Security Groups and traditional firewalls. The lesson continues by explaining some of the unique features of AWS and the challenges and benefits of being able to apply multiple Security Groups to a single instance.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-fundamentals-of-aws-security"&gt;&lt;img src="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182199</guid>
            <pubDate>Wed, 06 May 2015 03:00:00 GMT</pubDate>
            <media:title>The Fundamentals of AWS Security Groups</media:title>
            <media:description type="html">&lt;p&gt;Best Practices for Amazon Web Services (AWS) Security: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides an overview of Amazon Web Services (AWS) Security Groups and highlights some of the differences between Security Groups and traditional firewalls. The lesson continues by explaining some of the unique features of AWS and the challenges and benefits of being able to apply multiple Security Groups to a single instance.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/the-fundamentals-of-aws-security"&gt;&lt;img src="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e55f13e53dac1f9b30c7fc1ff4de07da&amp;source=podcast&amp;photo%5fid=44182199" width="625" height="352" type="text/html" medium="video" duration="298" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Amazon Web Services (Website)</category>
            <category>aws</category>
            <category>cloud security</category>
            <category>firewall management</category>
            <category>firewall policy management</category>
            <category>firewalls</category>
            <category>hybrid cloud</category>
            <category>hybrid environment</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>SDN</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/video_medium/algosec-case-study-bmfbovespa-video.mp4?source=podcast" type="video/mp4" length="15258261"/>
            <title>AlgoSec Case Study: BM&amp;FBOVESPA (English)</title>
            <link>http://video.algosec.com/algosec-case-study-bmfbovespa</link>
            <description>&lt;p&gt;Hear Wellington Vita, Information Security Manager, explain how AlgoSec helps BM&amp;FBOVESPA maintain a secure, compliant trading environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-case-study-bmfbovespa"&gt;&lt;img src="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182218</guid>
            <pubDate>Wed, 01 Apr 2015 03:00:00 GMT</pubDate>
            <media:title>AlgoSec Case Study: BM&amp;FBOVESPA (English)</media:title>
            <media:description type="html">&lt;p&gt;Hear Wellington Vita, Information Security Manager, explain how AlgoSec helps BM&amp;FBOVESPA maintain a secure, compliant trading environment.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-case-study-bmfbovespa"&gt;&lt;img src="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=da4aa7916a2a3d8d1db6908cd39cc56f&amp;source=podcast&amp;photo%5fid=44182218" width="625" height="469" type="text/html" medium="video" duration="281" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>AlgoSec (Business Operation)</category>
            <category>firewall management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security policy</category>
            <category>security software</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/video_medium/lesson-9-how-to-structure-network-video.mp4?source=podcast" type="video/mp4" length="20686665"/>
            <title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</title>
            <link>http://video.algosec.com/lesson-9-how-to-structure-network</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182306</guid>
            <pubDate>Mon, 08 Dec 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-9-how-to-structure-network"&gt;&lt;img src="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f008f7c1f97aa3aa33a02182c9c550d8&amp;source=podcast&amp;photo%5fid=44182306" width="625" height="352" type="text/html" medium="video" duration="334" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/standard/download-8-thumbnail.jpg" width="75" height=""/>
            <category>data center</category>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>security software</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/video_medium/lesson-8-nat-considerations-when-video.mp4?source=podcast" type="video/mp4" length="22584967"/>
            <title>Lesson 8: NAT Considerations When Managing Your Security Policy</title>
            <link>http://video.algosec.com/lesson-8-nat-considerations-when</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 8&lt;br /&gt;
A business owner makes a simple change request to allow traffic to a new application. You now need to figure out the right firewall rules to change. This should be pretty simple… but what if you’re using NAT (Network Address Translation) in your environment? In this lesson, Professor Wool explains some key principles of NATing and why it’s critical to understand your NAT policy in order to identify the right paths for network traffic, which firewalls rules really need to be modified, and how to write your security policy correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-8-nat-considerations-when"&gt;&lt;img src="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182234</guid>
            <pubDate>Tue, 11 Nov 2014 02:00:00 GMT</pubDate>
            <media:title>Lesson 8: NAT Considerations When Managing Your Security Policy</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 8&lt;br /&gt;
A business owner makes a simple change request to allow traffic to a new application. You now need to figure out the right firewall rules to change. This should be pretty simple… but what if you’re using NAT (Network Address Translation) in your environment? In this lesson, Professor Wool explains some key principles of NATing and why it’s critical to understand your NAT policy in order to identify the right paths for network traffic, which firewalls rules really need to be modified, and how to write your security policy correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-8-nat-considerations-when"&gt;&lt;img src="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c4e501a5254536aa42ad741dacb80d20&amp;source=podcast&amp;photo%5fid=44182234" width="625" height="352" type="text/html" medium="video" duration="397" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Management</category>
            <category>firewall rules</category>
            <category>Firewalls</category>
            <category>network address translation</category>
            <category>Network Security</category>
            <category>network security policy</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/video_medium/algosec-overview-managing-security-video.mp4?source=podcast" type="video/mp4" length="6679131"/>
            <title>AlgoSec Overview: Managing Security Policies in Your Data Center</title>
            <link>http://video.algosec.com/algosec-overview-managing-security</link>
            <description>&lt;p&gt;As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-overview-managing-security"&gt;&lt;img src="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182317</guid>
            <pubDate>Wed, 29 Oct 2014 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Overview: Managing Security Policies in Your Data Center</media:title>
            <media:description type="html">&lt;p&gt;As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-overview-managing-security"&gt;&lt;img src="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=c689444345c25371b1dc1dc245a12deb&amp;source=podcast&amp;photo%5fid=44182317" width="625" height="352" type="text/html" medium="video" duration="132" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>algosec businessflor</category>
            <category>algosec fireflow</category>
            <category>AlgoSec Security Policy Management</category>
            <category>Audit and Compliance</category>
            <category>Data Center</category>
            <category>Datacenters</category>
            <category>firewall auditing</category>
            <category>Firewall management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>security</category>
            <category>Security Policy</category>
            <category>virtual datacenter</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/video_medium/lesson-1-how-to-structure-your-video.mp4?source=podcast" type="video/mp4" length="20321042"/>
            <title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</title>
            <link>http://video.algosec.com/lesson-1-how-to-structure-your</link>
            <description>&lt;p&gt;Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-structure-your"&gt;&lt;img src="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182257</guid>
            <pubDate>Wed, 01 Oct 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</media:title>
            <media:description type="html">&lt;p&gt;Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-how-to-structure-your"&gt;&lt;img src="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=f89558d6f367f66d2f7fd246d7b932ed&amp;source=podcast&amp;photo%5fid=44182257" width="625" height="352" type="text/html" medium="video" duration="394" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>firewall rules</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>network segmentation</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/49543319/54117893/cbceedb300483c1bcd32b02036cdd14f/video_medium/segmenting-your-network-for-1-video.mp4?source=podcast" type="video/mp4" length="76178104"/>
            <title>Segmenting your Network for Security - The Good, the Bad, and the Ugly</title>
            <link>http://video.algosec.com/segmenting-your-network-for-1</link>
            <description>&lt;p&gt;Segmenting your network is one of the foundations of a sound security strategy. It limits the movements of an attacker, and therefore limits the overall impact of a security breach.&lt;br&gt;
So why is it that most organizations struggle when it comes to defining, implementing and enforcing effective network segmentation?&lt;br&gt;
In this webcast, AlgoSec and expert penetration tester Mark Wolfgang examine common segmentation mistakes and review best practices for defining and enforcing effective network segmentation.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/segmenting-your-network-for-1"&gt;&lt;img src="http://video.algosec.com/49543319/54117893/cbceedb300483c1bcd32b02036cdd14f/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/54117893</guid>
            <pubDate>Wed, 16 Jul 2014 00:00:00 GMT</pubDate>
            <media:title>Segmenting your Network for Security - The Good, the Bad, and the Ugly</media:title>
            <media:description type="html">&lt;p&gt;Segmenting your network is one of the foundations of a sound security strategy. It limits the movements of an attacker, and therefore limits the overall impact of a security breach.&lt;br&gt;
So why is it that most organizations struggle when it comes to defining, implementing and enforcing effective network segmentation?&lt;br&gt;
In this webcast, AlgoSec and expert penetration tester Mark Wolfgang examine common segmentation mistakes and review best practices for defining and enforcing effective network segmentation.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/segmenting-your-network-for-1"&gt;&lt;img src="http://video.algosec.com/49543319/54117893/cbceedb300483c1bcd32b02036cdd14f/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=cbceedb300483c1bcd32b02036cdd14f&amp;source=podcast&amp;photo%5fid=54117893" width="625" height="469" type="text/html" medium="video" duration="3706" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/49543319/54117893/cbceedb300483c1bcd32b02036cdd14f/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>Computer Network (Industry)</category>
            <category>Computer Security (Software Genre)</category>
            <category>firewall management</category>
            <category>network security</category>
            <category>Network Security (Literature Subject)</category>
            <category>Security Policy</category>
            <category>segmentation</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/video_medium/lesson-3-using-object-naming-video.mp4?source=podcast" type="video/mp4" length="17490787"/>
            <title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</title>
            <link>http://video.algosec.com/lesson-3-using-object-naming</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182290</guid>
            <pubDate>Thu, 10 Apr 2014 03:00:00 GMT</pubDate>
            <media:title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-3-using-object-naming"&gt;&lt;img src="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4797ebe9fab50b0c575eb5e0b6dac4eb&amp;source=podcast&amp;photo%5fid=44182290" width="625" height="352" type="text/html" medium="video" duration="323" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/standard/download-5-thumbnail.jpg" width="75" height=""/>
            <category>AlgoSec</category>
            <category>firewall management</category>
            <category>firewall object naming</category>
            <category>firewall objects</category>
            <category>firewall policy management</category>
            <category>Firewalls</category>
            <category>network security</category>
            <category>object naming conventions</category>
            <category>Professor Wool</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/video_medium/examining-the-need-for-video.mp4?source=podcast" type="video/mp4" length="17810477"/>
            <title>Examining the Need for Application-Centric Security Policy Management</title>
            <link>http://video.algosec.com/examining-the-need-for</link>
            <description>&lt;p&gt;Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/examining-the-need-for"&gt;&lt;img src="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182409</guid>
            <pubDate>Thu, 13 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Examining the Need for Application-Centric Security Policy Management</media:title>
            <media:description type="html">&lt;p&gt;Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/examining-the-need-for"&gt;&lt;img src="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=5f1d0c698cae1c93e39648727d821d53&amp;source=podcast&amp;photo%5fid=44182409" width="625" height="352" type="text/html" medium="video" duration="289" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>business applications</category>
            <category>data center</category>
            <category>data center applications</category>
            <category>decommission application</category>
            <category>prof wool</category>
            <category>security</category>
            <category>security management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/video_medium/managing-the-security-policy-in-video.mp4?source=podcast" type="video/mp4" length="10604809"/>
            <title>Managing the Security Policy in Your Data Center and Network</title>
            <link>http://video.algosec.com/managing-the-security-policy-in</link>
            <description>&lt;p&gt;Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-the-security-policy-in"&gt;&lt;img src="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182430</guid>
            <pubDate>Thu, 06 Mar 2014 02:00:00 GMT</pubDate>
            <media:title>Managing the Security Policy in Your Data Center and Network</media:title>
            <media:description type="html">&lt;p&gt;Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/managing-the-security-policy-in"&gt;&lt;img src="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=3980f51228641374a2c44937715ee7cd&amp;source=podcast&amp;photo%5fid=44182430" width="625" height="352" type="text/html" medium="video" duration="142" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/standard/download-3-thumbnail.jpg" width="600" height="338"/>
            <category>AlgoSec</category>
            <category>application connectivity management</category>
            <category>Audit and Compliance</category>
            <category>data center</category>
            <category>firewall audit</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>network security</category>
            <category>security change management</category>
            <category>security policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/video_medium/mitigating-risk-in-your-firewall-video.mp4?source=podcast" type="video/mp4" length="8306240"/>
            <title>Mitigating Risk in Your Firewall Policy</title>
            <link>http://video.algosec.com/mitigating-risk-in-your-firewall</link>
            <description>&lt;p&gt;&lt;a href="http://www.algosec.com/"&gt;http://www.algosec.com/&lt;/a&gt; - AlgoSec Firewall Analyzer helps you understand the level of risk in your network security policy, providing complete visibility of your security posture and enabling you to mitigate risk across traditional and next-generation firewalls as well as routers. Firewall Analyzer analyzes your policy against the broadest database, which can also be customized to address your corporate policies, of more than 120 industry best practices, which includes application-based risks.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/mitigating-risk-in-your-firewall"&gt;&lt;img src="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182584</guid>
            <pubDate>Fri, 21 Dec 2012 02:00:00 GMT</pubDate>
            <media:title>Mitigating Risk in Your Firewall Policy</media:title>
            <media:description type="html">&lt;p&gt;&lt;a href="http://www.algosec.com/"&gt;http://www.algosec.com/&lt;/a&gt; - AlgoSec Firewall Analyzer helps you understand the level of risk in your network security policy, providing complete visibility of your security posture and enabling you to mitigate risk across traditional and next-generation firewalls as well as routers. Firewall Analyzer analyzes your policy against the broadest database, which can also be customized to address your corporate policies, of more than 120 industry best practices, which includes application-based risks.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/mitigating-risk-in-your-firewall"&gt;&lt;img src="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=e810eb26140987749e5de78ef9aa7b26&amp;source=podcast&amp;photo%5fid=44182584" width="625" height="352" type="text/html" medium="video" duration="221" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall analyzer</category>
            <category>Firewall Management</category>
            <category>firewalls</category>
            <category>mitigate risk</category>
            <category>network risk</category>
            <category>network security policy</category>
            <category>next-generation firewalls</category>
            <category>policy analysis</category>
            <category>risk assessment</category>
            <category>routers</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/video_medium/lesson-6-analyzing-routers-as-part-video.mp4?source=podcast" type="video/mp4" length="20495387"/>
            <title>Lesson 6: Analyzing Routers as Part of Your Security Policy</title>
            <link>http://video.algosec.com/lesson-6-analyzing-routers-as-part</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 6&lt;br /&gt;
In this lesson, Professor Wool examines some of the challenges when it comes to managing routers and access control lists (ACLs) and provides recommendations for including routers as part of your overall security policy with tips on change management, auditing and ACL optimization.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-analyzing-routers-as-part"&gt;&lt;img src="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182766</guid>
            <pubDate>Tue, 25 Sep 2012 02:00:00 GMT</pubDate>
            <media:title>Lesson 6: Analyzing Routers as Part of Your Security Policy</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 6&lt;br /&gt;
In this lesson, Professor Wool examines some of the challenges when it comes to managing routers and access control lists (ACLs) and provides recommendations for including routers as part of your overall security policy with tips on change management, auditing and ACL optimization.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-6-analyzing-routers-as-part"&gt;&lt;img src="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=2f024d96dd0d23aa74a2f8fa6a4ac0c5&amp;source=podcast&amp;photo%5fid=44182766" width="625" height="352" type="text/html" medium="video" duration="289" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>access control lists</category>
            <category>ACLs</category>
            <category>Audit and Compliance</category>
            <category>fire wall change management</category>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewall management software</category>
            <category>firewall management tools</category>
            <category>network security</category>
            <category>prof wool</category>
            <category>router ACLs</category>
            <category>routers</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/video_medium/lesson-1-examining-the-most-common-video.mp4?source=podcast" type="video/mp4" length="26405122"/>
            <title>Lesson 1: Examining the Most Common Firewall Misconfigurations</title>
            <link>http://video.algosec.com/lesson-1-examining-the-most-common</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool discusses his research on different firewall misconfigurations and provides tips for preventing the most common risks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-examining-the-most-common"&gt;&lt;img src="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182624</guid>
            <pubDate>Mon, 17 Sep 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Examining the Most Common Firewall Misconfigurations</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool discusses his research on different firewall misconfigurations and provides tips for preventing the most common risks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-examining-the-most-common"&gt;&lt;img src="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=d0b0094e9616d6c9f528a648df323567&amp;source=podcast&amp;photo%5fid=44182624" width="625" height="352" type="text/html" medium="video" duration="389" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall management software</category>
            <category>firewall misconfigurations</category>
            <category>firewall risk</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/video_medium/new-customer-collection-video-video.mp4?source=podcast" type="video/mp4" length="8022600"/>
            <title>New Customer Collection Video</title>
            <link>http://video.algosec.com/new-customer-collection-video</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-customer-collection-video"&gt;&lt;img src="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182680</guid>
            <pubDate>Tue, 07 Aug 2012 03:00:00 GMT</pubDate>
            <media:title>New Customer Collection Video</media:title>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/new-customer-collection-video"&gt;&lt;img src="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/standard/download-4-thumbnail.jpg" width="600" height="450"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=956a98b36cc3219b003c721a696b5053&amp;source=podcast&amp;photo%5fid=44182680" width="625" height="469" type="text/html" medium="video" duration="166" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/standard/download-4-thumbnail.jpg" width="600" height="450"/>
            <category>fire wall change management</category>
            <category>Firewall Management</category>
            <category>firewall management software</category>
            <category>firewall management tools</category>
            <category>Firewalls</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/video_medium/lesson-2-automating-the-firewall-video.mp4?source=podcast" type="video/mp4" length="30272598"/>
            <title>Lesson 2: Automating the Firewall Change Control Process</title>
            <link>http://video.algosec.com/lesson-2-automating-the-firewall</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-automating-the-firewall"&gt;&lt;img src="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182690</guid>
            <pubDate>Thu, 28 Jun 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: Automating the Firewall Change Control Process</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-automating-the-firewall"&gt;&lt;img src="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=da5caa63acf663010badf236bea69325&amp;source=podcast&amp;photo%5fid=44182690" width="625" height="352" type="text/html" medium="video" duration="503" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>automate firewall changes</category>
            <category>firewall change control</category>
            <category>firewall change workflow</category>
            <category>firewall management</category>
            <category>Firewalls</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>security</category>
            <category>Security Policy</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/video_medium/lesson-2-ngfws-whitelisting-video.mp4?source=podcast" type="video/mp4" length="40617652"/>
            <title>Lesson 2: NGFWs - Whitelisting &amp; Blacklisting Policy Considerations</title>
            <link>http://video.algosec.com/lesson-2-ngfws-whitelisting</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the pros and cons of whitelisting and blacklisting policies and offers some recommendations on policy considerations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-ngfws-whitelisting"&gt;&lt;img src="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182711</guid>
            <pubDate>Wed, 06 Jun 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 2: NGFWs - Whitelisting &amp; Blacklisting Policy Considerations</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the pros and cons of whitelisting and blacklisting policies and offers some recommendations on policy considerations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-2-ngfws-whitelisting"&gt;&lt;img src="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=aa2c6bbe57878bf5156d1ea06e0353f3&amp;source=podcast&amp;photo%5fid=44182711" width="625" height="352" type="text/html" medium="video" duration="635" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>blacklisting</category>
            <category>firewall management</category>
            <category>firewall policies</category>
            <category>firewalls</category>
            <category>Network Security</category>
            <category>next-generation firewalls</category>
            <category>policy</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>whitelisting</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/video_medium/lesson-1-next-generation-firewalls-video.mp4?source=podcast" type="video/mp4" length="31036106"/>
            <title>Lesson 1: Next-Generation Firewalls: Overview of Application and User-Aware...</title>
            <link>http://video.algosec.com/lesson-1-next-generation-firewalls</link>
            <description>&lt;p&gt;Next Generation Firewalls: Lesson 1&lt;br&gt;
In this lesson, Professor Wool examines next-generation firewalls and the granular capabilities they provide for improved control over applications and users.
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-next-generation-firewalls"&gt;&lt;img src="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182727</guid>
            <pubDate>Mon, 21 May 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 1: Next-Generation Firewalls: Overview of Application and User-Aware...</media:title>
            <media:description type="html">&lt;p&gt;Next Generation Firewalls: Lesson 1&lt;br&gt;
In this lesson, Professor Wool examines next-generation firewalls and the granular capabilities they provide for improved control over applications and users.
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-1-next-generation-firewalls"&gt;&lt;img src="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=1ac281d49577cafce8bc246ba69434e3&amp;source=podcast&amp;photo%5fid=44182727" width="625" height="352" type="text/html" medium="video" duration="544" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>firewall management</category>
            <category>firewall management 201</category>
            <category>firewalls</category>
            <category>next-generation firewalls</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>Technology</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/video_medium/lesson-5-managing-firewall-policies-video.mp4?source=podcast" type="video/mp4" length="19797888"/>
            <title>Lesson 5: Managing Firewall Policies in a Disappearing Network Perimeter</title>
            <link>http://video.algosec.com/lesson-5-managing-firewall-policies</link>
            <description>&lt;p&gt;Firewall Management 201: Lesson 5&lt;br /&gt;
In this lesson, Professor Wool examines how virtualization, outsourcing of data centers, worker mobility and the consumerization of IT have all played a role in dissolving the network perimeter and what you can do to regain control.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-managing-firewall-policies"&gt;&lt;img src="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182901</guid>
            <pubDate>Mon, 07 May 2012 03:00:00 GMT</pubDate>
            <media:title>Lesson 5: Managing Firewall Policies in a Disappearing Network Perimeter</media:title>
            <media:description type="html">&lt;p&gt;Firewall Management 201: Lesson 5&lt;br /&gt;
In this lesson, Professor Wool examines how virtualization, outsourcing of data centers, worker mobility and the consumerization of IT have all played a role in dissolving the network perimeter and what you can do to regain control.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/lesson-5-managing-firewall-policies"&gt;&lt;img src="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=4e056f684aafa0ce814606197c80924b&amp;source=podcast&amp;photo%5fid=44182901" width="625" height="352" type="text/html" medium="video" duration="348" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/standard/download-4-thumbnail.jpg" width="600" height="338"/>
            <category>data center</category>
            <category>firewall management</category>
            <category>firewall policies</category>
            <category>Network Security</category>
            <category>prof wool</category>
            <category>Security Policy</category>
            <category>Software Technology Security</category>
            <category>virtualization</category>
        </item>
        <item>
            <enclosure url="http://video.algosec.com/4465660/44182951/6f4af97fd0ab81e6e9ca112bebfbb408/video_medium/algosec-case-study-t-mobile-video.mp4?source=podcast" type="video/mp4" length="12056023"/>
            <title>AlgoSec Case Study: T-Mobile</title>
            <link>http://video.algosec.com/algosec-case-study-t-mobile</link>
            <description>&lt;p&gt;Peter Erceg, Head of IT Security at T-Mobile, talks about how AlgoSec helped T-Mobile optimize their firewall policy, reduce efforts for PCI compliance and automate network security policy changes.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-case-study-t-mobile"&gt;&lt;img src="http://video.algosec.com/4465660/44182951/6f4af97fd0ab81e6e9ca112bebfbb408/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.algosec.com/photo/44182951</guid>
            <pubDate>Mon, 07 Mar 2011 02:00:00 GMT</pubDate>
            <media:title>AlgoSec Case Study: T-Mobile</media:title>
            <media:description type="html">&lt;p&gt;Peter Erceg, Head of IT Security at T-Mobile, talks about how AlgoSec helped T-Mobile optimize their firewall policy, reduce efforts for PCI compliance and automate network security policy changes.&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.algosec.com/algosec-case-study-t-mobile"&gt;&lt;img src="http://video.algosec.com/4465660/44182951/6f4af97fd0ab81e6e9ca112bebfbb408/standard/download-5-thumbnail.jpg" width="600" height="338"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.algosec.com/v.ihtml/player.html?token=6f4af97fd0ab81e6e9ca112bebfbb408&amp;source=podcast&amp;photo%5fid=44182951" width="625" height="352" type="text/html" medium="video" duration="274" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.algosec.com/4465660/44182951/6f4af97fd0ab81e6e9ca112bebfbb408/standard/download-5-thumbnail.jpg" width="600" height="338"/>
            <category>Firewall Operations</category>
            <category>PCI-DSS</category>
            <category>Security Policy</category>
        </item>
    </channel>
</rss>
