<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
    <url>
        <loc>https://video.algosec.com/algo-in-action</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=125102195</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/125102195/74ec34c6d508e0a66f7f4c4adcb55e0c/video_medium/algo-in-action-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/125102195/74ec34c6d508e0a66f7f4c4adcb55e0c/small/algo-in-action-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Algo in action</video:title>
            <video:description></video:description>
            <video:publication_date>2026-03-25T12:38:33+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>45</video:duration>
            <video:category>Horizon</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algo</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=124342311</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/124342311/5ab5e19b891a280a58c919ef7ca097eb/video_medium/algo-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/124342311/5ab5e19b891a280a58c919ef7ca097eb/small/algo-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Algo</video:title>
            <video:description></video:description>
            <video:publication_date>2026-03-05T16:44:28+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>100</video:duration>
            <video:category>Horizon</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/zerotrust-webinaredit</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=124025381</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/124025381/28955c95cbe7ecaf9cc358d2805a9497/video_medium/zerotrust-webinaredit-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/124025381/28955c95cbe7ecaf9cc358d2805a9497/small/zerotrust-webinaredit-thumbnail.jpg</video:thumbnail_loc>
            <video:title>zero_trust webinar_edit</video:title>
            <video:description></video:description>
            <video:publication_date>2026-02-26T08:51:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1182</video:duration>
            <video:category>Horizon</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/fortinet-azure-aws-more-inside</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=123504989</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/123504989/789df900b026aa5fc188ba6534c068d8/video_medium/fortinet-azure-aws-more-inside-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/123504989/789df900b026aa5fc188ba6534c068d8/small/fortinet-azure-aws-more-inside-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Fortinet, Azure, AWS &amp; More: Inside AlgoSec’s 2026 State of Network Security Report as 500 Security Leaders Tell All </video:title>
            <video:description>&lt;p&gt;The largest survey of its kind reveals how AI, automation, and consolidation are reshaping hybrid and multi-cloud security in 2026. &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;Join us for an exclusive webinar on AlgoSec’s 2026 State of Network Security Report, where 500 security leaders reveal how AI, automation, and consolidation are reshaping hybrid and multi-cloud security. Get the inside view on how enterprises are regaining control, simplifying operations, and securing faster than ever. See how leading vendors including Palo Alto Networks, Fortinet, Cisco, Zscaler, Azure, AWS, and Google Cloud are setting the pace for 2026 and what their strategies mean for you. &lt;/p&gt;</video:description>
            <video:publication_date>2026-02-11T15:51:02+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2474</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-extended-baseline-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=119147536</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/119147536/85c5eee387a230bf0c0342b1fdd52bd4/video_medium/the-extended-baseline-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/119147536/85c5eee387a230bf0c0342b1fdd52bd4/small/the-extended-baseline-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The Extended Baseline Compliance Add-on</video:title>
            <video:description></video:description>
            <video:publication_date>2025-12-01T14:30:20+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>145</video:duration>
            <video:category>Ecosystem</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/rule-recertification-at-business</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=118996260</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968579/118996260/cab467aee8f4cf1c5f4200f879845892/video_medium/rule-recertification-at-business-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968579/118996260/cab467aee8f4cf1c5f4200f879845892/small/rule-recertification-at-business-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Rule recertification at business speed</video:title>
            <video:description>&lt;h1&gt;Cut weeks into hours with application-centric firewall governance&lt;br&gt;&lt;/h1&gt;&lt;p style="text-align: left;"&gt;Firewall rule recertification doesn’t have to be slow, manual, and resource-draining. With rising audit pressure and evolving application landscapes, the traditional device-by-device approach is no longer enough.&lt;br&gt;&lt;/p&gt;&lt;p style="text-align: left;"&gt;In this video, we’ll show you how AlgoSec brings speed and clarity to the recertification process—so you can certify policies faster, with full application context, and zero guesswork. You’ll learn how to automate rule governance end-to-end, gain complete visibility into certification status, and reduce operational overhead across complex environments.&lt;/p&gt;&lt;h2 style="text-align: left;"&gt;Why you should watch&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Reduce certification cycles by up to 95%&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Eliminate blind spots across your rule lifecycle&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Align policies with business intent, not firewall syntax&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Automate application discovery, expiry, and certification&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2025-11-26T16:04:31+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>568</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-automation-summit-nov-2025</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=118908661</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968556/118908661/72d56808c12d26a92d873a9fcfe0995d/video_medium/algosec-automation-summit-nov-2025-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968556/118908661/72d56808c12d26a92d873a9fcfe0995d/small/algosec-automation-summit-nov-2025-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec-Automation-Summit-Nov-2025</video:title>
            <video:description>&lt;p&gt;Join us to explore the top application security challenges—and see how leading companies are turning complex, time-consuming processes into faster, simpler, and more secure operations.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Gain practical knowledge, tools, and strategies to simplify application security and accelerate business agility.&lt;/p&gt;&lt;p&gt;•	Actionable insights on application connectivity – Best practices to simplify application mapping, reduce downtime, and streamline change management.&lt;/p&gt;&lt;p&gt;•	Expert guidance – Advice from industry leaders on securing applications across hybrid and multi-cloud environments.&lt;/p&gt;&lt;p&gt;•	Automation to reduce risk – Learn how intelligent automation accelerates application changes, cuts manual work, and minimizes errors.&lt;/p&gt;&lt;p&gt;•	Case studies &amp;amp; real-world solutions – Hear how leading companies are securing and streamlining their applications to support business growth.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2025-11-24T22:36:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2973</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>automation</video:tag>
            <video:tag>intelligent automation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/conquering-cloud-security-pain-2</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=117474062</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/117474062/27fe55a01e51d0cea0898cc706ac2803/video_medium/conquering-cloud-security-pain-2-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/117474062/27fe55a01e51d0cea0898cc706ac2803/small/conquering-cloud-security-pain-2-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Conquering Cloud Security Pain Points</video:title>
            <video:description></video:description>
            <video:publication_date>2025-10-16T19:55:58+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1072</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosummit-2025</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=116919426</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/116919426/57ee99eda2ba0f4f7866bc85d6dff5bc/video_medium/algosummit-2025-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/116919426/57ee99eda2ba0f4f7866bc85d6dff5bc/small/algosummit-2025-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Algosummit 2025 </video:title>
            <video:description></video:description>
            <video:publication_date>2025-09-30T13:43:43+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3837</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/conquering-cloud-security-pain</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=116058643</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/116058643/3b93b85b7c8f0c0d6aca1a25b986e719/video_medium/conquering-cloud-security-pain-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/116058643/3b93b85b7c8f0c0d6aca1a25b986e719/small/conquering-cloud-security-pain-thumbnail.jpg</video:thumbnail_loc>
            <video:title> Conquering Cloud Security Pain Points</video:title>
            <video:description></video:description>
            <video:publication_date>2025-09-11T11:31:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1088</video:duration>
            <video:category>Cloud Security</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/a-deep-dive-into-the-multi-cloud</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=115201808</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/115201808/8aae631defa9ba664500989506cf4dee/video_medium/a-deep-dive-into-the-multi-cloud-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/115201808/8aae631defa9ba664500989506cf4dee/small/a-deep-dive-into-the-multi-cloud-thumbnail.jpg</video:thumbnail_loc>
            <video:title>A Deep Dive Into The Multi-Cloud Mess &amp; How AlgoSec Connects the Dots</video:title>
            <video:description></video:description>
            <video:publication_date>2025-08-13T08:43:23+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2518</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/kuppingercole-webinar</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=114974873</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968579/114974873/aafbb85e504fc78bc373e4e16507058c/video_medium/kuppingercole-webinar-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968579/114974873/aafbb85e504fc78bc373e4e16507058c/small/kuppingercole-webinar-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Kuppingercole webinar</video:title>
            <video:description>&lt;p&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2025-08-04T17:36:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3168</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>appviz</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/esg-on-solving-fragmentation-after</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=114167403</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/114167403/0f394f7a561a86572bb2085ca3291259/video_medium/esg-on-solving-fragmentation-after-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/114167403/0f394f7a561a86572bb2085ca3291259/small/esg-on-solving-fragmentation-after-thumbnail.jpg</video:thumbnail_loc>
            <video:title>ESG on solving fragmentation after security convergence</video:title>
            <video:description>&lt;p&gt;Cloud and datacenter security teams are now one—but the tools, workflows, and policies haven’t caught up.&lt;/p&gt;&lt;p&gt;Join ESG Principal Analyst John Grady alongside AlgoSec’s Field CTO Kyle Wickert and Product Manager Gal Yosef for a practical conversation on how leading organizations are tackling the operational challenges of security convergence.&lt;/p&gt;&lt;p&gt;What you’ll learn:&lt;/p&gt;&lt;p&gt;Why convergence between cloud and datacenter teams is accelerating&lt;/p&gt;&lt;p&gt;How to reduce tool overload and policy inconsistencies&lt;/p&gt;&lt;p&gt;What steps teams are taking to unify visibility, policy, and risk without slowing down delivery&lt;/p&gt;</video:description>
            <video:publication_date>2025-07-01T15:28:47+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2070</video:duration>
            <video:category>Thought Leadership</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/aws-native-firewall-see-it-secure</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=113795748</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/113795748/99017df6e4c582183887a93324cf0d3d/video_medium/aws-native-firewall-see-it-secure-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/113795748/99017df6e4c582183887a93324cf0d3d/small/aws-native-firewall-see-it-secure-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AWS Native Firewall: See IT, Secure IT</video:title>
            <video:description>&lt;p&gt;&lt;strong&gt;AlgoSec’s ACE platform gives you centralized visibility and control over AWS native firewalls—letting you assess risks, inspect firewall policies, and secure your cloud environment with confidence.&lt;/strong&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2025-06-19T09:46:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>167</video:duration>
            <video:category>Tech &amp; tips</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/from-cost-center-to-growth-driver</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=113713040</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/113713040/3ef15ae3af752f691c4936c13840e4b9/video_medium/from-cost-center-to-growth-driver-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/113713040/3ef15ae3af752f691c4936c13840e4b9/small/from-cost-center-to-growth-driver-thumbnail.jpg</video:thumbnail_loc>
            <video:title>From Cost Center to Growth Driver</video:title>
            <video:description>&lt;p&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2025-06-15T12:25:03+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2866</video:duration>
            <video:category>Cloud Security</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/securing-the-hybrid-cloud-csa</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=113712889</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968570/113712889/428e69c51ebe4b1d23111295af7324c4/video_medium/securing-the-hybrid-cloud-csa-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968570/113712889/428e69c51ebe4b1d23111295af7324c4/small/securing-the-hybrid-cloud-csa-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Securing the hybrid cloud (CSA)</video:title>
            <video:description></video:description>
            <video:publication_date>2025-06-15T12:04:59+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2073</video:duration>
            <video:category>Cloud Security</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/whats-new-in-algosec-product</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=113545400</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/113545400/24cb6c33cf5fe8b6e87a001043ee6f2b/video_medium/whats-new-in-algosec-product-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/113545400/24cb6c33cf5fe8b6e87a001043ee6f2b/small/whats-new-in-algosec-product-thumbnail.jpg</video:thumbnail_loc>
            <video:title>What’s new in AlgoSec: Product feature updates</video:title>
            <video:description>&lt;p&gt;Security and network teams are under pressure to manage more systems, meet compliance requirements, and reduce errors—all with limited time. This webinar walks through the latest AlgoSec Horizon platform updates, focusing on what’s changed and how it helps you work more efficiently.&lt;/p&gt;</video:description>
            <video:publication_date>2025-06-06T21:36:19+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>597</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>fireflow</video:tag>
            <video:tag>firewall analyzer</video:tag>
            <video:tag>horizon</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/segment-secure-simplify-mastering</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=112142418</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/112142418/9eeeea396a61528deadf8a97081e5ec3/video_medium/segment-secure-simplify-mastering-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/112142418/9eeeea396a61528deadf8a97081e5ec3/small/segment-secure-simplify-mastering-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Segment, Secure, Simplify. Mastering Network Security with Cisco &amp; AlgoSec</video:title>
            <video:description>&lt;p&gt;Watch this webinar to learn about-&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Identity-Based Segmentation &amp;amp; Network Enforcement – Leverage Cisco TrustSec and ISE for dynamic, policy-driven segmentation and enforcement across your network.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Automated Security &amp;amp; Adaptive Policy Remediation – Discover how AI-driven policies automatically adjust in response to evolving threats, improving your security posture.&lt;br&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;SGT &amp;amp; AlgoSec Integration – Explore how Security Group Tags (SGTs) and Change of Authorization (CoA) integrate with Cisco ISE and AlgoSec for streamlined policy enforcement and enhanced visibility.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Securing Roaming Users &amp;amp; Applications – Learn best practices for maintaining security for mobile users and applications while ensuring compliance and full visibility through AlgoSec’s dashboard.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2025-04-24T17:30:58+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3351</video:duration>
            <video:category>Cloud network security</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>cisco meraki</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/application-centric-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=111905987</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/111905987/91e1b2c1b469e177a18dffa063145491/video_medium/application-centric-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/111905987/91e1b2c1b469e177a18dffa063145491/small/application-centric-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Application-Centric Security</video:title>
            <video:description></video:description>
            <video:publication_date>2025-04-15T13:19:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1602</video:duration>
            <video:category>Cloud network security</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/5-mindset-shifts-for-security-teams</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=111900800</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/111900800/71163c04c22b370b18800f9fd648b64f/video_medium/5-mindset-shifts-for-security-teams-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/111900800/71163c04c22b370b18800f9fd648b64f/small/5-mindset-shifts-for-security-teams-thumbnail.jpg</video:thumbnail_loc>
            <video:title>5 Mindset Shifts for Security Teams with Gal Yosef</video:title>
            <video:description></video:description>
            <video:publication_date>2025-04-15T10:29:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1838</video:duration>
            <video:category>Cloud network security</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/why-cloud-security-starts-with-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=111900021</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/111900021/6671b6038f9a7a48d1a098d170825173/video_medium/why-cloud-security-starts-with-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/111900021/6671b6038f9a7a48d1a098d170825173/small/why-cloud-security-starts-with-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Why Cloud Security Starts with Applications and How to Protect Them at Scale</video:title>
            <video:description></video:description>
            <video:publication_date>2025-04-15T10:00:40+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1640</video:duration>
            <video:category>Cloud network security</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cloud-app-discovery-in-ace</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=111809851</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/111809851/82f5576caa055b248f972ebc228770ec/video_medium/cloud-app-discovery-in-ace-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/111809851/82f5576caa055b248f972ebc228770ec/small/cloud-app-discovery-in-ace-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cloud App Discovery in ACE</video:title>
            <video:description></video:description>
            <video:publication_date>2025-04-10T15:01:46+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1177</video:duration>
            <video:category>Cloud Security</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-horizon-solution-overview</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=111728004</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/111728004/abe0fc329422116433f979f87fbcf8f1/video_medium/algosec-horizon-solution-overview-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/111728004/abe0fc329422116433f979f87fbcf8f1/small/algosec-horizon-solution-overview-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Horizon- Solution overview</video:title>
            <video:description></video:description>
            <video:publication_date>2025-04-07T22:01:44+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>212</video:duration>
            <video:category>Company </video:category>
            <video:tag>application centric</video:tag>
            <video:tag>horizon</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/virtual-summit-the-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=111395032</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/111395032/96ec0b7374891f33d827950f5b80f714/video_medium/virtual-summit-the-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/111395032/96ec0b7374891f33d827950f5b80f714/small/virtual-summit-the-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Virtual Summit - The Compliance Catalyst</video:title>
            <video:description>&lt;p&gt;The &lt;strong&gt;Compliance Catalyst&lt;/strong&gt; virtual summit took place on March 26, and features speakers from Cisco, Ernst &amp;amp; Young, Nationwide, HCLTech, and AlgoSec. &lt;/p&gt;&lt;p&gt;The event covered compliance changes, customer success stories, auditor perspectives, and the benefits of shifting from rule-based to application-based recertification.&lt;/p&gt;</video:description>
            <video:publication_date>2025-03-24T21:39:30+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3767</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-demo-for-skybox-users</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=110591392</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/110591392/2335eb73e78794a7c4834da71b94e68d/video_medium/algosec-demo-for-skybox-users-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/110591392/2335eb73e78794a7c4834da71b94e68d/small/algosec-demo-for-skybox-users-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec demo for Skybox users</video:title>
            <video:description></video:description>
            <video:publication_date>2025-03-09T07:22:27+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2450</video:duration>
            <video:category>Demos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/enhanced-insights-on-your-policies</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=109980596</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968556/109980596/2c76b1fe70104b88ad03477afdbe7e0f/video_medium/enhanced-insights-on-your-policies-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968556/109980596/2c76b1fe70104b88ad03477afdbe7e0f/small/enhanced-insights-on-your-policies-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Enhanced Insights on Your Policies and Risks using CSV Reports</video:title>
            <video:description>&lt;p&gt;We’re excited to demonstrate how by exporting your Policies and Risk data into CSV reports you can further enhance your security analysis.&lt;/p&gt;
</video:description>
            <video:publication_date>2025-02-17T01:20:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>210</video:duration>
            <video:category>Tech &amp; tips</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-securing-application</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=109796180</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/109796180/097f8bda21e5eb59fd48af511f174c1b/video_medium/how-securing-application-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/109796180/097f8bda21e5eb59fd48af511f174c1b/small/how-securing-application-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How securing application connectivity relates to policy changes</video:title>
            <video:description>&lt;p&gt;&lt;/p&gt;
</video:description>
            <video:publication_date>2025-02-11T12:53:44+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>52</video:duration>
            <video:category>Horizon</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-enterprise-ace</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=109123242</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/109123242/2b42db6a8133e91c8bc0706a13de2fb0/video_medium/algosec-cloud-enterprise-ace-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/109123242/2b42db6a8133e91c8bc0706a13de2fb0/small/algosec-cloud-enterprise-ace-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Cloud Enterprise (ACE) Overview</video:title>
            <video:description>&lt;p&gt;Simplify cloud security with AlgoSec Cloud Enterprise (ACE). Gain visibility, enhance security, and ensure compliance across your multi-cloud environment.&lt;/p&gt;
</video:description>
            <video:publication_date>2025-01-23T13:44:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>125</video:duration>
            <video:category>Cloud network security</video:category>
            <video:tag>ACE</video:tag>
            <video:tag>Cloud Network</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-horizon-platform</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=108665693</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/108665693/258dbc914f6d91cb407440a2132fb8cb/video_medium/algosec-horizon-platform-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/108665693/258dbc914f6d91cb407440a2132fb8cb/small/algosec-horizon-platform-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Horizon Platform</video:title>
            <video:description></video:description>
            <video:publication_date>2025-01-11T23:40:34+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>42</video:duration>
            <video:category>Horizon</video:category>
            <video:tag>Horizon</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-and-algosec-joint-webinar</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=107667630</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/107667630/8c42f46dbb3ce0dbff6a59a3336f1588/video_medium/cisco-and-algosec-joint-webinar-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/107667630/8c42f46dbb3ce0dbff6a59a3336f1588/small/cisco-and-algosec-joint-webinar-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco and AlgoSec joint webinar</video:title>
            <video:description>&lt;p&gt;In this webinar you&amp;nbsp;learn about the partnership between Cisco and AlgoSec and understand more about&amp;nbsp; the integrated solutions being developed to help companies secure their business applications across dynamic and complex hybrid networks.&amp;nbsp; Hear about the latest solutions for managing application security and connectivity across hybrid cloud networks to reduce downtime, identify critical risk, and remove compliance violations. In this webinar, we will cover: Cisco and AlgoSec partnership highlights The latest product integrations Integration use cases with Cisco ACI and other Cisco solutions Customer examples and success stories&lt;/p&gt;
</video:description>
            <video:publication_date>2024-12-12T18:17:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1893</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco  cisco aci  compliance  intelligent automation  risk and compliance</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-servicenow-integration-3</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=107660488</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/107660488/2d5dcdb0618a741490f21bbe6d79b0b1/video_medium/algosec-servicenow-integration-3-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/107660488/2d5dcdb0618a741490f21bbe6d79b0b1/small/algosec-servicenow-integration-3-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec &amp; ServiceNow integration productdemo</video:title>
            <video:description>&lt;p&gt;&lt;/p&gt;
</video:description>
            <video:publication_date>2024-12-12T15:29:27+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>678</video:duration>
            <video:category>Demos</video:category>
            <video:tag>servicenow</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/akamai-and-algosec-webinar</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=107565717</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968570/107565717/c7b5f90f699f1715a8e370664c8c8eda/video_medium/akamai-and-algosec-webinar-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968570/107565717/c7b5f90f699f1715a8e370664c8c8eda/small/akamai-and-algosec-webinar-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Akamai and AlgoSec webinar</video:title>
            <video:description>&lt;p&gt;Join Akamai and AlgoSec to learn about the critical role that segmentation plays in Zero Trust architectures. This webinar will explore how micro-segmentation and macro-segmentation can work together to create a more comprehensive Zero Trust strategy.&lt;/p&gt;
</video:description>
            <video:publication_date>2024-12-10T18:46:28+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3180</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>akamai; zero trust; segmentation; micro-segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-faces-of-algosec-meet-our-team</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=106549034</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968555/106549034/b2224e1a3473a14795061e69f5e5d031/video_medium/the-faces-of-algosec-meet-our-team-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968555/106549034/b2224e1a3473a14795061e69f5e5d031/small/the-faces-of-algosec-meet-our-team-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The faces of AlgoSec: Meet our team</video:title>
            <video:description>&lt;p&gt;Get to know the dedicated team working behind the scenes to keep application connectivity secure anywhere!&lt;/p&gt;
</video:description>
            <video:publication_date>2024-11-19T13:26:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>184</video:duration>
            <video:category>Company </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/effortlessly-tighten-permissive</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=106159853</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/106159853/c04698bb9a5b84462fd89dcdf00921a8/video_medium/effortlessly-tighten-permissive-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/106159853/c04698bb9a5b84462fd89dcdf00921a8/small/effortlessly-tighten-permissive-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Effortlessly Tighten Permissive Rules with Intelligent Policy Tuner &amp; FireFlow</video:title>
            <video:description>&lt;p&gt;The Intelligent Policy Tuner helps you streamline and refine your policies. The Tighten Permissive Rules report identifies broad or permissive rules and offers recommendations to tighten them. If you use FireFlow, you can now open change requests directly from the report to implement these recommendations. Watch this video to learn more. In the tech docs, see &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://techdocs.algosec.com/en/asms/a33.00/asms-help/content/afa-ug/device-report-pages.htm"&gt;Tighten Permissive Rules&lt;/a&gt;.&lt;/p&gt;
</video:description>
            <video:publication_date>2024-11-06T14:26:16+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>113</video:duration>
            <video:category>Tech &amp; tips</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/natilik-case-study</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=106123896</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/106123896/b4da82c0a90ad35a933d5c307bd07b16/video_medium/natilik-case-study-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/106123896/b4da82c0a90ad35a933d5c307bd07b16/small/natilik-case-study-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Natilik case study</video:title>
            <video:description>&lt;p&gt;Natilik, a global managed service provider, collaborated with AlgoSec to address the complex security challenges faced by Rothschild, a financial services leader with over 60 offices in 40 countries and $2.5 billion in annual revenue. Rothschild’s operations include investment banking, asset management, and private banking, as well as advisory roles for governments. Given their critical global role, securing and streamlining their IT infrastructure was a top priority.&amp;nbsp;&lt;/p&gt;
</video:description>
            <video:publication_date>2024-11-05T15:39:43+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>354</video:duration>
            <video:category>Customer Testimonials</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/building-zero-trust-architecture</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=105853549</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/105853549/0f746844a38f95c195def9ab0e09734e/video_medium/building-zero-trust-architecture-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/105853549/0f746844a38f95c195def9ab0e09734e/small/building-zero-trust-architecture-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Building Zero Trust Architecture with AlgoSec</video:title>
            <video:description>&lt;p&gt;This is a short introduction and overview of the Zero Trust principles and how AlgoSec fits into the Zero Trust Architecture.&lt;/p&gt;
</video:description>
            <video:publication_date>2024-10-29T21:04:15+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>870</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>zero trust</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosummit-2024</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=104928906</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/104928906/35a753aebca9821fb0b4e5199a94db4f/video_medium/algosummit-2024-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/104928906/35a753aebca9821fb0b4e5199a94db4f/small/algosummit-2024-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Algosummit 2024 </video:title>
            <video:description>&lt;p&gt;AlgoSec’s annual customer &amp;amp; partner event, where you can deepen your security expertise and expand your knowledge of AlgoSec’s products&lt;/p&gt;
</video:description>
            <video:publication_date>2024-09-30T14:31:43+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>4321</video:duration>
            <video:category>Events</video:category>
            <video:tag>algosummit</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/beyond-connectivity-a-masterclass-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=104881666</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/104881666/a2cc0fc2ac9d2da303d2ad78c91b52fa/video_medium/beyond-connectivity-a-masterclass-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/104881666/a2cc0fc2ac9d2da303d2ad78c91b52fa/small/beyond-connectivity-a-masterclass-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Beyond Connectivity: A masterclass in network security with Cisco Meraki and AlgoSec</video:title>
            <video:description>&lt;p&gt;Cisco Meraki and AlgoSec are sharing their approach to reducing the risks and saving time and effort required to manage large complex networks – a critical discussion for organizations with branch offices, remote workers, hybrid data centers, and cloud resources.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us to learn how the solutions from Cisco Meraki and AlgoSec work together to improve how you manage connectivity and security across your network. The webinar will also cover:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;Strategies to tackling common network security challenges&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;How to streamline your security management&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Best practices for improving security effectiveness&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2024-09-27T19:23:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3362</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco meraki</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/introducing-prevasio-application</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=104663757</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/104663757/503d06a54be44c4779eee87636e2278e/video_medium/introducing-prevasio-application-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/104663757/503d06a54be44c4779eee87636e2278e/small/introducing-prevasio-application-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Introducing Prevasio Application Discovery</video:title>
            <video:description>&lt;p&gt;Introducing Prevasio's Application Discovery feature, offering real-time visibility into cloud environments. It maps applications and microservices, highlighting security risks through a visual graph. Users can explore architectures, identify vulnerabilities, and prioritize issues for efficient cloud management and improved security.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For more details, refer to the tech docs&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://techdocs.algosec.com/en/prevasio/content/prevasio/prev-app-disc.htm"&gt;Prevasio Application Discovery&lt;/a&gt;&lt;/p&gt;
</video:description>
            <video:publication_date>2024-09-25T11:54:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>133</video:duration>
            <video:category>Tech &amp; tips</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/state-of-network-security-report</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=104491943</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/104491943/146f48437fd6e025137d9772bad90218/video_medium/state-of-network-security-report-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/104491943/146f48437fd6e025137d9772bad90218/small/state-of-network-security-report-thumbnail.jpg</video:thumbnail_loc>
            <video:title>State of Network Security Report 2024 Key Insights and Trends</video:title>
            <video:description>&lt;h2&gt;AlgoSec’s State of Network Security report uncovers key market trends, highlighting the solutions and technologies in demand. The findings are based on comprehensive surveys conducted in 2022 and 2023, revealing a shift towards multi-cloud environments and increased complexity to network security.&lt;/h2&gt;&lt;h2&gt;Highlights from the 2024 State of Network Security report include:&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;Security, continuity, and compliance driving cloud platform selection&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;The growing adoption of SD-WAN&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;The rise in SASE adoption&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;The increasing importance of firewalls in cloud estates&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;The persistence of hybrid networks&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2024-09-19T14:08:22+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>910</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/intelligent-automation-for-cisco</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=104142400</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/104142400/7d6773e9d7f7106f00320896a3111781/video_medium/intelligent-automation-for-cisco-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/104142400/7d6773e9d7f7106f00320896a3111781/small/intelligent-automation-for-cisco-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Intelligent automation for Cisco ACI</video:title>
            <video:description>In this example Nitin Rajput, Director Sales Engineering – APAC &amp;amp; Middle East, demonstrates of how AlgoSec customers can utilize the AlgoSec platform to&amp;nbsp;intelligently automate contract implementation in their Cisco ACI fabric being managed through Nexus Dashboard Orchestrator (NDO).</video:description>
            <video:publication_date>2024-09-04T04:41:36+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>766</video:duration>
            <video:category>Demos</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>cisco aci</video:tag>
            <video:tag>intelligent automation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/application-first-cloud-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=103658908</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/103658908/cc5ef0f410c5db01ed93b071b9977226/video_medium/application-first-cloud-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/103658908/cc5ef0f410c5db01ed93b071b9977226/small/application-first-cloud-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Application first cloud security</video:title>
            <video:description>Watch a 2 minute demo of how focus on the 1% of misconfiguration alerts that really matters :&lt;br /&gt;
Automatically map all cloud applications&lt;br /&gt;
Identify application misconfiguration risks&lt;br /&gt;
How would the day to day of risk prioritization works</video:description>
            <video:publication_date>2024-08-18T15:05:58+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>116</video:duration>
            <video:category>Cloud Security</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/enhance-your-efficiency-with-the</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=103618564</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/103618564/79311cc98bb17365ec652d94fce056df/video_medium/enhance-your-efficiency-with-the-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/103618564/79311cc98bb17365ec652d94fce056df/small/enhance-your-efficiency-with-the-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Enhance Your Efficiency with the Device Tree Context Menu</video:title>
            <video:description>This early availability feature allows you to make frequently used actions more accessible. You can perform key operations quickly and efficiently straight from the Device Tree, reducing the need for multiple clicks and improving overall navigation comfort.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;For more details, refer to the tech docs Device tree context menu.&lt;/p&gt;</video:description>
            <video:publication_date>2024-08-15T16:11:22+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>97</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>ASMS</video:tag>
            <video:tag>Tech docs</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/securing-application-connectivity-3</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=103215763</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968570/103215763/e7852ec25004748a7e9e5aba08b3bba2/video_medium/securing-application-connectivity-3-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968570/103215763/e7852ec25004748a7e9e5aba08b3bba2/small/securing-application-connectivity-3-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Securing Application Connectivity In Your Agile Environment</video:title>
            <video:description>&lt;p&gt;Learn how to boost your application connectivity and ensure your business's continuous growth without sacrificing safety or speed in this webinar from AlgoSec expert Eric Jeffery.&lt;/p&gt;</video:description>
            <video:publication_date>2024-07-26T00:57:59+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2594</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>appviz</video:tag>
            <video:tag>compliance</video:tag>
            <video:tag>devops</video:tag>
            <video:tag>secure application connectivity</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/july-2024-webinar1-automate-and</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=102443490</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/102443490/0c66f5703b0cf46996263d49b751dec5/video_medium/july-2024-webinar1-automate-and-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/102443490/0c66f5703b0cf46996263d49b751dec5/small/july-2024-webinar1-automate-and-thumbnail.jpg</video:thumbnail_loc>
            <video:title>July 2024 webinar1- Automate and Secure your Application Connectivity</video:title>
            <video:description>In this webinar where we share practical insights and strategies to help you manage your critical application infrastructure.
&lt;p&gt;Learn how intelligent automation can revolutionize the way you manage and optimize connections between your applications.&lt;/p&gt;
&lt;p&gt;Hear from AlgoSec connectivity expert Kyle Wickert and see how automation can reduce implementation times, cut costs, and improve application delivery.&lt;/p&gt;</video:description>
            <video:publication_date>2024-06-26T08:08:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1805</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>appviz</video:tag>
            <video:tag>intelligent automation</video:tag>
            <video:tag>secure application connectivity</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/sso-role-mapping-and-management</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=101463111</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/101463111/648f9421e4b09702e96e44c47c618cb2/video_medium/sso-role-mapping-and-management-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/101463111/648f9421e4b09702e96e44c47c618cb2/small/sso-role-mapping-and-management-thumbnail.jpg</video:thumbnail_loc>
            <video:title>SSO Role Mapping and Management</video:title>
            <video:description>Create groups of users based on their job roles, departments, or other criteria in your identity provider. Then In AlgoSec Cloud, you can associate these SSO groups to user roles and set their permissions. This enhances security while reducing administrative overhead.&lt;br /&gt;
For more details, refer to the tech docs SSO Role Mapping.</video:description>
            <video:publication_date>2024-05-30T10:37:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>105</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>Cloud</video:tag>
            <video:tag>SSO</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/double-down-on-cloud-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=101460958</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/101460958/25e86e6b59e633c6502eb7d391572518/video_medium/double-down-on-cloud-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/101460958/25e86e6b59e633c6502eb7d391572518/small/double-down-on-cloud-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Double down on cloud security webinar</video:title>
            <video:description>The cloud offers fantastic benefits, but it also comes with new security challenges.&lt;br&gt;
Join our Double Down on Cloud Visibility: See Threats, Eliminate Risks &amp;amp; Secure Your Network webinar and empower yourself to confidently secure your cloud environment.&lt;br&gt;
In this session, you'll gain valuable insights on:&lt;br&gt;
Gain a unified view of your entire multi-cloud environment, including accounts, assets, and network security controls (e.g., AWS, Azure firewalls).  No more switching between dashboards!&lt;br&gt;
Identify and eliminate network security risks by confidently removing risky network configurations.&lt;br&gt;
Effortlessly identify and address compliance gaps across your multi-cloud network</video:description>
            <video:publication_date>2024-05-30T09:08:29+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1646</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>webinar</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/migration-demo-vmware-nsx-t</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=100994483</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968568/100994483/4306f687dae7fd5844ceb66b1c2126d6/video_medium/migration-demo-vmware-nsx-t-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968568/100994483/4306f687dae7fd5844ceb66b1c2126d6/small/migration-demo-vmware-nsx-t-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Migration demo- VMWare NSX-T firewall policies to Cisco ACI contracts</video:title>
            <video:description>This demonstration highlights how customers can use the AlgoSec platform to intelligently migrate policies from one existing system to another.&lt;br /&gt;
In this example Nitin Rajput, Director Sales Engineering – APAC &amp; Middle East, highlights this capability by migrating existing VMware NSX-T distributed firewall policies to Cisco ACI contracts.</video:description>
            <video:publication_date>2024-05-22T22:02:39+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>442</video:duration>
            <video:category>Demos</video:category>
            <video:tag>automation</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>cisco aci</video:tag>
            <video:tag>fireflow</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/sc-media-interview-with-chris</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=100954836</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/100954836/fbb7955786f7088449da3e96fce1af74/video_medium/sc-media-interview-with-chris-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/100954836/fbb7955786f7088449da3e96fce1af74/small/sc-media-interview-with-chris-thumbnail.jpg</video:thumbnail_loc>
            <video:title>SC Media interview with Chris Thomas, AlgoSec CRO</video:title>
            <video:description>&lt;span&gt;SC Media interviews Chris Thomas, AlgoSec CRO on the criticality of securing business applications.&lt;/span&gt;</video:description>
            <video:publication_date>2024-05-22T13:58:29+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>887</video:duration>
            <video:category>Company </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/prevasio-double-layered-cloud</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=100951210</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/100951210/bcc62db8dd1ccf9b6489169c4d133bcc/video_medium/prevasio-double-layered-cloud-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/100951210/bcc62db8dd1ccf9b6489169c4d133bcc/small/prevasio-double-layered-cloud-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Prevasio Double layered cloud security </video:title>
            <video:description></video:description>
            <video:publication_date>2024-05-22T13:16:08+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>68</video:duration>
            <video:category>Cloud Security</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-product-demo</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=100476488</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/100476488/19dd19703434b0b7ee454f9b2d6d3ad8/video_medium/algosec-cloud-product-demo-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/100476488/19dd19703434b0b7ee454f9b2d6d3ad8/small/algosec-cloud-product-demo-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec cloud product demo</video:title>
            <video:description>Watch AlgoSec cloud in action and learn how you can:&lt;/p&gt;
&lt;p&gt;• Enhance visibility across the hybrid multi-cloud estate with central management&lt;br /&gt;&lt;br /&gt;
• Prioritize risks according to business applications and severity&lt;br /&gt;&lt;br /&gt;
• Reduce manual labor, errors, and their associated risks and costs&lt;br /&gt;&lt;br /&gt;
• Cleanup unused network security rules to reduce attack vector and better utilize resources</video:description>
            <video:publication_date>2024-05-13T10:17:55+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>318</video:duration>
            <video:category>Products</video:category>
            <video:tag>cloud</video:tag>
            <video:tag>cloud security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/secure-your-applications-with-cisco</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=99573352</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/99573352/55b3bc56799e7afef3d1b3a9cd9b0d7b/video_medium/secure-your-applications-with-cisco-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/99573352/55b3bc56799e7afef3d1b3a9cd9b0d7b/small/secure-your-applications-with-cisco-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Secure your Applications with Cisco and AlgoSec</video:title>
            <video:description>&lt;p&gt;In this webinar you&amp;nbsp;learn about the partnership between &lt;b&gt;Cisco&lt;/b&gt;&amp;nbsp;and&amp;nbsp;&lt;b&gt;AlgoSec&lt;/b&gt;&amp;nbsp;and
understand more about&amp;nbsp; the integrated solutions being developed to help companies secure
their business applications across dynamic and complex hybrid networks.&amp;nbsp; Hear about the latest solutions for managing application
security and connectivity across hybrid cloud networks to reduce downtime,
identify critical risk, and remove compliance violations.&lt;br&gt;
&lt;br&gt;
In this webinar, we will cover:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Cisco and AlgoSec partnership highlights&lt;/li&gt;&lt;li&gt;The latest product integrations&lt;/li&gt;&lt;li&gt;Integration use cases with Cisco ACI and other
Cisco solutions&lt;/li&gt;&lt;li&gt;Customer examples and success stories&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2024-05-04T04:45:45+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1893</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>cisco aci</video:tag>
            <video:tag>compliance</video:tag>
            <video:tag>intelligent automation</video:tag>
            <video:tag>risk and compliance</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/notifications-for-informed-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=98091044</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/98091044/fceb109f7403126c565c06d8484abd5d/video_medium/notifications-for-informed-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/98091044/fceb109f7403126c565c06d8484abd5d/small/notifications-for-informed-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Notifications for Informed Security</video:title>
            <video:description>AlgoSec Cloud Notifications empower you to streamline your workflow and stay ahead of security concerns by allowing you to customize email and Microsoft Teams alerts for critical events.&lt;br&gt;
Be instantly notified of Security Risk Changes, Policy Updates, and ASMS Connectivity Issues for uninterrupted security management.&lt;br&gt;
Simply set your preferences and let AlgoSec Cloud do the rest, keeping you informed and ready to take action.
&lt;p&gt;For more details, refer to the tech docs &lt;a href="https://techdocs.algosec.com/en/cloudflow/content/cloudflow/notifications.htmhttp://" title="Link: https://techdocs.algosec.com/en/cloudflow/content/cloudflow/notifications.htmhttp://"&gt;Configure CloudFlow Notifications&lt;/a&gt;.&lt;/p&gt;</video:description>
            <video:publication_date>2024-04-21T11:10:57+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>102</video:duration>
            <video:category>Tech &amp; tips</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cspm-beyond-algosec-live-demo</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=96812221</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/96812221/2b1b8888aed18bf333a1281c0f26be29/video_medium/cspm-beyond-algosec-live-demo-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/96812221/2b1b8888aed18bf333a1281c0f26be29/small/cspm-beyond-algosec-live-demo-thumbnail.jpg</video:thumbnail_loc>
            <video:title>CSPM &amp; Beyond - AlgoSec live demo</video:title>
            <video:description>&lt;p&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2024-04-14T08:28:25+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2059</video:duration>
            <video:category>Cloud Security</video:category>
            <video:tag>cloud</video:tag>
            <video:tag>cloud security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-sko-2024</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=96674119</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/96674119/5da0aa1b162640f706a1e1235904d201/video_medium/algosec-sko-2024-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/96674119/5da0aa1b162640f706a1e1235904d201/small/algosec-sko-2024-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec SKO 2024</video:title>
            <video:description></video:description>
            <video:publication_date>2024-04-09T15:02:33+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>167</video:duration>
            <video:category>Company </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/threat-management-integrating-rules</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=95477290</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/95477290/3dad0579522ebcff75d749759316273a/video_medium/threat-management-integrating-rules-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/95477290/3dad0579522ebcff75d749759316273a/small/threat-management-integrating-rules-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Threat Management: Integrating rules into developer’s CI and CD pipelines</video:title>
            <video:description>Prevasio redefines Threat Management with leading-edge scanning, integrating global cybersecurity insights with real-time rule updates into developer’s CI/CD pipelines. Its 'shift left' strategy integrates security checks early in CI processes, preempting application vulnerabilities. Post-deployment, Prevasio's CD safeguards prevent the deployment of compromised applications. Its unique capability to isolate high-risk repositories without disrupting company cloud business logic is a game-changer.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;For more details, refer to the tech docs &lt;a href="https://techdocs.algosec.com/en/prevasio/content/prevasio/prev-mitigationrules.htmhttp://" title="Link: https://techdocs.algosec.com/en/prevasio/content/prevasio/prev-mitigationrules.htmhttp://"&gt;Threat Management.&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2024-03-07T15:59:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>121</video:duration>
            <video:category>Tech &amp; tips</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/intelligent-change-management-from</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=95331285</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/95331285/f35208454fde47b4a7e060c3af652780/video_medium/intelligent-change-management-from-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/95331285/f35208454fde47b4a7e060c3af652780/small/intelligent-change-management-from-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Intelligent change management from Fortinet and AlgoSec</video:title>
            <video:description>&lt;br&gt;
In this webinar we will walk through a live demo and highlight how the Fortinet solutions and the integrations with AlgoSec help companies add a range of intelligent automation to speed up the change request process and improve accuracy.
&lt;p&gt;In this webinar, we will cover:&lt;br&gt;
•	An overview of the Fortinet and AlgoSec partnership&lt;br&gt;
•	Security policy change management using intelligent automation&lt;br&gt;
•	Use-cases and demos of our joint solutions&lt;/p&gt;</video:description>
            <video:publication_date>2024-03-04T21:39:48+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2403</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>fireflow</video:tag>
            <video:tag>firewall changes</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>fortinet</video:tag>
            <video:tag>intelligent automation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/become-hipaa-compliant-with-algosec</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=95183525</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/95183525/c33292428d460419daa9c08ccfea5a64/video_medium/become-hipaa-compliant-with-algosec-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/95183525/c33292428d460419daa9c08ccfea5a64/small/become-hipaa-compliant-with-algosec-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Become HIPAA compliant with AlgoSec</video:title>
            <video:description>In this insightful video, learn how AlgoSec's innovative solutions ensure healthcare entities adhere to HIPAA regulations effortlessly, optimizing security protocols and safeguarding patient data with seamless automation and comprehensive risk management.</video:description>
            <video:publication_date>2024-02-29T16:02:23+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>172</video:duration>
            <video:category>Promo Videos</video:category>
            <video:tag>compliance</video:tag>
            <video:tag>hipaa</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/objectflow-analysis-remediation</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=95173266</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968570/95173266/21cadbb96e8b4fb316640369553eab0a/video_medium/objectflow-analysis-remediation-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968570/95173266/21cadbb96e8b4fb316640369553eab0a/small/objectflow-analysis-remediation-thumbnail.jpg</video:thumbnail_loc>
            <video:title>ObjectFlow Analysis Remediation: Same name different content</video:title>
            <video:description>Uncover the power of AlgoSec ObjectFlow Analysis Remediation, a game-changer in managing network objects with the same name but differing content. Learn how to easily identify and align these objects to prevent security breaches and ensure smooth connectivity. This video guides you through the remediation process, from analysis to change requests, making object management straightforward and efficient. For more details, refer to the tech docs &lt;a href="https://techdocs.algosec.com/en/objectflow/content/objectflow/of-analysis.htm#Samenamedifferentcontentanalysishttp://"&gt;Same name different content analysis.&lt;/a&gt;</video:description>
            <video:publication_date>2024-02-29T12:45:41+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>155</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>objectflow</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/gigaom-webinar-3rd-party</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=94781763</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/94781763/985ecc04af0d36ecbf35f7a20d1420f6/video_medium/gigaom-webinar-3rd-party-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/94781763/985ecc04af0d36ecbf35f7a20d1420f6/small/gigaom-webinar-3rd-party-thumbnail.jpg</video:thumbnail_loc>
            <video:title>gigaOm webinar 3rd party</video:title>
            <video:description>GigaOm webinar- CTO Avishai wool discusses AlgoSec and what makes us the only outperforms in the industry.</video:description>
            <video:publication_date>2024-02-20T12:07:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2648</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-autodiscovery-2</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=94148593</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/94148593/78ae0b58bb52dccb6d3c57bcddd83b59/video_medium/algosec-autodiscovery-2-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/94148593/78ae0b58bb52dccb6d3c57bcddd83b59/small/algosec-autodiscovery-2-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec AutoDiscovery </video:title>
            <video:description>In this video see AlgoSec’s unique application-centric approach to building and maintaining a Micro-Segmentation strategy in your network.</video:description>
            <video:publication_date>2024-02-04T13:52:12+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>239</video:duration>
            <video:category>Products</video:category>
            <video:tag>micro segmentation</video:tag>
            <video:tag>zero trust</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/nitin-webinar-modernize-and-protect</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=94114326</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/94114326/842e849e3e5c1e554bf0072848c607a0/video_medium/nitin-webinar-modernize-and-protect-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/94114326/842e849e3e5c1e554bf0072848c607a0/small/nitin-webinar-modernize-and-protect-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Nitin Webinar: Modernize and protect your application infrastructure</video:title>
            <video:description>India application infrastructure with Nitin Rajput</video:description>
            <video:publication_date>2024-02-02T14:15:00+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1574</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/application-segmentation-using-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=93109516</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/93109516/95329aa8ad752bf095bdebf44ce98b71/video_medium/application-segmentation-using-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/93109516/95329aa8ad752bf095bdebf44ce98b71/small/application-segmentation-using-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Application Segmentation Using AlgoSec AutoDiscovery</video:title>
            <video:description>In this video see AlgoSec’s unique application-centric approach to building and maintaining a Micro-Segmentation strategy in your network.</video:description>
            <video:publication_date>2024-01-30T16:25:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>239</video:duration>
            <video:category>Products</video:category>
            <video:tag>Micro Segmentation</video:tag>
            <video:tag> Network Segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/beyond-connectivity-a-masterclass</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=92701673</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/92701673/a481528f20cbef6f054aa5d6639e1aba/video_medium/beyond-connectivity-a-masterclass-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/92701673/a481528f20cbef6f054aa5d6639e1aba/small/beyond-connectivity-a-masterclass-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Beyond Connectivity A Masterclass in Network Security with Meraki &amp; AlgoSec</video:title>
            <video:description>This webinar highlights real-world examples of organizations that have successfully implemented AlgoSec and Cisco Meraki solutions.  Learn details of how to overcome common network security challenges, how to streamline your security management, and how to boost your security effectiveness with AlgoSec and Cisco Meraki’s enhanced integration.</video:description>
            <video:publication_date>2024-01-22T18:19:41+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3427</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Cisco</video:tag>
            <video:tag>cisco meraki</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-community-recap-2023</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=92149949</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968555/92149949/b3405ead6af9c1eb73745ad29ba58630/video_medium/algosec-community-recap-2023-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968555/92149949/b3405ead6af9c1eb73745ad29ba58630/small/algosec-community-recap-2023-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Community Recap 2023</video:title>
            <video:description>As we joyfully step into 2024&#127775;we want to celebrate the collective milestones we’ve accomplished TOGETHER.&lt;br&gt;
Join us in savoring this video&#127909;, highlighting some of the standout collaboration achievements that defined 2023.&lt;br&gt;
Here’s to a new year filled with even more shared successes, growth, and community spirit!&lt;br&gt;
Happy New Year!&lt;p&gt;&lt;/p&gt;
&lt;p&gt;AlgoSec Community Team&lt;/p&gt;</video:description>
            <video:publication_date>2024-01-03T17:28:53+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>47</video:duration>
            <video:category>Company </video:category>
            <video:tag>community</video:tag>
            <video:tag>recap</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/sans-and-algosec-addressing-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=92122151</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/92122151/90ffc50248b5b87c95185b443244f0cb/video_medium/sans-and-algosec-addressing-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/92122151/90ffc50248b5b87c95185b443244f0cb/small/sans-and-algosec-addressing-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>SANS and AlgoSec: Addressing network and configuration risks</video:title>
            <video:description>Discover the latest in cloud security in our upcoming webinar. We'll tackle the challenges of configuration and network security in cloud environments, analyze real-world breach cases, and highlight overlooked risks. Learn about essential tools and practices to fortify your cloud infrastructure. Join us for insights into keeping your organization secure against evolving threats.</video:description>
            <video:publication_date>2024-01-02T13:39:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2852</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud configuration risks</video:tag>
            <video:tag>cloud network security</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>CNAPP</video:tag>
            <video:tag>cspm</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/strengthen-your-compliance-with</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=91835029</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/91835029/de06f117b875b7d34d7e9291639035b9/video_medium/strengthen-your-compliance-with-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/91835029/de06f117b875b7d34d7e9291639035b9/small/strengthen-your-compliance-with-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Strengthen your compliance with application-centric focus</video:title>
            <video:description>Learn to enhance your compliance strategy against the backdrop of increasingly strict and complex regulations by adopting an application-centric and continuous approach in this webinar from AlgoSec expert Gert De Wever.</video:description>
            <video:publication_date>2023-12-19T11:20:37+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1694</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>application centric</video:tag>
            <video:tag>application connectivity</video:tag>
            <video:tag>compliance</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/5-pillars-for-advanced-cloud</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=91305878</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/91305878/91d48e5b07e1ccd606ddfa39473789b0/video_medium/5-pillars-for-advanced-cloud-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/91305878/91d48e5b07e1ccd606ddfa39473789b0/small/5-pillars-for-advanced-cloud-thumbnail.jpg</video:thumbnail_loc>
            <video:title>5 Pillars for advanced cloud security</video:title>
            <video:description>&lt;span&gt;Secure
your cloud environment with just 5 Pillars. Learn how Prevasio CNAPP’s innovative
features and robust architecture, offers a comprehensive defense mechanism that
goes beyond traditional security&amp;nbsp;&lt;/span&gt;measures.&lt;br&gt;&lt;a href="https://www.prevasio.io/demo-request"&gt;Try Prevasio free here&amp;nbsp;&lt;/a&gt;</video:description>
            <video:publication_date>2023-12-04T15:24:25+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1271</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>cloud security management</video:tag>
            <video:tag>cloud strategy</video:tag>
            <video:tag>cnapp</video:tag>
            <video:tag>CSPM</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/data-visualizations-predefined</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=91296997</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/91296997/128f2376c12260afa94d6d2d210049a7/video_medium/data-visualizations-predefined-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/91296997/128f2376c12260afa94d6d2d210049a7/small/data-visualizations-predefined-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Data Visualizations - Predefined and custom graphs in reports</video:title>
            <video:description>Explore the new Data Visualizations for Reports feature, transforming your report data into customizable graphs. Get tips on making the most of this tool for enhanced data understanding and insights. Dive in to see how these visualizations can transform your data analysis experience! For more information, see the tech docs, &lt;a href="https://www.algosec.com/docs/en/asms/latest/asms-help/content/afa-admin/enabling-disabling-early-availability.htm?Highlight=early%20avail#DataVisualizations"&gt;Data Visualizations for Reports&lt;/a&gt;.</video:description>
            <video:publication_date>2023-12-04T12:00:44+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>152</video:duration>
            <video:category>Tech &amp; tips</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/navigating-key-regulations-for</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90677980</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/90677980/912348a4d38830a37d7c90b8c6a69590/video_medium/navigating-key-regulations-for-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/90677980/912348a4d38830a37d7c90b8c6a69590/small/navigating-key-regulations-for-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Navigating key regulations for organizations</video:title>
            <video:description>In this episode, we embark on a journey through the complex landscape of regulations that organizations must navigate to ensure legal and ethical operations. Our expert guest breaks down key compliance requirements, offering insights into the latest changes and best practices for staying on the right side of the law. From data protection to industry-specific regulations, join us as we explore the critical elements of organizational compliance and provide valuable guidance for steering your business through the regulatory maze.</video:description>
            <video:publication_date>2023-11-15T13:58:06+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>235</video:duration>
            <video:category>Promo Videos</video:category>
            <video:tag>compliance</video:tag>
            <video:tag>podcast</video:tag>
            <video:tag>regulatory compliance</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/securing-cloud-devops-with-avishai</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90438117</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/90438117/fee020b5f92e35683e6377582f710382/video_medium/securing-cloud-devops-with-avishai-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/90438117/fee020b5f92e35683e6377582f710382/small/securing-cloud-devops-with-avishai-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Securing cloud DevOps with Avishai Wool</video:title>
            <video:description>&lt;span&gt;The cloud has revolutionized the way we develop and deploy software, but with great power comes great responsibility.  In this exclusive video, Avishai Wool, a seasoned professional in the field, takes you on a comprehensive journey through the crucial aspects of securing your DevOps practices in the cloud.&lt;/span&gt;</video:description>
            <video:publication_date>2023-11-08T11:57:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>945</video:duration>
            <video:category>Promo Videos</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>devops</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/should-you-use-containers-in-cloud</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437382</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968579/90437382/b08e9eb08c599744671cb07bea2a67cd/video_medium/should-you-use-containers-in-cloud-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968579/90437382/b08e9eb08c599744671cb07bea2a67cd/small/should-you-use-containers-in-cloud-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Should you use containers in cloud applications?</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:40:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>34</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/managing-containerized-applications</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437379</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/90437379/9590f580c7e6b6e0215867405fe33f5d/video_medium/managing-containerized-applications-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/90437379/9590f580c7e6b6e0215867405fe33f5d/small/managing-containerized-applications-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Managing containerized applications</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:40:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>37</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/using-containers-in-your-cloud</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437378</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/90437378/1f7119f176202aa322ba0cbaefe5d6a1/video_medium/using-containers-in-your-cloud-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/90437378/1f7119f176202aa322ba0cbaefe5d6a1/small/using-containers-in-your-cloud-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Using containers in your cloud environment</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:40:34+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>55</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/differences-between-vms-and</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437373</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/90437373/8c82f768c6856c2273e5fea763c29041/video_medium/differences-between-vms-and-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/90437373/8c82f768c6856c2273e5fea763c29041/small/differences-between-vms-and-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Differences between VMs and containers</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:40:28+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>57</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/accountability-in-the-shared</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437372</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/90437372/6b5895491593285637b589f57498e547/video_medium/accountability-in-the-shared-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/90437372/6b5895491593285637b589f57498e547/small/accountability-in-the-shared-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Accountability in the shared responsibility model</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:40:24+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>60</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/exploring-the-shared-responsibility-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437369</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/90437369/63259f88d1d473ad59e316a05885f3a3/video_medium/exploring-the-shared-responsibility-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/90437369/63259f88d1d473ad59e316a05885f3a3/small/exploring-the-shared-responsibility-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Exploring the shared responsibility model in the cloud</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:40:16+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>70</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/critical-cloud-application-concerns</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437368</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968579/90437368/4623c5fd60d02be822c3724b7d8d7780/video_medium/critical-cloud-application-concerns-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968579/90437368/4623c5fd60d02be822c3724b7d8d7780/small/critical-cloud-application-concerns-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Critical cloud application concerns</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:40:09+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>107</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/integrating-security-into-the</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437367</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/90437367/924196caf1e7dbc46fd1cc9297db5cc6/video_medium/integrating-security-into-the-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/90437367/924196caf1e7dbc46fd1cc9297db5cc6/small/integrating-security-into-the-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Integrating security into the development process</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:40:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>43</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/preparing-for-cloud-application</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437350</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/90437350/b0b5457ef14964de6840055ab8598619/video_medium/preparing-for-cloud-application-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/90437350/b0b5457ef14964de6840055ab8598619/small/preparing-for-cloud-application-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Preparing for cloud application migration</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:39:53+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>42</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/next-steps-in-aligning-cloud</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437346</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/90437346/c5212f7a1a5f68b64bbb30868020c8ce/video_medium/next-steps-in-aligning-cloud-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/90437346/c5212f7a1a5f68b64bbb30868020c8ce/small/next-steps-in-aligning-cloud-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Next steps in aligning cloud security and development</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:39:51+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>48</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/introducing-security-controls-into</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437345</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/90437345/7bb7946c2410b2cd6def7d242c685f16/video_medium/introducing-security-controls-into-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/90437345/7bb7946c2410b2cd6def7d242c685f16/small/introducing-security-controls-into-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Introducing security controls into cloud deployment</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:39:47+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>75</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/speeding-up-security-controls-in</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437339</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/90437339/55dcbb28b4ba2cf5cd8a414f97deeebe/video_medium/speeding-up-security-controls-in-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/90437339/55dcbb28b4ba2cf5cd8a414f97deeebe/small/speeding-up-security-controls-in-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Speeding up security controls in cloud deployment</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:39:40+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>75</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/bridging-the-gap-between-cloud-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437336</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968555/90437336/c01e8d00abf6e10bb8017c28274f263d/video_medium/bridging-the-gap-between-cloud-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968555/90437336/c01e8d00abf6e10bb8017c28274f263d/small/bridging-the-gap-between-cloud-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Bridging the gap between cloud security and development</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:39:36+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>54</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cloud-application-deployment-2</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90437335</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968568/90437335/5d55511141fb1c1ea8581222a901e284/video_medium/cloud-application-deployment-2-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968568/90437335/5d55511141fb1c1ea8581222a901e284/small/cloud-application-deployment-2-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cloud application deployment visibility</video:title>
            <video:description></video:description>
            <video:publication_date>2023-11-08T11:39:36+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>61</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/decryptage-algosecmp4</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90285172</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/90285172/ea083ecbe9d591b6b3e32d3fb77a6a8f/video_medium/decryptage-algosecmp4-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/90285172/ea083ecbe9d591b6b3e32d3fb77a6a8f/small/decryptage-algosecmp4-thumbnail.jpg</video:thumbnail_loc>
            <video:title>DECRYPTAGE ALGOSEC.mp4</video:title>
            <video:description>In today's fast-paced world, compliance is a must for many organizations. Join us for a dive into this crucial subject with Marc-Henri Guy, AlgoSec's Vice-President of EMEA. Discover how AlgoSec is making a significant impact by supporting businesses in meeting their obligations. This is a discussion you don't want to miss.</video:description>
            <video:publication_date>2023-11-06T16:58:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>630</video:duration>
            <video:category>Company </video:category>
            <video:tag>compliance</video:tag>
            <video:tag>interview</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/introducing-prevasio-cnapp</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=90136216</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968555/90136216/5c4690e4a126c43f9e6a9e2e92fb3069/video_medium/introducing-prevasio-cnapp-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968555/90136216/5c4690e4a126c43f9e6a9e2e92fb3069/small/introducing-prevasio-cnapp-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Introducing Prevasio CNAPP</video:title>
            <video:description>Prevasio CNAPP gives you an extensive view of your east-west and north-south traffic. It empowers you to detect both configuration and IaaS network risks, identify drift from safe setups, and spot risky behavior in container apps—all without agents.&lt;br&gt;
Request a demo today to experience how Prevasio CNAPP can revolutionize your cloud security.</video:description>
            <video:publication_date>2023-10-31T11:27:50+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>155</video:duration>
            <video:category>Cloud Security</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>CNAPP</video:tag>
            <video:tag>CNAPP network</video:tag>
            <video:tag>container security</video:tag>
            <video:tag>prevasio</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/hybrid-cloud-security-with-google</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=89956906</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968570/89956906/b93c9ade09e162d128d0a32a3d3e537e/video_medium/hybrid-cloud-security-with-google-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968570/89956906/b93c9ade09e162d128d0a32a3d3e537e/small/hybrid-cloud-security-with-google-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Hybrid Cloud Security with Google and AlgoSec- Webinar</video:title>
            <video:description>In this short webinar we will discuss the challenges in these hybrid networks and how Google Cloud and AlgoSec are helping companies leverage cloud technologies to add more capacity and business applications without increasing their exposure to security risk.</video:description>
            <video:publication_date>2023-10-24T21:00:15+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2186</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>google</video:tag>
            <video:tag>Google cloud</video:tag>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>hybrid cloud security</video:tag>
            <video:tag>prevasio</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/securing-application-connectivity</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=89219238</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/89219238/33dbb4aa57f724bf314c5e86895bf9df/video_medium/securing-application-connectivity-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/89219238/33dbb4aa57f724bf314c5e86895bf9df/small/securing-application-connectivity-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Securing application connectivity in the dynamic cloud</video:title>
            <video:description>A discussion with our cloud security leadership on securing dynamic cloud environments</video:description>
            <video:publication_date>2023-10-02T11:18:55+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1533</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-network-policy-management</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=88855428</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/88855428/001b9f99450ce479e47d659c88172af1/video_medium/cisco-network-policy-management-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/88855428/001b9f99450ce479e47d659c88172af1/small/cisco-network-policy-management-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco Network Policy Management with AlgoSec</video:title>
            <video:description>&lt;p&gt;This webinar will
provide a brief overview of the Cisco and AlgoSec partnership, its benefits to
customers, and showcase real-life customer use cases. It also incluides use-cases and demos of our new joint solutions.&lt;/p&gt;</video:description>
            <video:publication_date>2023-09-20T20:30:13+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2126</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>automated security policy</video:tag>
            <video:tag>Cisco</video:tag>
            <video:tag>cisco aci</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/case-study-overcoming-firewall</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=88428609</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968570/88428609/03cf2d77aa4060500bbe2d2df6a0b7cc/video_medium/case-study-overcoming-firewall-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968570/88428609/03cf2d77aa4060500bbe2d2df6a0b7cc/small/case-study-overcoming-firewall-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Case Study - Overcoming firewall rule recertification challenges with Kyle Wickert</video:title>
            <video:description>Learn about the best practices and strategies employed by a successful organization to streamline recertification processes, enhance security, and maintain compliance.</video:description>
            <video:publication_date>2023-09-07T14:09:25+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>261</video:duration>
            <video:category>Products</video:category>
            <video:tag>firewalls</video:tag>
            <video:tag>rule recertification</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-customer-automation-usage</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=88428329</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/88428329/aec5219c285f70a9dfe4bee694cc3281/video_medium/algosec-customer-automation-usage-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/88428329/aec5219c285f70a9dfe4bee694cc3281/small/algosec-customer-automation-usage-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec customer automation usage with Kyle Wickert</video:title>
            <video:description>Gain invaluable insights from Kyle Wickert, a seasoned professional, as he shares tips and best practices for leveraging AlgoSec's automation features effectively.</video:description>
            <video:publication_date>2023-09-07T14:04:51+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>82</video:duration>
            <video:category>Products</video:category>
            <video:tag>automation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/using-algosec-to-secure-networks</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=88427899</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/88427899/ea9a3bc2bded333679026d7f7cf37579/video_medium/using-algosec-to-secure-networks-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/88427899/ea9a3bc2bded333679026d7f7cf37579/small/using-algosec-to-secure-networks-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Using AlgoSec to secure networks with Kyle Wickert</video:title>
            <video:description>Whether you're a seasoned cybersecurity professional or new to the world of network security, this video offers invaluable knowledge and practical tips for harnessing AlgoSec's capabilities to secure your network infrastructure effectively.</video:description>
            <video:publication_date>2023-09-07T13:59:15+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>155</video:duration>
            <video:category>Products</video:category>
            <video:tag>network security management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/case-study-with-kyle-wickert</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=88427575</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/88427575/6001a5c987e6602673814d6c538b9319/video_medium/case-study-with-kyle-wickert-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/88427575/6001a5c987e6602673814d6c538b9319/small/case-study-with-kyle-wickert-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Case study with Kyle Wickert - Executing changes with a timely turnaround</video:title>
            <video:description>Join us on this enlightening journey of transformation and discover the keys to executing changes with a timely turnaround, ultimately securing a competitive edge in today's fast-paced business landscape. Don't miss out on the insights that can revolutionize your approach to change management.</video:description>
            <video:publication_date>2023-09-07T13:52:25+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>316</video:duration>
            <video:category>Products</video:category>
            <video:tag>change automation</video:tag>
            <video:tag>change management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/joint-webinar-with-microsoft-azure</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=88145624</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/88145624/bc3c41a552d81a4343c3623389e4a89e/video_medium/joint-webinar-with-microsoft-azure-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/88145624/bc3c41a552d81a4343c3623389e4a89e/small/joint-webinar-with-microsoft-azure-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Joint webinar with Microsoft Azure- Understanding Hybrid Network Security</video:title>
            <video:description>In this joint webinar with Microsoft, we discuss the challenges in these hybrid networks and how Microsoft Azure and AlgoSec are helping companies leverage cloud technologies to add more capacity and business applications without increasing their exposure to security risk.&lt;br&gt;&lt;br&gt;During the webinar you will hear Yuval
Pery, the&amp;nbsp;Product Manager for Azure Network
Security at Microsoft, review and&amp;nbsp;discuss the security features and options available with Microsoft Azure.&amp;nbsp; We also have Yoav Yam-Karnibad, the Product
Manager for Cloud Network Security at AlgoSec, show the&amp;nbsp;integrations that exist today between AlgoSec and Microsoft Azure that help improve visibility and identify and prioritize risk in today's hybrid environments.</video:description>
            <video:publication_date>2023-08-29T17:30:58+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1805</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>azure</video:tag>
            <video:tag>azure firewall</video:tag>
            <video:tag>azure security</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>hybrid</video:tag>
            <video:tag>hybrid cloud security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/appviz-server-migration</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=87146704</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/87146704/e5ec82d91963c58e84f2d900ff7531e7/video_medium/appviz-server-migration-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/87146704/e5ec82d91963c58e84f2d900ff7531e7/small/appviz-server-migration-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AppViz Server Migration </video:title>
            <video:description>&lt;span&gt;AppViz automates network infrastructure changes for a seamless server migration, eliminating manual reviews and streamlining approval processes&lt;/span&gt;</video:description>
            <video:publication_date>2023-07-20T11:34:45+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>209</video:duration>
            <video:category>Demos</video:category>
            <video:tag>application flows</video:tag>
            <video:tag>application migrations</video:tag>
            <video:tag>application risk</video:tag>
            <video:tag>appviz</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/appviz-connectivity-diagrammov</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=87013698</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/87013698/8d455746d568fd7a29f38d5b62a8ced4/video_medium/appviz-connectivity-diagrammov-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/87013698/8d455746d568fd7a29f38d5b62a8ced4/small/appviz-connectivity-diagrammov-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AppViz Connectivity Diagram.mov</video:title>
            <video:description>AppViz's application connectivity diagram:&lt;br /&gt;
1. simplifies application architecture, showing endpoints, flows, and zones.&lt;br /&gt;
2. Aids audit and compliance by highlighting blocked connections.&lt;br /&gt;
3. Enables administrators can investigate blocked connections in the Flows tab.&lt;br /&gt;
4. Provides a visual overview enables effective communication and informed decision-making</video:description>
            <video:publication_date>2023-07-13T17:11:03+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>71</video:duration>
            <video:category>Products</video:category>
            <video:tag>application connectivity flows</video:tag>
            <video:tag>application connectivity management</video:tag>
            <video:tag>appviz</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/whats-new-in-algosec-cloud</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=87006980</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/87006980/7b284015dcf717bf79db0fdc0904eda7/video_medium/whats-new-in-algosec-cloud-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/87006980/7b284015dcf717bf79db0fdc0904eda7/small/whats-new-in-algosec-cloud-thumbnail.jpg</video:thumbnail_loc>
            <video:title>What's new in AlgoSec cloud</video:title>
            <video:description>Dive into the latest innovations and advancements in AlgoSec Cloud, revolutionizing cloud security management. Simplify and streamline your approach, gain visibility and control, and stay ahead in the dynamic digital landscape. Don't miss out on this game-changing opportunity to strengthen your security posture in the cloud.</video:description>
            <video:publication_date>2023-07-13T13:56:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1325</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>cloud security management</video:tag>
            <video:tag>Saas Q release</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/case-study-ncr-corporations-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=86775576</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/video_medium/case-study-ncr-corporations-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/86775576/328e01b63f7c400ea2da69de572ce8f5/small/case-study-ncr-corporations-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Case Study: NCR Corporation's Network Security Transformation with AlgoSec</video:title>
            <video:description>Discover how NCR Corporation successfully integrated AlgoSec's Security Policy Management Solution into their network infrastructure. Learn how AlgoSec Firewall Analyzer, FireFlow, AppViz, and AppChange enabled NCR to automate security policy changes, improve visibility, streamline auditing, and achieve zero trust. Explore the benefits of AlgoSec's comprehensive suite of tools in enhancing network security for a global organization like NCR.</video:description>
            <video:publication_date>2023-07-04T16:56:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>120</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag> application connectivity</video:tag>
            <video:tag> auditing</video:tag>
            <video:tag> automation</video:tag>
            <video:tag> Cisco ACI</video:tag>
            <video:tag> container security.</video:tag>
            <video:tag>container security</video:tag>
            <video:tag> firewall management</video:tag>
            <video:tag> microsegmentation</video:tag>
            <video:tag>NCR Corporation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag> risk analysis</video:tag>
            <video:tag> security policy management</video:tag>
            <video:tag> visibility</video:tag>
            <video:tag> zero trust</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/zscaler-and-algosec-demo</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=86484231</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/86484231/a1ef57e24e4a24cd6b81f39af493b5f6/video_medium/zscaler-and-algosec-demo-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/86484231/a1ef57e24e4a24cd6b81f39af493b5f6/small/zscaler-and-algosec-demo-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Zscaler and AlgoSec demo</video:title>
            <video:description>This short demo highlights the integration between Zscaler and AlgoSec.&lt;br /&gt;
This includes capabilities such as policy visibility, risk analysis, change history, compliance reports, policy optimization, and traffic simulation query.</video:description>
            <video:publication_date>2023-06-23T00:07:58+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>570</video:duration>
            <video:category>Demos</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>zero trust</video:tag>
            <video:tag>Zscaler</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/unlock-seamless-application</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=86478233</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/86478233/dbf70ce331a35dcde5dae0e62e1bba0e/video_medium/unlock-seamless-application-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/86478233/dbf70ce331a35dcde5dae0e62e1bba0e/small/unlock-seamless-application-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Unlock seamless application connectivity anywhere with AlgoSec</video:title>
            <video:description>Ready to unleash uninterrupted application connectivity from anywhere? Look no further than AlgoSec: the ultimate network security solution that will revolutionize the way you think about secure connectivity. Discover a world where seamless connectivity is the norm.</video:description>
            <video:publication_date>2023-06-22T14:39:03+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>59</video:duration>
            <video:category>Promo Videos</video:category>
            <video:tag>application connectivity</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/bridging-the-gap-for-success-in</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=86478087</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/86478087/fc65a43d2917f3b1a4e85e3787abec8e/video_medium/bridging-the-gap-for-success-in-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/86478087/fc65a43d2917f3b1a4e85e3787abec8e/small/bridging-the-gap-for-success-in-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Bridging the gap for success in business application security</video:title>
            <video:description>Failing to secure your apps can lead to disastrous data breaches, financial loss and reputational damage. But with the right approach, you can bolster your business's security measures and keep those threats at bay. Watch now to discover some valuable insights on application security that will help propel your business towards success!</video:description>
            <video:publication_date>2023-06-22T14:30:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>37</video:duration>
            <video:category>Promo Videos</video:category>
            <video:tag>application security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/5-keys-to-success-automating</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=86299547</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/86299547/1cf80718e5deec19867b319c61c36ed9/video_medium/5-keys-to-success-automating-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/86299547/1cf80718e5deec19867b319c61c36ed9/small/5-keys-to-success-automating-thumbnail.jpg</video:thumbnail_loc>
            <video:title>5 Keys to Success: Automating compliance for network security</video:title>
            <video:description>In a landscape where technological progression is rapidly advancing every day, network security has become a crucial factor in the success of businesses. Keeping sensitive data secure is no longer just an option, it's a necessity. But, with security issues constantly on the rise, maintaining compliance can be an overwhelming and time-consuming task for IT professionals.&lt;/p&gt;
&lt;p&gt;In this webinar, we cover automating compliance for network security as a key component for ensuring business continuity and mitigating risks. This not only reduces the workload of security teams but also helps them to stay ahead of potential threats. Join our workshop and learn why automating compliance for network security is a crucial aspect of ensuring business success in today's digital landscape.</video:description>
            <video:publication_date>2023-06-14T12:49:41+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1085</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>automation</video:tag>
            <video:tag>compliance</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/appviz-impact-analysis-tool</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=86247194</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968579/86247194/d9a6c1118626dc61d85d016007236d9d/video_medium/appviz-impact-analysis-tool-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968579/86247194/d9a6c1118626dc61d85d016007236d9d/small/appviz-impact-analysis-tool-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AppViz Impact Analysis Tool</video:title>
            <video:description>The AlgoSec AppViz Impact Analysis Tool simplifies the time-consuming and risky tasks of server decommissioning and firewall setup. With just a click or two, it enables users to quickly identify and track all the applications impacted by these changes, providing detailed information about each application's status and lifecycle stage. The impact analysis tool can also be utilized to look for vulnerabilities and to understand which applications are impacted by these vulnerabilities.</video:description>
            <video:publication_date>2023-06-12T12:17:33+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>75</video:duration>
            <video:category>Demos</video:category>
            <video:tag>appviz</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/empowering-cybersecurity-the-power</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=86111892</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968556/86111892/41303dee1cc7c5588e8fba17911c14e0/video_medium/empowering-cybersecurity-the-power-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968556/86111892/41303dee1cc7c5588e8fba17911c14e0/small/empowering-cybersecurity-the-power-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Empowering Cybersecurity: The Power of Automation</video:title>
            <video:description>Discover the role of AlgoSec in revolutionizing cybersecurity through automation. Learn how AlgoSec's advanced automation capabilities streamline security processes, optimize policy management, and improve overall threat detection and response. Unlock the power of automation with AlgoSec to enhance your cybersecurity posture and stay one step ahead of evolving threats.</video:description>
            <video:publication_date>2023-05-31T14:34:05+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>73</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>automated threat detection</video:tag>
            <video:tag>Automation</video:tag>
            <video:tag>Cybersecurity automation</video:tag>
            <video:tag>policy management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/from-chaos-to-control-overcoming</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=86091381</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/86091381/063a67622c7054aa2d0cd62487668716/video_medium/from-chaos-to-control-overcoming-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/86091381/063a67622c7054aa2d0cd62487668716/small/from-chaos-to-control-overcoming-thumbnail.jpg</video:thumbnail_loc>
            <video:title>From chaos to control - overcoming 5 challenges of network object management</video:title>
            <video:description>Join our free webinar on conquering 5 common network object management obstacles! Learn practical tips and strategies to simplify your network management process and boost efficiency. Don't miss out on this opportunity to improve your network performance and minimize headaches.</video:description>
            <video:publication_date>2023-05-29T16:59:44+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1302</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>objectflow</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/moving-to-zero-trust-hybrid-cloud</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=85364994</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/85364994/aabdf2c370ed189a01bf93a5ce7d0bd9/video_medium/moving-to-zero-trust-hybrid-cloud-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/85364994/aabdf2c370ed189a01bf93a5ce7d0bd9/small/moving-to-zero-trust-hybrid-cloud-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Moving to zero trust- Hybrid cloud security with Zscaler and AlgoSec.mp4</video:title>
            <video:description>As more organizations adopt hybrid cloud environments, securing data and applications has become increasingly complex. The traditional perimeter-based approach to security is no longer enough to protect against advanced threats and targeted attacks. In this webinar, experts from Algosec and Zscaler will discuss how to move toward a Zero Trust security architecture in hybrid cloud environments.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Join us for a conversation about:&lt;br&gt;
• Why organizations are moving toward zero trust&lt;br&gt;
• How to manage legacy and new network technologies together&lt;br&gt;
• A demo showing how these solutions are integrated&lt;/p&gt;</video:description>
            <video:publication_date>2023-04-21T17:49:43+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2264</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>zero trust</video:tag>
            <video:tag>Zscaler</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/intersection-of-cloud-and</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=85158393</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/85158393/7ce5282cf636ec1c4e08df2a030cba08/video_medium/intersection-of-cloud-and-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/85158393/7ce5282cf636ec1c4e08df2a030cba08/small/intersection-of-cloud-and-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Intersection of cloud and application security - CSA survey results</video:title>
            <video:description>Watch an exciting joint webinar between AlgoSec and the Cloud Security Association, where we will explore the latest trends and challenges in cloud security and container adoption.&lt;/p&gt;
&lt;p&gt;Our experts will cover the following topics:&lt;br /&gt;
•	The current state of cloud security and emerging threats&lt;br /&gt;
•	Best practices for securing cloud environments&lt;br /&gt;
•	Strategies for integrating container security into your overall security posture&lt;br /&gt;
•	The role of automation in managing security policies in containerized environments</video:description>
            <video:publication_date>2023-04-04T09:02:27+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2125</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud</video:tag>
            <video:tag>cloudsecurity</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>cyber security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/automation-security-with-algosec</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=85101825</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968555/85101825/864786880ad82af17d1ed0a6fabfd054/video_medium/automation-security-with-algosec-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968555/85101825/864786880ad82af17d1ed0a6fabfd054/small/automation-security-with-algosec-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Automation &amp; Security with Algosec- Cisco Live Amsterdam 2023</video:title>
            <video:description></video:description>
            <video:publication_date>2023-03-30T05:08:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>810</video:duration>
            <video:category>Events</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/master-the-zero-trust-strategy-for</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=84210327</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/video_medium/master-the-zero-trust-strategy-for-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968570/84210327/f244c9bfea16f9a9b492ce8a5122a148/small/master-the-zero-trust-strategy-for-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Master the Zero Trust Strategy for Improved Cybersecurity</video:title>
            <video:description>In today's digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in - a security model that requires every user, device, and application to be verified before granting access.
&lt;p&gt;If you're looking to implement zero trust security in your business or want to know more about how it works, join our upcoming webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization.&lt;/p&gt;</video:description>
            <video:publication_date>2023-03-08T16:57:24+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1180</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cyberattack</video:tag>
            <video:tag>cyber threats</video:tag>
            <video:tag>micro-segmentatio</video:tag>
            <video:tag>micro-segmentation</video:tag>
            <video:tag>network managemen</video:tag>
            <video:tag>network management</video:tag>
            <video:tag>network securit</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>ransomware</video:tag>
            <video:tag>risk management</video:tag>
            <video:tag>security</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>security policy</video:tag>
            <video:tag>security policy management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/aws-and-hybrid-cloud-securitymp4</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=83739963</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968555/83739963/43cfb6c1559b1efb9f93b7cdc5e130b1/video_medium/aws-and-hybrid-cloud-securitymp4-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968555/83739963/43cfb6c1559b1efb9f93b7cdc5e130b1/small/aws-and-hybrid-cloud-securitymp4-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AWS and Hybrid Cloud Security.mp4</video:title>
            <video:description>&lt;div&gt;With all the advantage that cloud technologies bring, how can companies embrace and maintain a healthy security posture across hybrid cloud environments.&amp;nbsp; In this short webinar we discuss how AWS and AlgoSec are helping companies leverage cloud technologies to add more capacity and business applications without increasing their exposure to security risk.&lt;/div&gt;&lt;div&gt;&lt;br&gt;Watch now to&amp;nbsp;learn&amp;nbsp;about: security of the cloud/security in the cloud, security challenges in hybrid environments, and the latest capabilities to help catch security policy and connectivity issues before code is deployed.&lt;br&gt;&lt;/div&gt;</video:description>
            <video:publication_date>2023-02-28T22:05:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1572</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>aws</video:tag>
            <video:tag>aws security</video:tag>
            <video:tag>cloud</video:tag>
            <video:tag>cloud computing</video:tag>
            <video:tag>cloud firewalls</video:tag>
            <video:tag>cloud migration</video:tag>
            <video:tag>cloud migrations</video:tag>
            <video:tag>cloudsecurity</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>cloud strategy</video:tag>
            <video:tag>devsecops</video:tag>
            <video:tag>hybrid cloud</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-community</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=83680647</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/83680647/ae0b89466b93f07eaa5c107a5968a957/video_medium/algosec-community-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/83680647/ae0b89466b93f07eaa5c107a5968a957/small/algosec-community-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Community</video:title>
            <video:description>AlgoSec Community platform is designed to help you connect and collaborate with other network security professionals who use AlgoSec products.&lt;br&gt;
The community will provide a space to share best practices, ask questions, and stay up-to-date on the latest Algosec product developments.&lt;br&gt;
Additionally, community members can participate in exclusive webinars, events, and training sessions. &lt;br&gt;&lt;a href="https://community.algosec.com/"&gt;&lt;b&gt;Visit the AlgoSec Community&lt;/b&gt;&lt;/a&gt;</video:description>
            <video:publication_date>2023-02-26T16:48:21+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>60</video:duration>
            <video:category>Company </video:category>
            <video:tag>algosec</video:tag>
            <video:tag>Community</video:tag>
            <video:tag>Knowledge</video:tag>
            <video:tag>Self-Service</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/zero-trust-framework-for-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=83004257</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/video_medium/zero-trust-framework-for-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/83004257/bfa44d66208c73afcdb215c88f01464d/small/zero-trust-framework-for-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Zero Trust Framework for Network Security</video:title>
            <video:description>With the increasing number of cyber threats, securing your network has become a top priority. Zero Trust Architecture is a new approach to cybersecurity that has proven to be effective in protecting against these threats. By incorporating Zero Trust principles into your security infrastructure, you can rest assured that your sensitive data is protected.&lt;/p&gt;
&lt;p&gt;In this informative video, Prof. Avishai Wool, CTO and Co-Founder of AlgoSec, discusses the key principles of Zero Trust and provides practical tips on how to integrate it into your existing security infrastructure.&lt;/p&gt;
&lt;p&gt;Don't miss this opportunity to take your security to the next level! Watch this video now and start implementing the best practices for Zero Trust Architecture.</video:description>
            <video:publication_date>2023-02-01T13:50:36+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2681</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cyberattack</video:tag>
            <video:tag>cyber threats</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>micro-segmentation</video:tag>
            <video:tag>network management</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>ransomware</video:tag>
            <video:tag>risk management</video:tag>
            <video:tag>security</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>security policy</video:tag>
            <video:tag>security policy management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-money-back-guarantee</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82977669</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/82977669/5411bae16e8cc868a7b4b3fa8e5de2bb/video_medium/algosec-money-back-guarantee-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/82977669/5411bae16e8cc868a7b4b3fa8e5de2bb/small/algosec-money-back-guarantee-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec money back guarantee</video:title>
            <video:description>AlgoSec CEO and Co-founder, Yuval Baron, explains the company's unique money-back guarantee policy and customers-first approach.</video:description>
            <video:publication_date>2023-01-31T09:52:09+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>54</video:duration>
            <video:category>Company </video:category>
            <video:tag>algosec</video:tag>
            <video:tag>yuval baron</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/yuval-baron-why-secure</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82977232</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/82977232/3b7f3f30d50391972877c89ad01fb996/video_medium/yuval-baron-why-secure-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/82977232/3b7f3f30d50391972877c89ad01fb996/small/yuval-baron-why-secure-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Yuval Baron - why secure application connectivity</video:title>
            <video:description>AlgoSec CEO and Co-founder, Yuval Baron, explains the criticality of securing application connectivity in today's competitive business environment.</video:description>
            <video:publication_date>2023-01-31T09:14:13+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>59</video:duration>
            <video:category>Company </video:category>
            <video:tag>algosec</video:tag>
            <video:tag>application connectivity</video:tag>
            <video:tag>business applications</video:tag>
            <video:tag>Yuval Baron</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/state-of-ransomware-caught-between-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82961519</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/82961519/5864db7fb0cf1d1a9f5b4a735c5760b7/video_medium/state-of-ransomware-caught-between-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/82961519/5864db7fb0cf1d1a9f5b4a735c5760b7/small/state-of-ransomware-caught-between-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>State of Ransomware: Caught between perception and reality</video:title>
            <video:description>Ransomware continues to be a major problem—and the problem is only getting worse. An exclusive ExtraHop 2022 survey conducted with over 500 security and IT decision makers provided some sobering responses: 85% of those surveyed reported suffering at least one ransomware attack while an alarming 74% have experienced multiple attacks. Yet most IT decision makers (77%) are confident in their ability to prevent or mitigate all cybersecurity threats, including ransomware.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, we take an in depth look into the implications of this alarming trend and provide a turnkey strategy that organizations can implement today to safeguard their most critical data stored in their business applications and increase their level of ransomware preparedness.&lt;/p&gt;
&lt;p&gt;Join us for:&lt;/p&gt;
&lt;p&gt;* In-depth analysis of infamous ransomware attacks&lt;br&gt;
* Ways to identify and remediate vulnerabilities at the application level&lt;br&gt;
* A practical application centric approach that can support your pre-existing security measures&lt;br&gt;
* Mitigation measures to consider at the onset of your next ransomware attack&lt;br&gt;
* Ransomware future trends predictions&lt;/p&gt;</video:description>
            <video:publication_date>2023-01-30T10:39:55+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1546</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>ransomware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/objectflow-similar-groups-analysis</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82320601</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/82320601/565c34a40afbc23737795791cdcc5a2e/video_medium/objectflow-similar-groups-analysis-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/82320601/565c34a40afbc23737795791cdcc5a2e/small/objectflow-similar-groups-analysis-thumbnail.jpg</video:thumbnail_loc>
            <video:title>ObjectFlow: Similar groups analysis</video:title>
            <video:description>&lt;p&gt;ObjectFlow uses advanced analysis tools to identify
misalignments in object naming and content that could potentially result in
security breaches. ObjectFlow’s&amp;nbsp;Similar Groups&amp;nbsp;analysis
identifies&amp;nbsp;network object groups with high level of similarity.&amp;nbsp;&lt;/p&gt;</video:description>
            <video:publication_date>2022-12-28T14:32:36+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>159</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>groups analysis</video:tag>
            <video:tag>objectflow</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-suppressing-risks</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82307111</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/82307111/45144d9f572c9f2950f4844c40484d2a/video_medium/algosec-cloud-suppressing-risks-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/82307111/45144d9f572c9f2950f4844c40484d2a/small/algosec-cloud-suppressing-risks-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Algosec cloud: Suppressing risks</video:title>
            <video:description>&lt;p&gt;Sometimes you may not want certain risks to be displayed in Algosec cloud. You can suppress these risks so only the risks that you want will
appear.&lt;/p&gt;</video:description>
            <video:publication_date>2022-12-27T09:13:45+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>105</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>risk suppression</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-azure-firewall</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82307110</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/82307110/15cc522210091a700d3750462f102356/video_medium/algosec-cloud-azure-firewall-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/82307110/15cc522210091a700d3750462f102356/small/algosec-cloud-azure-firewall-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Algosec cloud: Azure Firewall (managed with policies)</video:title>
            <video:description>&lt;p&gt;Azure has several security firewall&amp;nbsp;capabilities. Until now, Algosec cloud has supported the most common one, NSG, the Network Security Groups,
as well as the older Azure Firewall Classic. CloudFlow now supports Azure’s new firewall, called &lt;i&gt;Azure Firewall (managed with policies&lt;/i&gt;).&lt;/p&gt;</video:description>
            <video:publication_date>2022-12-27T09:13:44+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>162</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>azure</video:tag>
            <video:tag>azure firewall</video:tag>
            <video:tag>azure security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/application-based-segmentation</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82296762</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/82296762/0d454d4223366c7f698e071f092dc892/video_medium/application-based-segmentation-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/82296762/0d454d4223366c7f698e071f092dc892/small/application-based-segmentation-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Application based segmentation</video:title>
            <video:description>Micro-segmentation allows you to protect your application connectivity from cybercriminals and hackers. See how to achieve application-centric network segmentation in this short video.</video:description>
            <video:publication_date>2022-12-26T16:53:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>306</video:duration>
            <video:category>Products</video:category>
            <video:tag>micro-segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/isolate-ransomware-attacks</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82296712</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/82296712/a920417e8a0c1abb2a97cf4ea67e11bd/video_medium/isolate-ransomware-attacks-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/82296712/a920417e8a0c1abb2a97cf4ea67e11bd/small/isolate-ransomware-attacks-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Isolate ransomware attacks</video:title>
            <video:description>AlgoSec is a helpful tool in your arsenal when fighting ransomware. Use our solutions to build a playbook that scores against hackers and creates an automated isolation process for when an attack takes place.</video:description>
            <video:publication_date>2022-12-26T16:48:55+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>212</video:duration>
            <video:category>Products</video:category>
            <video:tag>ransomware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/firewall-compliance-made-easy</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82296695</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/82296695/eeac195f3ef9830436e1594b30a3af5c/video_medium/firewall-compliance-made-easy-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/82296695/eeac195f3ef9830436e1594b30a3af5c/small/firewall-compliance-made-easy-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Firewall compliance made easy</video:title>
            <video:description>You've found the perfect firewall partner. Just use the AlgoSec platform to prepare for upcoming regulatory compliance reviews of your firewalls, and get ready for full compliance in seconds.</video:description>
            <video:publication_date>2022-12-26T16:46:12+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>83</video:duration>
            <video:category>Products</video:category>
            <video:tag>compliance</video:tag>
            <video:tag>firewall compliance</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/vulnerabilities-data-in-your-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82296681</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/82296681/7d3357de6defeb0ec146b7d5c7da1262/video_medium/vulnerabilities-data-in-your-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/82296681/7d3357de6defeb0ec146b7d5c7da1262/small/vulnerabilities-data-in-your-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Vulnerabilities data in your firewalls risk check</video:title>
            <video:description>You can't fix what you don't see. Rooting out vulnerabilities can play a critical role in securing your application connectivity. Learn how to take advantage of vulnerabilities data while conducting firewall risk checks in this short demo.</video:description>
            <video:publication_date>2022-12-26T16:44:10+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>38</video:duration>
            <video:category>Products</video:category>
            <video:tag>firewall risk</video:tag>
            <video:tag>vulnerabilities</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/firewall-changes-made-easy</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82296612</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/82296612/1ddd0ba49d6162499aaa76cd0bacb38e/video_medium/firewall-changes-made-easy-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/82296612/1ddd0ba49d6162499aaa76cd0bacb38e/small/firewall-changes-made-easy-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Firewall changes made easy</video:title>
            <video:description>Welcome to FireFlow, the AlgoSec change management system that automates your entire workflow and streamlines your organization's policy change lifecycle. Accelerate your provisioning, auditing, rule removal, and rule certification.</video:description>
            <video:publication_date>2022-12-26T16:38:18+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>189</video:duration>
            <video:category>Products</video:category>
            <video:tag>fireflow</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/eliminate-unused-cloud-rules</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82296602</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/82296602/dc91eac3206bb5826217e1189bce3ac1/video_medium/eliminate-unused-cloud-rules-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/82296602/dc91eac3206bb5826217e1189bce3ac1/small/eliminate-unused-cloud-rules-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Eliminate unused cloud rules</video:title>
            <video:description>Algosec cloud is an application-centric solution that offers flow logs-based rule usage and cleanup to help you remediate risky and unused rules, allowing you to trim your bloated policies while maintaining your business continuity.</video:description>
            <video:publication_date>2022-12-26T16:35:29+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>80</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cloud-application-based-risk</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82296574</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/82296574/ae40a921987ed871142091c6991d627b/video_medium/cloud-application-based-risk-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/82296574/ae40a921987ed871142091c6991d627b/small/cloud-application-based-risk-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cloud Application Based Risk</video:title>
            <video:description>Algosec cloud&amp;nbsp;is an application-centric solution which lets you use tags to filter your risk analysis and remediation. Use this knowledge to focus on specific risk categories that you've applied to your cloud platform assets.</video:description>
            <video:publication_date>2022-12-26T16:33:23+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>100</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/go-app-centric-with-appviz</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82185153</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/82185153/951fe8a5a038691fbefced17a3f00db2/video_medium/go-app-centric-with-appviz-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/82185153/951fe8a5a038691fbefced17a3f00db2/small/go-app-centric-with-appviz-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Go App Centric with AppViz</video:title>
            <video:description>See how appying an applictaion centric approach via AppViz allowed Nationwide Insurance to easily visualize and manage their applications' security policies throughout their entire network. To learn more, go to &lt;a href="https://www.algosec.com/products/appviz/"&gt;https://www.algosec.com/products/appviz/&lt;/a&gt; &amp;nbsp;</video:description>
            <video:publication_date>2022-12-19T17:21:50+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>72</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>application centric</video:tag>
            <video:tag>appviz</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/introducing-algosecs</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82180484</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/82180484/6cdc6cfc3de2221e9b8118f15b696625/video_medium/introducing-algosecs-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/82180484/6cdc6cfc3de2221e9b8118f15b696625/small/introducing-algosecs-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Introducing AlgoSec’s Infrastructure-As-Code (IaC) connectivity risk analysis</video:title>
            <video:description>AlgoSec’s IaC Connectivity Risk Analysis solution is an extensible security plugin platform that checks code for potential vulnerabilities before any commits are made to a repository.&lt;br&gt;Accelerate application delivery by taking a proactive, preventive, and collaborative approach within your CI/CD pipeline.&lt;br&gt;&lt;br&gt;Gain clear visibility into risks right in the source control applications and get clear remediation steps without a need to move to different applications or wait for manual reviews and approval that the code is risk-free.</video:description>
            <video:publication_date>2022-12-19T13:45:49+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>178</video:duration>
            <video:category>Demos</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>iac</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/getting-iac-to-work-for-devsecops</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=82082267</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/82082267/44428f6940998de2251313ac43cd8edf/video_medium/getting-iac-to-work-for-devsecops-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/82082267/44428f6940998de2251313ac43cd8edf/small/getting-iac-to-work-for-devsecops-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Getting IaC to work for DevSecOps</video:title>
            <video:description>&lt;span&gt;Prof. Avishai Wool, AlgoSec Co-Founder and CTO, provides his unique perspective on the value of IaC to DevSecOps and how it can anable organizations to deploy applications faster and avoid risky configuration mistakes early in the game. Learn more at &lt;a href="https://video.algosec.com/iac-github-action-how-to-identify"&gt;https://video.algosec.com/iac-github-action-how-to-identify&lt;/a&gt;&lt;/span&gt;</video:description>
            <video:publication_date>2022-12-15T09:34:06+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>856</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>devsecops</video:tag>
            <video:tag>iac</video:tag>
            <video:tag>professor wool</video:tag>
            <video:tag>risk analysis</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/medibank-ransomware-attack</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=81865496</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968555/81865496/e33564bdb8644bf74139fc3af6ab01de/video_medium/medibank-ransomware-attack-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968555/81865496/e33564bdb8644bf74139fc3af6ab01de/small/medibank-ransomware-attack-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Medibank Ransomware Attack</video:title>
            <video:description>&lt;p&gt;Professor Avishai Wool, AlgoSec CTO and Co-Founder, provides an insider's look at how a ransomware attack on one of the top Australian health insurance companies manifested itself and also shares his thoughts on what security startegy measures organizations need to consider today to prevent this from happenning to them in the future.To learn more, visit&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://algosec.com"&gt;https://algosec.com/&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2022-12-06T21:18:42+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>139</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>attack</video:tag>
            <video:tag>professor wool</video:tag>
            <video:tag>ransomware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-gcp-inherited</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=81659932</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/81659932/2282f4fc517f4c40198b392eddf511fd/video_medium/algosec-cloud-gcp-inherited-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/81659932/2282f4fc517f4c40198b392eddf511fd/small/algosec-cloud-gcp-inherited-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec cloud: GCP Inherited Policies - Visibility and Risks</video:title>
            <video:description>See which inherited policies protect your GCP projects and each of your VPCs.</video:description>
            <video:publication_date>2022-11-28T11:55:16+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>70</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>policy management</video:tag>
            <video:tag>risks</video:tag>
            <video:tag>visibility</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-ceo-yuval-baron-interview</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=81407598</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/81407598/031388d20c645d4b1c1490499006be47/video_medium/algosec-ceo-yuval-baron-interview-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/81407598/031388d20c645d4b1c1490499006be47/small/algosec-ceo-yuval-baron-interview-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec CEO, Yuval Baron Interview: it-sa 2022</video:title>
            <video:description>Yuval Baron, AlgoSec CEO, explains why it's&amp;nbsp;so critical for&amp;nbsp;organizations to&amp;nbsp;secure application connectivity and shares his unwavering passion for customer satisfaction. To learn more, go to &lt;a href="https://algosec.com"&gt;https://algosec.com/&lt;/a&gt; &amp;nbsp;&amp;nbsp;</video:description>
            <video:publication_date>2022-11-16T17:23:01+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>111</video:duration>
            <video:category>Events</video:category>
            <video:tag>application centric</video:tag>
            <video:tag>application connectivity</video:tag>
            <video:tag>application connectivity management</video:tag>
            <video:tag>it-sa 2022</video:tag>
            <video:tag>secure application connectivity</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/nationwide-testimonial</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=81233217</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968568/81233217/9d42390ffeec36cd7ac02512c376599f/video_medium/nationwide-testimonial-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968568/81233217/9d42390ffeec36cd7ac02512c376599f/small/nationwide-testimonial-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Nationwide Testimonial</video:title>
            <video:description>AlgoSec delivers an application centric solution to meet the network security challenges of one of the top financial services firms in the US. To learn more, go to&amp;nbsp;&lt;a href="https://algosec.com"&gt;https://algosec.com/&lt;/a&gt; &amp;nbsp;</video:description>
            <video:publication_date>2022-11-07T18:18:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>145</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>appviz</video:tag>
            <video:tag>automated security policy</video:tag>
            <video:tag>automate firewall changes</video:tag>
            <video:tag>firewall analyzer</video:tag>
            <video:tag>network security policy management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/what-is-appviz</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=81166690</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/81166690/823c89d697fcd19ec6b32606601bc373/video_medium/what-is-appviz-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/81166690/823c89d697fcd19ec6b32606601bc373/small/what-is-appviz-thumbnail.jpg</video:thumbnail_loc>
            <video:title>What is AppViz?</video:title>
            <video:description>&amp;nbsp;AppViz &lt;span&gt;provides visibility into your network applications, enabling secure &amp;nbsp;application delivery.&lt;br&gt;&lt;br&gt;&lt;/span&gt;</video:description>
            <video:publication_date>2022-11-02T17:06:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>120</video:duration>
            <video:category>Demos</video:category>
            <video:tag>application connectivity flows</video:tag>
            <video:tag>application connectivity management</video:tag>
            <video:tag>cloud</video:tag>
            <video:tag>connectivity</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/2022-q3-saas-feature-release</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=81112202</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968568/81112202/6eb3fee73857541e79ef852d89ec730d/video_medium/2022-q3-saas-feature-release-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968568/81112202/6eb3fee73857541e79ef852d89ec730d/small/2022-q3-saas-feature-release-thumbnail.jpg</video:thumbnail_loc>
            <video:title> 2022 Q3 SaaS Feature Release </video:title>
            <video:description>Summary of features released in the 3rd Quarter 2022.</video:description>
            <video:publication_date>2022-10-31T15:55:26+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>231</video:duration>
            <video:category>Saas Q Release</video:category>
            <video:tag>objectflow</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/state-of-ransomware-caught-between</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=81111912</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/81111912/08b7c7673f7ceadb5fb31203226a67ef/video_medium/state-of-ransomware-caught-between-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/81111912/08b7c7673f7ceadb5fb31203226a67ef/small/state-of-ransomware-caught-between-thumbnail.jpg</video:thumbnail_loc>
            <video:title>State of Ransomware: Caught between perception and reality</video:title>
            <video:description>AlgoSec's Regional Solutions Engineer, Eric Jeffery delivers an eye opener on startling ransomware data from the latest ExtraHop 2022 Cyber Confidence Index. To learn more, go to&amp;nbsp;&lt;a href="https://algosec.com"&gt;https://algosec.com/&lt;/a&gt;</video:description>
            <video:publication_date>2022-10-31T15:33:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1721</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>ransomware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/whats-new-in-algosec-saas-q3-2022</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=79855568</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/79855568/af614d73d7e820c9783a52cbc426c09e/video_medium/whats-new-in-algosec-saas-q3-2022-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/79855568/af614d73d7e820c9783a52cbc426c09e/small/whats-new-in-algosec-saas-q3-2022-thumbnail.jpg</video:thumbnail_loc>
            <video:title>What's new in AlgoSec SaaS -Q3 2022</video:title>
            <video:description>A short update on our new SaaS features released in Q3 2022</video:description>
            <video:publication_date>2022-10-18T19:21:01+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>261</video:duration>
            <video:category>Saas Q Release</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>objectflow</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-share-a-risks-report</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=78537729</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/78537729/0bacf25521c0e41186157841c98025b2/video_medium/algosec-cloud-share-a-risks-report-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/78537729/0bacf25521c0e41186157841c98025b2/small/algosec-cloud-share-a-risks-report-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec cloud: Share a Risks Report with stakeholders</video:title>
            <video:description>Watch how you can align all policy management stakeholders by sharing your Risks Report in PDF format.</video:description>
            <video:publication_date>2022-09-21T13:51:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>94</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>risk</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-view-policies-that</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=78529412</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/78529412/4afdde596543895fed4bf99c6dcbdfb7/video_medium/algosec-cloud-view-policies-that-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/78529412/4afdde596543895fed4bf99c6dcbdfb7/small/algosec-cloud-view-policies-that-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec cloud: View policies that protect your virtual assets</video:title>
            <video:description>Learn how to monitor which policies protect your assets and discover which assets are unprotected on the Inventory page Assets tab.</video:description>
            <video:publication_date>2022-09-21T10:37:45+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>82</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>risk</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-to-improve-risk-management</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=77761839</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/77761839/0fe87f017f435d0ef4fc7abe28f56f5d/video_medium/how-to-improve-risk-management-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/77761839/0fe87f017f435d0ef4fc7abe28f56f5d/small/how-to-improve-risk-management-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to improve risk management through filtering</video:title>
            <video:description>AlgoSec Co-Founder and CTO, Prof. Avishai Wool, breaks down identity-based and label-based filtering and offers his insights on the use of filtering as a risk management strategy for security teams. To learn more, go to&amp;nbsp;&lt;a href="https://www.algosec.com"&gt;https://www.algosec.com/&lt;/a&gt;</video:description>
            <video:publication_date>2022-09-05T10:44:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1100</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/why-application-centric-security-is</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=77519477</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/77519477/da4ca5b7d02103e0f8a74fa2799e371e/video_medium/why-application-centric-security-is-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/77519477/da4ca5b7d02103e0f8a74fa2799e371e/small/why-application-centric-security-is-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Why application-centric security is crucial for your organization</video:title>
            <video:description>Visibility into your business applications is critical for delivering on business outcomes quickly. However, it must be accomplished while keeping your network security intact. Taking an application-centric approach can guarantee this. Learn more at &lt;a href="https://www.youtube.com/redirect?event=video_description&amp;amp;redir_token=QUFFLUhqbklDSmJ4MU8wcXM1OUtQS1BqQzBIdzlQUmVvQXxBQ3Jtc0ttRGFBRGVhVTQ3aWh2UVVtQTJXVXY5Vkt6dW5XeVJ3NWhZeUtHckIyZlFxVXlhR2VjcE11OWVycHpJc1RnS2I3d0d6MHFXRlgtUXhOLU8wV19oTENpSEJjbG9sbTFoSUU1OFJkcHpjQVJ4VWJjY2hnaw&amp;amp;q=https%3A%2F%2Fwww.algosec.com%2F&amp;amp;v=1SRype2UGUQ"&gt;https://www.algosec.com/&lt;/a&gt;</video:description>
            <video:publication_date>2022-08-31T09:18:03+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>108</video:duration>
            <video:category>Company </video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>application visibility</video:tag>
            <video:tag>business applications</video:tag>
            <video:tag>visibility</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/nationwide-insurance-testimonial</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=77445360</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/77445360/6854364c46208fd191643231724bf044/video_medium/nationwide-insurance-testimonial-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/77445360/6854364c46208fd191643231724bf044/small/nationwide-insurance-testimonial-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Nationwide Insurance Testimonial</video:title>
            <video:description></video:description>
            <video:publication_date>2022-08-29T13:20:36+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1227</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>case study</video:tag>
            <video:tag>customer story</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-cleaning-up-your</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=76882876</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/76882876/b9016b35bc913feb3599d0fbe5e2146c/video_medium/algosec-cloud-cleaning-up-your-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/76882876/b9016b35bc913feb3599d0fbe5e2146c/small/algosec-cloud-cleaning-up-your-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec cloud: Cleaning up your policies</video:title>
            <video:description></video:description>
            <video:publication_date>2022-08-15T10:23:28+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>145</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>policy management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/appviz-ux-enhancements</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=76731620</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968568/76731620/3aefe030bf318591c5ec2578660101f6/video_medium/appviz-ux-enhancements-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968568/76731620/3aefe030bf318591c5ec2578660101f6/small/appviz-ux-enhancements-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AppViz UX Enhancements</video:title>
            <video:description>Edit multiple flows &amp;amp; check connectivity when saving a flow</video:description>
            <video:publication_date>2022-08-01T10:17:20+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>92</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>appviz</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-the-new-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=76607617</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/76607617/00f2de5588573d9327cda075855132df/video_medium/algosec-cloud-the-new-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/76607617/00f2de5588573d9327cda075855132df/small/algosec-cloud-the-new-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec cloud: The new network policy tree</video:title>
            <video:description>See how the new network policy tree let's you quickly navigate between cloud vendors and drill down into individual VPCs/VNets&amp;nbsp;to see their policy sets.</video:description>
            <video:publication_date>2022-07-18T11:03:03+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>72</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>network policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/journey-to-the-cloudmp4</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=76535873</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/76535873/f2d8a16c3ad5ccc4c583b1c34bde1a3f/video_medium/journey-to-the-cloudmp4-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/76535873/f2d8a16c3ad5ccc4c583b1c34bde1a3f/small/journey-to-the-cloudmp4-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Journey to the Cloud.mp4</video:title>
            <video:description>Efficient cloud management helps simplify today’s complex network environment, allowing you to secure application connectivity anywhere. But it can be hard to achieve sufficient visibility when your data is dispersed across numerous public clouds, private clouds, and on-premises devices.&lt;/p&gt;
&lt;p&gt;Today it is easier than ever to speed up application delivery across a hybrid cloud environment while maintaining a high level of security. In this webinar, we’ll discuss:&lt;/p&gt;
&lt;p&gt;- The basics of managing multiple workloads in the cloud&lt;br /&gt;
- How to create a successful enterprise-level security management program&lt;br /&gt;
- The structure of effective hybrid cloud management</video:description>
            <video:publication_date>2022-07-10T10:27:26+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2948</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud migration</video:tag>
            <video:tag>cloud security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/keeping-a-lid-on-container-security-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=76259209</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/76259209/b14b216a7f78634165e1ef16fac38b4d/video_medium/keeping-a-lid-on-container-security-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/76259209/b14b216a7f78634165e1ef16fac38b4d/small/keeping-a-lid-on-container-security-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Keeping a lid on container security</video:title>
            <video:description>Prof. Avishai Wool, AlgoSec co-founder and CTO, shares his insights on how teams can best deploy container security measures using the latest technlogy tools. To learn how these can apply to securing your application connectivity, please visit&amp;nbsp;&lt;a href="https://www.algosec.com/"&gt;https://www.algosec.com/&lt;/a&gt;</video:description>
            <video:publication_date>2022-06-23T11:49:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>895</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>professor wool</video:tag>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/get-smarter-network-security-policy</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=76250065</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968570/76250065/f07b9ad17a1efaa5746f61bafd0b5201/video_medium/get-smarter-network-security-policy-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968570/76250065/f07b9ad17a1efaa5746f61bafd0b5201/small/get-smarter-network-security-policy-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Get Smarter Network Security Policy Automation</video:title>
            <video:description>In this video, AlgoSec co-founder and CTO, Prof. Avishai Wool explores the challenges of balancing security with business agility and how they can be offset with smarter network security policy automation. To learn more, go to&amp;nbsp;&lt;a href="https://www.algosec.com"&gt;https://www.algosec.com/&lt;/a&gt;</video:description>
            <video:publication_date>2022-06-22T15:12:10+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1017</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>professor wool</video:tag>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/taking-charge-of-application-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=76153315</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/76153315/7b4ae8232c2aaa81eacfab3737f455f6/video_medium/taking-charge-of-application-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/76153315/7b4ae8232c2aaa81eacfab3737f455f6/small/taking-charge-of-application-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Taking Charge of Application Security</video:title>
            <video:description>Eric Jeffery, AlgoSec's venerable regional solutions engineer, calls on the attention of AppSec network engineers and offers sage advice to organizations how to align their AppSec teams with their business goals. To learn more go to&amp;nbsp;&lt;a href="https://algosec.com"&gt;https://algosec.com/&lt;/a&gt;</video:description>
            <video:publication_date>2022-06-14T10:57:47+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1230</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>application connectivity management</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/123-punch-on-network-segmentation</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=76099817</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/76099817/71bb43df4e4d207d73e879f2ef0eda17/video_medium/123-punch-on-network-segmentation-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/76099817/71bb43df4e4d207d73e879f2ef0eda17/small/123-punch-on-network-segmentation-thumbnail.jpg</video:thumbnail_loc>
            <video:title>1,2,3 punch on Network Segmentation</video:title>
            <video:description>The zero-trust network layer is a best practice to use when securing application connectivity. However, achieving zero trust for your organization requires multiple tools that work together.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Join us for a conversation about:&lt;br&gt;
- Creating zero-trust in networks&lt;br&gt;
- Integrating application connectivity with cloud, SDN, and on-prem network security controls&lt;br&gt;
- Maintaining the network and micro-segmentation in harmony&lt;/p&gt;</video:description>
            <video:publication_date>2022-06-09T09:33:39+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1091</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Gated</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/measures-that-actually-do-reduce-2</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=75737381</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968579/75737381/a81dbf8f5c3fe5ce347c1f1ee183bd81/video_medium/measures-that-actually-do-reduce-2-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968579/75737381/a81dbf8f5c3fe5ce347c1f1ee183bd81/small/measures-that-actually-do-reduce-2-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Measures that actually Do reduce your hacking risks</video:title>
            <video:description>Robert Bigman, former CISO of the CIA offers tried and proven hacking risk measures that are "must haves" in any organization's cybersecurity toolkit. To see how these can apply to securing the connectivity of your critical business applications, please visit&amp;nbsp;&lt;a href="https://www.algosec.com/"&gt;https://www.algosec.com/&lt;/a&gt;</video:description>
            <video:publication_date>2022-05-10T13:57:26+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2550</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cyber security</video:tag>
            <video:tag>gated</video:tag>
            <video:tag>security management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/iac-connectivity-risk-analysis</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=75568163</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/75568163/f166fe59d12a6678a5a4ae58b36d3e16/video_medium/iac-connectivity-risk-analysis-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/75568163/f166fe59d12a6678a5a4ae58b36d3e16/small/iac-connectivity-risk-analysis-thumbnail.jpg</video:thumbnail_loc>
            <video:title>IaC Connectivity Risk Analysis: Identify risks from your pull requests</video:title>
            <video:description>The AlgoSec cloud Infrastructure-as-Code (IaC) Connectivity Risk Analysis seamlessly integrates into your CI/CD pipeline, scanning code for vulnerabilities in GitHub or GitLab before cloud deployment. It offers developers instant risk assessments and remediation steps directly within their workflow, enhancing security without slowing down development. Learn how this feature streamlines secure code deployment in your cloud infrastructure.</video:description>
            <video:publication_date>2022-04-25T15:15:00+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>141</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>demo</video:tag>
            <video:tag>devops</video:tag>
            <video:tag>DevSecOps</video:tag>
            <video:tag>IaC</video:tag>
            <video:tag>security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/secure-application-connectivity-2</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=75057786</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/75057786/88707e8ca8c26975dc40528ed5d49fa7/video_medium/secure-application-connectivity-2-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/75057786/88707e8ca8c26975dc40528ed5d49fa7/small/secure-application-connectivity-2-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Secure application connectivity. Anywhere.</video:title>
            <video:description>Are you ready for the next business application improvement but don't have the right automation and security tools to meet the rollout deadline? Don't sweat it. Just sit back and relax, AlgoSec has your back. Learn more at &lt;a href="https://www.algosec.com/"&gt;https://www.algosec.com/&lt;/a&gt;</video:description>
            <video:publication_date>2022-04-11T11:23:01+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>90</video:duration>
            <video:category>Company </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-application-centric-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74852525</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/74852525/0a0f8eccda1da65cd34ebac2fd576d78/video_medium/algosec-cloud-application-centric-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/74852525/0a0f8eccda1da65cd34ebac2fd576d78/small/algosec-cloud-application-centric-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec cloud: Application centric risk analysis &amp; remediation using tags</video:title>
            <video:description>In addition to the ability to filter risks for cloud types, accounts and regions, you can now focus your risk analysis and remediation on specific categories of risks identified by tags (key/value combinations) applied to the cloud platform assets. Customers can leverage this capability to focus on analyzing and remediating risks related to specific applications. To learn more, schedule a personal demo &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2022-03-30T17:51:11+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>125</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>application connectivity</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/skills-acceleration-workshops-cisco-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74815107</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/74815107/1dc3ba97e9bbca1a4e62c436af53a165/video_medium/skills-acceleration-workshops-cisco-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/74815107/1dc3ba97e9bbca1a4e62c436af53a165/small/skills-acceleration-workshops-cisco-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Skills Acceleration Workshops Cisco ACI</video:title>
            <video:description></video:description>
            <video:publication_date>2022-03-28T10:49:49+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>4068</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco aci app</video:tag>
            <video:tag>network objects</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/dissolving-operational-security-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74776042</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/74776042/c76f66528f3f8423c6c7b0be70142da4/video_medium/dissolving-operational-security-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/74776042/c76f66528f3f8423c6c7b0be70142da4/small/dissolving-operational-security-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Dissolving Operational Security Challenges in a Hybrid Cloud Environment</video:title>
            <video:description>Professor Avishai Wool shares new insights on how to best manage hybrid cloud security operations. For more information, please visit AlgoSec's hybrid cloud hub &lt;a href="https://www.algosec.com/resources/hub/hybrid_cloud/"&gt;https://www.algosec.com/resources/hub/hybrid_cloud/&lt;/a&gt;</video:description>
            <video:publication_date>2022-03-24T17:56:37+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>724</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>hybrid cloud security</video:tag>
            <video:tag>hybrid environment</video:tag>
            <video:tag>professor wool</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>prof. wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/secure-application-connectivity</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74775333</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/74775333/fa8d50a26e900673cf77bdc231e9ddbc/video_medium/secure-application-connectivity-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/74775333/fa8d50a26e900673cf77bdc231e9ddbc/small/secure-application-connectivity-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Secure Application Connectivity with Automation</video:title>
            <video:description>How can a high degree of application connectivity be achieved when your data is widely distributed? Efficient cloud management helps simplify today’s complex network environment, allowing you to secure application connectivity anywhere. But it can be hard to achieve sufficient visibility when your data is dispersed across numerous public clouds, private clouds, and on-premises devices.&lt;/p&gt;
&lt;p&gt;Today it is easier than ever to speed up application delivery across a hybrid cloud environment while maintaining a high level of security. In this webinar, we’ll discuss:&lt;/p&gt;
&lt;p&gt;- The basics of managing multiple workloads in the cloud&lt;br /&gt;
- How to create a successful enterprise-level security management program&lt;br /&gt;
- The structure of effective hybrid cloud management</video:description>
            <video:publication_date>2022-03-24T17:01:20+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1069</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>automation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/skills-acceleration-workshops-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74774099</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/74774099/3d453a7ced5c183215031263920512fa/video_medium/skills-acceleration-workshops-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/74774099/3d453a7ced5c183215031263920512fa/small/skills-acceleration-workshops-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Skills Acceleration Workshops: Hybrid Cloud</video:title>
            <video:description></video:description>
            <video:publication_date>2022-03-24T15:42:55+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2315</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>hybrid cloud</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/skills-acceleration-workshops</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74774082</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/74774082/847b8ea7ff9d1f685f98d3a8716b61f4/video_medium/skills-acceleration-workshops-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/74774082/847b8ea7ff9d1f685f98d3a8716b61f4/small/skills-acceleration-workshops-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Skills Acceleration Workshops: Object Flow</video:title>
            <video:description></video:description>
            <video:publication_date>2022-03-24T15:41:08+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1543</video:duration>
            <video:category>Network Object Management</video:category>
            <video:tag>objectflow</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/closing-network-security-gaps-with</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74520858</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968579/74520858/9d8c11fc889bd1a88fa6bb91a09497b8/video_medium/closing-network-security-gaps-with-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968579/74520858/9d8c11fc889bd1a88fa6bb91a09497b8/small/closing-network-security-gaps-with-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Closing Network Security Gaps with Micro-Segmentation</video:title>
            <video:description>Watch and learn from this interview with&amp;nbsp;AlgoSec co-founder and CTO, Prof. Avishai Wool, as he offers his invaluable insights&amp;nbsp;on how your organization can execute an&amp;nbsp;effective micro-segmentation strategy to close network security gaps.&amp;nbsp; For more information about micro-segmentation, go to&amp;nbsp;&lt;a href="https://www.algosec.com/resources/micro-segmentation/"&gt;https://www.algosec.com/resources/micro-segmentation/&lt;/a&gt;&lt;br&gt;</video:description>
            <video:publication_date>2022-03-07T18:26:01+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>997</video:duration>
            <video:category>Prof Wool: Micro-Segmentation</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/baseline-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74517294</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968555/74517294/81df3b1b04440f0aa02fefcd7a63182d/video_medium/baseline-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968555/74517294/81df3b1b04440f0aa02fefcd7a63182d/small/baseline-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Baseline compliance</video:title>
            <video:description></video:description>
            <video:publication_date>2022-03-07T16:25:57+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>67</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/regulatory-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74517244</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/74517244/64045b7c90ad631b1a450a87d116a454/video_medium/regulatory-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/74517244/64045b7c90ad631b1a450a87d116a454/small/regulatory-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Regulatory compliance</video:title>
            <video:description></video:description>
            <video:publication_date>2022-03-07T16:23:26+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>85</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/managing-network-objects-in-hybrid</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74404333</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/74404333/861c3d393affce0532ed06aab337d989/video_medium/managing-network-objects-in-hybrid-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/74404333/861c3d393affce0532ed06aab337d989/small/managing-network-objects-in-hybrid-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Managing network objects in hybrid environments</video:title>
            <video:description>Prof. Avishai Wool and Jade Kahn dive deep into the challenges, solutions and do's and don'ts of managing network object in multi-vendor hybrid environments.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Visit algosec.com/objectflow to learn how to manage network objects securely, effectively and efficiently.&lt;/p&gt;</video:description>
            <video:publication_date>2022-02-28T13:32:34+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1467</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>cyber security</video:tag>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>network objects</video:tag>
            <video:tag>NSPM</video:tag>
            <video:tag>policy management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/mark-t-hofman-unedited-video</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74329903</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968579/74329903/5f071e5dd5b166bea278ec0364448481/video_medium/mark-t-hofman-unedited-video-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968579/74329903/5f071e5dd5b166bea278ec0364448481/small/mark-t-hofman-unedited-video-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Mark T. Hofman (unedited video)</video:title>
            <video:description></video:description>
            <video:publication_date>2022-02-22T13:36:30+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1265</video:duration>
            <video:category>Connectivity </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/oded-vanunu-unedited-video</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74329722</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968576/74329722/6949ea1f8595ed6571ea82b92f41a043/video_medium/oded-vanunu-unedited-video-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968576/74329722/6949ea1f8595ed6571ea82b92f41a043/small/oded-vanunu-unedited-video-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Oded Vanunu (unedited video)</video:title>
            <video:description></video:description>
            <video:publication_date>2022-02-22T13:23:26+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1046</video:duration>
            <video:category>Connectivity </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/bob-bigman-unedited-video</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74329703</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968558/74329703/38c84c65765435705fae0ae117987317/video_medium/bob-bigman-unedited-video-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968558/74329703/38c84c65765435705fae0ae117987317/small/bob-bigman-unedited-video-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Bob Bigman (unedited video)</video:title>
            <video:description></video:description>
            <video:publication_date>2022-02-22T13:21:03+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1252</video:duration>
            <video:category>Connectivity </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/anouk-vos-unedited-video</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74327851</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/74327851/c2b3d474592a09464c5955226dcb6a59/video_medium/anouk-vos-unedited-video-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/74327851/c2b3d474592a09464c5955226dcb6a59/small/anouk-vos-unedited-video-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Anouk Vos (unedited video)</video:title>
            <video:description></video:description>
            <video:publication_date>2022-02-22T11:43:42+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>611</video:duration>
            <video:category>Connectivity </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/mark-t-hofman</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74296093</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/74296093/9d3d8054dff6ef70bcebf9d4a825216d/video_medium/mark-t-hofman-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/74296093/9d3d8054dff6ef70bcebf9d4a825216d/small/mark-t-hofman-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Mark T. Hofman</video:title>
            <video:description></video:description>
            <video:publication_date>2022-02-21T13:54:15+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>547</video:duration>
            <video:category>Connectivity </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/bob-bigman</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74295942</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/74295942/aaa8aed8a87197812ceaa13acf96170a/video_medium/bob-bigman-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/74295942/aaa8aed8a87197812ceaa13acf96170a/small/bob-bigman-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Bob Bigman</video:title>
            <video:description></video:description>
            <video:publication_date>2022-02-21T13:50:41+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>577</video:duration>
            <video:category>Connectivity </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/anouk-vos</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74295847</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/74295847/4c75fbf95cc69dbd44d5fc910447e798/video_medium/anouk-vos-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/74295847/4c75fbf95cc69dbd44d5fc910447e798/small/anouk-vos-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Anouk Vos</video:title>
            <video:description></video:description>
            <video:publication_date>2022-02-21T13:45:40+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>451</video:duration>
            <video:category>Connectivity </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-a-single-solution-to</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74295696</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/74295696/f44296ca471c04b0eda17ce556bb21f8/video_medium/algosec-a-single-solution-to-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/74295696/f44296ca471c04b0eda17ce556bb21f8/small/algosec-a-single-solution-to-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec - a single solution to secure application connectivity and accelerate policy changes</video:title>
            <video:description>&lt;span&gt;AlgoSec lives at the intersection of your infrastructure, security policy and the applications that run your business. &lt;br&gt;&lt;br&gt;AlgoSec’s unique technology visualizes connectivity flows and security posture by listening to the network to associate security policy with specific applications.&amp;nbsp;Additionally, AlgoSec integrates with leading ITSM, SIEM, vulnerability scanners, identify management, and orchestration systems to promote a holistic, more robust security posture.
&lt;br&gt;&lt;br&gt;AlgoSec’s platform delivers a unified way to visualize and manage the application connectivity and security policies across all public clouds, private clouds, containers, and on-premises networks. Its real-time network map provides a complete view and connectivity flows across all security and filtering technologies.
&lt;br&gt;&lt;br&gt;Using its unique vendor-agnostic deep algorithm for change management automation, AlgoSec enforces application connectivity and security policy, thus preventing human errors, substantially reducing exposure to security risks and expediting time-to-market. &lt;br&gt;&lt;br&gt;Over 1,800 of the world’s leading organizations trust AlgoSec to help secure their most critical workloads across public cloud, private cloud, containers, and on-premises networks.
&lt;br&gt;&lt;br&gt;See what securely accelerating your digital transformation, move-to-cloud, infrastructure modernization, or micro-segmentation initiatives looks like at &lt;a href="http://www.algosec.com"&gt;www.algosec.com&lt;/a&gt;&lt;/span&gt;</video:description>
            <video:publication_date>2022-02-21T13:38:36+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>44</video:duration>
            <video:category>Company </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/oded-vanunu</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74295417</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968556/74295417/5c361f0d2e7b64a5b214c63116c4f7c3/video_medium/oded-vanunu-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968556/74295417/5c361f0d2e7b64a5b214c63116c4f7c3/small/oded-vanunu-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Oded Vanunu</video:title>
            <video:description></video:description>
            <video:publication_date>2022-02-21T13:17:10+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>574</video:duration>
            <video:category>Connectivity </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/objectflow-product-demo-with</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=74110199</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/74110199/5e5c72326a49bcba08e7f0fa70177372/video_medium/objectflow-product-demo-with-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/74110199/5e5c72326a49bcba08e7f0fa70177372/small/objectflow-product-demo-with-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Objectflow Product Demo (with subtitles)</video:title>
            <video:description>Objectflow is the only network management solution which allows you to control all of your objects across your hybrid estate from a single location. To learn more, click &lt;a href="https://algosec.com/objectflow-lp"&gt;here&lt;/a&gt;.</video:description>
            <video:publication_date>2022-02-08T09:31:42+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>101</video:duration>
            <video:category>Demos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/objectflow-teaser-moon</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=73612491</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/73612491/a37546f19d2893379f3ac4a65616c417/video_medium/objectflow-teaser-moon-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/73612491/a37546f19d2893379f3ac4a65616c417/small/objectflow-teaser-moon-thumbnail.jpg</video:thumbnail_loc>
            <video:title>ObjectFlow Teaser Moon</video:title>
            <video:description>Discover Objectflow, the network object management solution which lets you control all of your objects across your hybrid estate from a single location. To learn more, visit &lt;a href="https://www.youtube.com/redirect?event=video_description&amp;amp;redir_token=QUFFLUhqbndvRF8zSUt4dVZEZkJDQ3h0SGpybjZPNWlMUXxBQ3Jtc0tsMk1pWkpxRWhyWkY5Sl9MR20xMmRpRTZJSDRyUXVmdjl6YVZFMUJ5aHpOR1dYZUVhckhpMl94dEU2X1RMaXZqWjhfYklWOGtLV2tDYXkwNDNwSnZtUlNBZHh2bzQ5TjlBcXAyek5UbW9yb1A0aklUSQ&amp;amp;q=https%3A%2F%2Falgosec.com%2Fobjectflow-lp"&gt;https://algosec.com/objectflow-lp&lt;/a&gt;</video:description>
            <video:publication_date>2022-01-16T12:31:26+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>34</video:duration>
            <video:category>Products</video:category>
            <video:tag>ObjectFlow</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-to-modernize-your</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=73612296</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/73612296/9a6059145be563694c04c76fd552708f/video_medium/how-to-modernize-your-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/73612296/9a6059145be563694c04c76fd552708f/small/how-to-modernize-your-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to modernize your infrastructure without neglecting security.mp4</video:title>
            <video:description>Moving enterprise applications onto the cloud can deliver several benefits, including increased data protection, enhanced business agility, and significant cost savings. However, if the migration isn’t appropriately executed, your hybrid cloud network could be compromised. The key is to balance your digital transformation efforts by improving your infrastructure while providing all the necessary security controls.&lt;/p&gt;
&lt;p&gt;In this webinar, our expert panel dives into the steps required to migrate applications without sacrificing security.&lt;br /&gt;
Join us in this session to learn how to:&lt;/p&gt;
&lt;p&gt;•	Transfer the security elements of your application onto the cloud&lt;br /&gt;
•	Find ways to lower migration costs and reduce risks through better preparation&lt;br /&gt;
•	Modernize your infrastructure with the help of superior visibility&lt;br /&gt;
•	Structure your security policies across your entire hybrid and multi-cloud network</video:description>
            <video:publication_date>2022-01-16T11:27:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3058</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/connectivity-2022-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=73393641</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968568/73393641/c3232f23243094ad12a5223c001fe932/video_medium/connectivity-2022-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968568/73393641/c3232f23243094ad12a5223c001fe932/small/connectivity-2022-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Connectivity 2022 - Network Security Summit</video:title>
            <video:description>&lt;p&gt;Come join the &lt;a href="https://connectivity.live/"&gt;Connectivity&lt;/a&gt;&amp;nbsp;virtual cyber security event on February 22, 2022.&amp;nbsp;&lt;span&gt;Register today! &lt;a href="https://connectivity.live/"&gt;https://connectivity.live/&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2022-01-06T16:57:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>42</video:duration>
            <video:category>Promo Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/itau-corpbanca-testimonial</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=72844317</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/72844317/a269f84939e2c39abe500aef6841261a/video_medium/itau-corpbanca-testimonial-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/72844317/a269f84939e2c39abe500aef6841261a/small/itau-corpbanca-testimonial-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Itau CorpBanca Testimonial</video:title>
            <video:description></video:description>
            <video:publication_date>2021-12-21T15:53:25+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>161</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>customer story</video:tag>
            <video:tag>testimonial</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/top-5-predictions-best-practices</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=72839921</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/video_medium/top-5-predictions-best-practices-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/72839921/7644f86b455465ff65ca0eb3f8bfa109/small/top-5-predictions-best-practices-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Top 5 Predictions &amp; Best Practices for 2022</video:title>
            <video:description>In this video, Prof. Avishai Wool, AlgoSec CTO and co-founder, provides his expert opinion on the Top 5 ongoing and new challenges in cybersecurity and network security management expected to take place in 2022 and offers invaluable best practices. To learn more, please contact us to set up a demo at&amp;nbsp;&lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;br&gt;&lt;br&gt;</video:description>
            <video:publication_date>2021-12-21T10:47:14+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>503</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>microsegmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cyber-combat-promo</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=72771156</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/72771156/fe96860113aced8565038c48170bbfaf/video_medium/cyber-combat-promo-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/72771156/fe96860113aced8565038c48170bbfaf/small/cyber-combat-promo-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cyber Combat Promo</video:title>
            <video:description></video:description>
            <video:publication_date>2021-12-19T11:48:06+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>8</video:duration>
            <video:category>Company </video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-employee-perspective-on</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=72682148</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/72682148/6d48f83f95ff6aa6ad93b990fddf0501/video_medium/the-employee-perspective-on-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/72682148/6d48f83f95ff6aa6ad93b990fddf0501/small/the-employee-perspective-on-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The employee perspective on AlgoSec’s new vision</video:title>
            <video:description>&lt;p&gt;Family, new adventures, and the highest of heights.
These are just a few of the things that help AlgoSec securely accelerate the
lives of our employees.&lt;/p&gt;</video:description>
            <video:publication_date>2021-12-15T12:16:11+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>385</video:duration>
            <video:category>Company </video:category>
            <video:tag>algosec</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/objectflow</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=72635229</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968556/72635229/bc53efc9c910185088fcac05a1767fab/video_medium/objectflow-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968556/72635229/bc53efc9c910185088fcac05a1767fab/small/objectflow-thumbnail.jpg</video:thumbnail_loc>
            <video:title>ObjectFlow</video:title>
            <video:description>&lt;h1&gt;&lt;a href="http://go.algosec.com/MTc4LVpGSC03MDUAAAGBWIcD--oaOwVrdhFKdktOfHfsAQzs_qD7AiXhun9_BGl-lAVCg7NtsScxFb6EJgdtgMB2fXg="&gt;Click here to get a personal demo&lt;/a&gt;&lt;/h1&gt;</video:description>
            <video:publication_date>2021-12-13T13:58:27+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>27</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/working-at-algosec</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=72483697</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/72483697/62142dbf76f3375b6fa8f65b72868036/video_medium/working-at-algosec-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/72483697/62142dbf76f3375b6fa8f65b72868036/small/working-at-algosec-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Working at AlgoSec </video:title>
            <video:description>Sergey Kalikin, R&amp;D (Belarus)</video:description>
            <video:publication_date>2021-12-06T13:55:45+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>45</video:duration>
            <video:category>Company </video:category>
            <video:tag>algosec</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/rescuing-your-network-with-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=72328224</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968556/72328224/4a69b49206344dd8a65406c44f1db405/video_medium/rescuing-your-network-with-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968556/72328224/4a69b49206344dd8a65406c44f1db405/small/rescuing-your-network-with-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Rescuing Your Network with Micro-Segmentation </video:title>
            <video:description></video:description>
            <video:publication_date>2021-11-25T18:19:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3295</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>MicroSegmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-quick-guide-to-change</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=70117351</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968559/70117351/61b8ef51cc6ef4966c0caeed7a1b427d/video_medium/the-quick-guide-to-change-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968559/70117351/61b8ef51cc6ef4966c0caeed7a1b427d/small/the-quick-guide-to-change-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The quick guide to change automation: Turning network security alerts into action</video:title>
            <video:description>&lt;b&gt;Avivi Siman-Tov, Director of Product&lt;/b&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;You use multiple network security controls in your organization, but they just don’t talk to each other. And while you probably get alerts from SIEM solutions and vulnerability scanners, responding to them feels like a never-ending game of whack-a-mole.&lt;/p&gt;&lt;p&gt;If you’ve had enough of manual policy changes but security concerns are holding you back from automating policy change management, this webinar is just for you.&lt;/p&gt;
&lt;p&gt;Learn how to transform your network security policies without replacing existing business processes -with enterprise-wide change automation.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;AlgoSec security expert Avivi Siman-Tov will guide you how to:&lt;/li&gt;&lt;li&gt;Increase agility, accelerate incident response, and reduce compliance violations and security misconfigurations.&lt;/li&gt;&lt;li&gt;Automate security policy changes without breaking network connectivity.&lt;/li&gt;&lt;li&gt;Analyze and recommend changes to your network security policies.&lt;/li&gt;&lt;li&gt;Push network security policy changes with zero-touch automation to your multi-vendor security devices.&lt;/li&gt;&lt;li&gt;Maximize ROI of your existing security controls by automatically analyzing, validating, and implementing network security policy changes.&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2021-07-26T10:45:30+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1201</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>change automation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/managing-network-security-with-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=69717552</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/69717552/e270b38be7fd75ac627cbf283bbe5893/video_medium/managing-network-security-with-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/69717552/e270b38be7fd75ac627cbf283bbe5893/small/managing-network-security-with-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Managing Network Security with AlgoSec in French</video:title>
            <video:description>AlgoSec video for Fortinet France day&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2021-06-24T11:04:51+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>124</video:duration>
            <video:category>Company </video:category>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/migrate-modernize-supercharging</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=69536079</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/69536079/140324964f1a31c47b5100a2c54f8d7d/video_medium/migrate-modernize-supercharging-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/69536079/140324964f1a31c47b5100a2c54f8d7d/small/migrate-modernize-supercharging-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Migrate &amp; modernize: Supercharging your Cisco Nexus refresh with ACI </video:title>
            <video:description>If you still have Cisco Nexus 7000 devices in your environment, surely you have been inundated with end-of-life warnings and next-gen messaging touting the benefits of upgrading to Nexus 9000 with Cisco ACI.&lt;/p&gt;
&lt;p&gt;We know, modernizing your infrastructure can be a real pain, but with change also comes opportunity!&lt;/p&gt;
&lt;p&gt;Find out in this session how to leverage your Nexus refresh to increase your efficiency and productivity, and reduce security concerns at the same time.&lt;/p&gt;
&lt;p&gt;AlgoSec’s Jeremiah Cornelius, along with Cisco’s Cynthia Broderick, will guide you on how to:&lt;/p&gt;
&lt;p&gt;• Migrate your current Nexus flows to ACI using your preferred mode – network or application centric.&lt;br /&gt;&lt;br /&gt;
• Remove vulnerabilities caused by human error via automation of network change processes.&lt;br /&gt;&lt;br /&gt;
• Instantly identify and remediate risk and compliance violations.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2021-06-10T22:27:12+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2522</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>change management</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>cisco aci app</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>sdn</video:tag>
            <video:tag>security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-to-modernise-your</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=69441880</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/69441880/63cfca3766992764f7124280f27d813a/video_medium/how-to-modernise-your-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/69441880/63cfca3766992764f7124280f27d813a/small/how-to-modernise-your-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to Modernise Your Infrastructure Without Neglecting Your Security</video:title>
            <video:description>Alex Hilton Chief Executive, CIF | Kyle Wickert Worldwide Strategic Architect, AlgoSec | Michael Meyer CRP, MRSBPO&lt;/p&gt;
&lt;p&gt;Episode 2 of Keeping Up-to-Date with Your Network Security&lt;/p&gt;
&lt;p&gt;There is a lot of value in moving enterprise applications onto the cloud. These benefits range from security and data protection and business agility, to financial benefits and faster time to markets. However, efforts can sometimes be misplaced, which causes disruption to the network and leaves you with inadequate security and compliance measures. Cloud network security is made up of multiple layered security, and before making the decision to use enterprise applications in the cloud, you must thoughtfully consider the variety of security controls you will use to secure your data.&lt;/p&gt;
&lt;p&gt;So, how can you elevate digital transformation and cloud migration efforts, without neglecting your security? Does it have to be one or the other, and if not, what steps should be taken in your transformation journeys to ensure that network security remains a priority?&lt;/p&gt;
&lt;p&gt;Join us in this session to learn more about:&lt;br /&gt;&lt;br /&gt;
- What is required to move the security portion of your application&lt;br /&gt;&lt;br /&gt;
- Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved&lt;br /&gt;&lt;br /&gt;
- How to enhance visibility, and why this is so important when modernising your infrastructure&lt;br /&gt;&lt;br /&gt;
- How to unify your network security management across a hybrid and multi-cloud environment&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2021-06-09T12:10:27+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3130</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/managing-the-network-of-the-future</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=69009194</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/69009194/b44bb0e5da66ac737436a62ab66f0b34/video_medium/managing-the-network-of-the-future-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/69009194/b44bb0e5da66ac737436a62ab66f0b34/small/managing-the-network-of-the-future-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Managing the network of the future </video:title>
            <video:description>Hear from network security experts as they discuss their vision of the network of the future, and how network security evolves.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2021-06-01T16:03:26+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>505</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/managing-the-complex-hybrid-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=69009182</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/69009182/e03c1fd004b1a8bf5860d29c34aabfcf/video_medium/managing-the-complex-hybrid-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/69009182/e03c1fd004b1a8bf5860d29c34aabfcf/small/managing-the-complex-hybrid-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Managing the complex hybrid network environment</video:title>
            <video:description>Hear from network security experts as they discuss how to manage the complex hybrid network environment.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2021-06-01T16:02:49+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>484</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>hybrid environment</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/gaps-between-cloudops-netops</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=69009144</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968555/69009144/89f87cd01ca444635af7f32973771a86/video_medium/gaps-between-cloudops-netops-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968555/69009144/89f87cd01ca444635af7f32973771a86/small/gaps-between-cloudops-netops-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Gaps between CloudOps, NetOps &amp; SecOps teams</video:title>
            <video:description>Hear from network security experts as they discuss the gaps faced by CloudOps, NetOps, and SecOps teams.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2021-06-01T16:00:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>335</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>cloud security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-current-state-of-netops-secops</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=69009133</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/69009133/192a44c3aee0a29583c5cd40d5038a6e/video_medium/the-current-state-of-netops-secops-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/69009133/192a44c3aee0a29583c5cd40d5038a6e/small/the-current-state-of-netops-secops-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The current state of NetOps &amp; SecOps</video:title>
            <video:description>Hear from network security experts on the current state of NetOps &amp; SecOps. How are security operations and network operations currently dealing with managing their network security and turning it into a strategic business asset.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2021-06-01T16:00:09+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>464</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-to-manage-your-cloud-journey</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=68673625</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/68673625/ffd88edfe1c19862adf322229253fc69/video_medium/how-to-manage-your-cloud-journey-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/68673625/ffd88edfe1c19862adf322229253fc69/small/how-to-manage-your-cloud-journey-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to manage your cloud journey</video:title>
            <video:description>&lt;h2&gt;Episode 1 of Keeping Up-to-Date with Your Network Security&amp;nbsp;&lt;/h2&gt;&lt;u&gt;Speakers:&lt;/u&gt;&lt;br&gt;Alex Hilton Chief Executive, CIF&amp;nbsp;&lt;div&gt;&lt;p&gt;Oren&amp;nbsp;Amiram&amp;nbsp;Director, Product Management, AlgoSec&amp;nbsp;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Stephen Owen CISO&amp;nbsp;&lt;/p&gt;&lt;/div&gt;Securing your data was once much&amp;nbsp;simpler. It’s&amp;nbsp;grown more complex in recent years.&amp;nbsp;As the workforce becomes more distributed, so does your data. Spreading your data across multiple public and private clouds complicates your&amp;nbsp;network. Today’s&amp;nbsp;data sits in multiple locations and geographies, and is made up of multiple public clouds, private clouds and other on-premises network devices.&amp;nbsp;Therefore,&amp;nbsp;managing your cloud journey can be tiresome and complicated.&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;Enter cloud management.&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;In this episode we’ll discuss:&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- How to manage multiple workloads on the cloud&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- What successful security management looks like for today’s enterprises&lt;span&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;- How to achieve simple, effective security management for your hybrid network&amp;nbsp;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/</video:description>
            <video:publication_date>2021-05-12T11:56:27+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3036</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-6-best-practices-to-stay-secure</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=68518614</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/video_medium/the-6-best-practices-to-stay-secure-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/68518614/629c798b0006a3bc66c9e695b31bf6bc/small/the-6-best-practices-to-stay-secure-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The 6 best practices to stay secure in the hybrid cloud</video:title>
            <video:description>&lt;p&gt;Omer Ganot(AlgoSec) | April 2021&lt;/p&gt;Doug Hurd (Cisco) Henrik Skovfoged (Conscia) Oren Amiram (AlgoSec) Tsippi Dach (AlgoSec)&lt;br&gt;What if we told you that there were just six things that you can start doing to be more secure in your hybrid cloud environment?&lt;br&gt;
In this session, you’ll get clear insight on what you can do right away to tighten your hybrid cloud network security.  From visibility through network management, to risk and cleanup – security expert Omer Ganot will guide you through the steps to help you stay secure.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/</video:description>
            <video:publication_date>2021-05-02T16:13:13+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2100</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>cyber security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>security policy change management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/modernize-your-network-and-harness</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=68076664</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/68076664/ef90e0c554cbc0046df6524c071f172c/video_medium/modernize-your-network-and-harness-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/68076664/ef90e0c554cbc0046df6524c071f172c/small/modernize-your-network-and-harness-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Modernize your network and Harness the power of Nexus &amp; Cisco ACI with AlgoSec</video:title>
            <video:description>Watch this short video and see how you can easily modernize your infrastructure with AlgoSec and upgrading your Cisco nexus switches to ACI&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2021-04-06T16:16:27+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>535</video:duration>
            <video:category>Products</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>Change Management</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>sdn</video:tag>
            <video:tag>security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/one-laptop-per-child-association</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67852247</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968566/67852247/3a5d88fa99b0e7787ebc7164c5ff141d/video_medium/one-laptop-per-child-association-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968566/67852247/3a5d88fa99b0e7787ebc7164c5ff141d/small/one-laptop-per-child-association-thumbnail.jpg</video:thumbnail_loc>
            <video:title>One Laptop per Child association -  AlgoSec Donation Ceremony</video:title>
            <video:description>As part of AlgoSec's appreciation for our partner community’s contributions and support, AlgoSec teamed up with One Laptop per Child Association (OLPC) to donate 21 laptops to the children in the Virgen de Suyapa School in Honduras.</video:description>
            <video:publication_date>2021-03-21T19:55:48+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>68</video:duration>
            <video:category>Company </video:category>
            <video:tag>corporate</video:tag>
            <video:tag>partners</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/bridging-netops-and-secops-an-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67787786</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968575/67787786/a04c6adb902d1b8014339f470a3edca4/video_medium/bridging-netops-and-secops-an-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968575/67787786/a04c6adb902d1b8014339f470a3edca4/small/bridging-netops-and-secops-an-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Bridging NetOps and SecOps: An Experts’ Panel</video:title>
            <video:description>Doug Hurd (Cisco) Henrik Skovfoged (Conscia) Oren Amiram (AlgoSec) Tsippi Dach (AlgoSec)&lt;/p&gt;
&lt;p&gt;Silos hurt security. Your network and its security are not managed by just one team. It is the responsibility of both NetOps and SecOps, but these teams don’t always play well together.&lt;/p&gt;
&lt;p&gt;In this security experts’ panel, Doug Hurd from Cisco, Henrik Skovfoged from Conscia, Oren Amiram and Tsippi Dach from AlgoSec will share how you can bring NetOps and SecOps teams together with Cisco ACI, Cisco Secure Workload (formerly Cisco Tetration) and AlgoSec.&lt;/p&gt;
&lt;p&gt;Discover how NetOps and SecOps teams can:&lt;/p&gt;
&lt;p&gt;Bridge the NetOps/SecOps divide, improve communication, and break down the silos between network and security.&lt;/p&gt;
&lt;p&gt;Align network, security, and business application owners&lt;/p&gt;
&lt;p&gt;Improve the entire network security with Cisco Secure Workload and firewall management&lt;/p&gt;
&lt;p&gt;Automate tasks and gain network traffic visibility of networks and security controls for threat detection, analysis and response across Cisco ACI and the entire hybrid and multi-vendor network.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2021-03-17T15:29:33+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2609</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>netops</video:tag>
            <video:tag>SecOps</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/setup-application-discovery-for-poc</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67773214</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/67773214/b8fdf3eb6d96355852dc137fe3b575eb/video_medium/setup-application-discovery-for-poc-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/67773214/b8fdf3eb6d96355852dc137fe3b575eb/small/setup-application-discovery-for-poc-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Setup Application Discovery for PoC environments</video:title>
            <video:description>Application Discovery is so much easier to setup in A32. Find out  how you setup Application Discovery for your PoC environment. For production environment, see the Setup&amp;nbsp; Application Discovery for production video.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2021-03-16T20:30:34+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>56</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>application discovery</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/setup-application-discovery-for</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67773212</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968561/67773212/1d69e1cecb6db6ea52f4ec3e344594ba/video_medium/setup-application-discovery-for-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968561/67773212/1d69e1cecb6db6ea52f4ec3e344594ba/small/setup-application-discovery-for-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Setup Application Discovery for production</video:title>
            <video:description>Application Discovery is so much easier to setup in A32. Find out  how you setup Application&amp;nbsp;Discovery for your production environment. For POCs, see the Setup Application&amp;nbsp;Discovery for POCs video.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/" title="Link: https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2021-03-16T20:30:23+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>64</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>application discovery</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/manage-your-network-security-with</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67772645</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968556/67772645/45eafb9f9aa239ba4e0c03c278b670ba/video_medium/manage-your-network-security-with-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968556/67772645/45eafb9f9aa239ba4e0c03c278b670ba/small/manage-your-network-security-with-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Manage your network security with AlgoSec &amp; VMWare</video:title>
            <video:description>Watch this demo and see how you can tighten your security and get increased visibility with AlgoSec and VMWare.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/</video:description>
            <video:publication_date>2021-03-16T19:48:21+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>290</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>Auditing and Compliance</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>information security</video:tag>
            <video:tag>risk analysis</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>vmware nsx</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-meraki-visibility-risk</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67772640</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/video_medium/cisco-meraki-visibility-risk-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968579/67772640/eb8d96ec23be780dc19e998830b76c13/small/cisco-meraki-visibility-risk-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco Meraki – Visibility, Risk &amp; Compliance Demo</video:title>
            <video:description>Product demo - Discover how you can gain visibility, risk and compliance for Cisco Meraki.

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/</video:description>
            <video:publication_date>2021-03-16T19:48:05+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>231</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>Auditing and Compliance</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>information security</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Risk Analysis</video:tag>
            <video:tag>SD-WAN</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-to-stop-ransomware-in-its-5</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67457810</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/67457810/ce55219ec9eaa4d8ec8689d242357871/video_medium/how-to-stop-ransomware-in-its-5-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/67457810/ce55219ec9eaa4d8ec8689d242357871/small/how-to-stop-ransomware-in-its-5-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to Stop Ransomware In Its Tracks</video:title>
            <video:description>&lt;h2&gt;Dania Ben Peretz | March 2020&lt;/h2&gt;Yes, it’s possible.&lt;br&gt;But the time to prepare is now - before it strikes.&lt;br&gt;In this session, security expert Dania Ben-Peretz will demonstrate what to do if your network is infected by ransomware. She will show how to prepare a ransomware playbook, using the existing capabilities of network security policy management tools, so you can handle a ransomware incident as it happens.&lt;br&gt;&lt;br&gt;&lt;br&gt;
Join us and learn:&lt;br&gt;&lt;ul&gt;&lt;li&gt;The dangers of ransomware.&lt;/li&gt;&lt;li&gt;How to prepare the playbook.&lt;/li&gt;&lt;li&gt;How to stop ransomware when it strikes.&lt;/li&gt;&lt;/ul&gt;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/</video:description>
            <video:publication_date>2021-03-02T19:21:14+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1505</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>micro segmentation</video:tag>
            <video:tag>micro-segmentation</video:tag>
            <video:tag>ransomware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-integration-hybrid</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67413841</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/67413841/762e84fb8a5b02b974fbacfd5a44e5ee/video_medium/algosec-cloud-integration-hybrid-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/67413841/762e84fb8a5b02b974fbacfd5a44e5ee/small/algosec-cloud-integration-hybrid-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec cloud Integration | Hybrid Network Connectivity Check</video:title>
            <video:description>Running a connectivity check in AlgoSec cloud allows you to observe how traffic is routed across your entire hybrid network. You can use this information to troubleshoot, reduce risk across the whole hybrid network, and more.</video:description>
            <video:publication_date>2021-03-01T16:23:31+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>103</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>connectivity</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/policy-driven-multi-vendor</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67302434</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/67302434/3470f915a90ef77059f125d70fb46468/video_medium/policy-driven-multi-vendor-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/67302434/3470f915a90ef77059f125d70fb46468/small/policy-driven-multi-vendor-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Policy-Driven, Multi-Vendor, App-Centric Security Management for Data Centers</video:title>
            <video:description>As your network extends into the Cisco ACI Fabric, managing security policies within your hybrid estate becomes increasingly complex.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Because each part of your network estate is managed in its own silo, it’s tough to get a full view of your entire network. Making changes across your entire network is a chore. Validating your entire network’s security is virtually impossible. Get more out of your existing investments by adopting new ways of working without burdening your teams with additional efforts.&lt;/p&gt;
&lt;p&gt;This will cover network security within Cisco ACI and multi-vendor security environments, and explore how to leverage AlgoSec’s security policy management to:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Discover a full picture of your network applications automatically.&lt;/li&gt;&lt;li&gt;
Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as those outside it.&lt;/li&gt;&lt;li&gt;
Unify, consolidate, and automate your network security policy management, including elements within and outside of the Cisco ACI fabric.&lt;/li&gt;&lt;li&gt;
Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations.&lt;/li&gt;&lt;/ul&gt;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/</video:description>
            <video:publication_date>2021-02-23T13:45:34+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2260</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>cisco aci app</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/securely-accelerate-digital</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67202045</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968570/67202045/69f766d205fcbf5c44b7a142854752dc/video_medium/securely-accelerate-digital-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968570/67202045/69f766d205fcbf5c44b7a142854752dc/small/securely-accelerate-digital-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Securely Accelerate Digital Transformation – A Joint VMware &amp; AlgoSec Webinar</video:title>
            <video:description>Brian Heili (VMware) and  Jeremiah Cornelius (AlgoSec)&lt;/p&gt;
&lt;p&gt;This past year was an earthquake. The global pandemic amplified the urgent need for businesses to accelerate digital transformation, at the same time that concerns about security achieved heightened levels of urgency. Digital transformation offers the ability to turn these challenges into opportunities.&lt;br /&gt;&lt;br /&gt;
In this joint session by VMware and AlgoSec, you’ll find out how you can maintain both security and agility throughout your digital business transformation project through the AlgoSec integration with VMware NSX-T.&lt;br /&gt;&lt;br /&gt;
Our experts Brian Heili from VMware and Jeremiah Cornelius from AlgoSec will show you:&lt;br /&gt;&lt;br /&gt;
•	Why infrastructure modernization with VMware NSX is vital for a successful and faster digital transformation.&lt;br /&gt;&lt;br /&gt;
•	How to gain complete visibility in NSX and across your entire hybrid network with AlgoSec.&lt;br /&gt;&lt;br /&gt;
•	How to automatically discover, map and manage application connectivity in VMware NSX.&lt;br /&gt;&lt;br /&gt;
•	How to assess risk in configuration of all network security policy changes and eliminate error with zero-touch automation.&lt;br /&gt;&lt;br /&gt;
•	How to ensure continuous compliance, including NSX Service Insertion and physical networks.&lt;/p&gt;
&lt;p&gt;Click here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;</video:description>
            <video:publication_date>2021-02-17T19:52:57+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3148</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/customer-story-mark-grady-from</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67177052</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968580/67177052/c8639a446544eae2d8489400d9486652/video_medium/customer-story-mark-grady-from-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968580/67177052/c8639a446544eae2d8489400d9486652/small/customer-story-mark-grady-from-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Customer Story - Mark Grady from Leading payment solutions company</video:title>
            <video:description>Leading payment solutions company credits AlgoSec for increasing security and compliance.&lt;br&gt;&lt;div&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;/div&gt;

Click here for a personal demo: https://www.algosec.com/lp/request-a-demo/</video:description>
            <video:publication_date>2021-02-16T22:20:34+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>189</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>customer story</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/aff-ransomware-isolation-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=67023869</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968571/67023869/3b1a126c89b05c7f72f7b780eb782619/video_medium/aff-ransomware-isolation-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968571/67023869/3b1a126c89b05c7f72f7b780eb782619/small/aff-ransomware-isolation-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AFF Ransomware Isolation</video:title>
            <video:description>In this video Prof. Avishai Wool shows how to create a playbook to be used in case of a ransomware attack and how it can be used when an attack takes place</video:description>
            <video:publication_date>2021-02-10T12:15:47+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>212</video:duration>
            <video:category>Products</video:category>
            <video:tag>ransomware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/tightening-security-posture-with</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=66971202</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968577/66971202/6ba2e45ab40e86122d8e1fbaac1ef691/video_medium/tightening-security-posture-with-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968577/66971202/6ba2e45ab40e86122d8e1fbaac1ef691/small/tightening-security-posture-with-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Tightening security posture with micro-segmentation</video:title>
            <video:description>&lt;h2&gt;Jan Heijdra,  Cisco Security Specialist . Yitzy Tannenbaum,  Product Marketing Manager | 27 January 2021&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Micro-segmentation protects your network by limiting the lateral movement of ransomware and other threats in your network. Yet successfully implementing a defense-in-depth strategy using micro-segmentation may be complicated.&lt;/p&gt;
&lt;p&gt;In this second webinar in a series of two webinars about ransomware, Yitzy Tannenbaum, Product Marketing Manager from AlgoSec and Jan Heijdra, Cisco Security Specialist, will provide a blueprint to implementing micro-segmentation using Cisco Secure Workload (formerly Cisco Tetration) and AlgoSec Network Security Policy Management.&lt;/p&gt;
&lt;p&gt;Join our live webinar to learn:&lt;br&gt;
•	Why micro-segmentation is critical to fighting ransomware&lt;br&gt;
•	Understand your business applications to create your micro-segmentation policy&lt;br&gt;
•	Validate your micro-segmentation policy is accurate&lt;br&gt;
•	Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;
•	Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;
•	Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;</video:description>
            <video:publication_date>2021-02-08T14:26:00+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3543</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>micro-segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/compliance-made-easy-pass-your-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=66705456</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/66705456/3551c9ddc736bb8dc9fed9ad720ce118/video_medium/compliance-made-easy-pass-your-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/66705456/3551c9ddc736bb8dc9fed9ad720ce118/small/compliance-made-easy-pass-your-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Compliance made easy. Pass your audits stress-free.</video:title>
            <video:description>&lt;p&gt;Don’t fail an audit ever again. Yes, it’s possible.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It doesn’t matter what regulation you are talking about, whether your own internal compliance standard or a common global framework such as PCI DSS, SOX, HIPPA, SWIFT, or even HKMA.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We’ll show you how.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, AlgoSec security expert Tal Dayan will reveal:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The secrets to passing audits&amp;nbsp;&lt;/li&gt;&lt;li&gt;How to improve your compliance score&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;How to always remain compliant&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2021-01-27T17:40:01+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2374</video:duration>
            <video:category>Webinars</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/reducing-risk-of-ransomware-attacks</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=66275378</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/66275378/c775c0a3eb7245a347cb1fbd493062b8/video_medium/reducing-risk-of-ransomware-attacks-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/66275378/c775c0a3eb7245a347cb1fbd493062b8/small/reducing-risk-of-ransomware-attacks-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Reducing Risk of Ransomware Attacks - Back to Basics</video:title>
            <video:description>&lt;b&gt;Jan Heijdra, Cisco Security Specialist. Yitzy Tannenbaum, AlgoSec, Huib Klaassnes, METSI Technologies | Jan 13, 2021&lt;/b&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Did you know that 50% of organizations were hit by ransomware attacks in 2020? These attacks have become more sophisticated, as attackers change tactics from “spray and pray” to more targeted server-based attacks. So how do you protect your network from such attacks?&lt;/p&gt;
&lt;p&gt;We invite you to join our series of webinars about ransomware with AlgoSec and Cisco, to learn practical methods to reduce your network attack surface and protect your organization from ransomware and other cyber-attacks.&lt;/p&gt;
&lt;p&gt;In our first webinar in the series, Yitzy Tannenbaum, Product Marketing Manager from AlgoSec and&amp;nbsp;Jan Heijdra, Cisco Security Specialist, will take you back to the basics.&lt;/p&gt;
&lt;p&gt;They will discuss:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Popular methods used to infect your network with ransomware&lt;/li&gt;&lt;li&gt;The importance of a layered defense-in-depth strategy&lt;/li&gt;&lt;li&gt;Best practices for managing your security devices&lt;/li&gt;&lt;li&gt;How to build a security wall with Cisco Secure and AlgoSec Network Security Policy Management to block ransomware&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2021-01-13T20:20:25+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3592</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Cisco</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/5-power-tips-to-keep-your-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=66274665</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968569/66274665/8ec6ebe318a61a9e201db2cb228728b8/video_medium/5-power-tips-to-keep-your-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968569/66274665/8ec6ebe318a61a9e201db2cb228728b8/small/5-power-tips-to-keep-your-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>5 power tips to keep your network secure in 2021</video:title>
            <video:description>&lt;b&gt;Jade Kahn and Asher Benbenisty | Jan 13, 2021&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;b&gt;
&lt;/b&gt;&lt;p&gt;No one could have predicted how unpredictable 2020 would be, so we’re here to help you get prepared for whatever is in store in 2021.&lt;/p&gt;
No matter what happens in the upcoming year – there are five things you can do now to keep your network secure in 2021.&lt;br&gt;&lt;br&gt;Join network security experts Jade Kahn and Asher Benbenisty, and learn how to:&lt;br&gt;&lt;br&gt;&lt;ol&gt;&lt;li&gt;Never fly blind: Ensure visibility across your entire hybrid network&lt;/li&gt;&lt;li&gt;Do more with less: Accelerate digital transformation &amp;amp; avoid misconfigurations with automation&lt;/li&gt;&lt;li&gt;Stay continuously compliant&lt;/li&gt;&lt;li&gt;Fight ransomware with micro-segmentation&lt;/li&gt;&lt;li&gt;Accelerate in the cloud&lt;/li&gt;&lt;/ol&gt;</video:description>
            <video:publication_date>2021-01-13T18:48:57+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2286</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-security-management-suite-11</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=65813899</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968556/65813899/417596c67ace9ab1c01d473b2d959d3f/video_medium/algosec-security-management-suite-11-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968556/65813899/417596c67ace9ab1c01d473b2d959d3f/small/algosec-security-management-suite-11-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Security Management Suite Demo</video:title>
            <video:description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;Dive deep into this demonstration of the
AlgoSec Security Management Suite.&lt;/p&gt;

&lt;p&gt;See how Firewall Analyzer provides
visibility into your network, visualize applications with AppViz, visualize
automatic network change management with FireFlow and see how you can even make
changes at the business application level with AppChange.&lt;/p&gt;&lt;span&gt;Click
here for a personal demo: &lt;a href="https://www.algosec.com/lp/request-a-demo/"&gt;https://www.algosec.com/lp/request-a-demo/&lt;/a&gt;&lt;/span&gt;&lt;br&gt;&lt;p&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2020-12-23T13:42:30+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1323</video:duration>
            <video:category>Demos</video:category>
            <video:tag>fireflow</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/axial-testimonial</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=65769584</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/65769584/c67980623f79dbddbda3c9eaa74c980f/video_medium/axial-testimonial-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/65769584/c67980623f79dbddbda3c9eaa74c980f/small/axial-testimonial-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Axial Testimonial</video:title>
            <video:description>Tony English, Chief Executive, Axial Systems, United Kingdom says:&lt;p&gt;&lt;/p&gt;
&lt;p&gt;“Thank you to AlgoSec for awarding us Partner of the Year 2019 for the UK. Certainly, we’ve had a strong working relationship with AlgoSec for many years”.&lt;/p&gt;</video:description>
            <video:publication_date>2020-12-21T18:32:00+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>34</video:duration>
            <video:category>Channel  Testimonials</video:category>
            <video:tag>customer story</video:tag>
            <video:tag>partners</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/a-customer-story-the-ncr-journey-to</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=65743138</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968570/65743138/a95ce97df54ed8d96b5d9fee26f9c2da/video_medium/a-customer-story-the-ncr-journey-to-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968570/65743138/a95ce97df54ed8d96b5d9fee26f9c2da/small/a-customer-story-the-ncr-journey-to-thumbnail.jpg</video:thumbnail_loc>
            <video:title>A Customer Story: The NCR journey to effective and agile network security</video:title>
            <video:description>&lt;p&gt;&lt;b&gt;Scott Theriault, Global Manager, Network Perimeter Security (NCR Corporation) | Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)&lt;/b&gt;  |  Dec 17, 2020&lt;/p&gt;
&lt;p&gt;Managing security in a multi-billion-dollar enterprise poses many challenges, as well as opportunities. Go inside an S&amp;amp;P 500 company and hear how they manage their network security.&lt;/p&gt;
&lt;p&gt;Join Scott Theriault, Global Manager, Network Perimeter Security at NCR Corporation as he shares his real-world experience managing security in a global organization with Yitzy Tannenbaum, Product Marketing Manager at AlgoSec. Get insights on:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Key factors managing network security in complex organizations&lt;/li&gt;&lt;li&gt;The benefits of network policy optimization&lt;/li&gt;&lt;li&gt;Importance of maintaining and demonstrating compliance&lt;/li&gt;&lt;li&gt;Change management and automation in large, complex networks&lt;/li&gt;&lt;li&gt;Driving alignment of cloud and on-premises security&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2020-12-20T19:28:39+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2924</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>customer story</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/new-in-a32-new-regulatory</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=65299060</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968560/65299060/fb8542c8a3f17e75f098d2b8efe2982b/video_medium/new-in-a32-new-regulatory-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968560/65299060/fb8542c8a3f17e75f098d2b8efe2982b/small/new-in-a32-new-regulatory-thumbnail.jpg</video:thumbnail_loc>
            <video:title>New in A32: New Regulatory Compliance reports</video:title>
            <video:description>A32.00 introduces new regulatory compliance reports for two significant standards:&lt;br&gt;
•	SWIFT, the world’s leading provider of secure financial messaging services.&lt;br&gt;
•	Hong Kong Momentary Authority (HKMA), Hong Kong’s central banking institution.</video:description>
            <video:publication_date>2020-11-23T19:51:06+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>51</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>afa</video:tag>
            <video:tag>compliance</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/vulnerabilities-data-in-your</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=65299053</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968555/65299053/43e7fa83ce9f87d0a9b376fa461ce20a/video_medium/vulnerabilities-data-in-your-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968555/65299053/43e7fa83ce9f87d0a9b376fa461ce20a/small/vulnerabilities-data-in-your-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Vulnerabilities data in your Firewall risk check</video:title>
            <video:description>Now, you can take advantage of vulnerabilities information as part of the risk check in the traffic workflow approval stage. See how.</video:description>
            <video:publication_date>2020-11-23T19:49:29+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>38</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>fireflow</video:tag>
            <video:tag>vulnerabilities</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cto-round-table-fighting-ransomware</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=65200173</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968567/65200173/d9b6614349fb84bd79001397f7a874e2/video_medium/cto-round-table-fighting-ransomware-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968567/65200173/d9b6614349fb84bd79001397f7a874e2/small/cto-round-table-fighting-ransomware-thumbnail.jpg</video:thumbnail_loc>
            <video:title>CTO Round Table: Fighting Ransomware with Micro-segmentation</video:title>
            <video:description>&lt;b&gt;Ariel Zeitlin, CTO (Guardicore) | Avishai Wool, CTO &amp;amp; Co-founder (AlgoSec)&lt;/b&gt;&amp;nbsp; |&amp;nbsp; Nov 17, 2020&lt;br&gt;&lt;br&gt;In the past few months, we’ve witnessed a steep rise in ransomware attacks targeting anyone from small companies to large, global enterprises. It seems like no organization is immune to ransomware. So how do you protect your network from such attacks?&lt;br&gt;&lt;br&gt;Join our discussion with AlgoSec CTO Prof. Avishai Wool and Guardicore CTO Ariel Zeitlin, and discover how micro-segmentation can help you reduce your network attack surface and protect your organization from cyber-attacks.&lt;br&gt;&lt;br&gt;Learn:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Why micro-segmentation is critical to fighting ransomware and other cyber threats.&lt;/li&gt;&lt;li&gt;Common pitfalls organizations face when implementing a micro-segmentation project&lt;/li&gt;&lt;li&gt;How to discover applications and their connectivity requirements across complex network environments.&lt;/li&gt;&lt;li&gt;How to write micro-segmentation filtering policy within and outside the data center&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2020-11-18T14:37:45+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3443</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>micro segmentation</video:tag>
            <video:tag>ransomware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/application-segmentation-using</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=65071031</video:player_loc>
            <video:content_loc>https://video.algosec.com/64968578/65071031/2c4294482ca35125b8106e3dcbc9387a/video_medium/application-segmentation-using-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/64968578/65071031/2c4294482ca35125b8106e3dcbc9387a/small/application-segmentation-using-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Application Segmentation Using AlgoSec AutoDiscovery </video:title>
            <video:description>In this video see AlgoSec’s unique application-centric approach to building and maintaining a Micro-Segmentation strategy in your network.</video:description>
            <video:publication_date>2020-11-10T17:25:53+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>306</video:duration>
            <video:category>Products</video:category>
            <video:tag>Micro Segmentation</video:tag>
            <video:tag>Network Segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/appviz-demo</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64894849</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445186/64894849/70803a7c7f9645cbcbb567b28fd85988/video_medium/appviz-demo-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445186/64894849/70803a7c7f9645cbcbb567b28fd85988/small/appviz-demo-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AppViz Demo</video:title>
            <video:description>In this video you’ll get a chance to see how AlgoSec AppViz provides an application-centric approach to your network security policy management.</video:description>
            <video:publication_date>2020-10-29T10:52:14+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>495</video:duration>
            <video:category>Products</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>appviz</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-fireflow-demo</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64894455</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445192/64894455/20ee7fba04e5d6a9fca1491f4d3e7477/video_medium/algosec-fireflow-demo-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445192/64894455/20ee7fba04e5d6a9fca1491f4d3e7477/small/algosec-fireflow-demo-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec FireFlow Demo</video:title>
            <video:description>See how Algosec FireFlow’s intelligent automated workflow supports the entire policy change lifecycle, including provisioning, auditing, removal, &amp;amp; recertification&lt;br&gt;&lt;table&gt;
 &lt;tbody&gt;&lt;tr&gt;
  &lt;td&gt;
  &lt;p&gt;Check&amp;nbsp;for more information about AlgoSec FireFlow:&amp;nbsp;&lt;a href="https://www.algosec.com/fireflow/"&gt;https://www.algosec.com/fireflow/&lt;/a&gt;&lt;/p&gt;
  &lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br&gt;</video:description>
            <video:publication_date>2020-10-29T10:30:39+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>347</video:duration>
            <video:category>Products</video:category>
            <video:tag>change management system</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cloud-migrations-made-simpler-safe</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64889600</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445188/64889600/20b747595bfc66082c680695eb8af3a8/video_medium/cloud-migrations-made-simpler-safe-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445188/64889600/20b747595bfc66082c680695eb8af3a8/small/cloud-migrations-made-simpler-safe-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cloud migrations made simpler: Safe, Secure and Successful Migrations Webinar</video:title>
            <video:description>Migrating applications to the cloud – without creating security holes, application outages or violating compliance – is within reach!&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, Director of Product at AlgoSec, will guide you on how to simplify and accelerate large-scale complex application migration projects.&lt;/p&gt;
&lt;p&gt;The webinar will cover:&lt;br&gt;
   •	Why organizations choose to migrate their applications to the cloud&lt;br&gt;
   •	What is required in order to move the security portion of your application and how long it may take&lt;br&gt;
   •	Challenges and solutions to lower the cost, better prepare for the migration and reduce the risks involved&lt;br&gt;
   •	How to deliver unified security policy management across the hybrid cloud environment&lt;/p&gt;</video:description>
            <video:publication_date>2020-10-28T18:45:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2150</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud migration</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>migrate applications</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/conscia-as-denmark-testimonial</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64847572</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445190/64847572/f115b1c5867c2cdc6e8658d2b4aba163/video_medium/conscia-as-denmark-testimonial-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445190/64847572/f115b1c5867c2cdc6e8658d2b4aba163/small/conscia-as-denmark-testimonial-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Conscia A/S Denmark Testimonial</video:title>
            <video:description>Henrik Skovfoged, Group Product Director Security at Conscia A/S Denmark says:&lt;br&gt;&amp;nbsp;“We are always striving to create the best form of security for our customers and AlgoSec is an excellent product that has shown that we can put that on top&lt;br&gt;
to create the right security for our customers”.</video:description>
            <video:publication_date>2020-10-25T21:40:25+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>40</video:duration>
            <video:category>Channel  Testimonials</video:category>
            <video:tag>customer story</video:tag>
            <video:tag>partners</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/orange-cyberdefense-testimonial</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64847567</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445026/64847567/8945d87ae9ecf4920fab164ff72c32f0/video_medium/orange-cyberdefense-testimonial-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445026/64847567/8945d87ae9ecf4920fab164ff72c32f0/small/orange-cyberdefense-testimonial-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Orange Cyberdefense Testimonial </video:title>
            <video:description>Johan Andersson, EVP at Orange Cyberdefense says: “We value our partnership which allows us to deliver unique value to our customers across EMEA.&lt;br /&gt;
We are looking forward to continue to grow and further enhancing our success together”.</video:description>
            <video:publication_date>2020-10-25T21:37:31+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>22</video:duration>
            <video:category>Channel  Testimonials</video:category>
            <video:tag>customer story</video:tag>
            <video:tag>partners</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/radically-reduce-firewall-rules</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64735571</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445025/64735571/90fb6e9017df250acc030a5072ae2a95/video_medium/radically-reduce-firewall-rules-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445025/64735571/90fb6e9017df250acc030a5072ae2a95/small/radically-reduce-firewall-rules-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Radically Reduce Firewall Rules with Application-Driven Rule Recertification</video:title>
            <video:description>&lt;h2&gt;Asher Benbenisty, Director of Product Marketing (AlgoSec) | October 2020&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Does your network still have obsolete firewall rules? Do you often feel overwhelmed with the number of firewall rules in your network?&lt;/p&gt;
&lt;p&gt;To make sure your network is secure and compliant, you need to regularly review and recertify firewall rules. However, manual firewall rule recertification is complex, time-consuming and error-prone, and mistakes may cause application outages.&lt;/p&gt;
&lt;p&gt;Discover a better way to recertify your firewall rules with Asher Benbenisty, AlgoSec’s Director of Product Marketing, as he discusses how associating application connectivity with your firewall rules can radically reduce the number of firewall rules on your network as well as the efforts involved in rule recertification.&lt;/p&gt;
&lt;p&gt;In this webinar, we discussed:&lt;br&gt;
* The importance of regularly reviewing and recertifying your firewall rules&lt;br&gt;
* Integrating application connectivity into your firewall rule recertification process&lt;br&gt;
* Automatically managing the rule-recertification process using an application-centric approach&lt;/p&gt;</video:description>
            <video:publication_date>2020-10-15T12:42:12+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2423</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>firewall rules</video:tag>
            <video:tag>rule recertification</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/overcoming-the-challenges-of</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64563330</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445025/64563330/f2e2295e340b972dcb3452a894e31370/video_medium/overcoming-the-challenges-of-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445025/64563330/f2e2295e340b972dcb3452a894e31370/small/overcoming-the-challenges-of-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Overcoming the Challenges of Managing a Hybrid Environment</video:title>
            <video:description>Omer Ganot, Cloud Security Product Manager (AlgoSec), Stuti Deshpande, Partner Solution Architect (AWS) | Sep 2020&lt;/p&gt;
&lt;p&gt;Public clouds such as Amazon Web Services (AWS) are a critical part of your hybrid network. It is important to keep out the bad guys (including untrusted insiders) and proactively secure your entire hybrid network.&lt;/p&gt;
&lt;p&gt;Securing your network is both the responsibility of the cloud providers, as well as your organization’s IT and CISOs – the shared responsibility model. As a result, your organization needs visibility into what needs to be protected, as well as an understanding of the tools that are available to keep them secure.&lt;/p&gt;
&lt;p&gt;In this webinar, Omer Ganot, AlgoSec’s Cloud Security Product Manager, and Stuti Deshpande's, Amazon Web Service’s Partner Solutions Architect, will share security challenges in the hybrid cloud and provide tips to protect your AWS and hybrid environment, including how to:&lt;br /&gt;
&lt;br /&gt;
    •	Securely migrate workloads from on-prem to public cloud&lt;br /&gt;
    •	Gain unified visibility into your network topology and traffic flows, including both public cloud and on-premises assets, from a single console.&lt;br /&gt;
    •	Manage/orchestrate multiple layers of security controls and proactively detect misconfigurations&lt;br /&gt;
    •	Protect your data, accounts, and workloads from misconfiguration risks&lt;br /&gt;
    •	Protect web applications in AWS by filtering traffic and blocking common attack patterns, such as SQL injection or cross-site scripting&lt;br /&gt;
    •	Gain a unified view of your compliance status and achieve continuous compliance</video:description>
            <video:publication_date>2020-10-01T15:55:23+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3330</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>aws</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/tip-to-bring-map-elements-closer</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64562064</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445029/64562064/e4672c7648562eb8ca39940c71a0b947/video_medium/tip-to-bring-map-elements-closer-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445029/64562064/e4672c7648562eb8ca39940c71a0b947/small/tip-to-bring-map-elements-closer-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Tip to bring map elements closer together</video:title>
            <video:description>Here's another tip for you! When map elements are far from each other, just doubleclick the connector between them to bring them closer together.</video:description>
            <video:publication_date>2020-10-01T14:23:46+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>50</video:duration>
            <video:category>Tech &amp; tips</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/hybrid-device-urt-unified-routing</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64562059</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445025/64562059/d98060b16b2157456c43778799b12e71/video_medium/hybrid-device-urt-unified-routing-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445025/64562059/d98060b16b2157456c43778799b12e71/small/hybrid-device-urt-unified-routing-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Hybrid Device URT (Unified Routing Table)</video:title>
            <video:description>You can combine both static and dynamic routing data using the Hybrid device URT method. See how it works.</video:description>
            <video:publication_date>2020-10-01T14:22:48+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>73</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>URT</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/prioritize-and-remediate-risks-in</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64562046</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445028/64562046/813cef6d1514bd3de9f477d8f851a124/video_medium/prioritize-and-remediate-risks-in-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445028/64562046/813cef6d1514bd3de9f477d8f851a124/small/prioritize-and-remediate-risks-in-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Prioritize and remediate risks in your network</video:title>
            <video:description>See how AlgoSec helps you prioritize and remediate risks in your network and ensures your requests are risk free</video:description>
            <video:publication_date>2020-10-01T14:21:16+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>106</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>FireFlow</video:tag>
            <video:tag>Risks</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-api-swagger</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64561980</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445027/64561980/25dc98b38a36710af6136fe6c29bb24b/video_medium/algosec-api-swagger-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445027/64561980/25dc98b38a36710af6136fe6c29bb24b/small/algosec-api-swagger-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec API Swagger</video:title>
            <video:description>On premise and in the cloud, AlgoSec simplifies and automates network security policy management to make your enterprise more agile, more secure and more compliant – all the time.&lt;br&gt;The AlgoSec platform&amp;nbsp;provides a set of Swagger API documentation, available right from the platform itself.&amp;nbsp;
&lt;p&gt;Swagger enables you to execute API request calls and access lists of requested parameters.&lt;/p&gt;</video:description>
            <video:publication_date>2020-10-01T14:19:56+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>84</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>API</video:tag>
            <video:tag>REST</video:tag>
            <video:tag>security management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/reflect-the-business-context-for</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64561963</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650857/64561963/8b39508250ab6030890be8d0a401ebd5/video_medium/reflect-the-business-context-for-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650857/64561963/8b39508250ab6030890be8d0a401ebd5/small/reflect-the-business-context-for-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Reflect the business context for every change request</video:title>
            <video:description>For every traffic change request, get a clear indication on its possible business implications</video:description>
            <video:publication_date>2020-10-01T14:18:33+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>54</video:duration>
            <video:category>Tech &amp; tips</video:category>
            <video:tag>affected applications</video:tag>
            <video:tag>change requests</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-algosec-achieving-2</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64479563</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650859/64479563/08337be4b8356079adb277355c6a83f5/video_medium/cisco-algosec-achieving-2-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650859/64479563/08337be4b8356079adb277355c6a83f5/small/cisco-algosec-achieving-2-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco &amp; AlgoSec Achieving application-driven security across your hybrid network</video:title>
            <video:description>&lt;b&gt;Roxana Diaz, Worldwide Technical Solutions Architect (Cisco), Yonatan Klein, Director of Product (AlgoSec)&lt;/b&gt;
&lt;p&gt;Your network extends into hybrid environments and may include private clouds running Cisco ACI, and on-premises devices. Managing network security policies in your multi-vendor estate is complex.&lt;/p&gt;
&lt;p&gt;Because your network is made up of multiple vendors and each part of your network estate is managed in its own silo, it is tough to get centralized management of your entire network. Making changes is a chore and validating security is difficult.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate, and automate your entire network security policy management across your Cisco and multi-vendor estate.&lt;/p&gt;
&lt;p&gt;In this session Roxana Diaz, Worldwide Technical Solutions Architect at Cisco, and Yonatan Klein, AlgoSec’s Director of Product, will discuss how to manage the Cisco and multi-cloud estate and how to:&lt;br&gt;
• Capitalize on your Cisco ACI investment to take advantage of its full capabilities&lt;br&gt;
• Bring centralized visibility, automation, and compliance monitoring into your Cisco and multi-vendor network ecosystem&lt;br&gt;
• Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it, including Cisco firewalls and routers, as well as multi-vendor devices.&lt;br&gt;
• Take advantage of Cisco Tetration Analytics and AlgoSec’s intelligent discovery to get a full picture of your network and application traffic and to design and provision a micro-segmentation network policy design.&lt;br&gt;
• Unify, consolidate, and automate your network security policy management&lt;br&gt;
• Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/p&gt;</video:description>
            <video:publication_date>2020-09-23T17:11:17+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3744</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/panel-how-to-solve-the-hybrid-cloud</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64477064</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445190/64477064/a2bdc0764be04af46bfd775faa7abde5/video_medium/panel-how-to-solve-the-hybrid-cloud-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445190/64477064/a2bdc0764be04af46bfd775faa7abde5/small/panel-how-to-solve-the-hybrid-cloud-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[Panel] How to Solve the Hybrid Cloud Policy Management Challenge</video:title>
            <video:description>&lt;b&gt;Yonatan Klein, Director of Product, Omer Ganot, Product Manager and Yitzy Tannenbaurm, Product Marketing Manager (AlgoSec)&lt;br&gt;&lt;/b&gt;&lt;br&gt;Today, your network is complex, extending beyond the perimeter in multiple locations, made up of multiple public and private clouds, SDNs, as well as on-premises data centers. Security controls are a “black box.” IT and security staff find it difficult to gain visibility, and maintain security in the hybrid cloud.&lt;br&gt;&lt;br&gt;Join a panel discussion with Yonatan Klein and Omer Ganot from AlgoSec’s product management team, along with moderator Yitzy Tannenbaum as they debate the hybrid management cloud challenge.&lt;br&gt;&lt;br&gt;They will discuss how to solve complex challenges securing hybrid networks, including:&lt;br&gt;• Gaining full policy and network visibility for their hybrid, multi-cloud network&lt;br&gt;• Multiple clouds with emphasis on the hybrid network - private and public&lt;br&gt;• Effective communication among multiple business, IT and security stakeholders to save time, reduce risk, and avoid misconfigurations&lt;br&gt;• Managing network security controls in a heterogeneous network environment&lt;br&gt;</video:description>
            <video:publication_date>2020-09-23T14:34:30+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3281</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/webcast-build-and-enforce-defense</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=64277400</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/video_medium/webcast-build-and-enforce-defense-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650861/64277400/c9c6f0f278f999d541c1a492c84e245c/small/webcast-build-and-enforce-defense-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Webcast: Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</video:title>
            <video:description>&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;• Understand your business applications to create your microsegmentation policy&lt;br&gt;• Validate your micro-segmentation policy is accurate&lt;br&gt;• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;</video:description>
            <video:publication_date>2020-09-06T13:43:40+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3657</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-rule-usage-and</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=63911630</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445186/63911630/a78e4cbefc97dc9bbb92646be1c12669/video_medium/algosec-cloud-rule-usage-and-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445186/63911630/a78e4cbefc97dc9bbb92646be1c12669/small/algosec-cloud-rule-usage-and-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec cloud rule usage and cleanup</video:title>
            <video:description>In this video we will demonstrate how &lt;b&gt;&lt;/b&gt;AlgoSec cloud can provide great value with flow logs-based rule usage and cleanup.&lt;br&gt;
With this capability you can easily observe usage tied to risky rules as well as identify unused rules and remove them to reduce risk and avoid bloated policies without compromising business continuity.</video:description>
            <video:publication_date>2020-08-03T11:48:26+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>80</video:duration>
            <video:category>Products</video:category>
            <video:tag>cleanup</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>optimization</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cloud-central-policy</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=63911625</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445026/63911625/171c1e0547c4d0eba7546366ddb1162d/video_medium/algosec-cloud-central-policy-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445026/63911625/171c1e0547c4d0eba7546366ddb1162d/small/algosec-cloud-central-policy-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec cloud central Policy Management</video:title>
            <video:description>In this video we will demonstrate the power of central policy management of cloud security controls.&lt;br&gt;
Save time, identify and prevent human error and risk by managing a single policy set instead of doing the same for multiple similar security controls.</video:description>
            <video:publication_date>2020-08-03T11:47:17+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>135</video:duration>
            <video:category>Products</video:category>
            <video:tag>change management</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>policy management</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/build-and-enforce-defense-in-depth</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=63855367</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/video_medium/build-and-enforce-defense-in-depth-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445190/63855367/95152215d0dafd06be978cd6f5cb488d/small/build-and-enforce-defense-in-depth-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar</video:title>
            <video:description>&lt;b&gt;Jothi Prakash Prabakaran, Senior Product Manager (Cisco), Yoni Geva, Product Manager (AlgoSec) | July 2020&lt;/b&gt;
&lt;p&gt;Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical webinar, Jothi Prakash Prabakaran, Senior Product Manager at Cisco, and Yoni Geva, Product Manager at AlgoSec, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of Cisco Tetration and network security policy management capabilities of AlgoSec.&lt;/p&gt;
&lt;p&gt;They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.&lt;/p&gt;
&lt;p&gt;Watch this webinar to learn how to:&lt;br&gt;
• Understand your business applications to create your microsegmentation policy&lt;br&gt;
• Validate your micro-segmentation policy is accurate&lt;br&gt;
• Enforce these granular policies on workloads and summarized policies across your infrastructure&lt;br&gt;
• Use risk and vulnerability analysis to tighten your workload and network security&lt;br&gt;
• Identify and manage security risk and compliance in your micro-segmented environment&lt;/p&gt;</video:description>
            <video:publication_date>2020-07-27T16:58:39+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3657</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>Data Center</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/micro-segmentation-from-strategy</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=63662374</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445025/63662374/cfb4ba081a83e678c0c8516bef2ce6da/video_medium/micro-segmentation-from-strategy-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445025/63662374/cfb4ba081a83e678c0c8516bef2ce6da/small/micro-segmentation-from-strategy-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Micro-segmentation – from Strategy to Execution</video:title>
            <video:description>Avishai Wool, CTO &amp;amp; Co-founder (AlgoSec) | June 2020&lt;br&gt;
&lt;p&gt;Organizations heavily invest in security solutions to keep their networks safe, but still struggle to close the security gaps. Micro-segmentation helps protect against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren’t sure where to begin or what approach to take.&lt;/p&gt;
&lt;p&gt;In this practical webinar, Prof. Avishai Wool, AlgoSec’s CTO and co-founder will guide you through each stage of a micro-segmentation project – from developing the correct micro-segmentation strategy to effectively implementing it and continually maintaining your micro-segmented network.&lt;/p&gt;
&lt;p&gt;Register now for this live webinar and get a practical blueprint to creating your micro-segmentation policy:&lt;/p&gt;
&lt;p&gt;• What is micro-segmentation.&lt;br&gt;
• Common pitfalls in micro-segmentation projects and how to avoid them.&lt;br&gt;
• The stages of a successful micro-segmentation project.&lt;br&gt;
• The role of policy change management and automation in micro-segmentation.&lt;/p&gt;
&lt;p&gt;Don't forget to also click on the links in the Attachments tab.&lt;/p&gt;</video:description>
            <video:publication_date>2020-07-08T22:37:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3591</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>network security</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/policy-portability-with-algosec</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=63639881</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445188/63639881/83420651de6c2dcd33dcc19080a18b2d/video_medium/policy-portability-with-algosec-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445188/63639881/83420651de6c2dcd33dcc19080a18b2d/small/policy-portability-with-algosec-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Policy Portability with AlgoSec – Enabling Migration Into CISCO ACI</video:title>
            <video:description>Policy Portability with AlgoSec – Enabling Migration Into CISCO ACI&lt;br /&gt;
&lt;a href="https://www.algosec.com/"&gt;https://www.algosec.com/&lt;/a&gt;</video:description>
            <video:publication_date>2020-07-07T11:35:45+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>200</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>Firewall Migration</video:tag>
            <video:tag>Firewalls</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/application-segmentation-with-cisco</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=63637257</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/video_medium/application-segmentation-with-cisco-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650861/63637257/7416aee44192b09118730b3bc4cbe9b2/small/application-segmentation-with-cisco-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Application Segmentation with Cisco Tetration &amp; AlgoSec</video:title>
            <video:description>Application Segmentation with Cisco Tetration &amp;amp; AlgoSec</video:description>
            <video:publication_date>2020-07-07T09:39:28+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>300</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>Cisco</video:tag>
            <video:tag>Firewall Migration</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Network Segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/5-practical-steps-to-implementing-a</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=63522855</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445186/63522855/17e31c960ede87ba9ea9027001658292/video_medium/5-practical-steps-to-implementing-a-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445186/63522855/17e31c960ede87ba9ea9027001658292/small/5-practical-steps-to-implementing-a-thumbnail.jpg</video:thumbnail_loc>
            <video:title>5 practical Steps to Implementing a Zero-Trust Network</video:title>
            <video:description>Chase Cunningham, Principal Analyst (Forrester Research), Prof. Avishai Wool, Co-founder &amp;amp; CTO (AlgoSec) | June 30, 2020
&lt;p&gt;A zero-trust architecture mitigates risk by only providing the minimally required access to your network resources. But implementing zero-trust is easier said than done.&lt;/p&gt;
&lt;p&gt;Get practical tips to successfully implement zero-trust architecture in this webinar featuring Chase Cunningham of Forrester Research and Prof. Avishai Wool, AlgoSec’s co-founder and CTO.&lt;/p&gt;
&lt;p&gt;In this session, they will discuss why zero-trust architecture is the blueprint for an effective security strategy, challenges implementing zero-trust architecture, as well as provide the five practical steps to successfully implementing zero-trust architecture:&lt;/p&gt;
&lt;p&gt;• Taking an inventory of your sensitive data and deciding how to segment it&lt;br&gt;
• Mapping the traffic flows of your sensitive data and associate them to your business applications&lt;br&gt;
• Designing and enforcing your network’s micro-perimeters&lt;br&gt;
• Ensuring all your security ecosystem integrates so you can holistically monitor and adjust your network if threats are detected&lt;br&gt;
• Embracing security automation and orchestration for long-term success&lt;/p&gt;</video:description>
            <video:publication_date>2020-07-01T15:56:09+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3361</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Analyst</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Zero Trust</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-first-step-towards-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=63482263</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650861/63482263/2f3799da46c54141311ae5eab8144ee2/video_medium/the-first-step-towards-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650861/63482263/2f3799da46c54141311ae5eab8144ee2/small/the-first-step-towards-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The First Step Towards Micro-segmentation: Application Visibility</video:title>
            <video:description>&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect, AlgoSec | June 2020&lt;/b&gt;&lt;br&gt;&lt;br&gt;
As cyber threats become more sophisticated, companies struggle to stay secure. To prevent serious breaches, your network must be internally segmented to stop unauthorized users from moving freely inside the network and exfiltrate data. Network segmentation must be designed and managed properly.&lt;br&gt;&lt;br&gt;
Identifying the business applications on your network is a critical early step to develop and implement your micro-segmentation strategy.&lt;br&gt;&lt;br&gt;
In this webinar, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, will get you started on your micro-segmentation journey. &lt;br&gt;&lt;br&gt;Explore:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Why application mapping is a crucial step in your path to micro-segmentation&lt;/li&gt;&lt;li&gt;Ways to discover and map your network’s business applications using industry's leading solutions&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;How to identify how your micro-segmentation program impacts your business applications&lt;/li&gt;&lt;li&gt;Tips to understand the business impact of your planned segmentation project on your organization&lt;/li&gt;&lt;li&gt;How to succeed with your micro-segmentation project&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2020-06-28T13:22:42+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1664</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>application discovery</video:tag>
            <video:tag>application visibility</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/achieving-intent-based-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=63415237</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/video_medium/achieving-intent-based-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650860/63415237/d40d0b761aa9153a987b2dffb6cc5060/small/achieving-intent-based-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>"Achieving intent-based network security across your hybrid network" with Avishai Wool, CTO, Algosec at Check Point Cyber Security Summit 2020</video:title>
            <video:description>Avishai Wool, AlgoSec CTO and co-founder, discusses how to achieve intent-based network security across your hybrid network at Check Point Cyber Security Summit 2020.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Learn about:
&lt;p&gt;How to reduce the attack surface of your network&lt;/p&gt;
&lt;p&gt;The benefits of lateral segmentation&lt;/p&gt;
&lt;p&gt;How to manage micro-segmented networks&lt;/p&gt;</video:description>
            <video:publication_date>2020-06-23T14:53:12+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1824</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Cyber Attacks &amp; Incident Response</video:tag>
            <video:tag>events</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Network Segmentation</video:tag>
            <video:tag>Privacy and Security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Risk Management and Vulnerabilities</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/policy-optimization-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=63393273</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/video_medium/policy-optimization-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650860/63393273/4585141ecbda5b81d608818932b27fba/small/policy-optimization-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Policy Optimization</video:title>
            <video:description>Learn how to clean up and optimize your firewall policies with the AlgoSec solution</video:description>
            <video:publication_date>2020-06-22T10:52:12+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>148</video:duration>
            <video:category>Products</video:category>
            <video:tag>Firewall Management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cut-the-clutter-with-chatops</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=62872524</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445027/62872524/482d775b27b0982d1e39175dd69cdb56/video_medium/cut-the-clutter-with-chatops-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445027/62872524/482d775b27b0982d1e39175dd69cdb56/small/cut-the-clutter-with-chatops-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cut the Clutter with ChatOps &amp; Improve Network Security</video:title>
            <video:description>&lt;p&gt;&lt;b&gt;Dania Ben Peretz, Product Manager&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;ul&gt;&lt;/ul&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;IT teams’ alerts are overflowing with questions about network status from coworkers. Say no to overwhelming alerts in multiple applications. There is a better way to get critical answers about the state of your network: ChatOps.&lt;br&gt;&lt;br&gt;ChatOps, using your existing chat tools such as Slack or Microsoft Teams, can get the crucial questions answered, and not have to track multiple apps separately.&lt;br&gt;&lt;br&gt;In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, demonstrates the latest in AlgoBot and show how to:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get immediate answers to pressing network traffic questions&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Get immediate answers about whether your business applications are secure&lt;/li&gt;&lt;li&gt;Decrease the time it takes to resolve critical security incidents&lt;/li&gt;&lt;li&gt;Empower your business and application teams to drive innovation&lt;/li&gt;&lt;li&gt;Ensure that your network and security teams are focusing on the most critical issues&lt;/li&gt;&lt;li&gt;Efficiently manage security by transparently collaborating with IT, Security, Network and DevOps teams&lt;/li&gt;&lt;/ul&gt;All while saving time, reducing resources, and cutting the clutter.&lt;br&gt;</video:description>
            <video:publication_date>2020-05-13T18:48:42+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1548</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>AlgoBot</video:tag>
            <video:tag>Chatbot</video:tag>
            <video:tag>Devops</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Security Automation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/rule-recertification</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=62300594</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650861/62300594/43b974bbc9790e02f625457a1647eef7/video_medium/rule-recertification-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650861/62300594/43b974bbc9790e02f625457a1647eef7/small/rule-recertification-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Rule Recertification</video:title>
            <video:description>In this video you’ll learn how AlgoSec enables to efficiently and effectively manage the firewall rule recertification process through an application-centric approach. Following this approach, organizations must first identify all relevant business applications each rule supports, enabling you to review the firewall rules quickly and easily. If an application still exists and has not been modified, its rules still apply and can be recertified. If, however, the application no longer exists, the firewall rules should be removed.</video:description>
            <video:publication_date>2020-04-20T01:07:16+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>384</video:duration>
            <video:category>Products</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>appviz</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>rule recertification</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-appviz-rule</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=62300494</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445028/62300494/53fd81792673d8c37f76c8b11c541c72/video_medium/algosec-appviz-rule-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445028/62300494/53fd81792673d8c37f76c8b11c541c72/small/algosec-appviz-rule-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec AppViz – Rule Recertification</video:title>
            <video:description>In this video you’ll learn how AlgoSec enables to efficiently and effectively manage the firewall rule recertification process through an application-centric approach. Following this approach, organizations must first identify all relevant business applications each rule supports, enabling you to review the firewall rules quickly and easily. If an application still exists and has not been modified, its rules still apply and can be recertified. If, however, the application no longer exists, the firewall rules should be removed.</video:description>
            <video:publication_date>2020-04-20T01:00:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>212</video:duration>
            <video:category>Products</video:category>
            <video:tag>appviz</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>rule recertification</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-application-discovery-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=62300406</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445028/62300406/eaae98be6a2402fba307019027e312b3/video_medium/algosec-application-discovery-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445028/62300406/eaae98be6a2402fba307019027e312b3/small/algosec-application-discovery-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Application Discovery - Creating the application documentation repository</video:title>
            <video:description>In this short video learn how to leverage AlgoSec Application&amp;nbsp;Discovery to discover, provision, change and securely decommission connectivity for business applications. &lt;br&gt;&lt;br&gt;AlgoSec Application&amp;nbsp;Discovery discovers and maps application connectivity requirements to the network infrastructure, and then translates requests for connectivity changes into networking terms that security and operations teams can understand, approve, and implement.</video:description>
            <video:publication_date>2020-04-20T00:53:42+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>187</video:duration>
            <video:category>Products</video:category>
            <video:tag>application discovery</video:tag>
            <video:tag>application visibility</video:tag>
            <video:tag>appviz</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/gain-control-of-your-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=62192775</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/video_medium/gain-control-of-your-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445168/62192775/2c40c999839ca34d57f5f7e7edfcdbb7/small/gain-control-of-your-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Gain control of your network security with complete visibility: An AlgoSec live technical demo webcast</video:title>
            <video:description>In this technical demo of the AlgoSec Security Management Solution, we will show you how network security visibility is an important part of your security arsenal.
&lt;p&gt;Join the session and discover how to:&lt;br&gt;
   •	Gain visibility of your multi-vendor devices and traffic flows throughout your entire network – on-premises and in the cloud.&lt;br&gt;
   •	Ensure continuous compliance and reduce the effort needed to prepare for audits with out-of-the-box regulatory compliance reports.&lt;br&gt;
   •	Visualize and map firewall rulesets.&lt;br&gt;
   •	Identify and mitigate risky rules and provide intelligent recommendations to remediate the risks.&lt;/p&gt;
&lt;p&gt;Gain control of your network security policies with complete visibility.&lt;/p&gt;</video:description>
            <video:publication_date>2020-04-15T17:29:59+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1993</video:duration>
            <video:category>Demos</video:category>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>Live Demo Webcast</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/turning-network-security-alerts</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=61958404</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445190/61958404/d314d1bb565386429046d9e11817a60e/video_medium/turning-network-security-alerts-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445190/61958404/d314d1bb565386429046d9e11817a60e/small/turning-network-security-alerts-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Turning Network Security Alerts into Action: Change Automation to the Rescue</video:title>
            <video:description>&lt;div&gt;&lt;b&gt;Presented by: Dania Ben-Peretz, Product Manager&lt;/b&gt;&lt;/div&gt;&lt;p&gt;You use multiple network security controls in your organization, but they don’t talk to each other. And while you may get alerts that come with tools such as SIEM solutions and vulnerability scanners – in your security landscape, making the necessary changes to proactively react to the myriad of alerts is difficult. Responding to alerts feels like a game of whack-a-mole. Manual changes are also error-prone, resulting in misconfigurations. It’s clear that manual processes are insufficient for your multi-device, multi-vendor, and heterogeneous environment network landscape.&lt;/p&gt;&lt;p&gt;What’s the solution? Network security change automation!&lt;/p&gt;&lt;p&gt;By implementing change automation for your network security policies across your enterprise security landscape you can continue to use your existing business processes while enhancing business agility, accelerate incident response times, and reduce the risk of compliance violations and security misconfigurations.&lt;/p&gt;&lt;p&gt;In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, shows you how to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Automate your network security policy changes without breaking core network connectivity&lt;/li&gt;&lt;li&gt;Analyze and recommend changes to your network security policies&lt;/li&gt;&lt;li&gt;Push network security policy changes with zero-touch automation to your multi-vendor security devices&lt;/li&gt;&lt;li&gt;Maximize the ROI of your existing security controls by automatically analyzing, validating, and implementing network security policy changes – all while seamlessly integrating with your existing business processes&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2020-04-06T12:36:23+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1694</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>change automation</video:tag>
            <video:tag>Change Management</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/optimize-your-juniper-investment</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=61650270</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/video_medium/optimize-your-juniper-investment-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445190/61650270/d6c3dac069cd3e89e381907d0133d8cb/small/optimize-your-juniper-investment-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Optimize your Juniper Investment with Intelligent Network Security Automation</video:title>
            <video:description>Max Shirshov, EMEA Solutions Architect (AlgoSec) | March 24, 2020&lt;br /&gt;
Are you maximizing all the capabilities that your Juniper solutions offer? Expand its potential and maximize your ROI. Discover how to secure your homogeneous and multi-vendor network with intelligent automation.&lt;/p&gt;
&lt;p&gt;In this webinar, Max Shirshov, EMEA Solutions Architect at AlgoSec, will demonstrate how to assess risk and audit the firewall estate for regulatory compliance, address security breaches caused by misconfigured network devices, and provide fast and efficient change management utilizing the AlgoSec Security Management solution for your Juniper devices.&lt;/p&gt;
&lt;p&gt;Join the webinar to learn how to:&lt;/p&gt;
&lt;p&gt;Gain complete visibility into your Juniper-estate as well as multi-vendor and hybrid networks&lt;br /&gt;
Intelligently push security policy changes to your Netscreen and SRX firewalls, MX routers and Juniper Space, as well as other vendors’ security devices, SDN and public clouds&lt;br /&gt;
Automate application and user aware security policy management and ensure your Juniper devices are properly configured&lt;br /&gt;
Assess risk and ensure regulatory compliance across your entire enterprise environment</video:description>
            <video:publication_date>2020-03-25T19:30:22+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1889</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>juniper</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>Network Security Automation</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/reece-group-empowers-business-and</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=61427218</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/video_medium/reece-group-empowers-business-and-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650860/61427218/2122be8cdfeb52fd29c13de0f710bb86/small/reece-group-empowers-business-and-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Reece Group empowers business and IT teams with ChatOps – Case Study</video:title>
            <video:description>&lt;p&gt;&lt;span&gt;Reece Group, the leading Australian plumbing and HVAC company,
was able to empower their application developers, get faster response time,
reduce risks and increase compliance and more. Watch the video case study to
find out more or read the
full case study &lt;a href="https://www.algosec.com/customer-success-stories/reece-group/"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;h1&gt;&lt;br&gt;&lt;/h1&gt;</video:description>
            <video:publication_date>2020-03-17T07:47:19+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>276</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>case study</video:tag>
            <video:tag>chatops</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>Interview</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>success story</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/robert-blank-von-algosec-auf-der</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=61410177</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650858/61410177/51a01c5d725fd4eb72bdabd81b6de876/video_medium/robert-blank-von-algosec-auf-der-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650858/61410177/51a01c5d725fd4eb72bdabd81b6de876/small/robert-blank-von-algosec-auf-der-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Robert Blank von AlgoSec auf der ITSA 2019</video:title>
            <video:description>Robert Blank (Regional Sales Manager DACH von AlgoSec) spricht auf der ITSA 2019 in Nürnberg. Erfahren Sie mehr darüber, wie die Security Policy Change-Automatierung von AlgoSec funktioniert, wie Cisco-Security komplettiert wird, und bekommen Sie hier das neueste Update zur Partnerschaft zwischen AlgoSec mit Cisco.</video:description>
            <video:publication_date>2020-03-16T14:52:33+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>117</video:duration>
            <video:category>Channel  Testimonials</video:category>
            <video:tag>network security</video:tag>
            <video:tag>Netzwerk Sicherheitsrichtlinien</video:tag>
            <video:tag>Netzwerk-Sicherheit visibility</video:tag>
            <video:tag>policy management</video:tag>
            <video:tag>Regelwerk-Management</video:tag>
            <video:tag>security policy</video:tag>
            <video:tag>Sichtbarkeit</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/5-ways-to-enrich-your-cisco</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=61384023</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445186/61384023/0035927524dc8ce97134dcdb68abf96e/video_medium/5-ways-to-enrich-your-cisco-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445186/61384023/0035927524dc8ce97134dcdb68abf96e/small/5-ways-to-enrich-your-cisco-thumbnail.jpg</video:thumbnail_loc>
            <video:title>5 ways to enrich your Cisco security posture with AlgoSec</video:title>
            <video:description>&lt;span&gt;Discover the benefits of integrating AlgoSec with
your entire &lt;b&gt;Cisco&lt;/b&gt; fabric, multi-cloud and multi-vendor network environments.&lt;/span&gt;</video:description>
            <video:publication_date>2020-03-15T11:58:57+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>75</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>Cisco SDN</video:tag>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>multicloud</video:tag>
            <video:tag>multivendor</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Network Security Management</video:tag>
            <video:tag>Policy Management</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/network-security-vision-with</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=61248183</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/video_medium/network-security-vision-with-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650861/61248183/1337080fb3e4740271e01d66cc24acb6/small/network-security-vision-with-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Network Security Vision with Application Visibility | Live discussion and demo</video:title>
            <video:description>Avishai Wool, CTO &amp; Co-founder (AlgoSec) &amp; Yoni Geva, Product Manager (AlgoSec) | March 5, 2020&lt;/p&gt;
&lt;p&gt;You’re always making changes to your network, commissioning and decommissioning servers, moving data to and from the cloud, revising application connectivity settings and policies, and/or adding and removing business applications.&lt;/p&gt;
&lt;p&gt;But how do you make sure that you are not running blind and making network configuration mistakes that may lead to outages? Are you leaving firewall openings for unused applications, making your network vulnerable to insider threats or outside attackers?&lt;/p&gt;
&lt;p&gt;Stop running blind. Expand your vision with application visibility.&lt;/p&gt;
&lt;p&gt;With application visibility, you associate your traffic flows to the related business applications, enhance network visibility, improve troubleshooting, gain enhanced compliance reports, and even save time while improving security on your network.&lt;/p&gt;
&lt;p&gt;In this webinar, Avishai Wool, AlgoSec’s co-founder and CTO, and Yoni Geva, AlgoSec’s Product Manager, will demonstrate – in a live demo - how to overcome these challenges and ensure business continuity through application visibility.&lt;/p&gt;
&lt;p&gt;Join the webinar and learn how to:&lt;br /&gt;
• Associate your business applications with your security policy rules.&lt;br /&gt;
• Identify the network traffic relevant for each application.&lt;br /&gt;
• Identify hidden risks and vulnerabilities in your applications.&lt;br /&gt;
• Associate compliance violations with the relevant business applications.&lt;br /&gt;
• Improve troubleshooting by identifying affected applications.&lt;br /&gt;
• Better document the applications on your network.</video:description>
            <video:publication_date>2020-03-09T15:51:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2991</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>application visibility</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/5-dinge-von-denen-sie-sicherlich</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=61166183</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/video_medium/5-dinge-von-denen-sie-sicherlich-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650861/61166183/242de32ae12a997510189ac9d08bc971/small/5-dinge-von-denen-sie-sicherlich-thumbnail.jpg</video:thumbnail_loc>
            <video:title>5 Dinge, von denen Sie sicherlich nicht gewusst haben, die Sie mit einer Security Policy Management Lösung machen können</video:title>
            <video:description>Dietmar Wyhs, Regional Sales Manager DACH |  Oct 9 2017&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Die heutigen Unternehmen entwickeln sich kontinuierlich weiter, um neue Anwendungen, Transformationsinitiativen wie Cloud und SDN zu unterstützen und täglich neue und anspruchsvollere Cyber-Attacken abzuwehren. Aber die Sicherheits- und Netzwerk-Mitarbeiter haben Schwierigkeiten mitzuhalten. Dies wirkt sich nicht nur auf die Business-Agilität aus, sondern setzt Ihr Unternehmen Risiken aus und behindert dessen Fähigkeit, sich der modernen Bedrohungslandschaft zu stellen.&lt;/p&gt;
&lt;p&gt;Viele Fachleute sind der Meinung, dass sie die neuesten Anwendungen brauchen, um diese Herausforderungen zu bewältigen. Aber was, wenn Sie bereits haben, was Sie brauchen und diese Anwendung in Ihrem Unternehmen genutzt wird: Ihre Security Policy Management Lösung?&lt;/p&gt;
&lt;p&gt;Die heutigen Sicherheitsrichtlinien-Management-Lösungen machen weit mehr als die Automatisierung von traditionellen Änderungsmanagement Aufgaben. In diesem technischen Webinar zeigt Ihnen Dietmar Wyhs fünf wichtige Sicherheitsmanagement-Herausforderungen, denen Unternehmensorganisationen sich heutzutage stellen. Gleichzeitig erklärt er, wie die Lösung von AlgoSec Ihnen helfen kann, Sicherheitsbedrohungen zu bewältigen, Risiken zu verringern, und schnell auf Ausfällen zu reagieren, bei gleichzeitiger Maximierung der Geschäftsagibilität und Sicherstellung der Compliance in den unterschiedlichen, sich ständig verändernden Hybridnetzwerken.&lt;/p&gt;
&lt;p&gt;Dieses technische Webinar konzentriert sich auf:&lt;/p&gt;
&lt;p&gt;•Verwalten von Sicherheitsrichtlinien von End-to-End-Lösungen öffentlicher und privater Clouds einschließlich Microsoft Azure, Amazon Web Services AWS, Cisco ACI und VMWare NSX&lt;br&gt;
•Zuordnung von Sicherheitslücken zu Anwendungen, zur Bewertung und Priorisierung des Risikos&lt;br&gt;
•Möglichkeit Cyber-Attacken mit Geschäftsprozesse zu korrelieren&lt;br&gt;
•Migration von Firewall-Richtlinien zwischen Firewall-Herstellern&lt;br&gt;
•Durchführung einer vollautomatischen, Zero-Touch-Sicherheitsregelwerksänderung&lt;/p&gt;</video:description>
            <video:publication_date>2020-03-05T14:07:13+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2068</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Firewall Management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/couchtalk-software-defined-networks</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=61138011</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445190/61138011/58389a4b039d6b2d2e436dd09573bd43/video_medium/couchtalk-software-defined-networks-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445190/61138011/58389a4b039d6b2d2e436dd09573bd43/small/couchtalk-software-defined-networks-thumbnail.jpg</video:thumbnail_loc>
            <video:title>CouchTalk: Software Defined Networks (SDN) – Migration, Security and Management</video:title>
            <video:description>Kyle Wickert, Worldwide Solution Architect, and Yitzy Tannenbaum, Product Marketing Manager, discuss software-defined networks (SDN).&amp;nbsp;&lt;br&gt;&lt;br&gt;As network security moves from a traditional perimeter model to a more granular software-defined model, find out how to simplify network complexity when migrating to SDN.&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;</video:description>
            <video:publication_date>2020-03-04T14:39:03+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>476</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>ACI</video:tag>
            <video:tag>Cisco</video:tag>
            <video:tag>couchtalks</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>Tetration</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/couchtalk-cisco-aci-and-algosec</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=61138007</video:player_loc>
            <video:content_loc>https://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/video_medium/couchtalk-cisco-aci-and-algosec-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60650858/61138007/57a06fc9e928eb2ba7b9e17f95f3aa86/small/couchtalk-cisco-aci-and-algosec-thumbnail.jpg</video:thumbnail_loc>
            <video:title>CouchTalk: Cisco ACI and AlgoSec – Visibility and Automation</video:title>
            <video:description>Kyle Wickert, Worldwide Solution Architect, and Yitzy Tannenbaum, Product Marketing Manager, discuss security policy change management throughout your Cisco and hybrid environment.&amp;nbsp;&lt;br&gt;&lt;br&gt;AlgoSec provides visibility and automation into Cisco ACI, enables intent-based networking with Cisco Tetration, and manages and automates Cisco firewalls</video:description>
            <video:publication_date>2020-03-04T14:38:55+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>456</video:duration>
            <video:category>Thought Leadership</video:category>
            <video:tag>couchtalks</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>security policy</video:tag>
            <video:tag>software defined networking</video:tag>
            <video:tag>VMware NSX</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/creatingascheduledanalysismp4-gif</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=61099657</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445027/61099657/6bacbdecbf38449946b127a03253732e/video_medium/creatingascheduledanalysismp4-gif-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445027/61099657/6bacbdecbf38449946b127a03253732e/small/creatingascheduledanalysismp4-gif-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Creating_a_scheduled_analysis.mp4 GIF</video:title>
            <video:description>GIF Training video fro social</video:description>
            <video:publication_date>2020-03-03T11:14:21+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>7</video:duration>
            <video:category>Promo Videos</video:category>
            <video:tag>techniacl tutorials</video:tag>
            <video:tag>training</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cessation-of-misconfigurations-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=60676810</video:player_loc>
            <video:content_loc>https://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/video_medium/cessation-of-misconfigurations-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/60445026/60676810/b0ba8b0b18dbf77de55c855b87c4177d/small/cessation-of-misconfigurations-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cessation of Misconfigurations: Common Network Misconfiguration Risks &amp; How to Avoid Them</video:title>
            <video:description>&lt;p&gt;Misconfigurations aren’t simply inconvenient mistakes but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s list of Top 10 most critical web application security risks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your audits, and cause costly outages that bring your business to a standstill.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Avivi Siman-Tov, AlgoSec’s Director of Product, will show examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Watch the webinar to learn how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Understand and map your entire network before you make a change&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole and understand the impact of changes to your entire network&amp;nbsp;&lt;/li&gt;&lt;li&gt;Maximize the capabilities of network management automation to avoid common misconfigurations&amp;nbsp;&lt;/li&gt;&lt;li&gt;Avoid common mistakes when making changes to your network security devices&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2020-02-18T17:32:41+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1940</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-aci-algosec-achieving-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=60236501</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543316/60236501/7172c25b4f49d0dee344198731ce81d4/video_medium/cisco-aci-algosec-achieving-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543316/60236501/7172c25b4f49d0dee344198731ce81d4/small/cisco-aci-algosec-achieving-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco ACI &amp; AlgoSec: Achieving application-driven security across your hybrid network</video:title>
            <video:description>&lt;p&gt;As your network extends into hybrid and multi-cloud environments, including software-defined networks such as Cisco ACI, managing security policies within your hybrid estate becomes more and more complex.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Because each part of your network estate is managed in its own silo, it’s tough to get a full view of your entire network. Making changes across your entire network is a chore and validating your entire network’s security is virtually impossible.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate, and automate your entire network security policy management including both within the Cisco ACI fabric and elements outside the fabric.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this session Omer Ganot, AlgoSec’s Product Manager, will discuss how to:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Unify, consolidate, and automate your network security policy management, including elements within and outside of the Cisco ACI fabric.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2020-02-05T13:04:42+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3811</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>network security</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/achieving-visibility-and-security-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=59793974</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543330/59793974/fb58b308520346124ba9d7a22296a816/video_medium/achieving-visibility-and-security-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543330/59793974/fb58b308520346124ba9d7a22296a816/small/achieving-visibility-and-security-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Achieving Visibility and Security in AWS and across the Hybrid Network | AWS &amp; AlgoSec Joint Webinar</video:title>
            <video:description>&lt;p&gt;As enterprises rapidly migrate data and applications to public clouds such as Amazon Web Services (AWS), they achieve many benefits, including advanced security capabilities, but also face new security challenges.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;AWS lets organizations operate applications in a hybrid deployment mode by providing multiple networking capabilities. To maintain an effective security posture while deploying applications across complex hybrid network environments, security professionals need a holistic view and control from a single source.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Yet, security isn’t just the responsibility of the cloud providers alone. Organizations need to understand the shared responsibility model and their role in maintaining a secure deployment. While AWS’s cloud framework is secured by AWS, the challenge of using the cloud securely is the responsibility of your organization’s IT and CISOs. As multiple DevOps and IT personnel make frequent configuration changes, the shared responsibility model helps achieve visibility and maintain cloud security.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, AlgoSec’s Director of Product, and Ram Dileepan, Amazon Web Service’s Partner Solutions Architect, will share best practices for network security governance in AWS and hybrid network environments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</video:description>
            <video:publication_date>2020-01-22T17:50:19+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2983</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>Devops</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>SDN</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/sko-2020</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=59788891</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543327/59788891/49176c3921ba35ae9f8486c0eb96a4ad/video_medium/sko-2020-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543327/59788891/49176c3921ba35ae9f8486c0eb96a4ad/small/sko-2020-thumbnail.jpg</video:thumbnail_loc>
            <video:title>SKO 2020</video:title>
            <video:description>AlgoBand performs at the AlgoSec SKO annual company celebration&lt;br&gt;Band Members include&amp;nbsp;Yuval Baron, Shay Weiss, Eli Shay, Tali Waisel, Matan Moyal and Eli Cohen !!!</video:description>
            <video:publication_date>2020-01-22T13:54:17+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>515</video:duration>
            <video:category>Company </video:category>
            <video:tag>algosec</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/interview-anna-salgueiro-ingecom</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=59063540</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543326/59063540/b9752e20c71b13426c896e385afaec3e/video_medium/interview-anna-salgueiro-ingecom-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543326/59063540/b9752e20c71b13426c896e385afaec3e/small/interview-anna-salgueiro-ingecom-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Interview Anna Salgueiro Ingecom and AlgoSec</video:title>
            <video:description>“AlgoSec fits perfectly in our portfolio, adding value to drive digital transformation of our customers”.</video:description>
            <video:publication_date>2019-12-29T14:04:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>339</video:duration>
            <video:category>Channel  Testimonials</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/interview-tamas-ingram-and-algosec</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=59063440</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543312/59063440/0cf5329d5648652f25af77bae364d393/video_medium/interview-tamas-ingram-and-algosec-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543312/59063440/0cf5329d5648652f25af77bae364d393/small/interview-tamas-ingram-and-algosec-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Interview Tamas Ingram and AlgoSec</video:title>
            <video:description>AlgoSec is a very good choice if you have different vendors in your network and need to manage the policies of their network rules, so you can handle it very easily</video:description>
            <video:publication_date>2019-12-29T13:59:55+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>162</video:duration>
            <video:category>Channel  Testimonials</video:category>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/philip-huisgen-interview-algosec</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=59063402</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543316/59063402/8ddf5e9b24655d4c863b1f7eb09c3e60/video_medium/philip-huisgen-interview-algosec-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543316/59063402/8ddf5e9b24655d4c863b1f7eb09c3e60/small/philip-huisgen-interview-algosec-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Philip Huisgen Interview AlgoSec &amp; Datakom</video:title>
            <video:description>“We see a very strong partnership with AlgoSec and a very open communication”</video:description>
            <video:publication_date>2019-12-29T13:57:50+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>301</video:duration>
            <video:category>Channel  Testimonials</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/5-ways-algosec-enhances-your-f5</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=58920293</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543316/58920293/0d8ffa607b30b177ef077eed481124ec/video_medium/5-ways-algosec-enhances-your-f5-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543316/58920293/0d8ffa607b30b177ef077eed481124ec/small/5-ways-algosec-enhances-your-f5-thumbnail.jpg</video:thumbnail_loc>
            <video:title>5 ways AlgoSec enhances your F5 Security Posture Management</video:title>
            <video:description>Discover the benefits of integrating AlgoSec with your entire security infrastructure including F5 Advanced Firewall Manager (AFM) &amp;amp; Local Traffic Manager (LTM).</video:description>
            <video:publication_date>2019-12-24T10:38:49+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>77</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>f5 networks</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>Network Security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/6-ways-algosec-enhances-your-check</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=58046064</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543317/58046064/ad70250c35093058ae74f23fd6cf479e/video_medium/6-ways-algosec-enhances-your-check-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543317/58046064/ad70250c35093058ae74f23fd6cf479e/small/6-ways-algosec-enhances-your-check-thumbnail.jpg</video:thumbnail_loc>
            <video:title>6 Ways AlgoSec Enhances Your Check Point Security Posture Management</video:title>
            <video:description>Discover the benefits of integrating AlgoSec with Check Point CloudGuard and security devices.</video:description>
            <video:publication_date>2019-11-26T17:43:21+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>73</video:duration>
            <video:category>Ecosystem</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/testimonial-from-eguardian-sri</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=57777428</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543328/57777428/b3706833d23add81cffbfb5649feacf9/video_medium/testimonial-from-eguardian-sri-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543328/57777428/b3706833d23add81cffbfb5649feacf9/small/testimonial-from-eguardian-sri-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Testimonial from Eguardian, Sri Lanka</video:title>
            <video:description>&lt;b&gt;Suresh De Silva&amp;nbsp;&lt;/b&gt;is the CEO&amp;nbsp;&lt;br&gt;A value-added distributor in Bnagladesh, Sri Lanka and the Maldives&lt;br&gt;</video:description>
            <video:publication_date>2019-11-18T15:39:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>224</video:duration>
            <video:category>Channel  Testimonials</video:category>
            <video:tag>partners</video:tag>
            <video:tag>testimonial</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/testimonial-from-exclusive-networks</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=57777260</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543330/57777260/849545919653b55fab008d36394e450d/video_medium/testimonial-from-exclusive-networks-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543330/57777260/849545919653b55fab008d36394e450d/small/testimonial-from-exclusive-networks-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Testimonial from Exclusive-Networks, India</video:title>
            <video:description>&lt;b&gt;Ashwin Kulasekhar&amp;nbsp;&lt;/b&gt;is a&amp;nbsp;Sales Director&lt;br&gt;An Indian global value-added distributor for networking, cybersecurity,&amp;nbsp;data center and cloud transformation solutions&amp;nbsp;</video:description>
            <video:publication_date>2019-11-18T15:33:21+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>282</video:duration>
            <video:category>Channel  Testimonials</video:category>
            <video:tag>Partners</video:tag>
            <video:tag>testimonial</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/testimonial-from-iisi-taiwan</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=57777133</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543324/57777133/6d5c23a82c5d7d1a538f74758ca3f035/video_medium/testimonial-from-iisi-taiwan-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543324/57777133/6d5c23a82c5d7d1a538f74758ca3f035/small/testimonial-from-iisi-taiwan-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Testimonial from IISI, Taiwan</video:title>
            <video:description>&lt;b&gt;Abraham Wu&lt;/b&gt; is VP, Information Security Service&lt;br&gt;A Taiwan System Integrator</video:description>
            <video:publication_date>2019-11-18T15:27:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>283</video:duration>
            <video:category>Channel  Testimonials</video:category>
            <video:tag>partners</video:tag>
            <video:tag>testimonial</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/stop-putting-out-fires-pass-network-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=57181222</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543327/57181222/bcc926c39ddfdc95bb0c18d5c31b98b5/video_medium/stop-putting-out-fires-pass-network-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543327/57181222/bcc926c39ddfdc95bb0c18d5c31b98b5/small/stop-putting-out-fires-pass-network-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Stop putting out fires. Pass network security audits – every time</video:title>
            <video:description>&lt;p&gt;Compliance with network and data security regulations and internal standards is vital and mission-critical. But with increasing global regulations and network complexities, it’s harder than ever to keep up.  &lt;br&gt;&lt;br&gt;Firewall management and network security policies are critical components in achieving compliance. Firewall audits are complex and demanding and documentation of current rules is lacking. There’s no time and resources to find, organize, and inspect all your firewall rules. Instead of being proactive and preventative, network security teams are constantly putting out fires.&lt;br&gt;&lt;br&gt;In this webinar, you will learn:&lt;br&gt;&lt;br&gt;   • The golden rules for passing a network security audit&lt;br&gt;   • Best practices to maintain continuous compliance&lt;br&gt;   • How to conduct a risk assessment and fix issues&lt;br&gt;&lt;br&gt;Learn how to prevent fires and pass network security audits every time.&lt;br&gt;&lt;br&gt;Tal Dayan, AlgoSec’s product manager, will reveal the Firewall Audit Checklist, the six best practices to ensure successful audits.&lt;br&gt;&lt;br&gt;By adopting these best practices, security teams will significantly improve their network’s security posture and reduce the pain of ensuring compliance with regulations, industry standards and corporate policies.&lt;/p&gt;</video:description>
            <video:publication_date>2019-10-29T17:37:31+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2224</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>audit and compliance</video:tag>
            <video:tag>Firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/microsegmentation-for-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=56106036</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543331/56106036/fa35fd5df120cc07d820fbc124e0e123/video_medium/microsegmentation-for-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543331/56106036/fa35fd5df120cc07d820fbc124e0e123/small/microsegmentation-for-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Microsegmentation for Network Security – AlgoSec / SANS Webinar</video:title>
            <video:description>&lt;p&gt;Organizations heavily invest in a mix of security solutions to keep their networks safe, but still, struggle to close the security gaps. Micro-segmentation helps protect the organizations' network against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren't sure where to begin or what approach to take.&lt;/p&gt;&lt;p&gt;Dave Shackleford, the owner and principal consultant of Voodoo Security and a SANS analyst hosts Professor Avishai Wool, AlgoSecs CTO and co-founder, in this practical webinar to unveil why organizations are increasingly micro-segmenting for their networks, and guide you through each stage of a micro-segmentation project from development of the correct micro-segmentation strategy to effective implementation and maintenance of a micro-segmented network.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Register now to this live webinar to learn:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What micro-segmentation is&lt;/li&gt;&lt;li&gt;Why and how micro-segmentation can be part of the equation in protecting your network.&lt;/li&gt;&lt;li&gt;Common pitfalls in microsegmentation projects and how to avoid them.&lt;/li&gt;&lt;li&gt;The stages of a successful microsegmentation project.&lt;/li&gt;&lt;li&gt;How to monitor and maintain your micro-segmented network.&lt;/li&gt;&lt;li&gt;The role of policy management, change management, and automation in micro-segmentation.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;h4&gt;Speaker Bios&lt;/h4&gt;&lt;p&gt;Dave Shackleford&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.sans.org/instructors/dave-shackleford"&gt;Dave Shackleford&lt;/a&gt;, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security. Dave currently helps lead the Atlanta chapter of the Cloud Security Alliance.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;hr&gt;&lt;p&gt;Avishai Wool&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Prof. Avishai Wool, AlgoSec’s CTO and co-founder, is a world-renowned researcher and security industry veteran. He is a professor in the School of Electrical Engineering at Tel Aviv University and serves as the deputy-director of the Interdisciplinary Cyber Research Center at TAU. Prof. Wool has published more than 110 research papers and holds 13 US Patents, and has served on the program committee of the leading IEEE and ACM conferences on computer and network security. Prof. Wool has a B.Sc. (Cum Laude) in Mathematics and Computer Science, and a M.Sc. and Ph.D. in Computer Science.&lt;/p&gt;</video:description>
            <video:publication_date>2019-09-26T11:52:28+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3540</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Prof Wool</video:tag>
            <video:tag>SANS</video:tag>
            <video:tag>security policy</video:tag>
            <video:tag>webinar</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cisco-aci-demo</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=55751976</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543312/55751976/78084b099b1e66d6c375b976a7fe5529/video_medium/algosec-cisco-aci-demo-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543312/55751976/78084b099b1e66d6c375b976a7fe5529/small/algosec-cisco-aci-demo-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Demo: AlgoSec’s Integration with Cisco ACI</video:title>
            <video:description>&lt;p&gt;In this demo, Prof. Avishai Wool you will discuss the AlgoSec integration with ACI.&amp;nbsp;&lt;/p&gt;&lt;p&gt;He explains how the integration can provide joint customers with visibility, risk analysis and regulatory compliance of the ACI environment.&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Additionally, you will learn how to make policy changes to allow connectivity within the ACI.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.algosec.com/contact-us/"&gt;Contact us&lt;/a&gt; for more information.&amp;nbsp;&lt;/p&gt;</video:description>
            <video:publication_date>2019-09-15T16:16:47+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>595</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>AppViz</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security policy changes</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-capital-one-breach-how-to-avoid</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54506817</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/video_medium/the-capital-one-breach-how-to-avoid-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543315/54506817/9df22f0a0caaa15f1c04a08448676bee/small/the-capital-one-breach-how-to-avoid-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The Capital One Breach: How to avoid the Misconfiguration danger?</video:title>
            <video:description>&lt;b&gt;Prof. Avishai Wool explains the Capital One data breach, which exposed the personal information of nearly 106 million people.&lt;/b&gt; &lt;br&gt;&lt;br&gt;The AlgoSec network security policy management solution provides holistic visibility across cloud, on-premise, SDN and hybrid environments, enabling you to proactively analyze risk from the business perspective, intelligently automate security changes, avoid misconfiguration incidents and ensure continuous compliance.
&lt;p&gt;&lt;b&gt;Click &lt;/b&gt;&lt;a href="https://www.algosec.com/lp/see-algosec-action-2/?utm_source=Email&amp;amp;utm_campaign=2019-08-06_The_Capital_One_Breach_Global_%5BEM%5D_%5BQ32019%5Dhttp://"&gt;&lt;b&gt;here &lt;/b&gt;&lt;/a&gt;&lt;b&gt;to learn how.&lt;/b&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-08-06T14:38:09+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>221</video:duration>
            <video:category>Promo Videos</video:category>
            <video:tag>cyber security</video:tag>
            <video:tag>Data breach</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-aci-hybrid-networks-breaking</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54329483</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/video_medium/cisco-aci-hybrid-networks-breaking-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543330/54329483/cb75f925661e325e6248fecc17f893d7/small/cisco-aci-hybrid-networks-breaking-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco ACI &amp; Hybrid Networks Breaking Down Silos with Central Policy Management</video:title>
            <video:description>&lt;b&gt;Yonatan Klein, Director of Product Management&lt;/b&gt; | July 30, 2019
&lt;p&gt;While your network extended beyond the confines of the physical data center and you started using Software Defined Networks (SDN) such as Cisco ACI, managing security policies within your hybrid estate is complex.&lt;/p&gt;
&lt;p&gt;Each part of your network estate is managed in its own independent silo instead of being holistically managed.&lt;/p&gt;
&lt;p&gt;Learn how to unify, consolidate and automate your entire network security policy management including both the Cisco ACI SDN fabric and elements outside the SDN fabric.&lt;/p&gt;
&lt;p&gt;In this webinar, Yonatan Klein, Director of Product Management at AlgoSec, explains how to centralize your security policy management throughout your network and the unique challenges required to manage an SDN fabric, such as Cisco ACI, in order get the most out of your entire network.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;He covers how to:&lt;/li&gt;&lt;li&gt;Proactively assess risk throughout your network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations&lt;/li&gt;&lt;li&gt;Gain full visibility and unify security policy management of your entire hybrid network estate, simulate traffic routes and security policy for ACI and other network devices&lt;/li&gt;&lt;li&gt;Manage traffic change requests in a holistic manner, including automatically pushing security policy changes to Cisco ACI by creating contracts and filters to enforce data center whitelist policy; as well as identifying and provisioning changes to firewalls both within the ACI fabric as well as other network security controls that are on-premises and in the cloud&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2019-07-30T19:42:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3106</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Cisco</video:tag>
            <video:tag>Cisco Tetration</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>hybrid environment</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/segmenting-your-network-for-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117893</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543319/54117893/cbceedb300483c1bcd32b02036cdd14f/video_medium/segmenting-your-network-for-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543319/54117893/cbceedb300483c1bcd32b02036cdd14f/small/segmenting-your-network-for-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Segmenting your Network for Security - The Good, the Bad, and the Ugly</video:title>
            <video:description>Segmenting your network is one of the foundations of a sound security strategy. It limits the movements of an attacker, and therefore limits the overall impact of a security breach.&lt;br&gt;
So why is it that most organizations struggle when it comes to defining, implementing and enforcing effective network segmentation?&lt;br&gt;
In this webcast, AlgoSec and expert penetration tester Mark Wolfgang examine common segmentation mistakes and review best practices for defining and enforcing effective network segmentation.</video:description>
            <video:publication_date>2019-07-24T16:03:17+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3706</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Computer Network (Industry)</video:tag>
            <video:tag>Computer Security (Software Genre)</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Network Security (Literature Subject)</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-firewall-analyzer-afa-demo</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117880</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543313/54117880/a341e94d6b1a623cbc15aaa05805cc59/video_medium/algosec-firewall-analyzer-afa-demo-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543313/54117880/a341e94d6b1a623cbc15aaa05805cc59/small/algosec-firewall-analyzer-afa-demo-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Firewall Analyzer (AFA) Demo</video:title>
            <video:description>&lt;p&gt;Watch this demo of AlgoSec Firewall Analyzer (AFA). See how
AFA delivers visibility and analysis of complex network security policies
across on-premise and cloud networks.&amp;nbsp;Discover how AlgoSec Firewall
Analyzer lets you view your multi-vendor network topology, and offers
audit-ready compliance reports. Learn more at &lt;a href="https://www.algosec.com/firewall-analyzer/"&gt;https://www.algosec.com/firewall-analyzer/&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-07-24T16:03:12+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>370</video:duration>
            <video:category>Products</video:category>
            <video:tag>AFA</video:tag>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>Demo</video:tag>
            <video:tag>Firewall Analyzer</video:tag>
            <video:tag>Firewall Management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/demo-algosecs-optimization-of-cisco</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117870</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543324/54117870/6d20549f766ec78cac6015abfc0cf395/video_medium/demo-algosecs-optimization-of-cisco-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543324/54117870/6d20549f766ec78cac6015abfc0cf395/small/demo-algosecs-optimization-of-cisco-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Demo: AlgoSec's Optimization of Cisco Firewall Policies</video:title>
            <video:description>&lt;p&gt;In this demo, Yitzy Tannenbaum provides you with guidelines on how to clean up and optimize your Cisco firewalls policies with the AlgoSec solution.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.algosec.com/contact-us/"&gt;Contact us&lt;/a&gt;&amp;nbsp;for more information.&amp;nbsp;&lt;br&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-07-24T16:03:03+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>179</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>appviz</video:tag>
            <video:tag>Cisco</video:tag>
            <video:tag>juniper</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-risk-assessment</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117852</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543322/54117852/fc70ccbf47251f92d7c682512c24b74a/video_medium/cisco-risk-assessment-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543322/54117852/fc70ccbf47251f92d7c682512c24b74a/small/cisco-risk-assessment-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco Risk Assessment</video:title>
            <video:description></video:description>
            <video:publication_date>2019-07-24T16:02:56+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>91</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>Cisco</video:tag>
            <video:tag>juniper</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/juniper-risk-assessment</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117842</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543315/54117842/dd3b78c156e3afe19d521f9aa339e55d/video_medium/juniper-risk-assessment-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543315/54117842/dd3b78c156e3afe19d521f9aa339e55d/small/juniper-risk-assessment-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Juniper Risk Assessment</video:title>
            <video:description></video:description>
            <video:publication_date>2019-07-24T16:02:37+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>99</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>juniper</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/juniper-policy-optimization</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117839</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543327/54117839/dbf89318a1c29d98b46c4dc95ad83b71/video_medium/juniper-policy-optimization-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543327/54117839/dbf89318a1c29d98b46c4dc95ad83b71/small/juniper-policy-optimization-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Juniper Policy Optimization</video:title>
            <video:description></video:description>
            <video:publication_date>2019-07-24T16:02:37+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>183</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>juniper</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-baseline-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117838</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543319/54117838/44ac85789f2fe81cea6cc4272074c035/video_medium/cisco-baseline-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543319/54117838/44ac85789f2fe81cea6cc4272074c035/small/cisco-baseline-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco Baseline Compliance</video:title>
            <video:description></video:description>
            <video:publication_date>2019-07-24T16:02:37+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>83</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>Cisco</video:tag>
            <video:tag>juniper</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-regulatory-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117833</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543314/54117833/288baf8ba4f752d64c81c59b1e8e4d51/video_medium/cisco-regulatory-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543314/54117833/288baf8ba4f752d64c81c59b1e8e4d51/small/cisco-regulatory-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco Regulatory Compliance</video:title>
            <video:description></video:description>
            <video:publication_date>2019-07-24T16:02:34+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>97</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>Cisco</video:tag>
            <video:tag>juniper</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/juniper-baseline-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117822</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543316/54117822/0f2b44239a6dff38c30536b6fa278c5c/video_medium/juniper-baseline-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543316/54117822/0f2b44239a6dff38c30536b6fa278c5c/small/juniper-baseline-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Juniper Baseline Compliance</video:title>
            <video:description></video:description>
            <video:publication_date>2019-07-24T16:02:10+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>83</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>juniper</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/juniper-regulatory-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117815</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543316/54117815/bfbf4426ed575f11534a7e8899b42181/video_medium/juniper-regulatory-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543316/54117815/bfbf4426ed575f11534a7e8899b42181/small/juniper-regulatory-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Juniper Regulatory Compliance</video:title>
            <video:description></video:description>
            <video:publication_date>2019-07-24T16:01:51+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>97</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>juniper</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/migration-to-cisco-firepower</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117797</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/video_medium/migration-to-cisco-firepower-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543314/54117797/0534c3a48e8560e33c68423031611e30/small/migration-to-cisco-firepower-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Migration to Cisco Firepower</video:title>
            <video:description>How to utilize the AlgoSec solution to migrate to Cisco Firepower</video:description>
            <video:publication_date>2019-07-24T16:01:34+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>69</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>algosec</video:tag>
            <video:tag>asa</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>firepower</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>juniper</video:tag>
            <video:tag>managment</video:tag>
            <video:tag>policy</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>visibility</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-cisco-aci-epg-creation</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54117795</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543331/54117795/bf23554e7908a685f2b82cc9915e1ab4/video_medium/algosec-cisco-aci-epg-creation-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543331/54117795/bf23554e7908a685f2b82cc9915e1ab4/small/algosec-cisco-aci-epg-creation-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec  - Cisco ACI EPG Creation Demo</video:title>
            <video:description></video:description>
            <video:publication_date>2019-07-24T16:01:34+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>917</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>aci</video:tag>
            <video:tag>algosec</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>contract</video:tag>
            <video:tag>cyber</video:tag>
            <video:tag>epg</video:tag>
            <video:tag>managment</video:tag>
            <video:tag>policy</video:tag>
            <video:tag>sdn</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/empowering-devops-with-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=54063027</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543318/54063027/56e2a192bef466ce0238d02d0ffd0ad1/video_medium/empowering-devops-with-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543318/54063027/56e2a192bef466ce0238d02d0ffd0ad1/small/empowering-devops-with-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Empowering DevOps with Network Security and Application Connectivity Automation</video:title>
            <video:description>&lt;b&gt;Omer Ganot, Product Manager&amp;nbsp;&lt;/b&gt;I Aug 6, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;DevOps methodologies enable agile application development and rapid delivery. However, sometimes network security is an afterthought, leading to bottlenecks before release and security breaches after.&lt;/p&gt;
&lt;p&gt;When it comes to network connectivity, such as whenever a new application needs to connect to an external resource, the continuous delivery process grinds to a halt. Approving and implementing network changes could stall the application provisioning for weeks. The application developer needs to open change requests and wait for approvals, breaking the continuous delivery cycle. As a result, security is in the uncomfortable position of being a bottleneck and an impediment to innovation.&lt;/p&gt;
&lt;br&gt;&lt;br&gt;In this webinar, Omer Ganot, AlgoSec’s Product Manager describes how to seamlessly integrate network security into DevOps, and how the ‘Connectivity as Code’ approach can be implemented to overcome these challenges.&lt;br&gt;&lt;br&gt;This webinar will teach you how to:&lt;ul&gt;&lt;li&gt;Weave network security changes into the existing CI/CD pipeline to fully automate the application delivery process&lt;/li&gt;&lt;li&gt;Seamlessly manage network connectivity as part of the DevOps process for secure, faster, more agile and problem-free application delivery&lt;/li&gt;&lt;li&gt;Ensure continuous compliance and auditability throughout the application delivery process&lt;/li&gt;&lt;li&gt;Get clearly documented application connectivity requirements which help ensure business continuity&lt;/li&gt;&lt;li&gt;Bridge the gap between application developers and network security throughout the entire application lifecycle&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2019-07-22T14:36:47+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2151</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>DevOps</video:tag>
            <video:tag>NetOps</video:tag>
            <video:tag>Network Security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-and-cisco-aci-for-improved</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=53965291</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/video_medium/algosec-and-cisco-aci-for-improved-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543322/53965291/9eb3f8c5a573378055ed58b253828b2c/small/algosec-and-cisco-aci-for-improved-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec and Cisco ACI for Improved Data Center Security, Compliance and Business Agility</video:title>
            <video:description>AlgoSec and Cisco ACI deliver security policy across the entire network, enables automated security policy change management for multi-vendor devices, provide risk and compliance analysis, and more.</video:description>
            <video:publication_date>2019-07-18T13:58:57+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>487</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>aci</video:tag>
            <video:tag>algosec</video:tag>
            <video:tag>automated security policy</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>contracts</video:tag>
            <video:tag>cyber</video:tag>
            <video:tag>juniper</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>policy</video:tag>
            <video:tag>private cloud</video:tag>
            <video:tag>sdn</video:tag>
            <video:tag>security policy</video:tag>
            <video:tag>vmware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/avoiding-the-securityagility</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=53789320</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/video_medium/avoiding-the-securityagility-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543322/53789320/c9187dd732523aafe8b688e78ccb439d/small/avoiding-the-securityagility-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Avoiding the Security/Agility Tradeoff with Network Security Policy</video:title>
            <video:description>&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | July 10, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Business application deployments and changes require IT, networking and security teams to be more agile than ever before.&lt;br&gt;
But frequently, this agility comes at the expense of security and compliance and enables network breaches and cyber-attacks.&lt;/p&gt;
&lt;p&gt;In this webinar, Yitzy Tannenbaum, Product Marketing Manager at AlgoSec, covers how network security policy automation helps you avoid this conflict.&lt;/p&gt;
&lt;p&gt;Watch the webinar to learn how to:&lt;br&gt;
•	Plan for the entire network security lifecycle&lt;br&gt;
•	Discover your network topology and traffic flows&lt;br&gt;
•	Ensure continuous compliance and identify risks and compliance violations&lt;br&gt;
•	Easily implement changes across your hybrid network environment&lt;br&gt;
•	Mandate a consistent and unified change process&lt;/p&gt;</video:description>
            <video:publication_date>2019-07-11T12:43:21+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2613</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>algosec</video:tag>
            <video:tag>automation</video:tag>
            <video:tag>change management</video:tag>
            <video:tag>compliance</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/managing-network-security-with</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=53546196</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543314/53546196/4550e2bd0eaabc2660f3861da3d66c3b/video_medium/managing-network-security-with-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543314/53546196/4550e2bd0eaabc2660f3861da3d66c3b/small/managing-network-security-with-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Managing Network Security with AlgoSec</video:title>
            <video:description>Managing complex security polices across devices and operations teams is more challenging than ever. It’s time consuming, risky, prone to human error and out of sync with the business.  What if you could automate the entire security policy change process and manage your entire network environment - across  cloud, SDN and on-premise – using a single platform? Now you can. Over 1,800 leading organizations, including 20 of the Fortune 50, have relied on AlgoSec to drive business agility, security and compliance. Sounds intriguing? See it in action: &lt;a href="https://www.algosec.com/lp/see-algosec-action-2/"&gt;https://www.algosec.com/lp/see-algosec-action-2/&lt;/a&gt;</video:description>
            <video:publication_date>2019-07-02T10:58:29+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>124</video:duration>
            <video:category>Company </video:category>
            <video:tag>algosec</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>Science and Technology</video:tag>
            <video:tag>SDN</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/effectively-managing-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=53517696</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/video_medium/effectively-managing-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543331/53517696/b6e522c1eb5123a2a88d100caf162d8b/small/effectively-managing-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Effectively Managing Security Policy | Joint Fortinet &amp; AlgoSec Webinar</video:title>
            <video:description>&lt;b&gt;Satish Veerapuneni, Director of Products and Solutions (Fortinet) and Yoav Karnibad, Product Manager (AlgoSec)&lt;/b&gt; | Jun 26 2019
&lt;p&gt;In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.&lt;/p&gt;
&lt;p&gt;In this webinar, Satish Veerapuneni, Director of Products and Solutions at Fortinet and Yoav Karnibad, Product Manager at AlgoSec will discuss how joint customers benefit from AlgoSec’s multi-vendor security policy management capabilities while leveraging Fortinet’s industry-leading Security Fabric’s FortiManager &amp;amp; FortiAnalyzer.&lt;/p&gt;
&lt;p&gt;Join this live webinar to learn how to:&lt;br&gt;
• Automate policy optimization and risk assessment across all your security devices.&lt;br&gt;
• Enhance visibility and exercise greater control over your hybrid / heterogeneous network&lt;br&gt;
• Tie application connectivity needs to network security policies, reduce planning time and costs for network change automation&lt;br&gt;
• Assess risk and ensure regulatory compliance across the entire enterprise environment&lt;br&gt;
• Realize single pane of glass management with advanced analysis and management of policy modifications through Fortinet Security Fabric’s FortiManager/FortiAnalyzer&amp;nbsp;and AlgoSec’s Firewall Analyzer, FireFlow and BusinessFlow&lt;/p&gt;</video:description>
            <video:publication_date>2019-07-01T13:53:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3334</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Audit</video:tag>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>change management</video:tag>
            <video:tag>cyber Security</video:tag>
            <video:tag>FireFlow</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>Fortinet</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-ceo-yuval-baron</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=53465208</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543318/53465208/d44b783d4b0714fe16128a7b51981508/video_medium/algosec-ceo-yuval-baron-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543318/53465208/d44b783d4b0714fe16128a7b51981508/small/algosec-ceo-yuval-baron-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec CEO, Yuval Baron - Invitation to AlgoSummit Americas 2019</video:title>
            <video:description>&lt;span&gt;AlgoSec Co-founder and CEO,&amp;nbsp;Yuval Baron,&amp;nbsp;invites customers and partners to AlgoSummit Americas 2019 taking place in
Dallas, Texas from October 21-24, 2019.&lt;br&gt;&lt;/span&gt;&lt;p&gt;For more information or to sign up &lt;a href="https://www.algosec.com/algosummit/"&gt;https://www.algosec.com/algosummit/&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-06-30T10:03:31+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>24</video:duration>
            <video:category>Company </video:category>
            <video:tag>algosec</video:tag>
            <video:tag>AlgoSummit</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/securely-managing-application</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=53083724</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/video_medium/securely-managing-application-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543330/53083724/3a53e9daff9a2bc19930ddc029e874d9/small/securely-managing-application-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Securely Managing Application Connectivity – Best Practices</video:title>
            <video:description>&lt;b&gt;Yoni Geva, Product Manager&amp;nbsp;&lt;/b&gt; | June 12, 2019&lt;br&gt;New business applications are added, changed or removed every day, forcing implementation of complex, time-consuming network security changes. Migrating business applications to the cloud adds additional complexities, such as understanding the network connectivity of each application prior to deployment, provisioning the relevant firewalls and routers in the cloud, and then migrating and adjusting existing network connectivity to support them.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this webinar, Yoni Geva, Product Manager at AlgoSec will present:&lt;/p&gt;
&lt;p&gt;•Innovative application-discovery technologies&lt;br&gt;
•Application-centric use cases, including policy cleanup and documentation&lt;br&gt;
•How to simplify and accelerate rule recertification through automation&lt;br&gt;
•How to prevent breaches by associating vulnerabilities to business applications and&lt;br&gt;
firewall rules&lt;br&gt;
•How to ensure ongoing compliance and audit-readiness&lt;/p&gt;</video:description>
            <video:publication_date>2019-06-16T11:41:17+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1111</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Application Security</video:tag>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>change management</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>Connectivity</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/microsegmentation-ongoing</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=52938534</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543315/52938534/8f5caca0feb36d3182e80f341525099d/video_medium/microsegmentation-ongoing-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543315/52938534/8f5caca0feb36d3182e80f341525099d/small/microsegmentation-ongoing-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Microsegmentation - Ongoing Maintenance</video:title>
            <video:description>&lt;p&gt;In lesson 5, Prof. Wool video covers the steps needed to take to ensure ongoing maintenance of your data center upon completion of a micro-segmentation
project&lt;/p&gt;</video:description>
            <video:publication_date>2019-06-11T16:52:15+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>424</video:duration>
            <video:category>Prof Wool: Micro-Segmentation</video:category>
            <video:tag>Data Center</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/microsegmentation-generating-a</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=52938483</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543318/52938483/8b6d66465a495f960523b89e77416a02/video_medium/microsegmentation-generating-a-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543318/52938483/8b6d66465a495f960523b89e77416a02/small/microsegmentation-generating-a-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Microsegmentation - Generating a Filtering Policy</video:title>
            <video:description>In lesson 4, Prof. Wool demonstrates how to
generate a filtering policy during a micro-segmentation project</video:description>
            <video:publication_date>2019-06-11T16:48:45+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>407</video:duration>
            <video:category>Prof Wool: Micro-Segmentation</video:category>
            <video:tag>Data Center</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/microsegmentation-defining-logical</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=52938407</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543322/52938407/cb103debc3b39af2eb202015d5616b02/video_medium/microsegmentation-defining-logical-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543322/52938407/cb103debc3b39af2eb202015d5616b02/small/microsegmentation-defining-logical-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Microsegmentation Defining Logical Segments</video:title>
            <video:description>In lesson 3, Prof. Wool covers how to define
logical segments within a micro-segmentation project</video:description>
            <video:publication_date>2019-06-11T16:45:31+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>459</video:duration>
            <video:category>Prof Wool: Micro-Segmentation</video:category>
            <video:tag>Data Center</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/microsegmentation-mapping</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=52938308</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/video_medium/microsegmentation-mapping-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543326/52938308/6c21a30be19567d6b5e00c464942fbeb/small/microsegmentation-mapping-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Microsegmentation - Mapping Existing Applications</video:title>
            <video:description>&lt;p&gt;Watch Prof. Wool as he shares tips on how to
prepare for network segmentation by identifying the segment borders&lt;/p&gt;</video:description>
            <video:publication_date>2019-06-11T16:42:03+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>252</video:duration>
            <video:category>Prof Wool: Micro-Segmentation</video:category>
            <video:tag>Data Center</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/introduction-to-micro-segmentation</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=52937927</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543330/52937927/cd360a9cbec5eb3df886e4d8bb75b927/video_medium/introduction-to-micro-segmentation-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543330/52937927/cd360a9cbec5eb3df886e4d8bb75b927/small/introduction-to-micro-segmentation-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Introduction to Micro-segmentation</video:title>
            <video:description>&lt;p&gt;In lesson 1, Prof. Wool introduces
micro-segmentation: reasons for segmenting the data center, challenges, required
steps when deploying a micro-segmentation strategy, and how to future-proof your
policies&lt;/p&gt;&lt;br&gt;</video:description>
            <video:publication_date>2019-06-11T16:22:59+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>460</video:duration>
            <video:category>Prof Wool: Micro-Segmentation</video:category>
            <video:tag>Data Center</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/csa-study-security-challenges-in</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=52462354</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543312/52462354/eb670c2f78983d7c62bcf81293b10412/video_medium/csa-study-security-challenges-in-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543312/52462354/eb670c2f78983d7c62bcf81293b10412/small/csa-study-security-challenges-in-thumbnail.jpg</video:thumbnail_loc>
            <video:title>CSA Study: Security Challenges in Cloud Environments</video:title>
            <video:description>John Yeoh, Global VP of Research (CSA) &amp; Yitzy Tannenbaum Product Marketing Manager (AlgoSec) | May 22 2019&lt;/p&gt;
&lt;p&gt;Cloud computing provides improved security, agility, and flexibility. However, integrating this new service into legacy IT environments comes with great concern.&lt;/p&gt;
&lt;p&gt;In a recent report published by the Cloud Security Alliance (CSA), security, data loss and compliance were identified as the top 3 concerns when moving to the cloud. In the face of increasingly complex environments, cloud visibility and expertise are essential to ensuring a manageable, secure and fluent transition to a native cloud, hybrid or multi-cloud environment.&lt;/p&gt;
&lt;p&gt;Join our special webinar with John Yeoh, Director of Research with expertise in cybersecurity, cloud computing, information security, and next generation technology from the Cloud Security Alliance (CSA).&lt;/p&gt;
&lt;p&gt;We will cover various topics from the new CSA report Cloud Complexity: The Use of Hybrid and Multi-Cloud Environments, including:&lt;/p&gt;
&lt;p&gt;• Workloads being used in or moved to the cloud and how they are being deployed/migrated&lt;br /&gt;
• Types of cloud platforms being used by companies&lt;br /&gt;
• Common security challenges faced by companies when moving workloads to the cloud&lt;br /&gt;
• Methods of managing risk and vulnerabilities in the cloud environment&lt;br /&gt;
• Causes of network or application outages and the amount of time it took to remediate</video:description>
            <video:publication_date>2019-05-26T11:46:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3603</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>cloud security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/asher-webinar-rule-recertification</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=52282845</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543328/52282845/e3378bd8e545b4768707ca8b2e9da418/video_medium/asher-webinar-rule-recertification-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543328/52282845/e3378bd8e545b4768707ca8b2e9da418/small/asher-webinar-rule-recertification-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Asher webinar rule recertification - Promo</video:title>
            <video:description>New webinar! Join Asher Benbenisty, @AlgoSec’s Director of Product Marketing to hear the application-centric approach to #firewall re-certification #networksecurity&lt;br&gt;
&lt;a href="https://www.algosec.com/webinar/firewall-rule-rectierfication-with-application-connectivity/"&gt;https://www.algosec.com/webinar/firewall-rule-rectierfication-with-application-connectivity/&lt;/a&gt;</video:description>
            <video:publication_date>2019-05-19T14:36:31+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>23</video:duration>
            <video:category>Promo Videos</video:category>
            <video:tag>firewall rule recertification</video:tag>
            <video:tag>network security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/firewall-rule-recertification-with</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=51313899</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/video_medium/firewall-rule-recertification-with-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543315/51313899/28b03ebf89a04b04bfe7ccebae9cb7f5/small/firewall-rule-recertification-with-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Firewall Rule Recertification with Application Connectivity</video:title>
            <video:description>Asher Benbenisty, Director of Product Marketing | Apr 24 2019&lt;/p&gt;
&lt;p&gt;Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.&lt;/p&gt;
&lt;p&gt;However, manual firewall rule recertification is complex, time-consuming and prone to errors.&lt;/p&gt;
&lt;p&gt;Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.&lt;/p&gt;
&lt;p&gt;In this webinar Asher will cover:&lt;br /&gt;
• Why it is important to regularly review and recertify your firewall rules&lt;br /&gt;
• How to use application connectivity for firewall rule recertification&lt;br /&gt;
• How to automatically manage the rule-recertification process</video:description>
            <video:publication_date>2019-04-29T11:30:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1197</video:duration>
            <video:category>Webinars</video:category>
            <video:tag> Compliance</video:tag>
            <video:tag> Connectivity</video:tag>
            <video:tag> Cyber Security</video:tag>
            <video:tag> firewall management</video:tag>
            <video:tag> firewall rule recertification</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag> Network Security</video:tag>
            <video:tag> Security Management</video:tag>
            <video:tag> security policy</video:tag>
            <video:tag> security tools</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/boosting-network-security-with</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=50970008</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543315/50970008/a28b16cd51ce9081093b2ef5a096fae3/video_medium/boosting-network-security-with-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543315/50970008/a28b16cd51ce9081093b2ef5a096fae3/small/boosting-network-security-with-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Boosting Network Security with ChatOps</video:title>
            <video:description>&lt;b&gt;Dania Ben Peretz, Product Manager&lt;/b&gt;&amp;nbsp; | Apr 17 2019&lt;br&gt;&lt;br&gt;
The way we consume content has greatly evolved throughout the years - from text-only collateral to using applications that centralize the content and make it easier to access. However, the number of business applications is rapidly growing, ultimately causing organizations to suffer from “app fatigue”.
&lt;p&gt;Network security stakeholders can benefit from such a shift in content consumption by taking a conversational approach with ChatOps.&lt;/p&gt;
In this webinar, Dania Ben Peretz, Product Manager at AlgoSec covers how ChatOps helps network security and operational staff to:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Shorten resolution time of critical security incidents&lt;/li&gt;&lt;li&gt;Manage security more efficiently through collaboration and transparency between IT, Security, Network and DevOps teams&lt;/li&gt;&lt;li&gt;Ensure ongoing security and compliance&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2019-04-25T12:03:36+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1786</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Bots</video:tag>
            <video:tag>ChatOps</video:tag>
            <video:tag>Cyber Security</video:tag>
            <video:tag>DevOps</video:tag>
            <video:tag>IT Security</video:tag>
            <video:tag>Network Management</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>Security Management</video:tag>
            <video:tag>security tools</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/taming-the-storm-clouds-managing</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=49895193</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/video_medium/taming-the-storm-clouds-managing-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543312/49895193/dc4df391a76a089c566104a63f8badf5/small/taming-the-storm-clouds-managing-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Taming the storm clouds: managing network security across hybrid and multi-cloud</video:title>
            <video:description>Yonatan Klein, Director of Product Management | Mar 27, 2019&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.&lt;/p&gt;
&lt;p&gt;Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.&lt;/p&gt;
&lt;p&gt;Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.&lt;/p&gt;
&lt;p&gt;Yonatan will cover how to:&lt;br&gt;
•Easily and automatically identify security risks and misconfigurations in your cloud&lt;br&gt;
•Centrally manage security controls across accounts, regions and VPCs/VNETs&lt;br&gt;
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs&lt;br&gt;
•Obtain a cross-network-estate risk analysis&lt;/p&gt;</video:description>
            <video:publication_date>2019-03-28T13:00:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2733</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Cloud Security</video:tag>
            <video:tag>Cyber Security</video:tag>
            <video:tag>cyber threat</video:tag>
            <video:tag>Cyber Threats</video:tag>
            <video:tag>DevOps</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>IT Security</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>Risk Management</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/managing-application-connectivity</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=49721671</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/video_medium/managing-application-connectivity-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543326/49721671/272968807dfb09156001e7c88b48053c/small/managing-application-connectivity-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Managing Application Connectivity in the World of Network Security</video:title>
            <video:description>&lt;p&gt;&lt;b&gt;Asher Benbenisty, Director of Product Marketing |&lt;/b&gt; Feb 27 2018&lt;br&gt;&lt;/p&gt;&lt;p&gt;The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.&amp;nbsp;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;&lt;br&gt;During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, discusses how taking an application-centric approach to security policy management will improve both your security and operational efficiency.&amp;nbsp;&lt;br&gt;&lt;br&gt;Learn how to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Gain insight into your company’s security policy management maturity level&lt;/li&gt;&lt;li&gt;Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows&lt;/li&gt;&lt;li&gt;Identify security risks across your enterprise network and prioritize them based on business criticality&lt;/li&gt;&lt;li&gt;Securely migrate business application connectivity and security devices to a new data center&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2019-03-20T10:54:37+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2192</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>data center</video:tag>
            <video:tag>mapping network flows</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Security Automation</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/movin-on-up-to-the-cloud-how-to</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=49721659</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/video_medium/movin-on-up-to-the-cloud-how-to-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543327/49721659/b7638ecd622bb415d654ed299e5208b2/small/movin-on-up-to-the-cloud-how-to-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Movin' On Up to the Cloud: How to Migrate your Application Connectivity</video:title>
            <video:description>&lt;span&gt;&lt;b&gt;Avivi Siman-Tov, Product Manager |&lt;/b&gt; Feb 6 2018&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;br&gt;&lt;/span&gt;Migrating applications to the cloud or to another data center is a complex and risky process. First, you need to understand the applications you are currently running (application discovery). Then, you need to define and map the existing application connectivity flows (pre-migration), so that you can easily reestablish them post-migration.&lt;br&gt;&lt;br&gt;If done manually, this is a difficult and time-consuming process, and a single mistake can cause outages, compliance violations and create holes in your security perimeter.&amp;nbsp;&lt;br&gt;&lt;br&gt;Understanding the migration destination is just as important; cloud security architecture is fundamentally different from physical networks, and it is extremely difficult to translate the network connectivity flows to the cloud security controls and then manage network security policies cohesively across the entire hybrid enterprise environment. All in all, migrating application connectivity is a complex, tedious and error-prone process that can take months and often compromises security, compliance and business agility.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Avivi Siman-Tov, Product Manager at AlgoSec, explores how to simplify and accelerate large-scale complex application migration projects, while making security a priority.&amp;nbsp;&lt;br&gt;&lt;br&gt;Discover best practices to:&amp;nbsp;&lt;br&gt;&lt;ul&gt;&lt;li&gt;Automatically discover applications and their existing connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Analyze, simulate and compute the necessary changes – even between different network security technologies such as traditional firewalls and cloud security groups&amp;nbsp;&lt;/li&gt;&lt;li&gt;Execute the necessary firewall rule changes, and mass-migrate relevant connectivity flows&amp;nbsp;&lt;/li&gt;&lt;li&gt;Assess the risk and ensure compliance throughout the migration process&amp;nbsp;&lt;/li&gt;&lt;li&gt;Deliver unified security policy management across the hybrid enterprise cloud environment&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2019-03-20T10:53:50+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1788</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>application discovery</video:tag>
            <video:tag>cloudsecurity</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>hybrid</video:tag>
            <video:tag>migrating applications</video:tag>
            <video:tag>networksecurity</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>risk assessment</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/managing-effective-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=49615359</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/video_medium/managing-effective-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543317/49615359/a61b1227849251e32a2981784acbc6a7/small/managing-effective-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Managing Effective Security Policies Across Hybrid and Multi-Cloud Environments</video:title>
            <video:description>&lt;p&gt;&lt;span&gt;&lt;b&gt;Yitzy Tannenbaum, Product Marketing Manager&lt;/b&gt; | Oct 25 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are not only migrating applications to the cloud from on-premise data centers, but they are developing multi-cloud strategies to take advantage of availability and cost structures as well as to avoid vendor lock-in. In fact, IDC has predicted that more than 85% of IT organizations will commit to multi-cloud architectures already by the end of this year.&amp;nbsp;&lt;br&gt;&lt;br&gt;In complex, multi-cloud and hybrid environments, security teams need to understand which network flows and security controls impact application connectivity, including cloud-specific security controls (Network ACL and security groups) as well as virtual and physical firewalls that protect cloud resources. They need to manage policies that maintain their compliance posture across multiple clouds and hybrid environments.&amp;nbsp;&lt;br&gt;&lt;br&gt;In this webinar, Yitzy Tannenbaum illuminates security-policy issues in multi-cloud and hybrid environments and show you how to achieve:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Visibility across the multi-cloud network topology to ensure deployment of security controls that support network-segmentation architecture&lt;/li&gt;&lt;li&gt;Uniform security policy across complex multi-cloud and hybrid environments&lt;/li&gt;&lt;li&gt;Automatic monitoring of multi-cloud and hybrid network-security configuration changes to analyze and&amp;nbsp;assess risk and to avoid compliance violations&lt;/li&gt;&lt;li&gt;Instant generation of audit-ready reports for major regulations, including PCI, HIPAA, SOX and NERC, in the context of multi-cloud environments&lt;/li&gt;&lt;li&gt;Automatic provisioning of application connectivity flows across a variety of security controls in hybrid environments&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2019-03-14T11:40:10+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2630</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>automation</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>compliance</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>hybrid environment</video:tag>
            <video:tag>IDC</video:tag>
            <video:tag>migrating applications</video:tag>
            <video:tag>multi-cloud</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/selecting-the-right-security-policy</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=49615259</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/video_medium/selecting-the-right-security-policy-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543330/49615259/26569be0faf52cc329bf82bf37a909f1/small/selecting-the-right-security-policy-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Selecting the right security policy management solution for your organization</video:title>
            <video:description>&lt;p&gt;&lt;b&gt;Kyle Wickert, Worldwide Strategic Architect&amp;nbsp;&lt;/b&gt;&lt;br&gt;&lt;/p&gt;IT must deliver more, faster. Yet as cyber-attacks increase in volume and sophistication, IT groups are finding themselves ill-equipped to secure their networks and maintain compliance while supporting business productivity.&amp;nbsp;&lt;br&gt;In this era of digital transformation, managing security across complex enterprise networks presents huge challenges. Automation will ease the pressure.&amp;nbsp;&lt;br&gt;Join Kyle Wickert, Worldwide Strategic Architect at AlgoSec, for a technical webinar on tips and best practices to help you select the right security policy management solution that will help drive business agility while ensuring security and compliance.&amp;nbsp;&lt;br&gt;&lt;br&gt;Key topics include:&lt;br&gt;&lt;ul&gt;&lt;li&gt;Intelligent automation is more than just adding policies&lt;/li&gt;&lt;li&gt;Letting a business-centric approach take the lead&amp;nbsp;&lt;/li&gt;&lt;li&gt;Extracting the best from existing automation processes and creating new ones&amp;nbsp;&lt;/li&gt;&lt;li&gt;Managing it all together: cloud, SDN and on-premise&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2019-03-14T11:35:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2338</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>automation</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/network-security-at-the-speed-of</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=49615205</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543331/49615205/38f8415e51bb5d766d89582e212bb667/video_medium/network-security-at-the-speed-of-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543331/49615205/38f8415e51bb5d766d89582e212bb667/small/network-security-at-the-speed-of-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Network security at the speed of DevOps</video:title>
            <video:description>&lt;p&gt;&lt;span&gt;&lt;b&gt;Anner Kushnir, VP Technology&lt;/b&gt; | Jul 24 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;DevOps methodologies have become extremely popular to enable agile application development and delivery.&lt;br&gt;Unfortunately, when it comes to the associated network connectivity, such as whenever a new application needs to connect to an external resource, the process breaks. The application developer then needs to open change requests and wait for approvals which effectively breaks the continuous delivery cycle. As a result security is in the uncomfortable position of being a bottleneck and an impediment to innovation.&lt;br&gt;&lt;br&gt;In this webinar, Anner Kushnir, AlgoSec’s VP of Technology will describe how the innovative 'Connectivity as Code' approach can be implemented to overcome these challenges, and seamlessly weave network security into the existing CI/CD pipeline in order to fully automate the application delivery process end-to-end.&lt;br&gt;&lt;br&gt;This webinar will teach you how to:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Seamlessly manage network connectivity as part of the DevOps process for faster, more agile and problem-free application delivery&lt;/li&gt;&lt;li&gt;Avoid external out-of-band network connectivity problems that require separate and manual handling&lt;/li&gt;&lt;li&gt;Ensure continuous compliance and auditability throughout the application delivery process&lt;/li&gt;&lt;li&gt;Get clearly documented application connectivity requirements which help prevent disruptions to the business&lt;/li&gt;&lt;li&gt;Bridge the gap between application developers and network security throughout the entire application lifecycle&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2019-03-14T11:33:23+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3309</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>automation</video:tag>
            <video:tag>devops</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/network-security-audit-passing-your</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=49615104</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/video_medium/network-security-audit-passing-your-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543327/49615104/136e59e2afb568e47149553c486bea6e/small/network-security-audit-passing-your-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Network Security Audit? Passing Your Next One with Flying Colors</video:title>
            <video:description>&lt;p&gt;&lt;span&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt; | Sep 6 2018&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Enterprises are required to maintain an unfailing state of compliance with laws and regulations.&amp;nbsp;&lt;br&gt;&lt;br&gt;Do you know about the upcoming PCI-DSS 3.2.1 standard and what it means for your operation? Are you ready to be audited?&lt;br&gt;&lt;br&gt;Like fire drills, audits can catch us unprepared and expose inadequacies. What should we do now to make sure we pass the next audit with ease?&lt;br&gt;&lt;br&gt;Presented by renowned industry expert, Professor Avishai Wool, this technical webinar imparts best practices and reveals specific techniques to help you make sure that your compliance posture stands up to any audit.&lt;br&gt;&lt;br&gt;In this webinar, Professor Wool discusses:&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Know if your network is compliant with the new PCI standard&lt;/li&gt;&lt;li&gt;Upgrade to the secure alternative to SSL to safeguard your payment data&lt;/li&gt;&lt;li&gt;Prepare for the next audit&lt;/li&gt;&lt;li&gt;Assure continuous compliance&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2019-03-14T11:28:42+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3379</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>automation</video:tag>
            <video:tag>compliance</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>pci</video:tag>
            <video:tag>pci audit</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security audit</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/from-antiquity-to-the-cloud-25</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=49614976</video:player_loc>
            <video:content_loc>https://video.algosec.com/49543326/49614976/bd1f9267d21e8da48f41902a69c86c6d/video_medium/from-antiquity-to-the-cloud-25-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/49543326/49614976/bd1f9267d21e8da48f41902a69c86c6d/small/from-antiquity-to-the-cloud-25-thumbnail.jpg</video:thumbnail_loc>
            <video:title>From antiquity to the cloud: 25 years of firewalls and network filtering</video:title>
            <video:description>&lt;p&gt;&lt;b&gt;Prof. Avishai Wool, CTO&lt;/b&gt;&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The first commercial firewall shipped in 1992. 25 years later the firewall is still the core building block of enterprises’ security infrastructures.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this educational webinar on the history of the firewall, Prof. Wool will take you through a riveting 25-year journey of the evolution of the firewall - from the ancient world of the host-based firewalls of the 90s, to today’s cloud-based firewalls, and will explain how each type of firewall works, its advantages and limitations, and provide some tips and best practices for effective network filtering.&lt;br&gt;&lt;br&gt;In this highly informational, and entertaining webinar Professor Wool will cover:&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The Early 90s: Host vs. Network&amp;nbsp;&lt;br&gt;Late 90s: Keeping State&amp;nbsp;&lt;br&gt;2003: Zone-Based firewalls&amp;nbsp;&lt;br&gt;2010: Next-Gen firewalls&amp;nbsp;&lt;br&gt;2015: Virtualized and cloud firewalls&lt;br&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-03-14T11:22:00+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3888</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>firewall history</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/checkpoint-baseline-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44584958</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44584958/bb1619296a6e04202539a28dca59b044/video_medium/checkpoint-baseline-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44584958/bb1619296a6e04202539a28dca59b044/small/checkpoint-baseline-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>CheckPoint: Baseline compliance</video:title>
            <video:description>Demo showing how AlgoSec can help you ensure that your CheckPoint firewall is configured in accordance with your organizations internal standards.</video:description>
            <video:publication_date>2019-03-05T11:06:09+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>82</video:duration>
            <video:category>Products</video:category>
            <video:tag>checkpoint</video:tag>
            <video:tag>demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/checkpoint-policy-optimization</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44584951</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44584951/647a70b1878c60aecff85447b6ab3f71/video_medium/checkpoint-policy-optimization-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44584951/647a70b1878c60aecff85447b6ab3f71/small/checkpoint-policy-optimization-thumbnail.jpg</video:thumbnail_loc>
            <video:title>CheckPoint: Policy optimization</video:title>
            <video:description>Clean up and optimize your CheckPoint firewall policies with AlgoSec</video:description>
            <video:publication_date>2019-03-05T11:05:56+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>199</video:duration>
            <video:category>Products</video:category>
            <video:tag>checkpoint</video:tag>
            <video:tag>demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/checkpoint-regulatory-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44584923</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465687/44584923/f32bd032f184d288d208ad102fe1a660/video_medium/checkpoint-regulatory-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465687/44584923/f32bd032f184d288d208ad102fe1a660/small/checkpoint-regulatory-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>CheckPoint: Regulatory compliance</video:title>
            <video:description>AlgoSec helps you to prepare for a regulatory compliance review on a CheckPoint firewall in seconds!</video:description>
            <video:publication_date>2019-03-05T11:05:17+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>97</video:duration>
            <video:category>Products</video:category>
            <video:tag>checkpoint</video:tag>
            <video:tag>demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/checkpoint-risk-assessment</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44584921</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107547/44584921/98cc4c5c7b305a40683db5f50e31a6c5/video_medium/checkpoint-risk-assessment-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107547/44584921/98cc4c5c7b305a40683db5f50e31a6c5/small/checkpoint-risk-assessment-thumbnail.jpg</video:thumbnail_loc>
            <video:title>CheckPoint: Risk assessment</video:title>
            <video:description>AlgoSec can help you assess and remediate the risk on your checkpoint firewall.</video:description>
            <video:publication_date>2019-03-05T11:05:17+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>100</video:duration>
            <video:category>Products</video:category>
            <video:tag>checkpoint</video:tag>
            <video:tag>demo</video:tag>
            <video:tag>risk assessment</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/panel-discussion-network-security-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44415276</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/video_medium/panel-discussion-network-security-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107560/44415276/24cb2f0d85632231cc3bd811592c9758/small/panel-discussion-network-security-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Panel Discussion: Network Security and Compliance best practices for Financial Institutions</video:title>
            <video:description>Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy&lt;br /&gt;
management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.&lt;/p&gt;
&lt;p&gt;There’s a better way to manage your network security!&lt;/p&gt;
&lt;p&gt;Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.&lt;/p&gt;
&lt;p&gt;Topics include:&lt;/p&gt;
&lt;p&gt;• How to overcome security management complexities with automation&lt;br /&gt;
• How to pass compliance audits in the face of demanding regulations&lt;br /&gt;
• Key industry metrics that compare security environments within and beyond the finance industry&lt;br /&gt;
• Real financial customers case studies</video:description>
            <video:publication_date>2019-02-27T12:54:37+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1355</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>audit</video:tag>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>change management</video:tag>
            <video:tag>fintech</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>firewalls management</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network security policy management</video:tag>
            <video:tag>security analysis</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-case-study-t-mobile</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182951</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182951/6f4af97fd0ab81e6e9ca112bebfbb408/video_medium/algosec-case-study-t-mobile-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182951/6f4af97fd0ab81e6e9ca112bebfbb408/small/algosec-case-study-t-mobile-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Case Study: T-Mobile</video:title>
            <video:description>Peter Erceg, Head of IT Security at T-Mobile, talks about how AlgoSec helped T-Mobile optimize their firewall policy, reduce efforts for PCI compliance and automate network security policy changes.</video:description>
            <video:publication_date>2019-02-14T18:35:39+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>274</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>Firewall Operations</video:tag>
            <video:tag>PCI-DSS</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-5-managing-firewall-policies</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182901</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/video_medium/lesson-5-managing-firewall-policies-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44182901/4e056f684aafa0ce814606197c80924b/small/lesson-5-managing-firewall-policies-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 5: Managing Firewall Policies in a Disappearing Network Perimeter</video:title>
            <video:description>Firewall Management 201: Lesson 5&lt;br /&gt;
In this lesson, Professor Wool examines how virtualization, outsourcing of data centers, worker mobility and the consumerization of IT have all played a role in dissolving the network perimeter and what you can do to regain control.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:34:30+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>348</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>data center</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall policies</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>Software Technology Security</video:tag>
            <video:tag>virtualization</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosecs-baseline-compliance-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182880</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44182880/25bb94d15fdd364530a2f0dfa6d23057/video_medium/algosecs-baseline-compliance-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44182880/25bb94d15fdd364530a2f0dfa6d23057/small/algosecs-baseline-compliance-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec's Baseline Compliance Capability</video:title>
            <video:description>AlgoSec Firewall Analyzer allows security teams to easily and efficiently define baseline hardware and software configurations to which devices must adhere, and generates reports to identify devices that do not comply with the corporate baseline, minimizing system risks.</video:description>
            <video:publication_date>2019-02-14T18:34:13+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>128</video:duration>
            <video:category>Products</video:category>
            <video:tag>baseline compliance</video:tag>
            <video:tag>configurations</video:tag>
            <video:tag>corporate policy</video:tag>
            <video:tag>device configurations</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-fireflows-seamless</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182814</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107560/44182814/a11d96807c3e30dcf1fb2fdce4712ee1/video_medium/algosec-fireflows-seamless-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107560/44182814/a11d96807c3e30dcf1fb2fdce4712ee1/small/algosec-fireflows-seamless-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec FireFlow's Seamless Integration with Remedy</video:title>
            <video:description>AlgoSec FireFlow complements existing change management systems with intelligent automation that enables IT to process firewall changes more quickly and with less risk.&lt;br /&gt;
This video examines how AlgoSec FireFlow seamlessly integrates with BMC Remedy to eliminate the need for opening and tracking change requests in multiple systems.</video:description>
            <video:publication_date>2019-02-14T18:32:42+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>232</video:duration>
            <video:category>Products</video:category>
            <video:tag>BMC Remedy</video:tag>
            <video:tag>change management</video:tag>
            <video:tag>change management system</video:tag>
            <video:tag>change workflow</video:tag>
            <video:tag>FireFlow</video:tag>
            <video:tag>firewall changes</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>Remedy</video:tag>
            <video:tag>ticketing system</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-fireflow-cms-integration</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182791</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107560/44182791/a1e882f1caba905fbc634760da08b808/video_medium/algosec-fireflow-cms-integration-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107560/44182791/a1e882f1caba905fbc634760da08b808/small/algosec-fireflow-cms-integration-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec FireFlow CMS Integration</video:title>
            <video:description>A demonstration of how AlgoSec FireFlow integrates with change management systems (in this case HP Service Manager) to add intelligent automation to the security change workflow.</video:description>
            <video:publication_date>2019-02-14T18:32:23+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>192</video:duration>
            <video:category>Products</video:category>
            <video:tag>FireFlow</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewall managment</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>security change management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-6-analyzing-routers-as-part</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182766</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/video_medium/lesson-6-analyzing-routers-as-part-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44182766/2f024d96dd0d23aa74a2f8fa6a4ac0c5/small/lesson-6-analyzing-routers-as-part-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 6: Analyzing Routers as Part of Your Security Policy</video:title>
            <video:description>Firewall Management 201: Lesson 6&lt;br /&gt;
In this lesson, Professor Wool examines some of the challenges when it comes to managing routers and access control lists (ACLs) and provides recommendations for including routers as part of your overall security policy with tips on change management, auditing and ACL optimization.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:31:53+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>289</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>access control lists</video:tag>
            <video:tag>ACLs</video:tag>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>fire wall change management</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall management 201</video:tag>
            <video:tag>firewall management software</video:tag>
            <video:tag>firewall management tools</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>router ACLs</video:tag>
            <video:tag>routers</video:tag>
            <video:tag>security</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-1-next-generation-firewalls</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182727</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/video_medium/lesson-1-next-generation-firewalls-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44182727/1ac281d49577cafce8bc246ba69434e3/small/lesson-1-next-generation-firewalls-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 1: Next-Generation Firewalls: Overview of Application and User-Aware Policies</video:title>
            <video:description>Next Generation Firewalls: Lesson 1&lt;br&gt;
In this lesson, Professor Wool examines next-generation firewalls and the granular capabilities they provide for improved control over applications and users.
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:31:10+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>544</video:duration>
            <video:category>Prof Wool: Next Generation Firewalls</video:category>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall management 201</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>next-generation firewalls</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>Technology</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-2-ngfws-whitelisting</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182711</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/video_medium/lesson-2-ngfws-whitelisting-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44182711/aa2c6bbe57878bf5156d1ea06e0353f3/small/lesson-2-ngfws-whitelisting-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 2: NGFWs - Whitelisting &amp; Blacklisting Policy Considerations</video:title>
            <video:description>Next Generation Firewalls: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the pros and cons of whitelisting and blacklisting policies and offers some recommendations on policy considerations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:30:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>635</video:duration>
            <video:category>Prof Wool: Next Generation Firewalls</video:category>
            <video:tag>blacklisting</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall policies</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>next-generation firewalls</video:tag>
            <video:tag>policy</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>whitelisting</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-2-automating-the-firewall</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182690</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/video_medium/lesson-2-automating-the-firewall-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44182690/da5caa63acf663010badf236bea69325/small/lesson-2-automating-the-firewall-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 2: Automating the Firewall Change Control Process</video:title>
            <video:description>Firewall Management 201: Lesson 2&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of managing firewall change requests and provides tips on how to automate the entire workflow.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:30:41+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>503</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>automate firewall changes</video:tag>
            <video:tag>firewall change control</video:tag>
            <video:tag>firewall change workflow</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/new-customer-collection-video</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182680</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/video_medium/new-customer-collection-video-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44182680/956a98b36cc3219b003c721a696b5053/small/new-customer-collection-video-thumbnail.jpg</video:thumbnail_loc>
            <video:title>New Customer Collection Video</video:title>
            <video:description></video:description>
            <video:publication_date>2019-02-14T18:30:20+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>166</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>fire wall change management</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewall management software</video:tag>
            <video:tag>firewall management tools</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/simplifying-firewall-audits-and</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182646</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/video_medium/simplifying-firewall-audits-and-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182646/7288f88413432a2d88381591c13209ee/small/simplifying-firewall-audits-and-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Simplifying Firewall Audits and Demonstrating Compliance</video:title>
            <video:description>AlgoSec Firewall Analyzer delivers out-of-the-box compliance reports for the widest range of industry standards including PCI-DSS, ISO 27001, Sarbanes Oxley and more. These reports help you dramatically reduce the time and effort required to prepare for audits - by as much as 80%.</video:description>
            <video:publication_date>2019-02-14T18:29:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>124</video:duration>
            <video:category>Products</video:category>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>Firewall analyzer</video:tag>
            <video:tag>firewall audit</video:tag>
            <video:tag>firewall compliance</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>ISO 27001</video:tag>
            <video:tag>IT audit</video:tag>
            <video:tag>PCI</video:tag>
            <video:tag>PCI audit</video:tag>
            <video:tag>PCI compliance</video:tag>
            <video:tag>PCI-DSS</video:tag>
            <video:tag>Sarbanes-Oxley compliance</video:tag>
            <video:tag>security audit</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>SOX</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-1-examining-the-most-common</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182624</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/video_medium/lesson-1-examining-the-most-common-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107547/44182624/d0b0094e9616d6c9f528a648df323567/small/lesson-1-examining-the-most-common-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 1: Examining the Most Common Firewall Misconfigurations</video:title>
            <video:description>Firewall Management 201: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool discusses his research on different firewall misconfigurations and provides tips for preventing the most common risks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:29:45+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>389</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall management software</video:tag>
            <video:tag>firewall misconfigurations</video:tag>
            <video:tag>firewall risk</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-4-tips-for-firewall-rule</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182607</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/video_medium/lesson-4-tips-for-firewall-rule-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44182607/dc89d0b912300da27e034e544e2dc875/small/lesson-4-tips-for-firewall-rule-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 4: Tips for Firewall Rule Recertification</video:title>
            <video:description>Firewall Management 201: Lesson 4&lt;br /&gt;
In this lesson, Professor Wool examines some tips for including firewall rule recertification as part of your change management process, including questions you should be asking and be able to answer as well as guidance on how to effectively recertify firewall rules.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:29:19+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>395</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>change management</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall management 201</video:tag>
            <video:tag>firewall rule</video:tag>
            <video:tag>firewall rule recertification</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>rule recertification</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/mitigating-risk-in-your-firewall</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182584</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/video_medium/mitigating-risk-in-your-firewall-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44182584/e810eb26140987749e5de78ef9aa7b26/small/mitigating-risk-in-your-firewall-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Mitigating Risk in Your Firewall Policy</video:title>
            <video:description>&lt;a href="http://www.algosec.com/"&gt;http://www.algosec.com/&lt;/a&gt; - AlgoSec Firewall Analyzer helps you understand the level of risk in your network security policy, providing complete visibility of your security posture and enabling you to mitigate risk across traditional and next-generation firewalls as well as routers. Firewall Analyzer analyzes your policy against the broadest database, which can also be customized to address your corporate policies, of more than 120 industry best practices, which includes application-based risks.</video:description>
            <video:publication_date>2019-02-14T18:28:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>221</video:duration>
            <video:category>Products</video:category>
            <video:tag>firewall analyzer</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>mitigate risk</video:tag>
            <video:tag>network risk</video:tag>
            <video:tag>network security policy</video:tag>
            <video:tag>next-generation firewalls</video:tag>
            <video:tag>policy analysis</video:tag>
            <video:tag>risk assessment</video:tag>
            <video:tag>routers</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/gain-visibility-of-your-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182556</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182556/0d9b61811497de1802b151bd0cfc4f44/video_medium/gain-visibility-of-your-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182556/0d9b61811497de1802b151bd0cfc4f44/small/gain-visibility-of-your-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Gain Visibility of Your Network with Topology Intelligence</video:title>
            <video:description>&lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; - AlgoSec Firewall Analyzer leverages powerful network topology intelligence to help you analyze and visualize complex networks. This brief demonstration examines AlgoSec's interactive topology map.</video:description>
            <video:publication_date>2019-02-14T18:28:22+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>135</video:duration>
            <video:category>Products</video:category>
            <video:tag>AFA</video:tag>
            <video:tag>analyze network topology</video:tag>
            <video:tag>firewall analysis</video:tag>
            <video:tag>firewall analysis tool</video:tag>
            <video:tag>firewall analyzer</video:tag>
            <video:tag>firewall rule analyzer</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network map</video:tag>
            <video:tag>Network Topology map</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/managing-the-security-policy-in</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182430</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/video_medium/managing-the-security-policy-in-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44182430/3980f51228641374a2c44937715ee7cd/small/managing-the-security-policy-in-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Managing the Security Policy in Your Data Center and Network</video:title>
            <video:description>Overwhelmed with managing the security policy in your data center and network? What if you could...&lt;/p&gt;
&lt;p&gt;Easily provision connectivity for your data center applications?&lt;br /&gt;
Process firewall changes 4x faster - and get it right every single time?&lt;br /&gt;
Discover and eliminate security policy misconfigurations?&lt;br /&gt;
Prepare for firewall audits at the click of a button?&lt;/p&gt;
&lt;p&gt;Now you can... with AlgoSec</video:description>
            <video:publication_date>2019-02-14T18:25:20+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>142</video:duration>
            <video:category>Products</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag>application connectivity management</video:tag>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>firewall audit</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security change management</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/tips-to-discover-business</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182417</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/video_medium/tips-to-discover-business-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44182417/80bdfba340732544d4906f71bfe7c61c/small/tips-to-discover-business-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Tips to Discover Business Application Connectivity Requirements</video:title>
            <video:description>Managing Business Application Connectivity: Lesson 3&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines how to leverage firewall rules for discovering the connectivity requirements of data center applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:25:10+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>424</video:duration>
            <video:category>Prof Wool: Managing Business Application Connectivity</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag>application connectivity</video:tag>
            <video:tag>application connectivity management</video:tag>
            <video:tag>business applications</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>data center applications</video:tag>
            <video:tag>datacenter applications</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/examining-the-need-for</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182409</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/video_medium/examining-the-need-for-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44182409/5f1d0c698cae1c93e39648727d821d53/small/examining-the-need-for-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Examining the Need for Application-Centric Security Policy Management</video:title>
            <video:description>Managing Business Application Connectivity: Lesson 1&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the challenges of managing data center applications and their connectivity requirements. Professor Wool also offers tips for bridging the gap between application owners and network and security teams - to ensure faster, more secure deployment, maintenance and decommissioning of critical applications.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:25:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>289</video:duration>
            <video:category>Prof Wool: Managing Business Application Connectivity</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag>business applications</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>data center applications</video:tag>
            <video:tag>decommission application</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-10-tips-to-simplify</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182380</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/video_medium/lesson-10-tips-to-simplify-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182380/e32f091cc2c3304f4ce552d35b7a0ccc/small/lesson-10-tips-to-simplify-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 10: Tips to Simplify Migrations to a Virtual Data Center</video:title>
            <video:description>Firewall Management 201: Lesson 10&lt;br /&gt;
In this lesson, Professor Wool examines the challenges of migrating business applications and physical data centers to a private cloud and offers tips to conduct these migrations without the risk of outages.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:24:45+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>293</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>business applications</video:tag>
            <video:tag>cloud migration</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>data center application</video:tag>
            <video:tag>data center consolidation</video:tag>
            <video:tag>datacenter consolidation</video:tag>
            <video:tag>data center migration</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>physical data center</video:tag>
            <video:tag>private cloud</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>virtual data center</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-7-examining-the-challenges</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182374</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/video_medium/lesson-7-examining-the-challenges-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107560/44182374/11f3ec0bd4c2c56ab1b60ec291133dd3/small/lesson-7-examining-the-challenges-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 7: Examining the Challenges of Accurately Simulating Network Routing</video:title>
            <video:description>Firewall Management 201: Lesson 7&lt;br /&gt;
In this lesson, Professor Wool examines the complex challenges of accurately simulating network routing, specifically drilling into three options for extracting the routing information from your network: SNMP, SSH and HSRP or VRPP.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:24:39+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>487</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>HSRP</video:tag>
            <video:tag>network routing</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>routing</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>SNMP</video:tag>
            <video:tag>SSH</video:tag>
            <video:tag>VRPP</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/application-centric-vulnerability</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182367</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/video_medium/application-centric-vulnerability-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107547/44182367/72365f6bd62eb3ef670bda01ab75deac/small/application-centric-vulnerability-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Application-Centric Vulnerability Management</video:title>
            <video:description>&lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; - Vulnerability management continues to be an important cornerstone of any cyber security program. But the unfortunate reality is that every organization has more vulnerabilities than they can realistically address. Traditionally, security teams have prioritized vulnerabilities in a very technology-centric fashion -- based on IP addresses, CVSS scores and threat path analysis -- this is not the language that business stakeholders speak or even understand.&lt;/p&gt;
&lt;p&gt;Application-Centric Vulnerability Management finally changes this paradigm -- for the first time, security teams can understand the risk in an entire business service -- complete with all its servers, databases, middleware, and the complex connectivity that's enabled by the underlying security infrastructure.</video:description>
            <video:publication_date>2019-02-14T18:24:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>139</video:duration>
            <video:category>Products</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag>application-centric vulnerability management</video:tag>
            <video:tag>application connectivity</video:tag>
            <video:tag>CVSS scores</video:tag>
            <video:tag>cyber security</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Qualys</video:tag>
            <video:tag>security</video:tag>
            <video:tag>security infrastructure</video:tag>
            <video:tag>vulnerabilities</video:tag>
            <video:tag>Vulnerability Management</video:tag>
            <video:tag>vulnerability scanner</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-to-prioritize-risk-from-the</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182336</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44182336/6d444df2442462b37bc75c32053992af/video_medium/how-to-prioritize-risk-from-the-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44182336/6d444df2442462b37bc75c32053992af/small/how-to-prioritize-risk-from-the-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to Prioritize Risk from the Business Perspective</video:title>
            <video:description>Managing Business Application Connectivity: Lesson 2
&lt;p&gt;In this lesson, Professor Wool discusses how to look at and prioritize network security vulnerabilities in a new way - from the perspective of the business applications in your data center.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:24:09+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>361</video:duration>
            <video:category>Prof Wool: Managing Business Application Connectivity</video:category>
            <video:tag>Network Security</video:tag>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/tips-for-secure-decommissioning-of</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182331</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/video_medium/tips-for-secure-decommissioning-of-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182331/d3adefaf0577207562515ea8e3018ec9/small/tips-for-secure-decommissioning-of-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Tips for Secure Decommissioning of Business Applications</video:title>
            <video:description>Managing Business Application Connectivity: Lesson 4
&lt;p&gt;In this lesson, Professor Wool examines the challenges of decommissioning business applications and offers recommendations for improving security without impacting network operations by removing firewall rules that are no longer in use.&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:24:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>499</video:duration>
            <video:category>Prof Wool: Managing Business Application Connectivity</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag>applications</video:tag>
            <video:tag>decommission</video:tag>
            <video:tag>decommissioning</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall operations management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network operations</video:tag>
            <video:tag>Professor Wool</video:tag>
            <video:tag>secure</video:tag>
            <video:tag>security</video:tag>
            <video:tag>security change management</video:tag>
            <video:tag>security management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-2-how-to-define-simplify-and</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182330</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/video_medium/lesson-2-how-to-define-simplify-and-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44182330/a971e559de70d0684d8858d2c05145fc/small/lesson-2-how-to-define-simplify-and-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 2: How to Define, Simplify and Enforce Network Segmentation and Security Zoning</video:title>
            <video:description>Network Segmentation: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool recommends a simple matrix to define network segments and security zones, and the traffic allowed to and from each zone. This matrix can then be used to immediately assess a firewall change requests as well as validate that existing security policies have been implemented correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:24:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>330</video:duration>
            <video:category>Prof Wool: Network Segmentation</video:category>
            <video:tag>Firewalls</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>network zoning</video:tag>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-overview-managing-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182317</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/video_medium/algosec-overview-managing-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182317/c689444345c25371b1dc1dc245a12deb/small/algosec-overview-managing-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Overview: Managing Security Policies in Your Data Center</video:title>
            <video:description>As your data centers and the security infrastructure that protects them continue to grow in size and complexity, so too does your security policy. Yet, manually managing complex security polices across devices and operations teams is no longer viable. It’s costly, risky and inefficient, and prevents you from keeping up with the speed of your business.&lt;/p&gt;
&lt;p&gt;What if you could manage your security policies in a way that's simple, automated, and orchestrated? Now you can with AlgoSec. AlgoSec empowers organizations to manage security at the speed of your business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security.</video:description>
            <video:publication_date>2019-02-14T18:23:58+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>132</video:duration>
            <video:category>Products</video:category>
            <video:tag>algosec businessflor</video:tag>
            <video:tag>algosec fireflow</video:tag>
            <video:tag>AlgoSec Security Policy Management</video:tag>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>Data Center</video:tag>
            <video:tag>Datacenters</video:tag>
            <video:tag>firewall auditing</video:tag>
            <video:tag>Firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>virtual datacenter</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-9-how-to-structure-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182306</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/video_medium/lesson-9-how-to-structure-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44182306/f008f7c1f97aa3aa33a02182c9c550d8/small/lesson-9-how-to-structure-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 9: How to Structure Network Objects to Plan for Future Policy Growth</video:title>
            <video:description>Firewall Management 201: Lesson 9&lt;br&gt;
In this lesson, Professor Wool explains how you can create templates - using network objects - for different types of services and network access which are reused by many different servers in your data center. Using this technique will save you from writing new firewall rules each time you provision or change a server, reduce errors, and allow you to provision and expand your server estate more quickly.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:23:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>334</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>data center</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>security software</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-3-common-mistakes-and-best</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182303</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/video_medium/lesson-3-common-mistakes-and-best-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44182303/01e5f51fd43db5def8186c84fe86ec65/small/lesson-3-common-mistakes-and-best-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 3: Common Mistakes and Best Practices for Designing Network Security Zones</video:title>
            <video:description>Network Segmentation: Lesson 3&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines common missteps when organizations create security zones and best practices to consider for an improved defense.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:23:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>405</video:duration>
            <video:category>Prof Wool: Network Segmentation</video:category>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network security zone</video:tag>
            <video:tag>network security zones</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>security zone</video:tag>
            <video:tag>security zones</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-3-using-object-naming</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182290</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/video_medium/lesson-3-using-object-naming-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465687/44182290/4797ebe9fab50b0c575eb5e0b6dac4eb/small/lesson-3-using-object-naming-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 3: Using Object Naming Conventions to Reduce Firewall Management Overhead</video:title>
            <video:description>Firewall Management 201: Lesson 3&lt;br /&gt;
In this lesson, Professor Wool offers some recommendations for simplifying firewall management overhead by defining and enforcing object naming conventions.&lt;br /&gt;
Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:23:39+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>323</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall object naming</video:tag>
            <video:tag>firewall objects</video:tag>
            <video:tag>firewall policy management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>object naming conventions</video:tag>
            <video:tag>Professor Wool</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-11-tips-for-filtering</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182282</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/video_medium/lesson-11-tips-for-filtering-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182282/d0a24cf40bd28e90e374321d72e5140a/small/lesson-11-tips-for-filtering-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 11: Tips for Filtering Traffic within a Private Cloud</video:title>
            <video:description>Firewall Management 201: Lesson 11&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides the example of a virtualized private cloud which uses hypervisor technology to connect to the outside world via a firewall.  If all worksloads within the private cloud share the same security requirements, this set up is adequate. But what happens if you want to run workloads with different security requirements within the cloud? Professor Wool explains the different options for filtering traffic within a private cloud, and discusses the challenges and solutions for managing them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:23:33+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>329</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>private cloud</video:tag>
            <video:tag>Professor Wool</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>virtual data center</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/protect-outbound-traffic-in-an-aws</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182267</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/video_medium/protect-outbound-traffic-in-an-aws-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182267/03b144c5631b7e1579c2666d1136adab/small/protect-outbound-traffic-in-an-aws-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Protect Outbound Traffic in an AWS Hybrid Environment</video:title>
            <video:description>Best Practices for Amazon Web Services (AWS) Security: Lesson 2&lt;/p&gt;
&lt;p&gt;Outbound traffic rules in AWS Security Groups are, by default, very wide and insecure. In addition, during the set-up process for AWS Security Groups the user is not intuitively guided through a set up process for outbound rules – the user must do this manually. In this lesson, Professor Wool, highlights the limitations and consequences of leaving the default rules in place, and provides recommendations on how to define outbound rules in AWS Security Groups in order to securely control and filter outbound traffic and protect against data leaks.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:23:20+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>263</video:duration>
            <video:category>Prof Wool: Best Practices for Amazon Web Services Security</video:category>
            <video:tag>AWS</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall misconfiguration</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-1-how-to-structure-your</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182257</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/video_medium/lesson-1-how-to-structure-your-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182257/f89558d6f367f66d2f7fd246d7b932ed/small/lesson-1-how-to-structure-your-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 1: How to Structure Your Security Policy in a Segmented Network</video:title>
            <video:description>Network Segmentation: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents a simple yet highly effective strategy to help you future proof your network segmentation policy against future changes. Using the concept of a diamond, Professor Wool shows how you can define very specific rules at each end point of the diamond and broader policies in the middle. This will significantly reduce the time and effort needed to work on change requests—without compromising on security in any way.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:23:13+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>394</video:duration>
            <video:category>Prof Wool: Network Segmentation</video:category>
            <video:tag>data center</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-5-the-challenges-of-east</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182248</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/video_medium/lesson-5-the-challenges-of-east-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107560/44182248/29825a33ac4f02b0fdd0df1d19c6aafc/small/lesson-5-the-challenges-of-east-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 5: The Challenges of East West Traffic Discovery for Network Segmentation</video:title>
            <video:description>Network Segmentation: Lesson 5&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool presents some of the challenges of setting up security policies for East-West traffic. On the one hand these policies need to allow all legitimate business traffic to flow through the data center, yet on the other hand they need to be very specific so as to block everything else. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:23:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>261</video:duration>
            <video:category>Prof Wool: Network Segmentation</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network security segmentation</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security</video:tag>
            <video:tag>security management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-4-using-next-generation</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182238</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/video_medium/lesson-4-using-next-generation-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107560/44182238/dab3bab204d4a15a112afe579c826e2d/small/lesson-4-using-next-generation-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 4: Using Next Generation Firewalls for Cyber Threat Prevention</video:title>
            <video:description>Next Generation Firewalls: Lesson 4&lt;br /&gt;
As part of the blacklisting approach to application security, most NGFW vendors now offer their customers a subscription based service that provides periodic updates to firewall definitions and signatures for a great number of applications especially the malicious ones. In this lesson, Professor Wool discusses the pros and cons of this offering for cyber threat prevention. It also discusses the limitations of this service when home-grown applications are deployed in the enterprise, and provides a  recommendation on how to solve this problem.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:22:59+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>348</video:duration>
            <video:category>Prof Wool: Next Generation Firewalls</video:category>
            <video:tag>cyber attack</video:tag>
            <video:tag>cyber threat</video:tag>
            <video:tag>cyber threat detection</video:tag>
            <video:tag>cyber threat prevention</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Next-Generation Firewall</video:tag>
            <video:tag>ngfw</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-8-nat-considerations-when</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182234</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/video_medium/lesson-8-nat-considerations-when-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44182234/c4e501a5254536aa42ad741dacb80d20/small/lesson-8-nat-considerations-when-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 8: NAT Considerations When Managing Your Security Policy</video:title>
            <video:description>Firewall Management 201: Lesson 8&lt;br /&gt;
A business owner makes a simple change request to allow traffic to a new application. You now need to figure out the right firewall rules to change. This should be pretty simple… but what if you’re using NAT (Network Address Translation) in your environment? In this lesson, Professor Wool explains some key principles of NATing and why it’s critical to understand your NAT policy in order to identify the right paths for network traffic, which firewalls rules really need to be modified, and how to write your security policy correctly.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:22:56+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>397</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network address translation</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>network security policy</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-4-data-center-segmentation</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182229</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/video_medium/lesson-4-data-center-segmentation-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44182229/e7de21fde97412592b2fd22ec86e6e4a/small/lesson-4-data-center-segmentation-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 4: Data Center Segmentation Best Practices</video:title>
            <video:description>Network Segmentation: Lesson 4&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool provides recommendations for how to design your network for optimal segmentation in two typical scenarios: Allowing traffic from an external partner application into the corporate data center, and structuring network traffic flows within the data center to force specific flows with more check points for better security.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:22:51+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>308</video:duration>
            <video:category>Prof Wool: Network Segmentation</video:category>
            <video:tag>Data Center</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network security segmentation</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security</video:tag>
            <video:tag>security management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-case-study-bmfbovespa</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182218</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/video_medium/algosec-case-study-bmfbovespa-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182218/da4aa7916a2a3d8d1db6908cd39cc56f/small/algosec-case-study-bmfbovespa-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Case Study: BM&amp;FBOVESPA (English)</video:title>
            <video:description>Hear Wellington Vita, Information Security Manager, explain how AlgoSec helps BM&amp;FBOVESPA maintain a secure, compliant trading environment.</video:description>
            <video:publication_date>2019-02-14T18:22:40+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>281</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>AlgoSec (Business Operation)</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security policy</video:tag>
            <video:tag>security software</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-fundamentals-of-aws-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182199</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/video_medium/the-fundamentals-of-aws-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44182199/e55f13e53dac1f9b30c7fc1ff4de07da/small/the-fundamentals-of-aws-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The Fundamentals of AWS Security Groups</video:title>
            <video:description>Best Practices for Amazon Web Services (AWS) Security: Lesson 1&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides an overview of Amazon Web Services (AWS) Security Groups and highlights some of the differences between Security Groups and traditional firewalls. The lesson continues by explaining some of the unique features of AWS and the challenges and benefits of being able to apply multiple Security Groups to a single instance.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:22:14+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>298</video:duration>
            <video:category>Prof Wool: Best Practices for Amazon Web Services Security</video:category>
            <video:tag>Amazon Web Services (Website)</video:tag>
            <video:tag>aws</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall policy management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>hybrid environment</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-3-best-practices-for</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182196</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/video_medium/lesson-3-best-practices-for-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465687/44182196/9215d82e7075332ada9014679d1d6b7b/small/lesson-3-best-practices-for-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 3: Best Practices for Bringing NSX Security Policy Management into the InfoSec Fold</video:title>
            <video:description>Network Security for VMware NSX: Lesson 3&lt;/p&gt;
&lt;p&gt;Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment.</video:description>
            <video:publication_date>2019-02-14T18:22:11+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>297</video:duration>
            <video:category>Prof Wool: Network Security for VMware NSX</video:category>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>auditing</video:tag>
            <video:tag>east west traffic</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>firewall security</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>nsx</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>vmware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/change-management-auditing-and</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182182</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/video_medium/change-management-auditing-and-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44182182/d0cea2f1b49838b5d93d68f90d8d099e/small/change-management-auditing-and-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Change Management, Auditing and Compliance in an AWS Hybrid Environment</video:title>
            <video:description>Best Practices for Amazon Web Services (AWS) Security: Lesson 3&lt;/p&gt;
&lt;p&gt;Once you start using AWS for production applications, auditing and compliance considerations come into play, especially if these applications are processing data that is subject to regulations such as PCI, HIPAA, SOX etc. In this lesson, Professor Wool reviews AWS’s own auditing tools, CloudWatch and CloudTrail, which are useful for cloud-based applications. However if you are running a hybrid data center, you will likely need to augment these tools with solutions that can provide reporting, visibility and change monitoring across the entire environment. Professor Wool provides some recommendations for key features and functionally you’ll need to ensure compliance, and tips on what the auditors are looking for.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:21:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>382</video:duration>
            <video:category>Prof Wool: Best Practices for Amazon Web Services Security</video:category>
            <video:tag>aws</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>hipaa</video:tag>
            <video:tag>hybrid cloud</video:tag>
            <video:tag>hybrid environments</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>pci</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Regulatory Compliance</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>sox</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-6-how-to-build-firewall</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182175</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/video_medium/lesson-6-how-to-build-firewall-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44182175/0b703ddeea2e989e3bc350549757ce6a/small/lesson-6-how-to-build-firewall-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 6: How to Build Firewall Policies for East West Traffic</video:title>
            <video:description>Network Segmentation: Lesson 6&lt;/p&gt;
&lt;p&gt;Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:21:50+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>439</video:duration>
            <video:category>Prof Wool: Network Segmentation</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>security network segmentation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-3-managing-your-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182171</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/video_medium/lesson-3-managing-your-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107547/44182171/b9e12ad72654514540985c604cfa8e53/small/lesson-3-managing-your-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 3: Managing Your Security Policy in a Mixed Next Gen and Traditional Firewall Environment</video:title>
            <video:description>Next Generation Firewalls: Lesson 3&lt;br /&gt;
Next generation firewalls (NGFWs) allow you to manage security policies with much greater granularity, based on specific applications and users, which provides much greater control over the traffic you want to allow or deny. Today, NGFWs are usually deployed alongside traditional firewalls. Therefore change requests need to be written using each firewall type’s specific terminology; application names and default ports for NGFWs, and actual protocols and ports for traditional firewalls. This new lesson explains some of challenges of writing firewall rules for a mixed firewall environment, and how to address them.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:21:47+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>351</video:duration>
            <video:category>Prof Wool: Next Generation Firewalls</video:category>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>next generation firewall</video:tag>
            <video:tag>ngfw</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-1-migrating-to-nsx</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182155</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/video_medium/lesson-1-migrating-to-nsx-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44182155/def81240212859275a1a7e8e49361dd8/small/lesson-1-migrating-to-nsx-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 1: Migrating to NSX: Understanding the Why in Order to Figure Out the How</video:title>
            <video:description>VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com</video:description>
            <video:publication_date>2019-02-14T18:21:28+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>319</video:duration>
            <video:category>Prof Wool: Network Security for VMware NSX</video:category>
            <video:tag>Data Center</video:tag>
            <video:tag>east west traffic</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>firewall security</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>nsx</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>vmware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-12-managing-your-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182154</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/video_medium/lesson-12-managing-your-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44182154/1ab2e958faa7e5fa8581da3380b0a834/small/lesson-12-managing-your-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 12: Managing Your Security Policy for Disaster Recovery</video:title>
            <video:description>In this lesson Professor Wool discusses ways to ensure that your security policy on your primary site and on your disaster recovery (DR) site are always sync. He presents multiple scenarios: where the DR and primary site use the exact same firewalls, where different vendor solutions or different models are used on the DR site, and where the IP address is or is not the same on the two sites.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:21:27+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>318</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>Disaster Recovery</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>security policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/combining-security-groups-and</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182148</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/video_medium/combining-security-groups-and-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107560/44182148/92cd6dd9ebc61271a4111bbc26bec00d/small/combining-security-groups-and-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Combining Security Groups and Network ACLs to Bypass AWS Capacity Limitations</video:title>
            <video:description>Best Practices for Amazon Web Services (AWS) Security: Lesson 5&lt;/p&gt;
&lt;p&gt;AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group.  In this lesson Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:21:21+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>393</video:duration>
            <video:category>Prof Wool: Best Practices for Amazon Web Services Security</video:category>
            <video:tag>amazon security</video:tag>
            <video:tag>amazon security groups</video:tag>
            <video:tag>aws</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall misconfiguration</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>nacl</video:tag>
            <video:tag>network access control lists</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-13-zero-touch-change</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182144</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/video_medium/lesson-13-zero-touch-change-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44182144/e254cfe4860678b02481a8ea15c6745f/small/lesson-13-zero-touch-change-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 13: Zero-Touch Change Management with Checks and Balances</video:title>
            <video:description>Firewall Management 201: Lesson 13&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. He explains how, using conditional logic, its possible to significantly speed up security policy change management while maintaining control and ensuring accuracy throughout the process.</video:description>
            <video:publication_date>2019-02-14T18:21:19+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>423</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>firewall management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network operations</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>professor wool</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>security policy change management</video:tag>
            <video:tag>zero touch automation</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/best-practices-for-incorporating</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182114</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/video_medium/best-practices-for-incorporating-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44182114/c49b17648815f3daa2a78afe31fd3ad6/small/best-practices-for-incorporating-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Best Practices for Incorporating Security Automation into the DevOps Lifecycle</video:title>
            <video:description>Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this lesson, Professor Wool examines the need for and the process of adjusting application connectivity throughout each stage of the DevOps lifecycle.&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:20:44+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>387</video:duration>
            <video:category>Prof Wool: Best Practices: Incorporating Security into DevOps</video:category>
            <video:tag>Devops</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>security policy change management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosecs-vision-for-business-driven</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182109</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44182109/6f852420311e85e47028a7a3d7664b70/video_medium/algosecs-vision-for-business-driven-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44182109/6f852420311e85e47028a7a3d7664b70/small/algosecs-vision-for-business-driven-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec's Vision for Business-Driven Security Policy Management - Yuval Baron</video:title>
            <video:description>Hear from AlgoSec's CEO, Yuval Baron, why enterprises need a business-driven approach to security management, and how AlgoSec translates this vision into reality to enable the world’s largest and most complex organizations to manage security based on what matters most – the application that powers their organizations.</video:description>
            <video:publication_date>2019-02-14T18:20:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>160</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-2-tips-on-how-to-create</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182098</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/video_medium/lesson-2-tips-on-how-to-create-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44182098/ce089eaa3bad2d6123444b73d7e938e8/small/lesson-2-tips-on-how-to-create-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 2: Tips on How to Create Filtering Policies for NSX</video:title>
            <video:description>Network Security for VMware NSX: Lesson 2&lt;/p&gt;
&lt;p&gt;When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts athttp://blog.algosec.com</video:description>
            <video:publication_date>2019-02-14T18:20:24+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>381</video:duration>
            <video:category>Prof Wool: Network Security for VMware NSX</video:category>
            <video:tag>east west traffic</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>firewall security</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>nsx</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>vmware</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/using-aws-network-acls-for-enhanced</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182088</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/video_medium/using-aws-network-acls-for-enhanced-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44182088/c3e563d70dbfbdadd99c127bdbee633d/small/using-aws-network-acls-for-enhanced-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Using AWS Network ACLs for Enhanced Traffic Filtering</video:title>
            <video:description>In this lesson Professor Wool examines the differences between Amazon's Security Groups and Network Access Control Lists (NACLs), and provides some tips and tricks on how to use them together for the most effective and flexible traffic filtering for your enterprise.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:20:13+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>420</video:duration>
            <video:category>Prof Wool: Best Practices for Amazon Web Services Security</video:category>
            <video:tag>aws</video:tag>
            <video:tag>aws security</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall misconfiguration</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>nacl</video:tag>
            <video:tag>nacls</video:tag>
            <video:tag>network access control lists</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-aci-and-algosec-integration-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182087</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/video_medium/cisco-aci-and-algosec-integration-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44182087/dcd1a526c8336ca642a67e763c8639bd/small/cisco-aci-and-algosec-integration-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco ACI and AlgoSec Integration (Overview and Demo)</video:title>
            <video:description>Enhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com</video:description>
            <video:publication_date>2019-02-14T18:20:12+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>458</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>cisco</video:tag>
            <video:tag>epgs</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-1-how-to-bring-business</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182073</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182073/a56a7b4cd02011edfe60a8dc31f51281/video_medium/lesson-1-how-to-bring-business-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182073/a56a7b4cd02011edfe60a8dc31f51281/small/lesson-1-how-to-bring-business-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 1: How to Bring Business Context into Incident Response</video:title>
            <video:description>Advanced Cyber Threat and Incident Management: Lesson 1&lt;/p&gt;
&lt;p&gt;SIEM solutions collect and analyze logs generated by the technology infrastructure, security systems and business applications. The Security Operations Center (SOC) team uses this information to identify and flag suspicious activity for further investigation. In this lesson, Professor Wool explains why it’s important to connect the information collected by the SIEM with other databases that provide information on application connectivity, in order to make informed decisions on the level of risk to the business, and the steps the SOC needs to take to neutralize the attack.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:19:52+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>334</video:duration>
            <video:category>Prof Wool: Advanced Cyber Threat and Incident Management</video:category>
            <video:tag>cyberattack</video:tag>
            <video:tag>cyber attack</video:tag>
            <video:tag>cyber threat</video:tag>
            <video:tag>incident resonse</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Incident and Event Magement</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>siem</video:tag>
            <video:tag>splunk</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-14-synchronized-object</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182061</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/video_medium/lesson-14-synchronized-object-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107560/44182061/21c66ed92e36977f79bf555977f026be/small/lesson-14-synchronized-object-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 14: Synchronized Object Management in a Multi-Vendor Environment</video:title>
            <video:description>Firewall Management 201: Lesson 14&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Many organizations have different types of firewalls from multiple vendors, which typically means there is no single source for naming and managing network objects. This ends up creating duplication, confusion, mistakes and network connectivity problems especially when a new change request is generated and you need to know which network object to refer to. In this lesson Profession Wool provides tips and best practices for how to synchronize network objects in a multi-vendor environment for both legacy scenarios, and greenfield scenarios.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:19:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>399</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>firewall security</video:tag>
            <video:tag>network management</video:tag>
            <video:tag>network objects</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-splunk-app-for-incident</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182052</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/video_medium/algosec-splunk-app-for-incident-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44182052/0c4d10edf34317e11d28581651e31def/small/algosec-splunk-app-for-incident-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Splunk App for Incident Response</video:title>
            <video:description>This video demonstrates a new AlgoSec App for incident response which integrates with Splunk.&lt;/p&gt;
&lt;p&gt;Splunk can detect and analyze potential breaches while AlgoSec manages security policies and augments them with business context.&lt;/p&gt;
&lt;p&gt;The new AlgoSec Splunk App enhances and automates incident response by highlighting the potential impact on business applications and business processes; adding information regarding the infected server's exposure to the internet, or access to sensitive internal networks; and automating the action needed to contain the incident.</video:description>
            <video:publication_date>2019-02-14T18:19:23+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>214</video:duration>
            <video:category>Products</video:category>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>incident response</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security information and event management</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>SIEM</video:tag>
            <video:tag>Splunk</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-16-how-to-take-control-of-a</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182049</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/video_medium/lesson-16-how-to-take-control-of-a-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182049/4cf23ef44547986e20b5679b559b1b5e/small/lesson-16-how-to-take-control-of-a-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 16: How to Take Control of a Firewall Migration Project</video:title>
            <video:description>Firewall Management 201: Lesson 16&lt;/p&gt;
&lt;p&gt;Some companies use tools to automatically convert firewall rules from an old firewall, due to be retired, to a new firewall. In this lesson, Professor Wool explains why this process can be risky and provides some specific technical examples. He then presents a more realistic way to manage the firewall rule migration process that involves stages and checks and balances to ensure a smooth, secure transition to the new firewall that maintains secure connectivity.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:19:22+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>379</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall migration</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>ngfw</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-algosec-qradar-app-for-incident</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182027</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/video_medium/the-algosec-qradar-app-for-incident-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44182027/697b47e70fcfbb1d2c48e4c514506a03/small/the-algosec-qradar-app-for-incident-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The AlgoSec QRadar App for Incident Response</video:title>
            <video:description>This video demonstrates a new AlgoSec App for incident response which integrates with the IBM QRadar Security Intelligence Platform.&lt;/p&gt;
&lt;p&gt;Through AlgoSec’s integration with IBM QRadar, this App enhances and automates the Security Incident Response process by:&lt;/p&gt;
&lt;p&gt;* Augmenting security incident data with business context&lt;br /&gt;
* Automatically associating applications with compromised servers&lt;br /&gt;
* Identifying network connectivity to/from a compromised server&lt;br /&gt;
* Automatically isolating a compromised server from the network</video:description>
            <video:publication_date>2019-02-14T18:19:00+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>388</video:duration>
            <video:category>Products</video:category>
            <video:tag>cyber attacks</video:tag>
            <video:tag>cyber threats</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>IBM QRadar</video:tag>
            <video:tag>incident response</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security intelligence</video:tag>
            <video:tag>security intelligence platform</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algobot-your-network-security-3</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182026</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44182026/191a7562fe3e5c1b0708ca8f801c9c65/video_medium/algobot-your-network-security-3-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44182026/191a7562fe3e5c1b0708ca8f801c9c65/small/algobot-your-network-security-3-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoBot: Your Network Security Policy Management Assistant (3 of 3)</video:title>
            <video:description>With the AlgoBot you can take care of network security policy management tasks from the comfort of your chat room or mobile device.
&lt;p&gt;Ideal for:&lt;br&gt;
- Business/IT Application Owners&lt;br&gt;
- Network Security Teams&lt;br&gt;
- Cyber Operation Analysts&lt;br&gt;
- Help Desk and IT Support&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:19:00+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>223</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-2-bringing-reachability</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182021</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/video_medium/lesson-2-bringing-reachability-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44182021/b0d85fa329b1dfbdd446266c8b43a5f3/small/lesson-2-bringing-reachability-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 2: Bringing Reachability Analysis into Incident Response</video:title>
            <video:description>Advanced Cyber Threat and Incident Management: Lesson 2&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool discusses the need for reachability analysis in order to assess the severity of the threat and potential impact of an incident. Professor Wool explains how to use traffic simulations to map connectivity paths to/from compromised servers and to/from the internet. By mapping the potential lateral movement paths of an attacker across the network, the SOC team can, for example, proactively take action to prevent data exfiltration or block incoming communications with Command and Control servers.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:18:56+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>336</video:duration>
            <video:category>Prof Wool: Advanced Cyber Threat and Incident Management</video:category>
            <video:tag>cyberattack</video:tag>
            <video:tag>cyber attack</video:tag>
            <video:tag>cyber threat</video:tag>
            <video:tag>incident response</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security incident and event management</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>security policy</video:tag>
            <video:tag>siem</video:tag>
            <video:tag>splunk</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-15-how-to-synchronize-object</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44182008</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/video_medium/lesson-15-how-to-synchronize-object-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44182008/13a6814f2c37052c1fb387ad7ea20522/small/lesson-15-how-to-synchronize-object-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 15: How to Synchronize Object Management with a CMDB</video:title>
            <video:description>Firewall Management 201: Lesson 15&lt;/p&gt;
&lt;p&gt;Many organizations have both a firewall management system as well as a CMDB, yet these systems do not communicate with each other and their data is not synchronized. This becomes a problem when making security policy change requests, and typically someone needs to manually translate the names used by in the firewall management system to the name in the CMDB, which is a slow and error-prone process, in order for the change request to work.&lt;/p&gt;
&lt;p&gt;In this lesson Professor Wool provides tips on how to use a network security policy management to coordinate between the two system, match the object names, and then automatically populate the change management process with the correct names and definitions.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:18:38+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>298</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>cmdb</video:tag>
            <video:tag>firewall changes</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>network management</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-right-way-to-audit-aws-policies</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181993</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/video_medium/the-right-way-to-audit-aws-policies-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465687/44181993/b1c1f67722fb6eb47731b6e174f7b8ae/small/the-right-way-to-audit-aws-policies-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The Right Way to Audit AWS Policies</video:title>
            <video:description>Best Practices for Amazon Web Services (AWS) Security: Lesson 6&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In this whiteboard video lesson Professor Wool provides best practices for performing security audits across your AWS estate.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:18:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>380</video:duration>
            <video:category>Prof Wool: Best Practices for Amazon Web Services Security</video:category>
            <video:tag>amazon security</video:tag>
            <video:tag>amazon security groups</video:tag>
            <video:tag>aws</video:tag>
            <video:tag>cloud firewalls</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Firewalls</video:tag>
            <video:tag>hybrid cloud security</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>public cloud security</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-to-integrate-security-into-the-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181992</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/video_medium/how-to-integrate-security-into-the-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107547/44181992/530e283f33821556fb69c84052c07c98/small/how-to-integrate-security-into-the-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to Integrate Security into the Test Environment</video:title>
            <video:description>Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In a typical DevOps scenario development team adds new functionality to an existing business application and then rolls it out into production. However, while the new functionality worked as planned in both the test and pre-production environments, the application then fails when moved into the live production environment. In this video, Professor Wool will discuss the reasons why this process went wrong, and how you can fix it.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:18:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>292</video:duration>
            <video:category>Prof Wool: Best Practices: Incorporating Security into DevOps</video:category>
            <video:tag>Devops</video:tag>
            <video:tag>Firewall management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/demo-algosecs-cisco-aci-app-center</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181981</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/video_medium/demo-algosecs-cisco-aci-app-center-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465687/44181981/cd6ffbb3cb4ab2fd653726f5bec24c85/small/demo-algosecs-cisco-aci-app-center-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Demo: AlgoSec's Cisco ACI App Center</video:title>
            <video:description>The AlgoSec Connectivity and Compliance App provides insights into your network and security posture, including a current snapshot of risk and compliance across your ACI fabric.
&lt;p&gt;Key capabilities of the App include:&lt;/p&gt;
&lt;p&gt;- Traffic assessment to determine if specific traffic is traversing the network or if its blocked -  including visibility into security devices and their status across the traffic route&lt;/p&gt;
&lt;p&gt;- The ability to automatically update the firewall policy in the event that connectivity is blocked erroneously&lt;/p&gt;
&lt;p&gt;- Instant risk analysis for Cisco ACI contracts alongside firewall security policies&lt;/p&gt;
&lt;p&gt;- A detailed PCI compliance report for your Cisco ACI fabric, that’s ready for auditors&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:17:55+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>385</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>ACI Fabric</video:tag>
            <video:tag>AlgoSec Cisco ACI App</video:tag>
            <video:tag>Audit and Compliance</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>Cisco ACI App</video:tag>
            <video:tag>epgs</video:tag>
            <video:tag>Firewall management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algobot-your-network-security-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181977</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44181977/d322e46911eceae0cea3a6fd8195eaaa/video_medium/algobot-your-network-security-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44181977/d322e46911eceae0cea3a6fd8195eaaa/small/algobot-your-network-security-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoBot: Your Network Security Policy Management Assistant (2 of 3)</video:title>
            <video:description>With the AlgoBot you can take care of network security policy management tasks from the comfort of your chat room or mobile device.&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Ideal for:&lt;br&gt;
- Business/IT Application Owners&lt;br&gt;
- Network Security Teams&lt;br&gt;
- Cyber Operation Analysts&lt;br&gt;
- Help Desk and IT Support&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:17:50+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>266</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/onboarding-new-firewall-devices</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181964</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/video_medium/onboarding-new-firewall-devices-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107547/44181964/e10b23fea5f80c6a1fe1337d28d4fc53/small/onboarding-new-firewall-devices-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Onboarding New Firewall Devices Using AlgoSec's APIs</video:title>
            <video:description>Security integration is a common requirement for many enterprise customers and MSSPs. This video showcases the process to operationalize this requirements including:&lt;br /&gt;
1. Onboarding new firewall devices through a web portal&lt;br /&gt;
2. Easily get compliance scores for newly onboarded devices&lt;br /&gt;
3. Identify firewall cleanup opportunities&lt;br /&gt;
4. Identify if security policies are blocking application connectivity</video:description>
            <video:publication_date>2019-02-14T18:17:27+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>301</video:duration>
            <video:category>Products</video:category>
            <video:tag>firewall management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>mssps</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-and-cisco-tetration</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181951</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44181951/ac6973972ef7d0562691a0df575176e3/video_medium/algosec-and-cisco-tetration-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44181951/ac6973972ef7d0562691a0df575176e3/small/algosec-and-cisco-tetration-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec and Cisco Tetration Analytics Demo</video:title>
            <video:description>AlgoSec &amp;amp; Tetration - A Joint Solution&lt;br&gt;&lt;ul&gt;&lt;li&gt;Discover application connectivity and dependencies&lt;/li&gt;&lt;li&gt;Automatically map business applications to underlying network security infrastructure&lt;/li&gt;&lt;li&gt;Business-driven risk, vulnerabilities, and compliance analysis&lt;/li&gt;&lt;li&gt;Troubleshoot application connectivity issues&lt;/li&gt;&lt;li&gt;Automatically implement a white-list security policy in hybrid&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;</video:description>
            <video:publication_date>2019-02-14T18:17:05+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>343</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>cisco tetration</video:tag>
            <video:tag>hybrid cloud</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/tips-for-adding-capacity-without</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181948</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/video_medium/tips-for-adding-capacity-without-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44181948/0ccdc09b741f04206dd36b3f659e9519/small/tips-for-adding-capacity-without-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Tips for Adding Capacity Without Changing Your Security Policies</video:title>
            <video:description>Best Practices for Incorporating Security into DevOps&lt;p&gt;&lt;/p&gt;
&lt;p&gt;In theory adding capacity should be fairly straightforward, with minimal need for any intervention by the organization’s security team. But in practice it’s a little more complex. In this video Professor Wool provides some tips and best practices to help you add capacity without having to change your security policies, complete a security review or worse still, cause an outage or gap in the security perimeter.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:17:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>446</video:duration>
            <video:category>Prof Wool: Best Practices: Incorporating Security into DevOps</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>DevOps</video:tag>
            <video:tag>Firewall management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-17-pci-linking</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181937</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/video_medium/lesson-17-pci-linking-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44181937/fdf0e5036006d18cfb40fc57ac280e8d/small/lesson-17-pci-linking-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 17: PCI - Linking Vulnerabilities to Business Applications</video:title>
            <video:description>Firewall Management 201: Lesson 17&lt;/p&gt;
&lt;p&gt;PCI-DSS 3.2 regulation requirement 6.1 mandates that organizations establish a process for identifying security vulnerabilities on the servers that are within the scope of PCI. In this new lesson, Professor Wool explains how to address this requirement by presenting vulnerability data by both the servers and the by business processes that rely on each server. He discusses why this method is important and how it allows companies to achieve compliance while ensuring ongoing business operations.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:16:51+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>281</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>nessus</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>pci</video:tag>
            <video:tag>pci dss</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>rapid7</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>tenable</video:tag>
            <video:tag>vulnerabilities</video:tag>
            <video:tag>vulnerability scanners</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-to-intelligently-select-the</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181920</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/video_medium/how-to-intelligently-select-the-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44181920/1772ee30e20c98c8d8c7667649d3e7cc/small/how-to-intelligently-select-the-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to Intelligently Select the Security Groups to Modify When Managing Changes in AWS</video:title>
            <video:description>Best Practices for Amazon Web Services (AWS) Security: Lesson 7&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:16:31+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>419</video:duration>
            <video:category>Prof Wool: Best Practices for Amazon Web Services Security</video:category>
            <video:tag>amazon security</video:tag>
            <video:tag>amazon security groups</video:tag>
            <video:tag>aws</video:tag>
            <video:tag>cloud firewalls</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>hybrid cloud security</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>public cloud security</video:tag>
            <video:tag>publick cloud</video:tag>
            <video:tag>SDN</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-to-integrate-security-into-the</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181918</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/video_medium/how-to-integrate-security-into-the-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44181918/0181d939b45c1552d4f90366f73e9c01/small/how-to-integrate-security-into-the-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to Integrate Security into the CI Process</video:title>
            <video:description>Best Practices for Incorporating Security into DevOps&lt;/p&gt;
&lt;p&gt;In previous lessons Professor Wool discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live.  In this whiteboard video Professor Wool looks at how security automation helps to speed up the practice of Continuous Integration (CI) - a core element of DevOps.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:16:30+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>329</video:duration>
            <video:category>Prof Wool: Best Practices: Incorporating Security into DevOps</video:category>
            <video:tag>cloud security</video:tag>
            <video:tag>DevOps</video:tag>
            <video:tag>Firewall management</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-different-data-sources-for</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181914</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/video_medium/the-different-data-sources-for-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44181914/e939292f9bdaa1169eabd25695c8c0a5/small/the-different-data-sources-for-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The Different Data Sources for Application Connectivity Discovery</video:title>
            <video:description>Managing Business Application Connectivity: Lesson 6
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:16:28+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>340</video:duration>
            <video:category>Prof Wool: Managing Business Application Connectivity</video:category>
            <video:tag>application connectivity</video:tag>
            <video:tag>application discovery</video:tag>
            <video:tag>application flows</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network connectivity flows</video:tag>
            <video:tag>network sniffers</video:tag>
            <video:tag>network traffic</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>prof. wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/how-to-automatically-identify</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181877</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/video_medium/how-to-automatically-identify-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44181877/c2388410abe5deb84379c4ee696b5036/small/how-to-automatically-identify-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to Automatically Identify Business Application Connectivity Needs from Network Traffic</video:title>
            <video:description>Managing Business Application Connectivity: Lesson 5
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:15:29+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>410</video:duration>
            <video:category>Prof Wool: Managing Business Application Connectivity</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag>application connectivity</video:tag>
            <video:tag>application connectivity management</video:tag>
            <video:tag>application flows</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>data center</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>network connectivity flows</video:tag>
            <video:tag>Network Security</video:tag>
            <video:tag>network sniffers</video:tag>
            <video:tag>network traffic</video:tag>
            <video:tag>prof wool</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-7-how-to-aggregate-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181876</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/video_medium/lesson-7-how-to-aggregate-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44181876/d5894f7ffc54d4f9858292bb6ee2723c/small/lesson-7-how-to-aggregate-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 7: How to Aggregate Network Flows Into Application Flows</video:title>
            <video:description>Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:15:29+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>348</video:duration>
            <video:category>Prof Wool: Network Segmentation</video:category>
            <video:tag>algosec</video:tag>
            <video:tag>application connectivity</video:tag>
            <video:tag>application discovery</video:tag>
            <video:tag>application flows</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>data center applications</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network connectivity flows</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network sniffers</video:tag>
            <video:tag>network traffic</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>security</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algobot-your-network-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181869</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107547/44181869/2f147baaf21a285b49a99fe69b598136/video_medium/algobot-your-network-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107547/44181869/2f147baaf21a285b49a99fe69b598136/small/algobot-your-network-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoBot: Your Network Security Policy Management Assistant</video:title>
            <video:description>With AlgoBot you can take care of network security policy management tasks from the comfort of your chat room or mobile device.
&lt;p&gt;Ideal for:&lt;br&gt;
- Business/IT Application Owners&lt;br&gt;
- Network Security Teams&lt;br&gt;
- Cyber Operation Analysts&lt;br&gt;
- Help Desk and IT Support&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:15:25+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>360</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/the-benefits-of-mapping-firewall</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181854</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/video_medium/the-benefits-of-mapping-firewall-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465687/44181854/72ce166d6692eacad1d4807eb07ea18e/small/the-benefits-of-mapping-firewall-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The Benefits of Mapping Firewall Rules to Business Applications</video:title>
            <video:description>Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:15:13+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>243</video:duration>
            <video:category>Prof Wool: Managing Business Application Connectivity</video:category>
            <video:tag>algosec</video:tag>
            <video:tag>application connectivity flows</video:tag>
            <video:tag>businessflow</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall rule management</video:tag>
            <video:tag>network connectivity</video:tag>
            <video:tag>network connectivity flows</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network traffic</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/new-how-to-manage-dynamic-objects</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181841</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/video_medium/new-how-to-manage-dynamic-objects-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44181841/0524b2eaa5d233030ef32c3f04935a7b/small/new-how-to-manage-dynamic-objects-thumbnail.jpg</video:thumbnail_loc>
            <video:title>New! How to Manage Dynamic Objects in Cloud Environments</video:title>
            <video:description>Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:14:49+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>359</video:duration>
            <video:category>Prof Wool: Best Practices for Amazon Web Services Security</video:category>
            <video:tag>amazon web services security</video:tag>
            <video:tag>avishai wool</video:tag>
            <video:tag>aws</video:tag>
            <video:tag>aws security</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>dynamic objects aws</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewall rule management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>prof. wool</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-eyecatcher-video-2020</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181821</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44181821/0a990ed07d6335c7870416b1d0c51088/video_medium/algosec-eyecatcher-video-2020-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44181821/0a990ed07d6335c7870416b1d0c51088/small/algosec-eyecatcher-video-2020-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Eyecatcher Video 2020</video:title>
            <video:description>AlgoSec corporate video - check out what we do in this 2 min presentation.</video:description>
            <video:publication_date>2019-02-14T18:14:18+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>124</video:duration>
            <video:category>Products</video:category>
            <video:tag>corporate</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/lesson-7-how-to-prepare-for-network</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181819</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/video_medium/lesson-7-how-to-prepare-for-network-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44181819/f796f81cc13de312cc8c7bd06b607f5b/small/lesson-7-how-to-prepare-for-network-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Lesson 7: How to Prepare for Network Segmentation by Identifying the Segment Borders</video:title>
            <video:description>Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at</video:description>
            <video:publication_date>2019-02-14T18:14:18+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>247</video:duration>
            <video:category>Prof Wool: Managing Business Application Connectivity</video:category>
            <video:tag>algosec</video:tag>
            <video:tag>avishai wool</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>Data Center</video:tag>
            <video:tag>data center security</video:tag>
            <video:tag>east west traffic</video:tag>
            <video:tag>Firewall Management</video:tag>
            <video:tag>firewall rule management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>network segmentation</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>prof. wool</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/cisco-aci-and-algosec-integration</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181812</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/video_medium/cisco-aci-and-algosec-integration-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44181812/1ea3eaaff1b36a7756bfa854f08f6b30/small/cisco-aci-and-algosec-integration-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Cisco ACI and AlgoSec Integration (ActiveChange Demo)</video:title>
            <video:description>nhanced Security Policy Visibility and Change, Risk, and Compliance Management&lt;/p&gt;
&lt;p&gt;Through the integration of AlgoSec and the Cisco® Application Centric Infrastructure (Cisco ACI™) architecture, customers can monitor security policy changes across their Cisco ACI system, obtain risk and compliance context for both managed and unmanaged security devices, and extend automation across their entire security&lt;br /&gt;
environment.&lt;/p&gt;
&lt;p&gt;For more information contact AlgoSec at &lt;a href="mailto:info@algosec.com"&gt;info@algosec.com&lt;/a&gt; or visit our website at www.algosec.com</video:description>
            <video:publication_date>2019-02-14T18:14:13+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>376</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>algosec</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>epgs</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>firewalls</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>security management</video:tag>
            <video:tag>Security Policy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/application-vulnerabilities-risk</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181806</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465687/44181806/27bc273176c734d85d73c4af9dba2e31/video_medium/application-vulnerabilities-risk-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465687/44181806/27bc273176c734d85d73c4af9dba2e31/small/application-vulnerabilities-risk-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Application Vulnerabilities &amp; Risk</video:title>
            <video:description>Demo&lt;br&gt;BusinessFlow allows application owners to gain visibility to and own the risk their business applications introduced into the environment.</video:description>
            <video:publication_date>2019-02-14T18:14:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>90</video:duration>
            <video:category>Products</video:category>
            <video:tag>appviz</video:tag>
            <video:tag>businessflow</video:tag>
            <video:tag>demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/sharing-network-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181793</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/video_medium/sharing-network-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44181793/82a8e57717222b74b1b7f76f49f5d8aa/small/sharing-network-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Sharing Network Security Information with the Wider IT Community With Team Collaboration Tools</video:title>
            <video:description>Firewall Management 201: Lesson 18&lt;/p&gt;
&lt;p&gt;Collaboration tools such as Slack provide a convenient way to have group discussions and complete collaborative business tasks. Now, these automated chatbots can be used for answering questions and handling tasks for development, IT and infosecurity teams.&lt;/p&gt;
&lt;p&gt;For example, enterprises can use chatbots to automate information-sharing across silos, such as between IT and application owners. So rather than having to call somebody and ask them “Is that system up? What happened to my security change request?” and so on, tracking helpdesk issues and the status of help requests can become much more accessible and responsive. Chatbots also make access to siloed resources more democratic and more widely available across the organization (subject, of course to the necessary access rights).&lt;/p&gt;
&lt;p&gt;In this video, Prof. Wool discusses how automated chatbots can be used to help a wide range of users for their security policy management tasks – thereby improving service to stakeholders and helping to accelerate security policy change processes across the enterprise.&lt;/p&gt;
&lt;p&gt;Learn more about AlgoSec at &lt;a href="http://www.algosec.com"&gt;http://www.algosec.com&lt;/a&gt; and read Professor Wool's blog posts at &lt;a href="http://blog.algosec.com"&gt;http://blog.algosec.com&lt;/a&gt;</video:description>
            <video:publication_date>2019-02-14T18:13:59+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>287</video:duration>
            <video:category>Prof Wool: Firewall Management 201</video:category>
            <video:tag>avishai wool</video:tag>
            <video:tag>chatbot</video:tag>
            <video:tag>cloud security</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>firewall rules</video:tag>
            <video:tag>ms teams</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>prof wool</video:tag>
            <video:tag>Security Policy</video:tag>
            <video:tag>skype for business</video:tag>
            <video:tag>slack</video:tag>
            <video:tag>team collaboration tools</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/automate-the-entire-security-policy</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181789</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44181789/8e65c6e94a22668a3b93501df11ec734/video_medium/automate-the-entire-security-policy-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44181789/8e65c6e94a22668a3b93501df11ec734/small/automate-the-entire-security-policy-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Automate the entire security policy change management process   with zero touch</video:title>
            <video:description></video:description>
            <video:publication_date>2019-02-14T18:13:56+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>314</video:duration>
            <video:category>Products</video:category>
            <video:tag>automate security policy</video:tag>
            <video:tag>security policy</video:tag>
            <video:tag>security policy automation</video:tag>
            <video:tag>security policy change management</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/demo-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181785</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107547/44181785/59eff58046eb5fca55a1219113002933/video_medium/demo-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107547/44181785/59eff58046eb5fca55a1219113002933/small/demo-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Demo: Compliance</video:title>
            <video:description>AlgoSec Regulatory Compliance Reports.</video:description>
            <video:publication_date>2019-02-14T18:13:48+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>57</video:duration>
            <video:category>Products</video:category>
            <video:tag>compliance</video:tag>
            <video:tag>demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/devopsifying-network-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181768</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/video_medium/devopsifying-network-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44181768/2e5a4dec5e02b94502d7e0baf5c1bb26/small/devopsifying-network-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>DevOpsifying Network Security: AlgoSec - Ansible Demo</video:title>
            <video:description>This demo describes how developers can seamlessly incorporate network connectivity into their DevOps methodology, using their existing CI tools, in order to fully automate the application delivery process end-to-end.</video:description>
            <video:publication_date>2019-02-14T18:13:37+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>584</video:duration>
            <video:category>Products</video:category>
            <video:tag>AlgoSec</video:tag>
            <video:tag>algosec devops</video:tag>
            <video:tag>ansible</video:tag>
            <video:tag>application connectivity'</video:tag>
            <video:tag>chef</video:tag>
            <video:tag>CI tools</video:tag>
            <video:tag>code integration</video:tag>
            <video:tag>DevOps</video:tag>
            <video:tag>firewall management</video:tag>
            <video:tag>Jenkins</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>puppet</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-application-discovery</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181749</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44181749/263219e0d05eaf94c82f692ff82e2e28/video_medium/algosec-application-discovery-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44181749/263219e0d05eaf94c82f692ff82e2e28/small/algosec-application-discovery-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Application Discovery - discovering additional connectivity demo</video:title>
            <video:description>A practical demo on how to discover and visualize connectivity flows,</video:description>
            <video:publication_date>2019-02-14T18:13:30+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>169</video:duration>
            <video:category>Products</video:category>
            <video:tag>application discovery</video:tag>
            <video:tag>fireflow</video:tag>
            <video:tag>visibility</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/businessflow-overview</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181748</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44181748/6fc02386cd5df2381f5c4cdc72f815ba/video_medium/businessflow-overview-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44181748/6fc02386cd5df2381f5c4cdc72f815ba/small/businessflow-overview-thumbnail.jpg</video:thumbnail_loc>
            <video:title>BusinessFlow Overview</video:title>
            <video:description>BusinessFlow provides application lifecycle management and visibility into business applications geared towards application owners and application architects.</video:description>
            <video:publication_date>2019-02-14T18:13:30+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>73</video:duration>
            <video:category>Products</video:category>
            <video:tag>businessflow</video:tag>
            <video:tag>demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/firewall-investigation</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181734</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465687/44181734/276ef0d4de33e8ed02e3b4ccb45ed613/video_medium/firewall-investigation-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465687/44181734/276ef0d4de33e8ed02e3b4ccb45ed613/small/firewall-investigation-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Firewall Investigation</video:title>
            <video:description>AlgoSec provides point and time analysis of devices enabling full visibility of your security policies.</video:description>
            <video:publication_date>2019-02-14T18:13:10+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>128</video:duration>
            <video:category>Products</video:category>
            <video:tag>demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/rule-re-certification</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181726</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107560/44181726/84040f91658b4d1df2fa8d12133206ff/video_medium/rule-re-certification-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107560/44181726/84040f91658b4d1df2fa8d12133206ff/small/rule-re-certification-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Rule Re certification</video:title>
            <video:description></video:description>
            <video:publication_date>2019-02-14T18:13:06+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>92</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/risk-assessment</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181723</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44181723/710c6984cd2f17abd51e18559b59bb33/video_medium/risk-assessment-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44181723/710c6984cd2f17abd51e18559b59bb33/small/risk-assessment-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Risk Assessment</video:title>
            <video:description>Proactively assess the risk of every change before it is implemented</video:description>
            <video:publication_date>2019-02-14T18:13:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>59</video:duration>
            <video:category>Products</video:category>
            <video:tag>demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/visualize-and-understand</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181721</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465687/44181721/678fb80019f8b28090118ce0e9e3ae07/video_medium/visualize-and-understand-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465687/44181721/678fb80019f8b28090118ce0e9e3ae07/small/visualize-and-understand-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Visualize and understand application connectivity</video:title>
            <video:description>Visualize and understand application connectivity to help you easily provision new or updated connections in your network.</video:description>
            <video:publication_date>2019-02-14T18:13:03+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>140</video:duration>
            <video:category>Products</video:category>
            <video:tag>demo</video:tag>
            <video:tag>visibility</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/algosec-zero-trust-presentation</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181720</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/video_medium/algosec-zero-trust-presentation-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107547/44181720/fb1c7af2f781806e661e0aef5ae24af4/small/algosec-zero-trust-presentation-thumbnail.jpg</video:thumbnail_loc>
            <video:title>AlgoSec Zero Trust Presentation @Forrester Event</video:title>
            <video:description>The Forrester Zero Trust Model, when applied to network security, can help organizations develop robust prevention, detection, and incident response capabilities. The session, presented at the Security and Privacy event in Washington DC covered the challenges organizations face and approaches that can be employed, including steps to achieve visibility, policy management automation, application connectivity analysis and network segmentation.</video:description>
            <video:publication_date>2019-02-14T18:13:02+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1640</video:duration>
            <video:category>Customer Testimonials</video:category>
            <video:tag>algosec</video:tag>
            <video:tag>automation</video:tag>
            <video:tag>aws</video:tag>
            <video:tag>azure</video:tag>
            <video:tag>checkpoint</video:tag>
            <video:tag>cisco</video:tag>
            <video:tag>forrester</video:tag>
            <video:tag>juniper</video:tag>
            <video:tag>Management</video:tag>
            <video:tag>micro segmentation</video:tag>
            <video:tag>networking</video:tag>
            <video:tag>network security</video:tag>
            <video:tag>palo alto</video:tag>
            <video:tag>security policy</video:tag>
            <video:tag>segmentation</video:tag>
            <video:tag>trust</video:tag>
            <video:tag>visibility</video:tag>
            <video:tag>zero</video:tag>
            <video:tag>zero trust</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/demo-visibility</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181716</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44181716/f3fe44781e17f4e21b9fb34746f73e36/video_medium/demo-visibility-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44181716/f3fe44781e17f4e21b9fb34746f73e36/small/demo-visibility-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Demo: Visibility</video:title>
            <video:description>Visibility and ongoing monitoring of your network security topology</video:description>
            <video:publication_date>2019-02-14T18:13:00+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>100</video:duration>
            <video:category>Products</video:category>
            <video:tag>demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/demo-mapping</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181694</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107560/44181694/c781c12128725896d5c81c10fb874843/video_medium/demo-mapping-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107560/44181694/c781c12128725896d5c81c10fb874843/small/demo-mapping-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Demo: Mapping</video:title>
            <video:description>Mapping your network flows</video:description>
            <video:publication_date>2019-02-14T18:12:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>123</video:duration>
            <video:category>Products</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/palo-alto-baseline-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181692</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107557/44181692/8e7532a353ad7dfa64738ef0f0af582a/video_medium/palo-alto-baseline-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107557/44181692/8e7532a353ad7dfa64738ef0f0af582a/small/palo-alto-baseline-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Palo Alto: Baseline compliance</video:title>
            <video:description>Configure your Palo Alto firewalls according to your organization's standards</video:description>
            <video:publication_date>2019-02-14T18:12:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>83</video:duration>
            <video:category>Products</video:category>
            <video:tag>palo alto</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/demo-algosec-incident-response</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181693</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465660/44181693/ab08e40eb5ce9c0c1465ae6c4f9de8b4/video_medium/demo-algosec-incident-response-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465660/44181693/ab08e40eb5ce9c0c1465ae6c4f9de8b4/small/demo-algosec-incident-response-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Demo: AlgoSec Incident Response Extension for IBM Resilient</video:title>
            <video:description>&lt;p&gt;Resilient is an intelligent orchestration and
case management system that enables security teams to respond to security
incidents quickly and effectively.&lt;/p&gt;</video:description>
            <video:publication_date>2019-02-14T18:12:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>285</video:duration>
            <video:category>Products</video:category>
            <video:tag>algosec</video:tag>
            <video:tag>ibm</video:tag>
            <video:tag>managment</video:tag>
            <video:tag>network</video:tag>
            <video:tag>policy</video:tag>
            <video:tag>resilient</video:tag>
            <video:tag>security</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/risk-assessment-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181690</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107559/44181690/c5951940904af303b2b335eac71a504f/video_medium/risk-assessment-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107559/44181690/c5951940904af303b2b335eac71a504f/small/risk-assessment-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Risk assessment</video:title>
            <video:description>Assess and remediate the risk on your firewalls.</video:description>
            <video:publication_date>2019-02-14T18:12:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>81</video:duration>
            <video:category>Products</video:category>
            <video:tag>palo alto</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/palo-alto-regulatory-compliance</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181688</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107561/44181688/13cd0ec42457b17f66f23cc66988acf3/video_medium/palo-alto-regulatory-compliance-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107561/44181688/13cd0ec42457b17f66f23cc66988acf3/small/palo-alto-regulatory-compliance-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Palo Alto Regulatory compliance</video:title>
            <video:description>AlgoSec can help you prepare for a regulatory compliance review of a Palo Alto firewall in seconds.</video:description>
            <video:publication_date>2019-02-14T18:12:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>97</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>palo alto</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/palo-alto-policy-optimization-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=44181687</video:player_loc>
            <video:content_loc>https://video.algosec.com/16107558/44181687/66ee75873f4e5cda1954b4adf15f6e90/video_medium/palo-alto-policy-optimization-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/16107558/44181687/66ee75873f4e5cda1954b4adf15f6e90/small/palo-alto-policy-optimization-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Palo Alto Policy Optimization</video:title>
            <video:description>Clean up and optimize your firewall policies today!</video:description>
            <video:publication_date>2019-02-14T18:12:32+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>169</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>palo alto</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/palo-alto-risk-assessment</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=43974839</video:player_loc>
            <video:content_loc>https://video.algosec.com/4465687/43974839/42f2f36e2ed96af2ec539476382a89f6/video_medium/palo-alto-risk-assessment-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/4465687/43974839/42f2f36e2ed96af2ec539476382a89f6/small/palo-alto-risk-assessment-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Palo Alto: Risk Assessment</video:title>
            <video:description>Assess and remediate the risk on your Palo Alto firewall.</video:description>
            <video:publication_date>2019-02-07T10:47:35+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>99</video:duration>
            <video:category>Ecosystem</video:category>
            <video:tag>palo alto</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://video.algosec.com/kuppingercole-analysts-driving</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://video.algosec.com/v.ihtml/player.html?photo_id=43950798</video:player_loc>
            <video:content_loc>https://video.algosec.com</video:content_loc>
            <video:thumbnail_loc>https://video.algosec.com/27288170/43950798/e1d2f3d8e6ad63fbb719aee4fb7c4769/small/kuppingercole-analysts-driving-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Kuppingercole Analysts: Driving Agility and Reducing Cyber Risks with Business-Driven Security Management and Automation</video:title>
            <video:description>Joint Analyst webinar with Alexei Balaganski, Lead Analyst at KuppingerCole</video:description>
            <video:publication_date>2019-02-06T14:11:25+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3571</video:duration>
            <video:category>Webinars</video:category>
            <video:tag>Kuppingercole analyst</video:tag>
            <video:tag>Security Management</video:tag>
        </video:video>
    </url>
</urlset>
