SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
SECURELY ACCELERATE
DIGITAL TRANSFORMATION
Brian Heili — VMware
Jeremiah Cornelius — AlgoSec
Brian Heili
2 | Confidential
PRESENTERS
Network Security Solution
Engineer and Ambassador for
the Office of the CTO
Jeremiah Cornelius
Technical Leader,
Alliances and Partner
AGENDA
VMware NSX and the Service-Defined Firewall
2
3
4
5
AlgoSec and Intelligent Automation for Security
Visibility, Compliance and Change Management
Joint Value - AlgoSec and VMware
Questions … and Answers!
3 | Confidential
DIGITAL TRANSFORMATION:
VMWARE NSX AND THE
SERVICE-DEFINED FIREWALL
Traditional approach
SECURING THE MODERN DATA CENTER REQUIRES A NEW APPROACH
Realities
Built for the User Perimeter, not
the Data Center
Complex to insert into the
network
Unable to dynamically scale
Blind spots and Lack of Controls
for East West traffic
Inconsistent and Unmanageable
Policy
Expensive (HW, SW, Maintenance,
Power, Cooling, Cabling, Rack
Space)
IDS/IPS
FIREWALL
5 | Confidential
Solves Traditional Challenges
NSX SERVICE-DEFINED FIREWALL
Solution
Hypervisor Based L4-7 FW with
Advanced Threat Prevention
Distributed architecture
eliminates hair pinning of traffic
Easy to Deploy: No Physical
Network Changes Required
Automatic Policy Provisioning and
Deprovisioning
Consistent policy across critical
workloads
More Cost Effective (Typically 50%
Less)
FIREWALL
IDS/IPS
6 | Confidential
Web_tier
Automated and Dynamic Policies
MASSIVELY SIMPLIFY OPERATIONS
DB_tier
X
New workloads
inherit policies
+
App_tier
X
X
Policy is retired with
the workload
Policy moves
with workload,
no dropped
connections
7 | Confidential
SECURING THE MODERN DATA CENTER
Create zones in software
with no network changes
Quickly deploy compliance
& audit requirements
Threat detection and
response beyond the
perimeter
Automatically correlate,
validate and defend
against advanced threats
Policy deployment and
lifecycle management
Security infrastructure as
code
Maintain consistent
security across workloads
in private data centers and
the cloud
Threat Prevention Security Policy Automation Consistent Security
Segmentation
8 | Confidential
9 | Confidential
DIGITAL TRANSFORMATION:
ALGOSEC INTELLIGENT AUTOMATION
Manage
Integrate
CRM
Trading
Systems
ERP
BUSINESS-DRIVEN
SECURITY
MANAGEMENT
THE ALGOSEC
ECOSYSTEM
Operational
Framework Layer
Security Layer
Firewalls Routers Web
Proxies
Load
Balancers
Security
Groups
Physical Networks Private Cloud/SDN Public Cloud
Implementation Integration
AppChange
ALGOSEC INTELLIGENT AUTOMATION FRAMEWORK
Application
Framework Layer
Implementation Integration
Ticketing
Systems
GRC
Systems SIEM/SOAR
Systems
Orchestration
AppViz Syslog &
Traffic Data
Authentication
Authorization
CMDB Data Vulnerability
Scanners
Security Layer
Firewalls Routers Web
Proxies
Load
Balancers
Security
Groups
Physical Networks Private Cloud/SDN Public Cloud
ALGOSEC INTELLIGENT AUTOMATION FRAMEWORK
Application
Framework Layer
Implementation Integration
AppViz
Operational
Framework Layer
Implementation Integration
AppChange
Analyze, Monitor
& Visualize
Automate, Integrate
& Manage
Discover &
Understand
Operational Efficiency and Accuracy
Ticketing
Systems
GRC
Systems SIEM/SOAR
Systems
Orchestration
Syslog &
Traffic Data
Authentication
Authorization
CMDB Data Vulnerability
Scanners
TRANSFORMATION OF NETWORK SECURITY MANAGEMENT
Visibility into the
Entire Network
Agile and Secure
Change Management
Risk and
Compliance
Effective Collaboration between all stakeholders
13 | Confidential
Digital Transformation – Intrinsic Security with Intelligent Automation
14 | Confidential
DIGITAL TRANSFORMATION:
VISIBILITY INTO THE ENTIRE NETWORK
CHALLENGE: VISIBILITY INTO THE ENTIRE NETWORK
15 | Confidential
Multiple Environments:
On-prem, public clouds and private clouds
Multiple security Vendors
Difficult to understand the network structures and flow paths
Lack of association between business applications and their
related rules and connectivity flows
Intrinsic Security and the Hybrid Legacy
FULL NETWORK AND APPLICATION VISIBILITY
• Visibility and analysis of complex network security policies across technologies, vendors and operational systems
• Automated discovery and mapping of business applications
• Understand the impact of network flows and security controls on application-network connectivity
• Correlate risks and vulnerabilities to firewall policies
16 | Confidential
17 | Confidential
DIGITAL TRANSFORMATION:
RISK AND COMPLIANCE
CHALLENGE: RISK AND COMPLIANCE
18 | Confidential
Keeping up with internal and changing regulatory standards
Audit preparation is timely and effort-extensive
Maintaining ongoing documentation and audit trail
Identifying risk across the entire network
Understanding the business impact of vulnerabilities
AUTOMATE & ENSURE A CONTINUOUS STATE OF COMPLIANCE
Automatically Document
Network Changes
Analyze Existing Risks
and Flag Any New
Changes for New Risks
Get Audit-ready
Compliance Reports
Tie Vulnerabilities to
Business Applications
and Firewall Rules
Digital Transformation – Intrinsic Security with Intelligent Automation
20 | Confidential
DIGITAL TRANSFORMATION:
AGILE AND SECURE CHANGE MANAGEMENT
CHALLENGE: AGILE AND SECURE CHANGE MANAGEMENT
21 | Confidential
Handling multiple vendors and technologies via various platforms
Lack of skilled personnel
Enforcing security policy consistency
Identifying and mitigating risks
CHANGE MANAGEMENT
AND AUTOMATION
22
Automatic design
• End-to-end: multi-
vendor, multi-platform
• Optimized changes,
eliminate human error
Zero-Touch policy push
automation
Full documentation and
audit trail
What-if security check
DevOps friendly
Consistency across the
entire network, including
multiple clouds and
hybrid environments
22 | Confidential
JOINT VALUE - ALGOSEC AND VMWARE
MITIGATE RISK
Strengthen your cybersecurity
posture by reducing your attack
surface and prevent lateral
movement
ENSURE COMPLIANCE
Eliminate visibility and
security blind-spots you get
from misaligned controls
with traditional approaches
SIMPLIFIED SECURITY
ARCHITECTURE
Radically simplified deployment and
architecture eliminates the need for
complex network changes
ACCELERATE OPERATIONS
Security policy that moves at the
speed of development — align
heterogenous controls with
VMware’s service-defined firewall
23 | Confidential
Transformation – Intrinsic Security with Intelligent Automation
24 | Confidential
QUESTIONS?
ALGOSEC AND VMWARE — RESOURCES
25 | Confidential
Transformation – Intrinsic Security with Intelligent Automation
• VMware NSX Service-defined Firewall -
•https://www.vmware.com/security/internal-firewall.html
• VMware NSX Service-defined Firewall Data Sheet
https://www.vmware.com/content/dam/digitalmarketing/vmware/e
n/pdf/products/vmware-nsx-service-defined-firewall.pdf
• Partner Solution Brief: AlgoSec & VMware NSX
https://www.algosec.com/wp-content/uploads/2016/03/AlgoSec-
and-VMware-WEB-1.pdf
THANK YOU

Más contenido relacionado

La actualidad más candente

2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...AlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentAlgoSec
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)AlgoSec
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteAlgoSec
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarAlgoSec
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarAlgoSec
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solutionAlgoSec
 
compliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarcompliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarAlgoSec
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation finalAlgoSec
 
The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinarAlgoSec
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...shira koper
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesAlgoSec
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...AlgoSec
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Securityshira koper
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationAlgoSec
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation Maytal Levi
 

La actualidad más candente (20)

2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution
 
compliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarcompliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinar
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final
 
The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinar
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...Intent Based Networking: turning intentions into reality with network securit...
Intent Based Networking: turning intentions into reality with network securit...
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Security
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 

Similar a 2021 02-17 v mware-algo-sec securely accelerate your digital transformation webinar

2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Presentation Wsta
Presentation WstaPresentation Wsta
Presentation Wstawill4468
 
Presentation wsta
Presentation wstaPresentation wsta
Presentation wstawill4468
 
WSTA PRESENTATION
WSTA PRESENTATIONWSTA PRESENTATION
WSTA PRESENTATIONwill4468
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Emc The journey to the Private Cloud
Emc The journey to the Private CloudEmc The journey to the Private Cloud
Emc The journey to the Private CloudGabriele Bozzi
 
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...Amazon Web Services
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
Deploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load BalancingDeploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load BalancingAvi Networks
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxAbasse KPEGOUNI
 
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAmazon Web Services
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
 

Similar a 2021 02-17 v mware-algo-sec securely accelerate your digital transformation webinar (20)

2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Presentation Wsta
Presentation WstaPresentation Wsta
Presentation Wsta
 
Presentation wsta
Presentation wstaPresentation wsta
Presentation wsta
 
WSTA PRESENTATION
WSTA PRESENTATIONWSTA PRESENTATION
WSTA PRESENTATION
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Emc The journey to the Private Cloud
Emc The journey to the Private CloudEmc The journey to the Private Cloud
Emc The journey to the Private Cloud
 
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Deploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load BalancingDeploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load Balancing
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
Issa 042711
Issa 042711Issa 042711
Issa 042711
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation Security
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the Cloud
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

2021 02-17 v mware-algo-sec securely accelerate your digital transformation webinar

  • 1. SECURELY ACCELERATE DIGITAL TRANSFORMATION Brian Heili — VMware Jeremiah Cornelius — AlgoSec
  • 2. Brian Heili 2 | Confidential PRESENTERS Network Security Solution Engineer and Ambassador for the Office of the CTO Jeremiah Cornelius Technical Leader, Alliances and Partner
  • 3. AGENDA VMware NSX and the Service-Defined Firewall 2 3 4 5 AlgoSec and Intelligent Automation for Security Visibility, Compliance and Change Management Joint Value - AlgoSec and VMware Questions … and Answers! 3 | Confidential
  • 4. DIGITAL TRANSFORMATION: VMWARE NSX AND THE SERVICE-DEFINED FIREWALL
  • 5. Traditional approach SECURING THE MODERN DATA CENTER REQUIRES A NEW APPROACH Realities Built for the User Perimeter, not the Data Center Complex to insert into the network Unable to dynamically scale Blind spots and Lack of Controls for East West traffic Inconsistent and Unmanageable Policy Expensive (HW, SW, Maintenance, Power, Cooling, Cabling, Rack Space) IDS/IPS FIREWALL 5 | Confidential
  • 6. Solves Traditional Challenges NSX SERVICE-DEFINED FIREWALL Solution Hypervisor Based L4-7 FW with Advanced Threat Prevention Distributed architecture eliminates hair pinning of traffic Easy to Deploy: No Physical Network Changes Required Automatic Policy Provisioning and Deprovisioning Consistent policy across critical workloads More Cost Effective (Typically 50% Less) FIREWALL IDS/IPS 6 | Confidential
  • 7. Web_tier Automated and Dynamic Policies MASSIVELY SIMPLIFY OPERATIONS DB_tier X New workloads inherit policies + App_tier X X Policy is retired with the workload Policy moves with workload, no dropped connections 7 | Confidential
  • 8. SECURING THE MODERN DATA CENTER Create zones in software with no network changes Quickly deploy compliance & audit requirements Threat detection and response beyond the perimeter Automatically correlate, validate and defend against advanced threats Policy deployment and lifecycle management Security infrastructure as code Maintain consistent security across workloads in private data centers and the cloud Threat Prevention Security Policy Automation Consistent Security Segmentation 8 | Confidential
  • 9. 9 | Confidential DIGITAL TRANSFORMATION: ALGOSEC INTELLIGENT AUTOMATION
  • 11. Operational Framework Layer Security Layer Firewalls Routers Web Proxies Load Balancers Security Groups Physical Networks Private Cloud/SDN Public Cloud Implementation Integration AppChange ALGOSEC INTELLIGENT AUTOMATION FRAMEWORK Application Framework Layer Implementation Integration Ticketing Systems GRC Systems SIEM/SOAR Systems Orchestration AppViz Syslog & Traffic Data Authentication Authorization CMDB Data Vulnerability Scanners
  • 12. Security Layer Firewalls Routers Web Proxies Load Balancers Security Groups Physical Networks Private Cloud/SDN Public Cloud ALGOSEC INTELLIGENT AUTOMATION FRAMEWORK Application Framework Layer Implementation Integration AppViz Operational Framework Layer Implementation Integration AppChange Analyze, Monitor & Visualize Automate, Integrate & Manage Discover & Understand Operational Efficiency and Accuracy Ticketing Systems GRC Systems SIEM/SOAR Systems Orchestration Syslog & Traffic Data Authentication Authorization CMDB Data Vulnerability Scanners
  • 13. TRANSFORMATION OF NETWORK SECURITY MANAGEMENT Visibility into the Entire Network Agile and Secure Change Management Risk and Compliance Effective Collaboration between all stakeholders 13 | Confidential Digital Transformation – Intrinsic Security with Intelligent Automation
  • 14. 14 | Confidential DIGITAL TRANSFORMATION: VISIBILITY INTO THE ENTIRE NETWORK
  • 15. CHALLENGE: VISIBILITY INTO THE ENTIRE NETWORK 15 | Confidential Multiple Environments: On-prem, public clouds and private clouds Multiple security Vendors Difficult to understand the network structures and flow paths Lack of association between business applications and their related rules and connectivity flows Intrinsic Security and the Hybrid Legacy
  • 16. FULL NETWORK AND APPLICATION VISIBILITY • Visibility and analysis of complex network security policies across technologies, vendors and operational systems • Automated discovery and mapping of business applications • Understand the impact of network flows and security controls on application-network connectivity • Correlate risks and vulnerabilities to firewall policies 16 | Confidential
  • 17. 17 | Confidential DIGITAL TRANSFORMATION: RISK AND COMPLIANCE
  • 18. CHALLENGE: RISK AND COMPLIANCE 18 | Confidential Keeping up with internal and changing regulatory standards Audit preparation is timely and effort-extensive Maintaining ongoing documentation and audit trail Identifying risk across the entire network Understanding the business impact of vulnerabilities
  • 19. AUTOMATE & ENSURE A CONTINUOUS STATE OF COMPLIANCE Automatically Document Network Changes Analyze Existing Risks and Flag Any New Changes for New Risks Get Audit-ready Compliance Reports Tie Vulnerabilities to Business Applications and Firewall Rules Digital Transformation – Intrinsic Security with Intelligent Automation
  • 20. 20 | Confidential DIGITAL TRANSFORMATION: AGILE AND SECURE CHANGE MANAGEMENT
  • 21. CHALLENGE: AGILE AND SECURE CHANGE MANAGEMENT 21 | Confidential Handling multiple vendors and technologies via various platforms Lack of skilled personnel Enforcing security policy consistency Identifying and mitigating risks
  • 22. CHANGE MANAGEMENT AND AUTOMATION 22 Automatic design • End-to-end: multi- vendor, multi-platform • Optimized changes, eliminate human error Zero-Touch policy push automation Full documentation and audit trail What-if security check DevOps friendly Consistency across the entire network, including multiple clouds and hybrid environments 22 | Confidential
  • 23. JOINT VALUE - ALGOSEC AND VMWARE MITIGATE RISK Strengthen your cybersecurity posture by reducing your attack surface and prevent lateral movement ENSURE COMPLIANCE Eliminate visibility and security blind-spots you get from misaligned controls with traditional approaches SIMPLIFIED SECURITY ARCHITECTURE Radically simplified deployment and architecture eliminates the need for complex network changes ACCELERATE OPERATIONS Security policy that moves at the speed of development — align heterogenous controls with VMware’s service-defined firewall 23 | Confidential Transformation – Intrinsic Security with Intelligent Automation
  • 25. ALGOSEC AND VMWARE — RESOURCES 25 | Confidential Transformation – Intrinsic Security with Intelligent Automation • VMware NSX Service-defined Firewall - •https://www.vmware.com/security/internal-firewall.html • VMware NSX Service-defined Firewall Data Sheet https://www.vmware.com/content/dam/digitalmarketing/vmware/e n/pdf/products/vmware-nsx-service-defined-firewall.pdf • Partner Solution Brief: AlgoSec & VMware NSX https://www.algosec.com/wp-content/uploads/2016/03/AlgoSec- and-VMware-WEB-1.pdf