SlideShare a Scribd company logo
SECURELY ACCELERATE
DIGITAL TRANSFORMATION
Brian Heili — VMware
Jeremiah Cornelius — AlgoSec
Brian Heili
2 | Confidential
PRESENTERS
Network Security Solution
Engineer and Ambassador for
the Office of the CTO
Jeremiah Cornelius
Technical Leader,
Alliances and Partner
AGENDA
VMware NSX and the Service-Defined Firewall
2
3
4
5
AlgoSec and Intelligent Automation for Security
Visibility, Compliance and Change Management
Joint Value - AlgoSec and VMware
Questions … and Answers!
3 | Confidential
DIGITAL TRANSFORMATION:
VMWARE NSX AND THE
SERVICE-DEFINED FIREWALL
Traditional approach
SECURING THE MODERN DATA CENTER REQUIRES A NEW APPROACH
Realities
Built for the User Perimeter, not
the Data Center
Complex to insert into the
network
Unable to dynamically scale
Blind spots and Lack of Controls
for East West traffic
Inconsistent and Unmanageable
Policy
Expensive (HW, SW, Maintenance,
Power, Cooling, Cabling, Rack
Space)
IDS/IPS
FIREWALL
5 | Confidential
Solves Traditional Challenges
NSX SERVICE-DEFINED FIREWALL
Solution
Hypervisor Based L4-7 FW with
Advanced Threat Prevention
Distributed architecture
eliminates hair pinning of traffic
Easy to Deploy: No Physical
Network Changes Required
Automatic Policy Provisioning and
Deprovisioning
Consistent policy across critical
workloads
More Cost Effective (Typically 50%
Less)
FIREWALL
IDS/IPS
6 | Confidential
Web_tier
Automated and Dynamic Policies
MASSIVELY SIMPLIFY OPERATIONS
DB_tier
X
New workloads
inherit policies
+
App_tier
X
X
Policy is retired with
the workload
Policy moves
with workload,
no dropped
connections
7 | Confidential
SECURING THE MODERN DATA CENTER
Create zones in software
with no network changes
Quickly deploy compliance
& audit requirements
Threat detection and
response beyond the
perimeter
Automatically correlate,
validate and defend
against advanced threats
Policy deployment and
lifecycle management
Security infrastructure as
code
Maintain consistent
security across workloads
in private data centers and
the cloud
Threat Prevention Security Policy Automation Consistent Security
Segmentation
8 | Confidential
9 | Confidential
DIGITAL TRANSFORMATION:
ALGOSEC INTELLIGENT AUTOMATION
Manage
Integrate
CRM
Trading
Systems
ERP
BUSINESS-DRIVEN
SECURITY
MANAGEMENT
THE ALGOSEC
ECOSYSTEM
Operational
Framework Layer
Security Layer
Firewalls Routers Web
Proxies
Load
Balancers
Security
Groups
Physical Networks Private Cloud/SDN Public Cloud
Implementation Integration
AppChange
ALGOSEC INTELLIGENT AUTOMATION FRAMEWORK
Application
Framework Layer
Implementation Integration
Ticketing
Systems
GRC
Systems SIEM/SOAR
Systems
Orchestration
AppViz Syslog &
Traffic Data
Authentication
Authorization
CMDB Data Vulnerability
Scanners
Security Layer
Firewalls Routers Web
Proxies
Load
Balancers
Security
Groups
Physical Networks Private Cloud/SDN Public Cloud
ALGOSEC INTELLIGENT AUTOMATION FRAMEWORK
Application
Framework Layer
Implementation Integration
AppViz
Operational
Framework Layer
Implementation Integration
AppChange
Analyze, Monitor
& Visualize
Automate, Integrate
& Manage
Discover &
Understand
Operational Efficiency and Accuracy
Ticketing
Systems
GRC
Systems SIEM/SOAR
Systems
Orchestration
Syslog &
Traffic Data
Authentication
Authorization
CMDB Data Vulnerability
Scanners
TRANSFORMATION OF NETWORK SECURITY MANAGEMENT
Visibility into the
Entire Network
Agile and Secure
Change Management
Risk and
Compliance
Effective Collaboration between all stakeholders
13 | Confidential
Digital Transformation – Intrinsic Security with Intelligent Automation
14 | Confidential
DIGITAL TRANSFORMATION:
VISIBILITY INTO THE ENTIRE NETWORK
CHALLENGE: VISIBILITY INTO THE ENTIRE NETWORK
15 | Confidential
Multiple Environments:
On-prem, public clouds and private clouds
Multiple security Vendors
Difficult to understand the network structures and flow paths
Lack of association between business applications and their
related rules and connectivity flows
Intrinsic Security and the Hybrid Legacy
FULL NETWORK AND APPLICATION VISIBILITY
• Visibility and analysis of complex network security policies across technologies, vendors and operational systems
• Automated discovery and mapping of business applications
• Understand the impact of network flows and security controls on application-network connectivity
• Correlate risks and vulnerabilities to firewall policies
16 | Confidential
17 | Confidential
DIGITAL TRANSFORMATION:
RISK AND COMPLIANCE
CHALLENGE: RISK AND COMPLIANCE
18 | Confidential
Keeping up with internal and changing regulatory standards
Audit preparation is timely and effort-extensive
Maintaining ongoing documentation and audit trail
Identifying risk across the entire network
Understanding the business impact of vulnerabilities
AUTOMATE & ENSURE A CONTINUOUS STATE OF COMPLIANCE
Automatically Document
Network Changes
Analyze Existing Risks
and Flag Any New
Changes for New Risks
Get Audit-ready
Compliance Reports
Tie Vulnerabilities to
Business Applications
and Firewall Rules
Digital Transformation – Intrinsic Security with Intelligent Automation
20 | Confidential
DIGITAL TRANSFORMATION:
AGILE AND SECURE CHANGE MANAGEMENT
CHALLENGE: AGILE AND SECURE CHANGE MANAGEMENT
21 | Confidential
Handling multiple vendors and technologies via various platforms
Lack of skilled personnel
Enforcing security policy consistency
Identifying and mitigating risks
CHANGE MANAGEMENT
AND AUTOMATION
22
Automatic design
• End-to-end: multi-
vendor, multi-platform
• Optimized changes,
eliminate human error
Zero-Touch policy push
automation
Full documentation and
audit trail
What-if security check
DevOps friendly
Consistency across the
entire network, including
multiple clouds and
hybrid environments
22 | Confidential
JOINT VALUE - ALGOSEC AND VMWARE
MITIGATE RISK
Strengthen your cybersecurity
posture by reducing your attack
surface and prevent lateral
movement
ENSURE COMPLIANCE
Eliminate visibility and
security blind-spots you get
from misaligned controls
with traditional approaches
SIMPLIFIED SECURITY
ARCHITECTURE
Radically simplified deployment and
architecture eliminates the need for
complex network changes
ACCELERATE OPERATIONS
Security policy that moves at the
speed of development — align
heterogenous controls with
VMware’s service-defined firewall
23 | Confidential
Transformation – Intrinsic Security with Intelligent Automation
24 | Confidential
QUESTIONS?
ALGOSEC AND VMWARE — RESOURCES
25 | Confidential
Transformation – Intrinsic Security with Intelligent Automation
• VMware NSX Service-defined Firewall -
•https://www.vmware.com/security/internal-firewall.html
• VMware NSX Service-defined Firewall Data Sheet
https://www.vmware.com/content/dam/digitalmarketing/vmware/e
n/pdf/products/vmware-nsx-service-defined-firewall.pdf
• Partner Solution Brief: AlgoSec & VMware NSX
https://www.algosec.com/wp-content/uploads/2016/03/AlgoSec-
and-VMware-WEB-1.pdf
THANK YOU

More Related Content

PDF
Cloud migrations made simpler safe secure and successful migrations
PPTX
Best Practics for Automating Next Generation Firewall Change Processes
PDF
best practices-managing_security_in_the hybrid cloud
PDF
Microsegmentation from strategy to execution
PPTX
2018 10-11 automating network security policy management allows financial ins...
PPTX
SDN's managing security across the virtual network final
PPTX
Application visibility across the security estate the value and the vision ...
PDF
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Cloud migrations made simpler safe secure and successful migrations
Best Practics for Automating Next Generation Firewall Change Processes
best practices-managing_security_in_the hybrid cloud
Microsegmentation from strategy to execution
2018 10-11 automating network security policy management allows financial ins...
SDN's managing security across the virtual network final
Application visibility across the security estate the value and the vision ...
Movin' On Up to the Cloud: How to Migrate your Application Connectivity

What's hot (20)

PDF
2021 01-27 reducing risk of ransomware webinar
PPTX
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
PDF
2020 04-07 webinar slides -turning network security alerts into action change...
PPT
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
PPTX
2019 02-20 micro-segmentation based network security strategies (yoni geva)
PPT
More Things You Can Do with the AlgoSec Security Policy Management Suite
PDF
2021 01-13 reducing risk-of_ransomware
PDF
Build and enforce defense in depth - an algo sec-cisco tetration webinar
PPTX
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
PPTX
2019 08-13 selecting the right security policy management solution
PDF
compliance made easy. pass your audits stress-free webinar
PPTX
2018 11-19 improving business agility with security policy automation final
PDF
The state of the cloud csa survey webinar
PPTX
Put out audit security fires, pass audits -every time
PDF
Intent Based Networking: turning intentions into reality with network securit...
PPT
Create and Manage a Micro-Segmented Data Center – Best Practices
PPT
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
PDF
Managing Application Connectivity in the World of Network Security
PDF
Radically reduce firewall rules with application-driven rule recertification
PPTX
Tying cyber attacks to business processes, for faster mitigation
2021 01-27 reducing risk of ransomware webinar
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
2020 04-07 webinar slides -turning network security alerts into action change...
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
2019 02-20 micro-segmentation based network security strategies (yoni geva)
More Things You Can Do with the AlgoSec Security Policy Management Suite
2021 01-13 reducing risk-of_ransomware
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
2019 08-13 selecting the right security policy management solution
compliance made easy. pass your audits stress-free webinar
2018 11-19 improving business agility with security policy automation final
The state of the cloud csa survey webinar
Put out audit security fires, pass audits -every time
Intent Based Networking: turning intentions into reality with network securit...
Create and Manage a Micro-Segmented Data Center – Best Practices
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Managing Application Connectivity in the World of Network Security
Radically reduce firewall rules with application-driven rule recertification
Tying cyber attacks to business processes, for faster mitigation
Ad

Similar to 2021 02-17 v mware-algo-sec securely accelerate your digital transformation webinar (20)

PDF
Adaptive Security and Incident Response - A Business-Driven Approach
PDF
5 things you didnt know you could do with security policy management
PDF
5 things you didn't know you could do with security policy management
PPTX
AlgosecOverviewforcybersecurityinprotectio.pptx
PDF
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
PPTX
Algo sec suite overview 2013 05
PDF
MT17_Building Integrated and Secure Networks with limited IT Support
PPTX
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
PDF
Cisco Connect 2018 Thailand - Telco service provider network analytics
PDF
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
PPTX
VMworld 2015: Introducing Application Self service with Networking and Security
PDF
Business and Economic Benefits of VMware NSX
PDF
Network Virtualization and Security with VMware NSX - Business Case White Pap...
PDF
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
PDF
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
PDF
Security Change Management: Agility vs. Control
PPTX
A business driven approach to security policy management a technical perspec...
PPTX
#PCMVision: VMware NSX - Transforming Security
 
PDF
Revolutionizing Advanced Threat Protection
PPT
Information Security
Adaptive Security and Incident Response - A Business-Driven Approach
5 things you didnt know you could do with security policy management
5 things you didn't know you could do with security policy management
AlgosecOverviewforcybersecurityinprotectio.pptx
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
Algo sec suite overview 2013 05
MT17_Building Integrated and Secure Networks with limited IT Support
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
VMworld 2015: Introducing Application Self service with Networking and Security
Business and Economic Benefits of VMware NSX
Network Virtualization and Security with VMware NSX - Business Case White Pap...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
Security Change Management: Agility vs. Control
A business driven approach to security policy management a technical perspec...
#PCMVision: VMware NSX - Transforming Security
 
Revolutionizing Advanced Threat Protection
Information Security
Ad

More from AlgoSec (6)

PDF
Compliance made easy. Pass your audits stress-free.
PDF
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
PPT
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
PPTX
Zero Trust Framework for Network Security​
PPT
Selecting the right security policy management solution for your organization
PPTX
2018 07-24 network security at the speed of dev ops - webinar
Compliance made easy. Pass your audits stress-free.
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Zero Trust Framework for Network Security​
Selecting the right security policy management solution for your organization
2018 07-24 network security at the speed of dev ops - webinar

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Reach Out and Touch Someone: Haptics and Empathic Computing
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Monthly Chronicles - July 2025
Spectral efficient network and resource selection model in 5G networks
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MYSQL Presentation for SQL database connectivity
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx

2021 02-17 v mware-algo-sec securely accelerate your digital transformation webinar

  • 1. SECURELY ACCELERATE DIGITAL TRANSFORMATION Brian Heili — VMware Jeremiah Cornelius — AlgoSec
  • 2. Brian Heili 2 | Confidential PRESENTERS Network Security Solution Engineer and Ambassador for the Office of the CTO Jeremiah Cornelius Technical Leader, Alliances and Partner
  • 3. AGENDA VMware NSX and the Service-Defined Firewall 2 3 4 5 AlgoSec and Intelligent Automation for Security Visibility, Compliance and Change Management Joint Value - AlgoSec and VMware Questions … and Answers! 3 | Confidential
  • 4. DIGITAL TRANSFORMATION: VMWARE NSX AND THE SERVICE-DEFINED FIREWALL
  • 5. Traditional approach SECURING THE MODERN DATA CENTER REQUIRES A NEW APPROACH Realities Built for the User Perimeter, not the Data Center Complex to insert into the network Unable to dynamically scale Blind spots and Lack of Controls for East West traffic Inconsistent and Unmanageable Policy Expensive (HW, SW, Maintenance, Power, Cooling, Cabling, Rack Space) IDS/IPS FIREWALL 5 | Confidential
  • 6. Solves Traditional Challenges NSX SERVICE-DEFINED FIREWALL Solution Hypervisor Based L4-7 FW with Advanced Threat Prevention Distributed architecture eliminates hair pinning of traffic Easy to Deploy: No Physical Network Changes Required Automatic Policy Provisioning and Deprovisioning Consistent policy across critical workloads More Cost Effective (Typically 50% Less) FIREWALL IDS/IPS 6 | Confidential
  • 7. Web_tier Automated and Dynamic Policies MASSIVELY SIMPLIFY OPERATIONS DB_tier X New workloads inherit policies + App_tier X X Policy is retired with the workload Policy moves with workload, no dropped connections 7 | Confidential
  • 8. SECURING THE MODERN DATA CENTER Create zones in software with no network changes Quickly deploy compliance & audit requirements Threat detection and response beyond the perimeter Automatically correlate, validate and defend against advanced threats Policy deployment and lifecycle management Security infrastructure as code Maintain consistent security across workloads in private data centers and the cloud Threat Prevention Security Policy Automation Consistent Security Segmentation 8 | Confidential
  • 9. 9 | Confidential DIGITAL TRANSFORMATION: ALGOSEC INTELLIGENT AUTOMATION
  • 11. Operational Framework Layer Security Layer Firewalls Routers Web Proxies Load Balancers Security Groups Physical Networks Private Cloud/SDN Public Cloud Implementation Integration AppChange ALGOSEC INTELLIGENT AUTOMATION FRAMEWORK Application Framework Layer Implementation Integration Ticketing Systems GRC Systems SIEM/SOAR Systems Orchestration AppViz Syslog & Traffic Data Authentication Authorization CMDB Data Vulnerability Scanners
  • 12. Security Layer Firewalls Routers Web Proxies Load Balancers Security Groups Physical Networks Private Cloud/SDN Public Cloud ALGOSEC INTELLIGENT AUTOMATION FRAMEWORK Application Framework Layer Implementation Integration AppViz Operational Framework Layer Implementation Integration AppChange Analyze, Monitor & Visualize Automate, Integrate & Manage Discover & Understand Operational Efficiency and Accuracy Ticketing Systems GRC Systems SIEM/SOAR Systems Orchestration Syslog & Traffic Data Authentication Authorization CMDB Data Vulnerability Scanners
  • 13. TRANSFORMATION OF NETWORK SECURITY MANAGEMENT Visibility into the Entire Network Agile and Secure Change Management Risk and Compliance Effective Collaboration between all stakeholders 13 | Confidential Digital Transformation – Intrinsic Security with Intelligent Automation
  • 14. 14 | Confidential DIGITAL TRANSFORMATION: VISIBILITY INTO THE ENTIRE NETWORK
  • 15. CHALLENGE: VISIBILITY INTO THE ENTIRE NETWORK 15 | Confidential Multiple Environments: On-prem, public clouds and private clouds Multiple security Vendors Difficult to understand the network structures and flow paths Lack of association between business applications and their related rules and connectivity flows Intrinsic Security and the Hybrid Legacy
  • 16. FULL NETWORK AND APPLICATION VISIBILITY • Visibility and analysis of complex network security policies across technologies, vendors and operational systems • Automated discovery and mapping of business applications • Understand the impact of network flows and security controls on application-network connectivity • Correlate risks and vulnerabilities to firewall policies 16 | Confidential
  • 17. 17 | Confidential DIGITAL TRANSFORMATION: RISK AND COMPLIANCE
  • 18. CHALLENGE: RISK AND COMPLIANCE 18 | Confidential Keeping up with internal and changing regulatory standards Audit preparation is timely and effort-extensive Maintaining ongoing documentation and audit trail Identifying risk across the entire network Understanding the business impact of vulnerabilities
  • 19. AUTOMATE & ENSURE A CONTINUOUS STATE OF COMPLIANCE Automatically Document Network Changes Analyze Existing Risks and Flag Any New Changes for New Risks Get Audit-ready Compliance Reports Tie Vulnerabilities to Business Applications and Firewall Rules Digital Transformation – Intrinsic Security with Intelligent Automation
  • 20. 20 | Confidential DIGITAL TRANSFORMATION: AGILE AND SECURE CHANGE MANAGEMENT
  • 21. CHALLENGE: AGILE AND SECURE CHANGE MANAGEMENT 21 | Confidential Handling multiple vendors and technologies via various platforms Lack of skilled personnel Enforcing security policy consistency Identifying and mitigating risks
  • 22. CHANGE MANAGEMENT AND AUTOMATION 22 Automatic design • End-to-end: multi- vendor, multi-platform • Optimized changes, eliminate human error Zero-Touch policy push automation Full documentation and audit trail What-if security check DevOps friendly Consistency across the entire network, including multiple clouds and hybrid environments 22 | Confidential
  • 23. JOINT VALUE - ALGOSEC AND VMWARE MITIGATE RISK Strengthen your cybersecurity posture by reducing your attack surface and prevent lateral movement ENSURE COMPLIANCE Eliminate visibility and security blind-spots you get from misaligned controls with traditional approaches SIMPLIFIED SECURITY ARCHITECTURE Radically simplified deployment and architecture eliminates the need for complex network changes ACCELERATE OPERATIONS Security policy that moves at the speed of development — align heterogenous controls with VMware’s service-defined firewall 23 | Confidential Transformation – Intrinsic Security with Intelligent Automation
  • 25. ALGOSEC AND VMWARE — RESOURCES 25 | Confidential Transformation – Intrinsic Security with Intelligent Automation • VMware NSX Service-defined Firewall - •https://www.vmware.com/security/internal-firewall.html • VMware NSX Service-defined Firewall Data Sheet https://www.vmware.com/content/dam/digitalmarketing/vmware/e n/pdf/products/vmware-nsx-service-defined-firewall.pdf • Partner Solution Brief: AlgoSec & VMware NSX https://www.algosec.com/wp-content/uploads/2016/03/AlgoSec- and-VMware-WEB-1.pdf