SlideShare a Scribd company logo
SECURITY POLICY
MANAGEMENT FOR
FINANCIAL
INSTITUTIONS
AGENDA
• The state of network security & its complexities
• Benchmark firewalls in the network
• Bridging the complexity gap
2 | Confidential
BOB!
• Bank
• CISO
• An audit delayed the delivery
of an important capability
3 | Confidential
Drivers for Network Security
4 | Confidential
Network
security
personnel
5 | Confidential
10
20242731
38
45
525255
111
BENCHMARK: FIREWALLS BY INDUSTRY
6 | Confidential
BENCHMARK: FIREWALLS BY COUNTRY
8101111
1717
2122242829313234
3941
4952555860
7477
85
93
7 | Confidential
BENCHMARK: FIREWALLS BY COUNTRY IN FINANCE
8
14
22
27
3436
5963
71
8485
112
120
SUMMARY
• 2 main challenges:
• Compliance
• Digital transformation
• Number of firewalls does not necessarily predict complexity
8 | Confidential
Automation bridges the gap
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
Algosec security policy management for financial institutions
SUMMARY
• 2 challenging missions:
• Compliance
• Digital transformation
• Don’t let the number of firewalls overwhelm you
39 | Confidential
Security policy automation and tools
can help you address these
challenges and more
SOME RESOURCES
40
THANK YOU FOR YOUR TIME
Asher Benbenisty
Director of product marketing
Asher.Benbenisty@algosec.com

More Related Content

PPTX
Ransomware Attack: Best Practices to proactively prevent contain and respond
PPTX
2019 02-20 micro-segmentation based network security strategies (yoni geva)
PPT
Create and Manage a Micro-Segmented Data Center – Best Practices
PDF
AlgoSec Application Migration Webinar
PDF
Avoid outages-from-misconfigured-devices-webinar-slides
PPTX
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
PDF
Migrating and Managing Security Policies in a Segmented Data Center
PDF
5 things you didn't know you could do with security policy management
Ransomware Attack: Best Practices to proactively prevent contain and respond
2019 02-20 micro-segmentation based network security strategies (yoni geva)
Create and Manage a Micro-Segmented Data Center – Best Practices
AlgoSec Application Migration Webinar
Avoid outages-from-misconfigured-devices-webinar-slides
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Migrating and Managing Security Policies in a Segmented Data Center
5 things you didn't know you could do with security policy management

What's hot (20)

PDF
Managing application connectivity securely through a merger or acquisition – ...
PPTX
Tying cyber attacks to business processes, for faster mitigation
PPTX
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
PDF
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
PPTX
2018 10-11 automating network security policy management allows financial ins...
PDF
Security Change Management: Agility vs. Control
PPTX
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
PPTX
AWS Security Fundamentals: Dos and Don’ts
PPTX
Application visibility across the security estate the value and the vision ...
PDF
Cisco aci and AlgoSec webinar
PPTX
Shift Happens: Eliminating the Risks of Network Security Policy Changes
PPTX
Put out audit security fires, pass audits -every time
PPTX
SDN's managing security across the virtual network final
PDF
Radically reduce firewall rules with application-driven rule recertification
PDF
compliance made easy. pass your audits stress-free webinar
PDF
best practices-managing_security_in_the hybrid cloud
PDF
5 things you didnt know you could do with security policy management
PPTX
Dos and Don’ts for Managing External Connectivity to/from Your Network
PDF
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
PDF
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Managing application connectivity securely through a merger or acquisition – ...
Tying cyber attacks to business processes, for faster mitigation
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
2018 10-11 automating network security policy management allows financial ins...
Security Change Management: Agility vs. Control
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
AWS Security Fundamentals: Dos and Don’ts
Application visibility across the security estate the value and the vision ...
Cisco aci and AlgoSec webinar
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Put out audit security fires, pass audits -every time
SDN's managing security across the virtual network final
Radically reduce firewall rules with application-driven rule recertification
compliance made easy. pass your audits stress-free webinar
best practices-managing_security_in_the hybrid cloud
5 things you didnt know you could do with security policy management
Dos and Don’ts for Managing External Connectivity to/from Your Network
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ad

Similar to Algosec security policy management for financial institutions (20)

PDF
European smart grid cyber and scada security
PDF
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
PDF
NEDAS DC - November 29, 2016 Presentations
PDF
The Future of Cloud Networking is VMware NSX (Danish VMUG edition)
PPTX
LFI18-Solving the challenges of commissioning a wireless lighting infrastruc...
PPTX
The Intelligent Edge - Managing Network Traffic at the Edge
PDF
The Intelligent Edge - Managing Network Traffic at the Edge
PPTX
Network Emerging Technologies assessment
PDF
The Future of Cloud Networking is VMware NSX
PPTX
PDF
Develop and/or Secure your IoT project, see how MU-Electronics can help you
PPTX
Will DCIM-driven cloud services change the game for data center management?
PPTX
Cloud Technology Brief 2013 Q1 - Thailand
PDF
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
PDF
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
PPTX
The secure, direct to-internet branch
PDF
Introduction_to_Network_Security lecture
PPT
PPTX
Transforming cloud security into an advantage
PPTX
kavya cn ppt.pdf.pptx Hotel Management system using computer network
European smart grid cyber and scada security
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
NEDAS DC - November 29, 2016 Presentations
The Future of Cloud Networking is VMware NSX (Danish VMUG edition)
LFI18-Solving the challenges of commissioning a wireless lighting infrastruc...
The Intelligent Edge - Managing Network Traffic at the Edge
The Intelligent Edge - Managing Network Traffic at the Edge
Network Emerging Technologies assessment
The Future of Cloud Networking is VMware NSX
Develop and/or Secure your IoT project, see how MU-Electronics can help you
Will DCIM-driven cloud services change the game for data center management?
Cloud Technology Brief 2013 Q1 - Thailand
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
The secure, direct to-internet branch
Introduction_to_Network_Security lecture
Transforming cloud security into an advantage
kavya cn ppt.pdf.pptx Hotel Management system using computer network
Ad

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
A Presentation on Artificial Intelligence
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MYSQL Presentation for SQL database connectivity
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
Big Data Technologies - Introduction.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
20250228 LYD VKU AI Blended-Learning.pptx

Algosec security policy management for financial institutions