SlideShare a Scribd company logo
Managing Security
Policy Across
Multi-Cloud and
Hybrid Cloud
Networks
Yitzy Tannenbaum
Product Marketing Manager
poll
2 | Confidential
How many public cloud vendors
does your organization leverage?
• We are not yet in the cloud yet
• 1 vendor
• 2 vendors
• 3 or more vendors
While we wait for our audience to join
please vote using the “Votes” tab
in your BrightTALK panel
Welcome
Have a question? Submit it via the chat
This webinar is being recorded!
Slides and recording will be sent to you after the
webinar
3
marketing@algosec.com
Everyone’s moving to
the cloud
4 | Confidential
2015
2016
2017
2018
2019
2020
050100150200
67
82
99
117
138
162
The Rapid Growth of Cloud Computing, 2015-2020
Worldwide Spending on public Cloud Computing, 2015-2020 ($B)
Average Compound Growth Rate, YE2015-YE2020, 19%
IT Spending Average Compound Growth Rate, YE2015-YE2020, 3%
* Source: IDC, 2016
83% Of Enterprise
Workloads
Will Be In The Cloud By2020
- Forbes
Nearly 80% of IT
organizations are currently
deploying, or are planning
to implement, multi-cloud
environments.
-IDC
01
Nearly a third of
organizations work with
three to four cloud vendors.
- Microsoft
02
5 | Confidential
Cost efficient Different unique
features
Avoid lock in
Why multi cloud?
6 | Confidential
poll
7 | Confidential
What are the biggest challenges for
your organization engaging with
public cloud today?
• Security
• Governance & compliance
• Lack of visibility
• Lack of experience
Please vote using the “Votes” tab
in your BrightTALK panel
Cybersecurity Insiders 2018 Cloud Security
Report
Everyone’s concerned about cloud
security
8
Public Cloud Challenges
What are the biggest challenges for organizations
engaged with public cloud today?
(Somewhat/Extremely large)
UnplannedOutages
0%
10%
20%
30%
40%
50%
60%
70%
31%
37%
40%
47%
57%
58%
60%
66%
* Source: Forbes
Network are complex and heterogeneous
9 | Confidential
SDN
Multi
Public Clouds
On-Prem
MANAGING
SECURITY IN THE
CLOUD IS COMPLEX
MULTIPLE LAYERS OF
SECURITY CONTROLS
Cloud Infra
Security Controls
• Security groups
• Network ACLS
Security Products
by ISVs
• NG Firewalls
(Checkpoint, Palo-
Alto .. )
• WAF (Imperva, F5 .. )
10
Security Products
by Cloud Providers
In a multi and hybrid network there are many stakeholders
11 | Confidential
Multiple Stake
Holders
Cloud Teams
IT/
Network Security
CISO
Security Operations
Application
Developers / DevOps
Which team is responsible for managing
security in the public cloud
12 | Confidential
IT leaders report needing
to increase their security
staff by 24% to adequately
manage their
organization’s security
threats. –McAfee ‘Winning
the Game’
01
80% of organizations
affected by cyber security
skills gap -2018
Cyberthreat Defense
Report
02
13 | Confidential
| Confidential
Unified control of your
entire network estate
14
The challenges managing a hybrid multi
cloud environment
Visibility Change
Management
Risk analysis ComplianceGovernanceApplication
Connectivity
15
Visibility
Full visibility into the entire
network including deeply
understanding the network
topology and discovering the
network flows between:
• Multi-cloud environments
• Vpcs and v-nets
• Regions of same cloud
providers
• On-premise and cloud
providers
• The cloud environment and
the internet
• Traditional firewall in
the cloud
• Native cloud controls
(Microsoft Azure NSGs)
• On-premise devices
A single pane of glass into your entire network
17 | Confidential
Native Cloud Security Models
Virtual appliance in the cloud
Traditional
FW
18 | Confidential
Security Fundamentals Stay the Same
Visibility Change
Management
Risk analysis ComplianceGovernanceApplication
Connectivity
19
Change
Management
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
?
22
?
Security Fundamentals Stay the Same
Visibility Change
Management
Risk analysis ComplianceGovernanceApplication
Connectivity
24
application
connectivity
• Manage, provision and
monitor application
connectivity
• Keeping an application-
centric view across the
different networks and
security domains
• Review vulnerabilities and
risks
• Enable devops automation
through extensive APIs
Security Fundamentals Stay the Same
Visibility Change
Management
Risk analysis ComplianceGovernanceApplication
Connectivity
26
Risk analysis
Security Fundamentals Stay the Same
Visibility Change
Management
Risk analysis ComplianceGovernanceApplication
Connectivity
28
Unified
Compliance
Reports
poll
30 | Confidential
How much of your time is
invested in audits?
• Less than a week
• 1-2 weeks
• 2-4 weeks
• 1-2 months
• 2+ months !!!
Please vote using the “Votes” tab
in your BrightTALK panel
Manual Audits
Slow Down
Business
and are
Error-Prone
26%
29%
27%
12%
6%
<1 week
1-2 weeks
2-4 weeks
1-2 months
2+ months
Time devoted to firewall audits each year
31
?
?
summary
• Networks are complex:
• Multiple cloud vendors
• On-prem, private and public cloud
• Multiple stake-holders
• Easy to achieve agility, harder to keep it secure
• Visibility
• Change management
• Application connectivity
• Risk analysis
• Compliance
• You can apply your security guidelines in the cloud if you
choose the right tools
34
Q & A
You are also welcome to request a demo and email questions
marketing@algosec.com
INFOGRAPHIC
SURVEY
DATASHEET
36
https://www.algosec.com/resources
WEBINAR SLIDES
PPT Slides
upcoming webinars
https://www.algosec.com/webinars
NOVEMBER WEBINARS
Breaking Out of the Perimeter
without Breaking Security
When: Nov 6th
By: Yonatan Klein, Director of Product Management
Have it All: Achieving Agility and Security with Automation
When: Nov 19th
By: Yoni Geva, Product Manager
DECEMBER WEBINARS
Focus on FinTech:
Network Security Policy Management Best Practices
When: Dec 12th
By: Anner Kushnir, VP Technology
Network Security Policy Management:
Tips & Tricks
When: Dec 17th
By: Dania Peretz, Product Manager
---Sign up now ---
38
Join our community
Follow us for the latest on security policy management trends, tips & tricks, best
practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos presented
by Professor Wool
youtube.com/user/AlgoSe
c
linkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
THANK YOU!
Questions can be emailed to
marketing@algosec.com

More Related Content

PDF
Cloud migrations made simpler safe secure and successful migrations
PPTX
2018 10-11 automating network security policy management allows financial ins...
PDF
best practices-managing_security_in_the hybrid cloud
PPT
Create and Manage a Micro-Segmented Data Center – Best Practices
PDF
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
PPTX
Tying cyber attacks to business processes, for faster mitigation
PDF
AlgoSec Application Migration Webinar
PPTX
SDN's managing security across the virtual network final
Cloud migrations made simpler safe secure and successful migrations
2018 10-11 automating network security policy management allows financial ins...
best practices-managing_security_in_the hybrid cloud
Create and Manage a Micro-Segmented Data Center – Best Practices
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
Tying cyber attacks to business processes, for faster mitigation
AlgoSec Application Migration Webinar
SDN's managing security across the virtual network final

What's hot (20)

PPTX
Application visibility across the security estate the value and the vision ...
PDF
compliance made easy. pass your audits stress-free webinar
PPTX
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
PDF
Examining the Impact of Security Management on the Business (Infographic)
PPTX
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
PPTX
Migrating Application Connectivity and Network Security to AWS
PDF
Migrating and Managing Security in an AWS Environment- Best Practices
PDF
Microsegmentation from strategy to execution
PDF
Managing application connectivity securely through a merger or acquisition – ...
PPT
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
PDF
Managing Application Connectivity in the World of Network Security
PDF
The state of the cloud csa survey webinar
PPTX
Put out audit security fires, pass audits -every time
PDF
2021 01-13 reducing risk-of_ransomware
PPTX
2019 02-20 micro-segmentation based network security strategies (yoni geva)
PDF
Cisco aci and AlgoSec webinar
PPTX
2019 08-13 selecting the right security policy management solution
PDF
Avoid outages-from-misconfigured-devices-webinar-slides
PPTX
Shift Happens: Eliminating the Risks of Network Security Policy Changes
PPTX
Best Practics for Automating Next Generation Firewall Change Processes
Application visibility across the security estate the value and the vision ...
compliance made easy. pass your audits stress-free webinar
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Examining the Impact of Security Management on the Business (Infographic)
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Migrating Application Connectivity and Network Security to AWS
Migrating and Managing Security in an AWS Environment- Best Practices
Microsegmentation from strategy to execution
Managing application connectivity securely through a merger or acquisition – ...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Managing Application Connectivity in the World of Network Security
The state of the cloud csa survey webinar
Put out audit security fires, pass audits -every time
2021 01-13 reducing risk-of_ransomware
2019 02-20 micro-segmentation based network security strategies (yoni geva)
Cisco aci and AlgoSec webinar
2019 08-13 selecting the right security policy management solution
Avoid outages-from-misconfigured-devices-webinar-slides
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Best Practics for Automating Next Generation Firewall Change Processes
Ad

Similar to Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment (20)

PDF
MBT Webinar: Does the security of your business data keep you up at night?
PDF
10 Reasons Why Smart Organizations are Moving to Cloud BI
PPTX
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
PPTX
Cloud Security
PPTX
Cloud Security
PPTX
cloud security ppt
PPTX
Troubleshooting Webex and Microsoft Teams with ThousandEyes
PDF
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
PPTX
The End of Security as We Know It - Shannon Lietz
PPTX
Scalar Security Roadshow - Vancouver Presentation
PDF
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
PPTX
Cloud webinar final
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PPTX
Scalar Security Roadshow - Calgary Presentation
PPTX
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
PPTX
Navigating Cloud Trends in 2024 Webinar Deck
PDF
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
PPTX
Cloud security ppt
PPTX
Cloud Computing Gets Put to the Test
MBT Webinar: Does the security of your business data keep you up at night?
10 Reasons Why Smart Organizations are Moving to Cloud BI
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
Cloud Security
Cloud Security
cloud security ppt
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
The End of Security as We Know It - Shannon Lietz
Scalar Security Roadshow - Vancouver Presentation
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
Cloud webinar final
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Scalar Security Roadshow - Calgary Presentation
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
Navigating Cloud Trends in 2024 Webinar Deck
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Cloud security ppt
Cloud Computing Gets Put to the Test
Ad

More from AlgoSec (12)

PDF
2021 01-27 reducing risk of ransomware webinar
PDF
Compliance made easy. Pass your audits stress-free.
PDF
Build and enforce defense in depth - an algo sec-cisco tetration webinar
PDF
Radically reduce firewall rules with application-driven rule recertification
PDF
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
PDF
2020 04-07 webinar slides -turning network security alerts into action change...
PPT
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
PPT
More Things You Can Do with the AlgoSec Security Policy Management Suite
PPTX
2018 11-19 improving business agility with security policy automation final
PPTX
Zero Trust Framework for Network Security​
PPT
Selecting the right security policy management solution for your organization
PPTX
2018 07-24 network security at the speed of dev ops - webinar
2021 01-27 reducing risk of ransomware webinar
Compliance made easy. Pass your audits stress-free.
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Radically reduce firewall rules with application-driven rule recertification
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 04-07 webinar slides -turning network security alerts into action change...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
More Things You Can Do with the AlgoSec Security Policy Management Suite
2018 11-19 improving business agility with security policy automation final
Zero Trust Framework for Network Security​
Selecting the right security policy management solution for your organization
2018 07-24 network security at the speed of dev ops - webinar

Recently uploaded (20)

PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
medical staffing services at VALiNTRY
PDF
Understanding Forklifts - TECH EHS Solution
PDF
AI in Product Development-omnex systems
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Digital Strategies for Manufacturing Companies
PPTX
history of c programming in notes for students .pptx
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
top salesforce developer skills in 2025.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Wondershare Filmora 15 Crack With Activation Key [2025
medical staffing services at VALiNTRY
Understanding Forklifts - TECH EHS Solution
AI in Product Development-omnex systems
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Odoo POS Development Services by CandidRoot Solutions
CHAPTER 2 - PM Management and IT Context
2025 Textile ERP Trends: SAP, Odoo & Oracle
Digital Strategies for Manufacturing Companies
history of c programming in notes for students .pptx
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
How to Migrate SBCGlobal Email to Yahoo Easily
How to Choose the Right IT Partner for Your Business in Malaysia
top salesforce developer skills in 2025.pdf
Odoo Companies in India – Driving Business Transformation.pdf
Navsoft: AI-Powered Business Solutions & Custom Software Development
PTS Company Brochure 2025 (1).pdf.......
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free

Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment

  • 1. Managing Security Policy Across Multi-Cloud and Hybrid Cloud Networks Yitzy Tannenbaum Product Marketing Manager
  • 2. poll 2 | Confidential How many public cloud vendors does your organization leverage? • We are not yet in the cloud yet • 1 vendor • 2 vendors • 3 or more vendors While we wait for our audience to join please vote using the “Votes” tab in your BrightTALK panel
  • 3. Welcome Have a question? Submit it via the chat This webinar is being recorded! Slides and recording will be sent to you after the webinar 3 marketing@algosec.com
  • 4. Everyone’s moving to the cloud 4 | Confidential 2015 2016 2017 2018 2019 2020 050100150200 67 82 99 117 138 162 The Rapid Growth of Cloud Computing, 2015-2020 Worldwide Spending on public Cloud Computing, 2015-2020 ($B) Average Compound Growth Rate, YE2015-YE2020, 19% IT Spending Average Compound Growth Rate, YE2015-YE2020, 3% * Source: IDC, 2016 83% Of Enterprise Workloads Will Be In The Cloud By2020 - Forbes
  • 5. Nearly 80% of IT organizations are currently deploying, or are planning to implement, multi-cloud environments. -IDC 01 Nearly a third of organizations work with three to four cloud vendors. - Microsoft 02 5 | Confidential
  • 6. Cost efficient Different unique features Avoid lock in Why multi cloud? 6 | Confidential
  • 7. poll 7 | Confidential What are the biggest challenges for your organization engaging with public cloud today? • Security • Governance & compliance • Lack of visibility • Lack of experience Please vote using the “Votes” tab in your BrightTALK panel
  • 8. Cybersecurity Insiders 2018 Cloud Security Report Everyone’s concerned about cloud security 8 Public Cloud Challenges What are the biggest challenges for organizations engaged with public cloud today? (Somewhat/Extremely large) UnplannedOutages 0% 10% 20% 30% 40% 50% 60% 70% 31% 37% 40% 47% 57% 58% 60% 66% * Source: Forbes
  • 9. Network are complex and heterogeneous 9 | Confidential SDN Multi Public Clouds On-Prem
  • 10. MANAGING SECURITY IN THE CLOUD IS COMPLEX MULTIPLE LAYERS OF SECURITY CONTROLS Cloud Infra Security Controls • Security groups • Network ACLS Security Products by ISVs • NG Firewalls (Checkpoint, Palo- Alto .. ) • WAF (Imperva, F5 .. ) 10 Security Products by Cloud Providers
  • 11. In a multi and hybrid network there are many stakeholders 11 | Confidential Multiple Stake Holders Cloud Teams IT/ Network Security CISO Security Operations Application Developers / DevOps
  • 12. Which team is responsible for managing security in the public cloud 12 | Confidential
  • 13. IT leaders report needing to increase their security staff by 24% to adequately manage their organization’s security threats. –McAfee ‘Winning the Game’ 01 80% of organizations affected by cyber security skills gap -2018 Cyberthreat Defense Report 02 13 | Confidential
  • 14. | Confidential Unified control of your entire network estate 14
  • 15. The challenges managing a hybrid multi cloud environment Visibility Change Management Risk analysis ComplianceGovernanceApplication Connectivity 15
  • 16. Visibility Full visibility into the entire network including deeply understanding the network topology and discovering the network flows between: • Multi-cloud environments • Vpcs and v-nets • Regions of same cloud providers • On-premise and cloud providers • The cloud environment and the internet • Traditional firewall in the cloud • Native cloud controls (Microsoft Azure NSGs) • On-premise devices
  • 17. A single pane of glass into your entire network 17 | Confidential Native Cloud Security Models Virtual appliance in the cloud Traditional FW
  • 19. Security Fundamentals Stay the Same Visibility Change Management Risk analysis ComplianceGovernanceApplication Connectivity 19
  • 22. ? 22
  • 23. ?
  • 24. Security Fundamentals Stay the Same Visibility Change Management Risk analysis ComplianceGovernanceApplication Connectivity 24
  • 25. application connectivity • Manage, provision and monitor application connectivity • Keeping an application- centric view across the different networks and security domains • Review vulnerabilities and risks • Enable devops automation through extensive APIs
  • 26. Security Fundamentals Stay the Same Visibility Change Management Risk analysis ComplianceGovernanceApplication Connectivity 26
  • 28. Security Fundamentals Stay the Same Visibility Change Management Risk analysis ComplianceGovernanceApplication Connectivity 28
  • 30. poll 30 | Confidential How much of your time is invested in audits? • Less than a week • 1-2 weeks • 2-4 weeks • 1-2 months • 2+ months !!! Please vote using the “Votes” tab in your BrightTALK panel
  • 31. Manual Audits Slow Down Business and are Error-Prone 26% 29% 27% 12% 6% <1 week 1-2 weeks 2-4 weeks 1-2 months 2+ months Time devoted to firewall audits each year 31
  • 32. ?
  • 33. ?
  • 34. summary • Networks are complex: • Multiple cloud vendors • On-prem, private and public cloud • Multiple stake-holders • Easy to achieve agility, harder to keep it secure • Visibility • Change management • Application connectivity • Risk analysis • Compliance • You can apply your security guidelines in the cloud if you choose the right tools 34
  • 35. Q & A You are also welcome to request a demo and email questions marketing@algosec.com
  • 37. upcoming webinars https://www.algosec.com/webinars NOVEMBER WEBINARS Breaking Out of the Perimeter without Breaking Security When: Nov 6th By: Yonatan Klein, Director of Product Management Have it All: Achieving Agility and Security with Automation When: Nov 19th By: Yoni Geva, Product Manager DECEMBER WEBINARS Focus on FinTech: Network Security Policy Management Best Practices When: Dec 12th By: Anner Kushnir, VP Technology Network Security Policy Management: Tips & Tricks When: Dec 17th By: Dania Peretz, Product Manager ---Sign up now ---
  • 38. 38 Join our community Follow us for the latest on security policy management trends, tips & tricks, best practices, thought leadership, fun stuff, prizes and much more! Subscribe to our YouTube channel for a wide range of educational videos presented by Professor Wool youtube.com/user/AlgoSe c linkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  • 39. THANK YOU! Questions can be emailed to marketing@algosec.com