Cloud teams know the difficulties of securing applications to cloud. Read about the process of segmenting an application in the cloud and practical limitations discovered in Azure Security Groups while simulating an application segmentation project in the cloud within multiple vNets.
About Avishag Daniely
Avishag is a senior cyber security analyst at GuardiCore where she is responsible for researching customer networks and generating analysis reports as well as research regarding new system features. Avishag is a candidate for a BA in Computer Science and Middle Eastern Studies. Prior to GuardiCore Avishag held analyst and research positions in Varonis and CyberArk.
Entries by Avishag Daniely
Cloud teams know the difficulties of migrating applications to cloud. Read about the practical limitations discovered in Azure Security Groups and flow logs while simulating an application migration to the cloud within a single vNet.
Traditional security tools are ineffective when it comes to protecting a hybrid cloud data center. They provide ineffective controls, limited visibility and automation, and can’t keep up with today’s pace of change. In contrast, Guardicore hybrid data center security strategies are built to enable security in this hybrid environment.
We had a great time presenting at Security Field Day 2019, showing how Reveal technology is foundational for creating and enforcing flexible micro-segmentation policy. Here are some of the top questions we fielded, and a chance to check out the full presentation.
The recent attacks on the Mexican domestic payment system SPEI led to millions of dollars being stolen in incremental amounts, under the radar of the Mexican banking authorities. In hindsight, network segmentation might have made all the difference.
When making the move to AWS, you need to put security first. We look at the gaps in Amazon’s own security groups solution, and discuss how can you utilize micro-segmentation to uncover process level visibility, deploy application-aware policy, and ensure simple management of a heterogeneous environment.
Imagine this, you’ve been coming to the office for the past few months, contacting customers, updating and documenting important information, sending confidential corporate emails, connecting to critical databases in the network data center, and all this time someone, or more precisely something, is watching your every move. A malware is on the loose in your […]