top of page

Search results

611 results found with an empty search

  • Play by the rules: Automation for simplified rule recertification | AlgoSec

    Learn how automation can simplify the process of rule recertification and help determine which rules are still necessary Webinars Play by the rules: Automation for simplified rule recertification As time goes by, once effective firewall rules can become outdated. This results in bloated security policies which can slow down application delivery. Therefore, best practice and compliance requirements calls for rule recertification at least once per year. While rule recertification can be done manually by going through the comments fields of every rule, this is a tedious process which is also subject to the weaknesses of human error. Automation can simplify the process and help determine which rules are still necessary, if done right. Join security experts Asher Benbenisty and Tsippi Dach to learn about: Rule recertification as part of application delivery pipeline The importance of recertifying rules regularly Methods used for rule recertification The business application approach for rule recertification October 27, 2021 Tsippi Dach Director of marketing communications Asher Benbenisty Director of product marketing Relevant resources AlgoSec AppViz – Rule Recertification Watch Video Changing the rules without risk: mapping firewall rules to business applications Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Rescuing your network with micro-segmentation

    Given the benefits of a micro segmentation strategy, it is worth understanding how to navigate these common challenges, and move towards a more consolidated, secure network Webinars Rescuing Your Network with Micro-Segmentation Cybersecurity has turned into a top priority as hackers grow more sophisticated. Micro-segmentation is a protective measure that allows you to put in gateways separating specific areas. This buffer can serve as a major deterrent keeping criminals from attacking sensitive data, and providing you with the ability to minimize the damage caused by unauthorized intrusions. It can also help with detection of weak points which expose your network to breaches. Join our panel of experts to learn how to plan and build your micro-segmentation strategy while avoiding common pitfalls along the way. In this session, we will discuss: The basics of micro-segmentation and it can help your network Why today’s environment has contributed to a greater need for micro-segmentation How to spot and avoid critical errors that can derail your micro-segmentation implementation July 5, 2021 Alex Hilton Chief Executive at Cloud Industry Forum (CIF) Prof. Avishai Wool CTO & Co Founder AlgoSec Relevant resources Building a Blueprint for a Successful Micro-segmentation Implementation Keep Reading Micro-Segmentation Implementation - Taking the Leap from Strategy to Execution Keep Reading Micro-segmentation – from strategy to execution Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Securely Accelerate Digital Transformation VMware & AlgoSec

    Securely accelerate digital transformation – A joint VMware AlgoSec webinar VMware AlgoSec Webinar Webinars Securely Accelerate Digital Transformation – A Joint VMware & AlgoSec Webinar This past year was an earthquake. The global pandemic amplified the urgent need for businesses to accelerate digital transformation, at the same time that concerns about security achieved heightened levels of urgency. Digital transformation offers the ability to turn these challenges into opportunities. In this joint session by VMware and AlgoSec, you’ll find out how you can maintain both security and agility throughout your digital business transformation project though the AlgoSec integration with VMware NSX-T. Our experts, Brian Heili from VMware and Jeremiah Cornelius from AlgoSec will show you: How VMware simplifies security deployments with NSX Service-defined Firewall by delivering a fundamentally different, “intrinsic” approach to securing east-west traffic at scale — one that’s built into the hypervisor and available at every host. How to gain complete visibility in NSX and across your entire hybrid network with AlgoSec. How to automatically discover, map and manage application connectivity in VMware NSX. How to assess risk in configuration of all network security policy changes and eliminate error with zero-touch automation. How to ensure continuous compliance, by having AlgoSec monitor and track changes to network security policies, whether on VMware NSX firewalls, traditional firewalls or cloud security control February 17, 2021 Brian Heili Network Security Solution Engineer Jeremiah Cornelius Technical Leader for Alliances and Partners at AlgoSec Relevant resources Tips on How to Create Filtering Policies for VMware NSX Keep Reading Partner Solution Brief: AlgoSec and VMware Read Document Network Security for VMware NSX Watch Video Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec | 5 Types of Firewalls for Enhanced Network Security

    Firewalls form the first line of defense against intrusive hackers trying to infiltrate internal networks and steal sensitive data. They... Firewall Change Management 5 Types of Firewalls for Enhanced Network Security Asher Benbenisty 2 min read Asher Benbenisty Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 10/25/23 Published Firewalls form the first line of defense against intrusive hackers trying to infiltrate internal networks and steal sensitive data. They act as a barrier between networks, clearly defining the perimeters of each. The earliest generation of packet-filter firewalls were rudimentary compared to today’s next-generation firewalls, but cybercrime threats were also less sophisticated. Since then, cybersecurity vendors have added new security features to firewalls in response to emerging cyber threats. Today, organizations can choose between many different types of firewalls designed for a wide variety of purposes. Optimizing your organization’s firewall implementation requires understanding the differences between firewalls and the network layers they protect. How Do Firewalls Work? Firewalls protect networks by inspecting data packets as they travel from one place to another. These packets are organized according to the transmission control protocol/internet protocol (TCP/IP), which provides a standard way to organize data in transit. This protocol is a concise version of the more general OSI model commonly used to describe computer networks. These frameworks allow firewalls to interpret incoming traffic according to strictly defined standards. Security experts use these standards to create rules that tell firewalls what to do when they detect unusual traffic. The OSI model has seven layers: Application Presentation Session Transport Network Data link Physical Most of the traffic that reaches your firewall will use one of the three major Transport layer protocols in this model, TCP, UDP, or ICMP. Many security experts focus on TCP rules because this protocol uses a three-step TCP handshake to provide a reliable two-way connection. The earliest firewalls only operated on the Network Layer, which provides information about source and destination IP addresses, protocols, and port numbers. Later firewalls added Transport Layer and Application Layer functionality. The latest next-generation firewalls go even further, allowing organizations to enforce identity-based policies directly from the firewall. Related Read : Host-Based vs. Network-Based Firewalls 1. Traditional Firewalls Packet Filtering Firewalls Packet-filtering firewalls only examine Network Layer data, filtering out traffic according to the network address, the protocol used, or source and destination port data. Because they do not inspect the connection state of individual data packets, they are also called stateless firewalls. These firewalls are simple and they don’t support advanced inspection features. However, they offer low latency and high throughput, making them ideal for certain low-cost inline security applications. Stateful Inspection Firewalls When stateful firewalls inspect data packets, they capture details about active sessions and connection states. Recording this data provides visibility into the Transport layer and allows the firewall to make more complex decisions. For example, a stateful firewall can mitigate a denial-of-service attack by comparing a spike in incoming traffic against rules for making new connections – stateless firewalls don’t have a historical record of connections to look up. These firewalls are also called dynamic packet-filtering firewalls. They are generally more secure than stateless firewalls but may introduce latency because it takes time to inspect every data packet traveling through the network. Circuit-Level Gateways Circuit-level gateways act as a proxy between two devices attempting to connect with one another. These firewalls work on the Session layer of the OSI model, performing the TCP handshake on behalf of a protected internal server. This effectively hides valuable information about the internal host, preventing attackers from conducting reconnaissance into potential targets. Instead of inspecting individual data packets, these firewalls translate internal IP addresses to registered Network Address Translation (NAT) addresses. NAT rules allow organizations to protect servers and endpoints by preventing their internal IP address from being public knowledge. 2. Next-Generation Firewalls (NGFWs) Traditional firewalls only address threats from a few layers in the OSI model. Advanced threats can bypass these Network and Transport Layer protections to attack web applications directly. To address these threats, firewalls must be able to analyze individual users, devices, and data assets as they travel through complex enterprise networks. Next-generation firewalls achieve this by looking beyond the port and protocol data of individual packets and sessions. This grants visibility into sophisticated threats that simpler firewalls would overlook. For example, a traditional firewall may block traffic from an IP address known for conducting denial-of-service attacks. Hackers can bypass this by continuously changing IP addresses to confuse and overload the firewall, which may allow routing malicious traffic to vulnerable assets. A next-generation firewall may notice that all this incoming traffic carries the same malicious content. It may act as a TCP proxy and limit the number of new connections made per second. When illegitimate connections fail the TCP handshake, it can simply drop them without causing the organization’s internal systems to overload. This is just one example of what next-gen firewalls are capable of. Most modern firewall products combine a wide variety of technologies to provide comprehensive perimeter security against comprehensive cyber attacks. How do NGFWs Enhance Network Security? Deep Packet Inspection (DPI) : NGFWs go beyond basic packet filtering by inspecting the content of data packets. They analyze the actual data payload and not just header information. This allows them to identify and block threats within the packet content, such as malware, viruses, and suspicious patterns. Application-Level Control : NGFWs can identify and control applications and services running on the network. This enables administrators to define and enforce policies based on specific applications, rather than just port numbers. For example, you can allow or deny access to social media sites or file-sharing applications. Intrusion Prevention Systems (IPS) : NGFWs often incorporate intrusion prevention capabilities. They can detect and prevent known and emerging cyber threats by comparing network traffic patterns against a database of known attack signatures. This proactive approach helps protect against various cyberattacks. Advanced Threat Detection: NGFWs use behavioral analysis and heuristics to detect and block unknown or zero-day threats. By monitoring network traffic for anomalies, they can identify suspicious behavior and take action to mitigate potential threats. U ser and Device Identification : NGFWs can associate network traffic with specific users or devices, even in complex network environments. This user/device awareness allows for more granular security policies and helps in tracking and responding to security incidents effectively. Integration with Security Ecosystem : NGFWs often integrate with other security solutions, such as antivirus software, intrusion detection systems (IDS), and security information and event management (SIEM) systems. This collaborative approach provides a multi-layered defense strategy . Security Automation : NGFWs can automate threat response and mitigation. For example, they can isolate compromised devices from the network or initiate other predefined actions to contain threats swiftly. In a multi-layered security environment, these firewalls often enforce the policies established by security orchestration, automation, and response (SOAR) platforms. Content Filtering : NGFWs can filter web content, providing URL filtering and content categorization. This helps organizations enforce internet usage policies and block access to potentially harmful or inappropriate websites. Some NGFWs can even detect outgoing user credentials (like an employee’s Microsoft account password) and prevent that content from leaving the network. VPN and Secure Remote Access : NGFWs often include VPN capabilities to secure remote connections. This is crucial for ensuring the security of remote workers and branch offices. Advanced firewalls may also be able to identify malicious patterns in external VPN traffic, protecting organizations from threat actors hiding behind encrypted VPN providers. Cloud-Based Threat Intelligence : Many NGFWs leverage cloud-based threat intelligence services to stay updated with the latest threat information. This real-time threat intelligence helps NGFWs identify and block emerging threats more effectively. Scalability and Performance : NGFWs are designed to handle the increasing volume of network traffic in modern networks. They offer improved performance and scalability, ensuring that security does not compromise network speed. Logging and Reporting : NGFWs generate detailed logs and reports of network activity. These logs are valuable for auditing, compliance, and forensic analysis, helping organizations understand and respond to security incidents. 3. Proxy Firewalls Proxy firewalls are also called application-level gateways or gateway firewalls. They define which applications a network can support, increasing security but demanding continuous attention to maintain network functionality and efficiency. Proxy firewalls provide a single point of access allowing organizations to assess the threat posed by the applications they use. It conducts deep packet inspection and uses proxy-based architecture to mitigate the risk of Application Layer attacks. Many organizations use proxy servers to segment the parts of their network most likely to come under attack. Proxy firewalls can monitor the core internet protocols these servers use against every application they support. The proxy firewall centralizes application activity into a single server and provides visibility into each data packet processed. This allows the organization to maintain a high level of security on servers that make tempting cyberattack targets. However, these servers won’t be able to support new applications without additional firewall configuration. These types of firewalls work well in highly segmented networks that allow organizations to restrict access to sensitive data without impacting usability and production. 4. Hardware Firewalls Hardware firewalls are physical devices that secure the flow of traffic between devices in a network. Before cloud computing became prevalent, most firewalls were physical hardware devices. Now, organizations can choose to secure on-premises network infrastructure using hardware firewalls that manage the connections between routers, switches, and individual devices. While the initial cost of acquiring and configuring a hardware firewall can be high, the ongoing overhead costs are smaller than what software firewall vendors charge (often an annual license fee). This pricing structure makes it difficult for growing organizations to rely entirely on hardware devices. There is always a chance that you end up paying for equipment you don’t end up using at full capacity. Hardware firewalls offer a few advantages over software firewalls: They avoid using network resources that could otherwise go to value-generating tasks. They may end up costing less over time than a continuously renewed software firewall subscription fee. Centralized logging and monitoring can make hardware firewalls easier to manage than complex software-based deployments. 5. Software Firewalls Many firewall vendors provide virtualized versions of their products as software. They typically charge an annual licensing fee for their firewall-as-a-service product, which runs on any suitably provisioned server or device. Some software firewall configurations require the software to be installed on every computer in the network, which can increase the complexity of deployment and maintenance over time. If firewall administrators forget to update a single device, it may become a security vulnerability. At the same time, these firewalls don’t have their own operating systems or dedicated system resources available. They must draw computing power and memory from the devices they are installed on. This leaves less power available for mission-critical tasks. However, software firewalls carry a few advantages compared to hardware firewalls: The initial subscription-based cost is much lower, and many vendors offer a price structure that ensures you don’t pay for resources you don’t use. Software firewalls do not take up any physical space, making them ideal for smaller organizations. The process of deploying software firewalls often only takes a few clicks. With hardware firewalls, the process can involve complex wiring and time-consuming testing. Advanced Threats and Firewall Solutions Most firewalls are well-equipped to block simple threats, but advanced threats can still cause problems. There are many different types of advanced threats designed to bypass standard firewall policies. Advanced Persistent Threats (APTs) often compromise high-level user accounts and slowly spread throughout the network using lateral movement. They may move slowly, gathering information and account credentials over weeks or months before exfiltrating the data undetected. By moving slowly, these threats avoid triggering firewall rules. Credential-based attacks bypass simple firewall rules by using genuine user credentials to carry out attacks. Since most firewall policies trust authenticated users, attackers can easily bypass rules by stealing user account credentials. Simple firewalls can’t distinguish between normal traffic and malicious traffic by an authenticated, signed-in user. Malicious insiders can be incredibly difficult to detect. These are genuine, authenticated users who have decided to act against the organization’s interest. They may already know how the firewall system works, or have privileged access to firewall configurations and policies. Combination attacks may target multiple security layers with separate, independent attacks. For example, your cloud-based firewalls may face a Distributed Denial of Service (DDoS) attack while a malicious insider exfiltrates information from the cloud. These tactics allow hackers to coordinate attacks and cover their tracks. Only next-generation firewalls have security features that can address these types of attack. Anti-data exfiltration tools may prevent users from sending their login credentials to unsecured destinations, or prevent large-scale data exfiltration altogether. Identity-based policies may block authenticated users from accessing assets they do not routinely use. Firewall Configuration and Security Policies The success of any firewall implementation is determined by the quality of its security rules. These rules decide which types of traffic the firewall will allow to pass, and what traffic it will block. In a modern network environment, this is done using four basic types of firewall rules: Access Control Lists (ACLs). These identify the users who have permission to access a certain resource or asset. They may also dictate which operations are allowed on that resource or asset. Network Address Translation (NAT) rules. These rules protect internal devices by hiding their original IP address from the public Internet. This makes it harder for hackers to gain unauthorized access to system resources because they can’t easily target individual devices from outside the network. Stateful packet filtering . This is the process of inspecting data packets in each connection and determining what to do with data flows that do not appear genuine. Stateful firewalls keep track of existing connections, allowing them to verify the authentication of incoming data that claims to be part of an already established connection. Application-level gateways. These firewall rules provide application-level protection, preventing hackers from disguising malicious traffic as data from (or for) an application. To perform this kind of inspection, the firewall must know what normal traffic looks like for each application on the network, and be able to match incoming traffic with those applications. Network Performance and Firewalls Firewalls can impact network performance and introduce latency into networks. Optimizing network performance with firewalls is a major challenge in any firewall implementation project. Firewall experts use a few different approaches to reduce latency and maintain fast, reliable network performance: Installing hardware firewalls on high-volume routes helps, since separate physical devices won’t draw computing resources away from other network devices. Using software firewalls in low-volume situations where flexibility is important. Sometimes, being able to quickly configure firewall rules to adapt to changing business conditions can make a major difference in overall network performance. Configuring servers to efficiently block unwanted traffic is a continuous process. Server administrators should avoid overloading firewalls with denied outbound requests that strain firewalls at the network perimeter. Firewall administrators should try to distribute unwanted traffic across multiple firewalls and routers instead of allowing it to concentrate on one or two devices. They should also try reducing the complexity of the firewall rule base and minimize overlapping rules. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • AlgoSec | 2023 Cybersecurity Predictions and Best Practices

    As 2022 comes to a close, Professor Avishai Wool, AlgoSec Co-Founder and CTO, provides his top 5 issues organizations will need to be... IaC 2023 Cybersecurity Predictions and Best Practices Prof. Avishai Wool 2 min read Prof. Avishai Wool Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 12/6/22 Published As 2022 comes to a close, Professor Avishai Wool, AlgoSec Co-Founder and CTO, provides his top 5 issues organizations will need to be aware in 2023 that will also dominate the cyber community conversation. 1) Application centric approach to network security will supersede basic NSPM I think the market has matured to the point where the NSPM approach has reached a tipping point and I see the shift to an application perspective becoming the de facto approach in network security policy management as there are better and more robust technologies in the market that can help organizations get there faster. I see this shift becoming even more viable in 2023 based on recent market trends in which organizations are opting for downsizing and trying to do more with the smaller staff at the expense of losing tribal knowledge. As a result, I see organizations shifting more towards adopting a holistic approach to network security that are more application centric in which they can retain critical knowledge, such as application traffic intent and application policy rules, so that the new generations can step in and pick up where the previous predecessors left off. 2) Containerization will enhance layered security I expect container security to be increasingly popular in the future, as companies understand that their existing network security mechanisms are not enough for the communication networks of today. Containers are seen as a cost-effective light-weight solution for deployment – and deploying them introduces another inner layer where security policies can be applied: behind the perimeter filters, the internal zoning, and the micro-segmentation, organizations can now also consider nano-segmentation at the container level. Vulnerability testing is another dimension of the container platform especially within cloud applications and SaaS products. The common Kubernetes platform offers both opportunities and challenges for vulnerability scanners. Beyond 2023 , businesses will need to enhance both their visibility and management capabilities of security within their containerized applications 3) Security driven IaaS ecosystems to improve network security I expect the popularity of Infrastructure as a service (IaaS) to continue to soar, making it difficult for security teams to keep up with the associated risks and vulnerabilities. Pre-set security settings may not meet the needs of the organization and customizing these settings can prove to be difficult. The customizability of IaaS offers great potential for productivity, but it also makes it complicated to secure. The bottom line is that companies can no longer depend on their network perimeter to guard sensitive data. In response, I anticipate organizations that begin utilizing an “Always-on Security” approach such as Infrastructure as Code (IaC) which would permit them to construct personalized policies to control the development environments during each phase of the software development life cycle (SDLC) and recognize potential risks, security flaws, and compliance issues on a what-if basis, before deploying flawed settings into production. 4) Cloud-native security tools will reign supreme I expect that cloud-based security systems will become more commonplace: these security solutions offer a wide range of abilities, such as secure access, identity and access management, data loss prevention, application security, automation of security, detection and prevention of intrusions, security information and event management, and encryption. With companies transitioning more workloads to the cloud, they will want to make use of many of these features. These tools make it possible for remote teams to manage a greater public cloud presence: comfortably configuring services and automating processes, to identify and preemptively tackle any kind of threats. To bridge the gap in cloud data security, I anticipate the emergence of data safeguarding systems that are designed specifically for cloud usage and are able to link up with public cloud systems in an advanced, agentless manner. This has been classified in the market as Cloud Native Application Protection Platform (CNAPP) . These platforms must be able to detect where the data is stored and what sorts of data are stored in the cloud, so that corporations can prioritize on what is most important – defending their most sensitive data and cloud-based applications without interfering with their normal operations. 5) Expect ransomware not to go away and get even more sophisticated Organizations in 2022 saw no let-up from ransomware threats, some of whom were attacked multiple times and I do not see any reason why this trend will change in 2023. Cyber criminals are getting more resourceful and savvier in their attempts to stay ahead of law enforcement, and I anticipate these attacks will only become more frequent as their perpetrators are proving more capable of infiltrating many organizations’ cyber defenses. In response, organizations will have to seek more technology solutions to protect data at the source. But that would not suffice. I think organizations will need to look beyond technological solutions and apply better preparedness strategies. Whether it be Zero Trust or something less overarching but more practical for an organization’s business needs, such as Micro-segmentation , it would ensure that threat-actors would not be able to access the data residing inside the security perimeter. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Turning Network Security Alerts into Action: Change Automation to the Rescue | AlgoSec

    Best practices for network security governance in AWS and hybrid network environments Webinars Turning Network Security Alerts into Action: Change Automation to the Rescue You use multiple network security controls in your organization, but they don’t talk to each other. And while you may get alerts that come with tools such as SIEM solutions and vulnerability scanners – in your security landscape, making the necessary changes to proactively react to the myriad of alerts is difficult. Responding to alerts feels like a game of whack-a-mole. Manual changes are also error-prone, resulting in misconfigurations. It’s clear that manual processes are insufficient for your multi-device, multi-vendor, and heterogeneous environment network landscape. What’s the solution? Network security change automation! By implementing change automation for your network security policies across your enterprise security landscape you can continue to use your existing business processes while enhancing business agility, accelerate incident response times, and reduce the risk of compliance violations and security misconfigurations. In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, shows you how to: Automate your network security policy changes without breaking core network connectivity Analyze and recommend changes to your network security policies Push network security policy changes with zero-touch automation to your multi-vendor security devices Maximize the ROI of your existing security controls by automatically analyzing, validating, and implementing network security policy changes – all while seamlessly integrating with your existing business processes April 7, 2020 Dania Ben Peretz Product Manager Relevant resources Network firewall security management See Documentation Simplify and Accelerate Large-scale Application Migration Projects Read Document Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Migrate & modernize: Supercharging your Cisco Nexus refresh with ACI | AlgoSec

    Webinars Migrate & modernize: Supercharging your Cisco Nexus refresh with ACI If you still have Cisco Nexus 7000 devices in your environment, surely you have been inundated with end-of-life warnings and next-gen messaging touting the benefits of upgrading to Nexus 9000 with Cisco ACI. We know, modernizing your infrastructure can be a real pain, but with change also comes opportunity! Find out in this session how to leverage your Nexus refresh to increase your efficiency and productivity, and reduce security concerns at the same time. AlgoSec’s Jeremiah Cornelius, along with Cisco’s Cynthia Broderick, will guide you on how to: Migrate your current Nexus flows to ACI using your preferred mode – network or application centric Remove vulnerabilities caused by human error via automation of network change processes. Instantly identify and remediate risk and compliance violations. June 9, 2021 Cynthia Broderick DC Networking, Business Development at Cisco Jeremiah Cornelius Technical Leader for Alliances and Partners at AlgoSec Relevant resources Modernize your network and harness the power of Nexus & Cisco ACI with AlgoSec Watch Video AlgoSec’s integration with Cisco ACI Watch Video Cisco & AlgoSec achieving application-driven security across your hybrid network Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Ensure up to date compliance and tighten your hybrid network security posture with AlgoSec A32.60

    AlgoSec’s latest product release provides organizations with enhanced application connectivity visibility, effective security, and continuous compliance with the most recent regulations across their multi-cloud environments. Ensure up to date compliance and tighten your hybrid network security posture with AlgoSec A32.60 AlgoSec’s latest product release provides organizations with enhanced application connectivity visibility, effective security, and continuous compliance with the most recent regulations across their multi-cloud environments. September 13, 2023 Speak to one of our experts RIDGEFIELD PARK, N.J., September 13, 2023 – AlgoSec, a global cybersecurity leader, introduces AlgoSec A32.60, the latest in application connectivity security and compliance. AlgoSec A32.60 provides an effective solution for organizations to secure application connectivity in their hybrid and multi-cloud estate. A32.60 integrates cloud security visibility into AlgoSec’s security management platform and enables organizations to ensure ongoing compliance with industry regulatory standards. The key benefits that AlgoSec A32.60 delivers to network and security experts include: Enhanced visibility and security of north-south network traffic: New integration with Palo Alto Prisma Access, now encompassing mobile user policies within the Prisma access fabric. New integration and support for SD-WAN Versa Networks, offering extended visibility into network connectivity and an intuitive topology map. Ensuring ongoing regulatory compliance: Enhanced ISO 27001 report with the latest 2022 standards, allowing organizations to ensure alignment with the most current regulations. Integration of a new ECB (European Central Bank) regulations report, allowing companies to confidently navigate evolving compliance requirements. Integrating cloud security visibility into network security policy management: Expanded integration with Microsoft Azure firewall enables centralized visibility across both cloud and traditional firewalls, all within a single, unified management solution. New automation support for Fully Qualified Domain Name (FQDN) objects in Palo Alto Panorama, Fortinet FortiManager, and Check Point. This allows users to efficiently manage and secure their network resources while embracing the flexibility of cloud environments. About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity by automating connectivity flows and security policy, anywhere. The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk, achieve compliance at the application-level and process changes at zero-touch across the hybrid network. AlgoSec’s patented application-centric view of the hybrid network enables business owners, application owners, and information security professionals to talk the same language, so organizations can deliver business applications faster while achieving a heightened security posture. Over 1,800 of the world’s leading organizations trust AlgoSec to help secure their most critical workloads across public cloud, private cloud, containers, and on-premises networks. See what securely accelerating your digital transformation, move-to-cloud, infrastructure modernization, or micro-segmentation initiatives looks like at www.algosec.com

  • Energy Company | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Leading Energy Company Embraces Network Security Policy Automation Organization Energy Company Industry Utilities & Energy Headquarters California, USA Download case study Share Customer
success stories "We can demonstrate that the firewalls meet our standards." Fortune 50-listed energy company cleans up hundreds of firewall rules, gains continuous compliance. Background The customer is one of the world’s leading integrated energy companies. Through its worldwide subsidiaries, the company is involved in virtually every facet of the energy industry. The company explores for, produces and transports crude oil and natural gas; refines, markets and distributes transportation fuels and lubricants; manufactures and sells petrochemicals and additives; generates power; and develops and deploys technologies that enhance business value in every aspect of the company’s operations. They are listed on the Fortune 50 and a component of the S&P 100. The Challenge The customer has over 900 firewalls throughout the world, including in several remote sites. Some of their challenges included: Overly broad firewall policies Risky firewall rules Pressure from legal and compliance teams Manual processes and difficulty implementing automation Lack of visibility into security policies throughout the network “Before AlgoSec, we didn’t manage our firewalls very well,” stated Jeremy Haynes, a Solution Architect at the energy company. “We did not have a good enforcement and validation tool to verify that policies were accurate and did not introduce unacceptable risk.” The Solution The company was in the process of migrating from their previous firewall vendor to Palo Alto Networks. They used the opportunity for a fresh start to clean up and optimize their security policies. They were searching for a solution that provided: Automation of firewall policy management Identification of layer 7 (application-based) policies Innovative features that aligned with their strategic goals Strong support for Palo Alto Networks firewalls Following an in-depth evaluation, the company selected AlgoSec’s Security Policy Management Solution, which includes AlgoSec Firewall Analyzer (AFA) and AlgoSec FireFlow (AFF). AlgoSec Firewall Analyzer ensures security and compliance by providing visibility and analysis into complex network security policies. AlgoSec FireFlow improves security and saves security staffs’ time by automating the entire security policy change process, eliminating manual errors, and reducing risk. The Results By using the AlgoSec Security Management Solution, the company was able to clean up risky firewall policies, reduce misconfigurations, and dedicate more workers to business-driven innovation instead of security policy maintenance. Some benefits gained include: Compliance with internal requirements Ability to map out their network and maintain network segmentation Less time needed to maintain firewall policies Easier time managing hundreds of firewalls spread out worldwide AlgoSec enabled their network segmentation initiatives. By mapping their network, and determining what zones should communicate with each other, they were able to fix existing policies that broke segmentation rules and not break segmentation policies in the future. This helped ensure a state of continuous compliance. “AlgoSec gives us an easy to read and present view of firewall compliance. This helps our business units ensure their policies are clean. We can also demonstrate that the firewalls connected to our network, but owned by other business units, meet our standards,” according to Haynes. They have over 1,700 change requests daily and therefore automation is crucial. “The ability to work with Ansible, ServiceNow, and Palo Alto gives us the ability to automate our firewall policy creation. It does so in a manner where we do not have to worry about a policy being created that may put our organization at risk,” continued Haynes. AlgoSec helps the company to not only quickly deploy firewall policies but also ensure the security of the business. “We want to make sure our money-making capabilities can conduct their business with minimal impact and do their job. The ROI for us is our great assurance in the security of our firewall policies,” concluded Haynes. Schedule time with one of our experts

  • Sanofi | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. SANOFI FINDS THE CURE FOR TIME-CONSUMING APPLICATION MIGRATION WITH ALGOSEC Organization Sanofi Industry Healthcare & Pharmaceuticals Headquarters Paris, France Download case study Share Customer
success stories "Using AlgoSec during our data center migration allowed us to give technical project leaders access to all of the rules involved in the migration of their applications, which reduced the IT security team’s time on these projects by 80%. The application was very useful, simple to use and made everybody happy." AlgoSec Business Impact Simplify data center migration projects Reduce rule migration process time by 80% Streamline and improve firewall operations Background A multinational pharmaceutical company, Sanofi, has 112 industrial sites in 41 countries and operations in more than 100 countries. The company’s 110,000 employees are committed to protecting health, enhancing life, providing hope and responding to the potential healthcare needs of seven billion people around the world. Challenge The sensitive nature of Sanofi’s business and its wide ranging global operations require an extensive and well secured network, which currently has 120 firewalls all over the world. In the midst of a data center consolidation project, the company needed to understand how its security devices would be affected by application migrations. Sanofi was also eager to improve change management processes and gain key performance indicators (KPIs) for risk analysis.“Our main concern with the data center consolidation project was to enable various technical project leaders to see the different rules impacting the migration of their applications, and to avoid any outages. For that, we needed pre-migration and post-migration documentation on security,” says Bruno Roulleau, Network Security Architect at Sanofi. “We also needed metrics on the risk associated with different policies on the firewalls.” Solution When looking for a solution, Sanofi evaluated several vendors. “A key point for us was the ability to easily integrate the security devices in our current infrastructure, into the solution. We also wanted detailed reporting that would allow us to delegate policy management to project leaders,” Roulleau notes.Because Sanofi constantly upgrades its devices, its systems need to evolve and incorporate the new devices and rules seamlessly. “We chose the AlgoSec Security Management solution because its graphical interface is very user-friendly, it easily supports new devices and generates detailed reports and metrics on risks,” says Roulleau.Sanofi also appreciated AlgoSec’s flexibility. “AlgoSec is very open to developing new capabilities. We can ask to have some new features available by a certain date and they will deliver on time,” according to Roulleau. For a company with a complex network and rapidly evolving security needs, that responsiveness proved key to the decision to go with AlgoSec. Results Sanofi’s security team is now able to delegate responsibility for rule changes both during migration and on an ongoing basis. “Using AlgoSec during our data center migration allowed us to give technical project leaders access to all of the rules involved in the migration of their applications, which reduced the IT security team’s time on these projects by 80%. The application was very useful, simple to use and made everybody happy,” Roulleau says.Additionally, with AlgoSec’s reports Sanofi can now easily and clearly document the status of their firewalls as well as the impact of any changes on the network throughout the migration project. “We can now generate detailed reports in just three clicks!” Roulleau adds.Furthermore, AlgoSec’s optimization reports enabled Sanofi to clean up its security policies. Because they could clearly see all of the rules and their impact on network security, Roulleau’s team was able to safely eliminate unused and duplicate rules, which increased the efficiency of the firewalls. Those reports also provided insight into the risks associated with the current system and various changes being made. Schedule time with one of our experts

  • Payment Solutions | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Leading payment solutions company credits AlgoSec for increasing security and compliance Organization Payment Solutions Industry Financial Services Headquarters Download case study Share Customer
success stories "Leading fintech company rapidly improves security and compliance with AlgoSec jumpstart program" Background The company is one of the largest payment solutions providers, with offices processing more than 28 billion transactions worldwide. The company services 800,000 merchant outlets that generate $120 billion in processing volume. Its businesses include credit card processing, merchant acquisition and issuance of bank credit cards. The company grew to its enormous size through innovation and acquisition. It has introduced modern technology into the payments industry and has acquired many innovative companies over the last three decades. Challenges Today, the company operates 10 data centers with varying security architectures and firewall equipment from different vendors. The security staff is currently in the process of a cross-company firewall consolidation that will take several years to complete. The company is automating its change management of firewall rules to cut down on the time and effort spent on researching and implementing rules to keep up with its fast growth. It deploys rule changes during tight, scheduled “push windows” and conducts compliance reviews twice per year. The firewall change process is highly complex with many steps: Request Design Peer Review Management Approval Implementation Validation Success for the security team is all about time. They seek to automate the process by reducing time spent on: Research and writing rules Peer reviews Staging Security peering after staging Firewall push window requirements Quarterly firewall ruleset reviews as part of compliance objectives Solution The security team acquired AlgoSec Firewall Analyzer (AFA) and deployed it at two of its data centers in Arizona and Colorado. In both locations, the company is in the process of firewall migration to consolidate on one vendor. However, they need to add firewall clusters one at a time after each migration instead of all at once. The company took advantage of AlgoSec’s Jumpstart Program that delivers the benefits of AlgoSec Firewall Analyzer in conjunction with other AlgoSec solutions quickly. With Jumpstart, the company is quickly able to: Automate the discovery and mapping of enterprise applications Automate the change management processes Adopt the new processes across the company Realize rapid ROI The company’s lead security infrastructure consultant proclaimed, “AlgoSec customized their Jumpstart Program just for us. Their people are engaged, personable, skilled and highly efficient. They became part of our team dedicated to our success.” In addition to getting Firewall Analyzer up and running quickly and delivering its benefits, the Jumpstart team’s AFA deployment immediately identified network security gaps and helped the company close them, making them more secure and compliant. Results AlgoSec Firewall Analyzer is achieving all the goals of the security team. Time for policy writing reduced from 90 hours to 15 hours – 83% less Cut the total process time by half, enabling the security team to keep up with the barrage of change requests. Reduced the admin overhead from 30 to 4 – 87% less “Automation is definitely the way to go,” declared their security consultant. “We can now stay on top of the process even while we migrate our firewalls. We are looking for more from AlgoSec.” The company is now in the process of implementing AlgoSec FireFlow (AFF) to enhance the existing change management system with intelligent network and security automation. AlgoSec FireFlow enforces compliance and automatically documents the entire change-management lifecycle. Some of the features include: Processing of firewall changes with zero-touch automation Elimination of mistakes and rework, and improvement of accountability for change requests Proactive assessment of the impact of network changes to ensure security and continuous compliance Automation of the rule–recertification processes Schedule time with one of our experts

  • Natilik and Rothschild | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. AlgoSec Case Study: Natilik and Rothschild Organization Natilik and Rothschild Industry Financial services Headquarters Download case study Share Customer
success stories AlgoSec Case Study: Natilik and Rothschild Interview details Interviewee: Robert Elgidge, Security Solutions Director at Natilik Company: Natilik, UK-based global managed service provider Client: Rothschild, a multinational financial services institution Background Natilik, a global managed service provider, collaborated with AlgoSec to address the complex security challenges faced by Rothschild, a financial services leader with over 60 offices in 40 countries and $2.5 billion in annual revenue. Rothschild’s operations include investment banking, asset management, and private banking, as well as advisory roles for governments. Given their critical global role, securing and streamlining their IT infrastructure was a top priority. As part of their modernization strategy, Natilik also leveraged AWS to support Rothschild’s expanding cloud footprint and used the AlgoSec Horizon platform to provide unified visibility and security management across both AWS and on-prem environments. This hybrid approach allowed Natilik to centralize security policy analysis, application connectivity mapping, and risk prioritization across firewalls, cloud controls, and distributed sites. Watch the interview: Natilik’s expertise spans five key solution areas: Collaboration and modern work : enabling seamless communication and productivity across teams. Customer engagement : enhancing customer experiences through tailored digital solutions. Modern networks : building secure, scalable, and high-performing network infrastructures. Multi-cloud and data centers : supporting hybrid and multi-cloud environments for agility and scalability. Cybersecurity : providing end-to-end protection, which underpins all other solution areas. Cybersecurity forms the backbone of their offerings, ensuring clients like Rothschild can navigate an evolving threat landscape while maintaining compliance and operational excellence. Primary use case Rothschild’s primary challenges stemmed from fragmented security policies and inefficient manual processes. According to Robert Elgidge: “Rothschild’s large global firewall estate led to poor visibility and cumbersome management. AlgoSec was introduced to simplify these complexities, but initially, the company struggled with change management, approvals, and deploying firewall rules. Although AlgoSec offered the technology and intelligence needed, a significant amount of manual work was required to align stakeholders and integrate workflows.” With the introduction of AWS into their hybrid architecture, Natilik used AlgoSec Horizon to bridge visibility gaps between cloud and on-prem environments. Horizon’s application-centric discovery and cross-environment policy analysis helped Natilik consolidate cloud security groups, optimize hybrid access rules, and ensure consistent enforcement across AWS and traditional firewalls. AlgoSec’s deployment ultimately allowed Rothschild to consolidate security policies and automate manual processes, reducing errors and freeing resources for higher-value projects. Most valuable features Robert highlighted several standout features of AlgoSec: “AlgoSec’s rule intelligence feature was crucial. It identified which firewall rules were essential and which could be removed, dramatically simplifying the structure. This optimization not only improved performance but also saved significant costs. Initially, Rothschild considered investing in new firewall infrastructure, but AlgoSec’s ability to streamline and prioritize existing rules negated that need. The resulting performance boost was substantial, avoiding unnecessary expenses and improving operational efficiency.” By focusing on rule prioritization and optimization, AlgoSec enhanced Rothschild’s security posture and operational outcomes. With the addition of AlgoSec’s cloud-native capabilities (via its Horizon/ACE architecture), this rule intelligence and optimization extends not only to physical and on-prem firewalls, but also to cloud-native firewalls and security-group configurations ensuring effective policy hygiene across hybrid and multi-cloud estates. Areas for improvement Despite AlgoSec’s benefits, Robert noted areas for potential improvement: “Internal challenges with workflows and approvals persisted. While AlgoSec provided the technical capabilities, a more tailored approach to building or improving management processes would have been helpful. The main difficulties lay in the bureaucratic side of things, such as aligning request and approval roles.” These challenges highlighted the importance of aligning organizational processes with advanced security technologies. Usage duration “My experience with AlgoSec began in 2022, during its deployment at Rothschild. Shortly after, I transitioned to another organization that also used AlgoSec, which gave me further insight into its capabilities across different environments.” Solution stability Robert praised AlgoSec’s reliability: “There were no stability issues. Once AlgoSec was fully integrated, it became the central authority for rule management. We removed manual admin rights from the technical team, ensuring all changes went through AlgoSec. This approach eliminated human error and reinforced the solution’s effectiveness.” This stability now also covers hybrid and cloud-native policy environments, so Rothschild benefits from the same governance and control whether rules apply to physical appliances or cloud firewalls. Customer service and support “The technical support team was highly skilled and responsive. However, in regions like Brazil, where collaboration often involves discussions and in-person meetings, a purely technical approach didn’t always fully address our needs. A more consultative support model could enhance the customer experience in these scenarios.” Initial setup “Deploying AlgoSec was challenging due to the complexity of Rothschild’s network. However, the technical support team acted quickly to address any issues, ensuring the implementation proceeded smoothly. Once the environment was stabilized, maintenance and ongoing use were straightforward.” Return on investment AlgoSec delivered a strong return on investment for Rothschild: “The money saved on after-hours work alone justified the tool within the first year. By optimizing firewall rules and automating workflows, we achieved significant operational savings. This freed up resources for other critical business initiatives, directly contributing to profitability.” With the addition of cloud-native policy management, Rothschild now sees potential additional savings by avoiding redundant firewall investments and streamlining cloud infrastructure as part of their hybrid estate. Pricing, setup costs, and licensing “Compared to other solutions like Tufin and FireMon, AlgoSec was competitively priced and stayed within budget. There were no significant additional costs apart from standard licensing fees. While we did hire new personnel to support change management, that was more related to internal processes than the technology itself.” Final insights Robert shared his advice for organizations considering AlgoSec: “AlgoSec is best suited for larger enterprises with complex environments, especially those with multiple firewall vendors and over 500 rules. For smaller setups, the added complexity of a dedicated solution might not be necessary. However, for businesses dealing with significant network complexity, AlgoSec simplifies management and delivers substantial value. With its cloud-native capabilities, hybrid-ready architecture, and unified policy management across on-prem and cloud, it’s more relevant than ever for organisations operating across diverse infrastructures.I’d rate it 10 out of 10 for companies with the right use case.” Schedule time with one of our experts

bottom of page