top of page

Search results

621 results found with an empty search

  • Security bot for network security policy management tasks

    AlgoBot is an intelligent chatbot that answers your questions, in English Use this personal assistant for security policy change management processes Algo Now AI-powered security assistant for network security policy
management tasks Your AI security policy management assistant. Algo is an AI-powered assistant that connects to the AlgoSec platform to deliver fast, natural-language access to core security policy workflows - so teams can get answers, run analysis, and drive change requests without switching tools. With Algo you can: Accelerate security policy decisions with AI-powered, natural-language guidance Reduce ticket resolution time by giving support teams instant, contextual answers Enable application owners to self-serve connectivity questions with guardrails Streamline change management by creating and tracking requests directly from chat Talk to Algo in natural language from Microsoft Teams (desktop, web, or mobile) so you can stay in your workflow while accessing AlgoSec capabilities Self-service security policy management Algo offloads day-to-day tasks from firewall and network administrators, by automatically answering typical security policy management questions and handling maintenance tasks. Ideal for a wide range of stakeholders including security teams and cyber analysts, application owners and developers, help desk, support, network, server and IT teams, Algo can, for example: Check if traffic is currently allowed between IP addresses, servers and applications Open change requests to allow network connectivity Check on the status of a change request Easy and convenient access to the AlgoSec security management solution Algo gives firewall and network administrators an easy and convenient way to access the AlgoSec Security Management Solution, to quickly take care of security policy management maintenance tasks. Using Algo, firewall and network administrators can, for example: Troubleshoot network connectivity issues and security incidents Check the status of change requests and approve changes Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec Values - AlgoSec

    AlgoSec Values Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec Wins SC Award for Best Security Company, Global InfoSec Award for Best Service Cybersecurity Company

    These award wins follow a year of double-digit year-on-year annual recurring revenue growth and the launch of the AlgoSec Horizon Platform AlgoSec Wins SC Award for Best Security Company, Global InfoSec Award for Best Service Cybersecurity Company These award wins follow a year of double-digit year-on-year annual recurring revenue growth and the launch of the AlgoSec Horizon Platform May 14, 2025 Speak to one of our experts RIDGEFIELD PARK, NJ, May 14, 2025 – Today, global cybersecurity leader AlgoSec announced it has won two prestigious cybersecurity awards, the 2025 SC Award for Best Security Company and the 2025 Global InfoSec Award for Best Service Cybersecurity Company. These accomplishments reinforce AlgoSec’s global leadership and its mission to deliver secure, seamless application connectivity across hybrid enterprise environments. AlgoSec offers a robust number of solutions dependent on customers’ business needs, such as application discovery and connectivity management , security change automation , and application-centric compliance and risk mitigation . Together, AlgoSec enables application owners, information security experts, SecOps and cloud security teams to deploy business applications faster while maintaining security. “We’re thrilled to be recognized as the best security company for our dedication to our customers and our impact on the industry at large,” said Chris Thomas , Chief Revenue Officer at AlgoSec. “These two awards cement our leadership as the top provider to future-proof complex multi-cloud hybrid networks through our unique application-centric approach.” To meet the complex security needs of its customers, AlgoSec recently launched AlgoSec Horizon Platform , the industry's first application-centric security management platform for the hybrid cloud network environment. With advanced AI nodules, AlgoSec Horizon platform prioritizes security efforts based on the criticality of business applications to ensure the most severe vulnerabilities are addressed first. This reduces operational complexity, simplifies security management, minimizes misconfigurations and enhances operational resilience. In 2024, AlgoSec saw double-digit year-on-year annual recurring revenue growth, gross dollar retention of over 90% and positive cashflow. For more information on AlgoSec, visit www.algosec.com . About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to securely accelerate application delivery up to 10 times faster by automating application connectivity and security policy across the hybrid network environment. With two decades of expertise securing hybrid networks, over 2200 of the world's most complex organizations trust AlgoSec to help secure their most critical workloads. AlgoSec Horizon platform utilizes advanced AI capabilities, enabling users to automatically discover and identify their business applications across multi-clouds, and remediate risks more effectively. It serves as a single source for visibility into security and compliance issues across the hybrid network environment, to ensure ongoing adherence to internet security standards, industry, and internal regulations. Additionally, organizations can leverage intelligent change automation to streamline security change processes, thus improving security and agility. Learn how AlgoSec enables application owners, information security experts, SecOps and cloud security teams to deploy business applications faster while maintaining security at www.algosec.com . MEDIA CONTACT: Megan Davis Alloy, on behalf of AlgoSec [email protected]

  • AlgoSec Security Management Solution A33.20 removes network security change friction across hybrid and multi-cloud networks

    The new capabilities empower teams to move faster with clarity, control, and business-aligned risk prioritization AlgoSec Security Management Solution A33.20 removes network security change friction across hybrid and multi-cloud networks The new capabilities empower teams to move faster with clarity, control, and business-aligned risk prioritization January 22, 2026 Speak to one of our experts RIDGEFIELD PARK, NJ, January 22, 2026 – Global cybersecurity leader AlgoSec has released version A33.20 of its Security Management Solution , as a part of the AlgoSec Horizon platform. The new version introduces capabilities designed to remove friction from network security operations, providing teams with clearer visibility, better control, and faster, more confident decision-making. With 90% of organizations expected to adopt a hybrid cloud approach by 2027, security teams must manage more complex and distributed network environments. Security changes are often required on tight timelines, frequently without full visibility into how policy modifications impact critical applications. At the same time, evolving governance and compliance requirements place added demands on maintaining precise and consistent security controls. “Security teams today are being asked to move faster than ever, but speed without clarity, especially across complex environments, creates risk,” said Eran Shiff , Chief Product Officer at AlgoSec. “With A33.20, we’re removing unnecessary complexity and delays from change management by giving teams visibility and control across environments, helping them focus on the risks that truly matter to the business and making every change faster and more secure.” ASMS A33.20 delivers these outcomes through four key areas: Simplifying alignment and execution: Algo, an AI-powered bot, simplifies workflows and streamlines manual repetitive tasks, including change ticket creation, risk and compliance analysis and validation of consistent application connectivity flows. Algo allows stakeholders to interact using their own language, improving alignment across the enterprise and simplifying execution of application connectivity and security management tasks. Improving visibility and control across hybrid environments: Expanded cloud policy support for AWS, Azure and Google Cloud, delivering traffic simulation query and impact analysis uniquely for Google Load Balancer, for AWS native firewall, and enabling full support of policy visibility for Palo Alto Networks NGFWs through Strata Cloud Manager. Automating security changes to reduce manual effort: AlgoSec FireFlow support for Google Cloud Network Firewall Policy provides work order recommendations for traffic change requests, while report-based automation enables remediation directly from analytics such as Disabled Rules and Unused Rules reports. Focusing risk and compliance efforts on business priorities: The only solution in which risk and compliance are evaluated in the context of enterprise applications, enabling prioritization based on business criticality and simplifying rule recertification. Additionally, out-of-the-box compliance assessments now include CIS Baseline for Palo Alto Networks, NIS2 and SOC 2-mapped controls with reporting across supported vendors. To learn more about the new A33.20 product release, click here . About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to securely accelerate application delivery up to 10 times faster by automating application connectivity and security policy across the hybrid network environment. With two decades of expertise securing hybrid networks, over 2200 of the world's most complex organizations trust AlgoSec to help secure their most critical workloads. AlgoSec Horizon platform utilizes advanced AI capabilities, enabling users to automatically discover and identify their business applications across multi-clouds, and remediate risks more effectively. It serves as a single source for visibility into security and compliance issues across the hybrid network environment, to ensure ongoing adherence to internet security standards, industry, and internal regulations. Additionally, organizations can leverage intelligent change automation to streamline security change processes, thus improving security and agility. Learn how AlgoSec enables application owners, information security experts, SecOps and cloud security teams to deploy business applications faster while maintaining security at www.algosec.com . MEDIA CONTACT: Megan Davis Alloy, on behalf of AlgoSec [email protected]

  • Application discovery tool & connectivity management

    Discover how AlgoSec s automated application analyzer can simplify and accelerate connectivity management, while ensuring enterprise wide security and compliance Application discovery tool & connectivity management Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. Introduction What is application connectivity management? Common challenges in application connectivity management The benefits of using intelligent automation in application connectivity management Application connectivity management vs. Network Security Policy Management (NSPM) Manage application connectivity security with AlgoSec Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure Solution overview See how this customer improved compliance readiness and risk Case study Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Network security policy management software (NSPM) | AlgoSec

    Efficiently manage network security policies with AlgoSec’s solution to ensure compliance, reduce risks, and streamline operations across your hybrid IT environment. Network security policy management software (NSPM) What is network security policy management? Network security policy management is the process of creating, implementing and maintaining policies and procedures to protect an organization’s network and data against unauthorized access, use, disclosure and disruption, modification or destruction. Specific activities include identifying and mitigating security risks, testing and deploying changes to connectivity and security rules, ensuring compliance with relevant laws and regulations and more. AlgoSec provides the leading solution for simplifying and automating network security policy management across on-premise firewalls, SDNs and in the public clouds. Its centralized management enables sweeping visibility, effective risk detection and intelligent automation. These capabilities come together to drive stronger security, sustained compliance, reduced risk and faster application delivery – all while cutting manual work, costs, and compliance efforts. Schedule a Demo Why do you need firewall and network security management? Centralized firewall and network security management is essential for preserving a secure, compliant environment – across the devices and workflows in your IT ecosystem. It’s also fundamental for solving a range of connected issues that generate security risks and non-compliance concerns: Technical debt Shadow IT Inconsistent, redundant and obsolete rules Visibility blind spots Growing network complexity IT personnel changes Emerging security vulnerabilities. A firewall and network security management solution helps you achieve IT security and compliance goals – at scale – through extensive integration options, full-scale visibility and intelligent automation. It keeps your hybrid network safe by providing clear processes for aspects ranging from change management to compliance reporting, and monitors if these processes remain effective as your requirements evolve. Schedule a Demo Network security management FAQ Frequently asked questions about network security management and AlgoSec’s network security policy management platform. How does firewall security management differ from network security management? Firewall security management is one of the specialized components of network security management – the practice of ensuring the overall safety of the entire network and its devices. Specifically, firewall management involves configuring rules to allow or block specific types of traffic based on factors such as IP address, port and protocol. Network security management covers a wider range of tasks, but both processes are essential for reducing the organization’s attack surface and for effective risk management. What key role does firewall configuration management play in network security? The security and exposure of web, email, VPN and database servers, routers, workstations and other devices depend on effective firewall configuration management. That’s because firewalls are responsible for blocking unwanted or malicious traffic (e.g. malware, ransomware, denial-of-service attacks, etc.) and allowing legitimate traffic to pass through. Besides creating traffic filtering rules, managing firewall configurations also involves securing access, keeping the firewall up to date. And since most regulatory authorities expect organizations to have firewalls as part of their security controls, the effectiveness of firewall configuration management cascades across compliance requirements as well. How does network security management help with risk management? Network security management activities help identify the sources of IT security risk, apply mitigating measures and monitor the effectiveness of this cycle as the business environment evolves. Specific processes include: Identifying potential vulnerabilities (e.g. application connectivity flows, weak credentials, unpatched software, open ports, etc.) through security assessments and penetration testing. Prioritizing risks and keeping security teams aligned on which high-impact security threats need fast resolution to avoid breaches and situations of non-compliance. Implementing security controls (e.g. firewalls, intrusion detection and prevention systems, encryption, etc.) that strengthen the organization’s security posture. Pushing firewall rules to devices so they don’t open security holes and increase exposure to cyberattacks. Continuously monitoring the network for evidence of security breaches, (e.g. unusual activity, unauthorized access etc.). Applying cybersecurity incident response plans in the event of a successful attack (e.g. isolating affected systems) to avoid or minimize downtime and ensure business continuity. How can I proactively assess and manage security threats? Information security offers a range of options to proactively determine and manage security threats across people, processes and technology: Regular security assessments that scrutinize networks, systems and applications to identify vulnerabilities and exposure to cyberattacks. Examples include penetration testing, vulnerability management and threat modeling. Multi-layered security through tools such as firewalls, intrusion detection and prevention systems and antivirus software. Policy and procedures reviews and updates that ensure they remain compliant and effective against bad actors’ evolving tactics. Network monitoring with real-time notifications to identify signs of compromise such as unusual login and account activity, suspicious or unknown files, and evidence of device tampering. Network log management that documents activity across cloud environments, web applications, endpoints and other systems, creating a trail of examinable evidence. Threat hunting searches for indicators of compromise from bad actors who may have evaded detection and maintained a covert presence in the network. Patch management that pinpoints outdated devices and software, delivering necessary upgrades to close security holes and fix known issues. Security awareness initiatives such as training employees and establishing a communication channel they can use to report potential security issues. The right technology reduces the complexity of managing multiple security layers and makes the entire process feasible and efficient. For instance, the AlgoSec Network Security Policy Management platform proactively evaluates the impact of proposed policy changes to minimize risk, prevent outages and maintain compliance. Because it also integrates with leading vulnerability scanners, AlgoSec maps security vulnerabilities to their business applications, so you can effectively assess and prioritize risks based on reliable context data. Can AlgoSec unify visibility and management across cloud, SDN and on-premise enterprise networks? IT and security managers who choose AlgoSec to simplify their network environments mention easy integration and comprehensive network insight as their main ROI drivers. That’s because the AlgoSec Network Security Policy Management platform provides full visibility across firewalls and security controls deployed on public and private clouds, as well as SDNs such as Cisco ACI and VMware NSX. The consolidation it enables makes it easy to: Have an up-to-date map of all the devices on the network Understand the information flow between firewalls Extract information about specific firewall rules Trim the firewall ruleset – by as much as 90% Reduce rule project reviews – from 1 month to 1 day according to our customers. Make firewall rule changes in minutes instead of days. Can I stay compliant using network security policy management solutions? Network security policy management solutions are indispensable to technical and business teams that need to coordinate across complex compliance tasks. They provide tangible benefits throughout the security policy management lifecycle: Automated discovery and visualization Real-time network topology updates Ongoing clean-up and optimization Automatic security rules documentation Continuous compliance checks Ready-to-use reports. An example of this is AlgoSec’s Network Security Policy Management platform, which generates pre-filled, audit-ready compliance reports for industry regulations (e.g. PCI DSS, HIPAA, SOX, ISO 27001, etc.). The AlgoSec solution also enables you to create customized corporate policies, which reduces audit preparation efforts by as much as 80% according to customers. I want to migrate my applications securely. Can AlgoSec’s Network Security Policy Management platform help me achieve this? Absolutely! AlgoSec’s Network Security Policy Management platform simplifies the entire process of migrating applications to the cloud or another data center. Its easy-to-use, customizable workflows help you automatically bring documentation up to date, clean up firewall rules, generate and push security policy changes to devices and lots more. It also keeps network access and the security policy’s integrity and compliance intact throughout the process. Customers mention effective orchestration of all migrations tasks as a core driver for ROI and report reducing rule migration time by 80%. What is the typical pricing range for network security policy management solutions? The cost of network security policy management solutions depends on: Pricing model – per license, per user, per endpoint or device or per usage (e.g. gigabytes processed). Contract duration – one-time fee or subscription (yearly, monthly). Add-ons and modifiers – pricing per integration, per update, per deployment hour. This results in a broad pricing range with large discrepancies between low-end and high-end network security policy management solutions. Yearly costs for complex environments with hundreds of users and multiple providers typically start at a few thousand US dollars and go up to six figures. If you’re interested in AlgoSec, you can request a quote, contact sales or locate a partner near you. We’d love to help! Schedule a Demo Additional network security policy management features AlgoSec’s Network Security Policy Management platform supports the following use cases Auditing and Compliance Avoid costly non-compliance with automatic checks and context-specific advice on proposed rule changes. Generate quick, audit-ready reports for regulations like PCI DSS, HIPAA, SOX, NERC and many more. Change Management Save 80% of the time spent on network security changes with automatic tracking and validation. Stay on top of things with real-time notifications, even when using a managed security service provider. Micro-segmentation Combine security modeling capabilities with deep knowledge of firewall information and application connectivity flows to ensure proper isolation. Automated micro-segmentation rules reduce your attack surface and monitor efficiency over time. Firewall & Network Security Risk Management Reduce risk across hybrid cloud environments by implementing a lean set of standardized firewall rules. Prevent errors and misconfigurations with automatic checks and quick remediation and clean-up. Digital Transformation Use out-of-the-box workflows to discover, map and migrate application connectivity with full compliance and no downtime. Reduce rule migration time by 80%, deploy necessary policy changes as you go, and increase your security posture and business agility. DevOps Improve application deployment speed and security with real-time policy visibility and fast troubleshooting. Simplify your DevOps workflow with smart automation and free your team up for other important tasks. Schedule a Demo Select a size What is network security policy management? Why do you need firewall and network security management? Network security management FAQ Additional network security policy management features Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec platform White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure continuous compliance Solution overview See how this customer improved compliance readiness and risk management with AlgoSec Case study Choose a better way to manage your network

  • Techcombank | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. TECHCOMBANK SAVES TIME AND RESOURCES WITH SIMPLIFIED FIREWALL POLICY MANAGEMENT Organization Techcombank Industry Financial Services Headquarters Hanoi, Vietnam Download case study Share Customer
success stories "AlgoSec enables us to identify ways to consolidate and optimize rules and perform deep risk analysis and automate workflows in ways that other products cannot match" Background Techcombank is one of the largest joint stock commercial banks in Vietnam. With more than 300 branches and 7,000 staff, Techcombank provides deposit products, loans, leasing, cash management and other services to more than 3.3 million individual customers and 45,000 corporate clients. Challenge Tens of firewall devices and hundreds of routers and switches protect the financial data of Techcombank’s customers, as well as the operations of hundreds of branches throughout Vietnam. As a bank, all security policies and firewall configurations must comply with PCI-DSS and ISO27001 standards. Ensuring compliance, however, created ongoing headaches for the IT security team. “With equipment from many different vendors, even simple policy audits were challenging tasks,” says Mr. Van Anh Tuan, CSO of Techcombank. “As a result of the diversity of products and lack of visibility, it was difficult for us to monitor changes to rule configurations in real time in order to maintain internal security compliance as well as PCI compliance.” “Cleaning up and fine tuning firewall policies was a particularly complex process, which made it difficult to respond quickly to the changing needs of our business applications,” adds Mr. Tuan. “We wanted a way to optimize and consolidate rules across all of our firewalls, regardless of manufacturer, and completely automate the end-to-end workflow for firewall rule change management.” In addition, Techcombank sought a solution that would simplify the process of conducting risk analysis, evaluating PCI compliance and identifying the necessary steps for remediation. Solution Following an in-depth competitive evaluation, Techcombank selected AlgoSec’s Security Management solution. “AlgoSec met many of our key requirements, better than its competitors in our evaluation,” Mr. Tuan notes. Techcombank particularly liked AlgoSec’s superior security policy analysis and ability to make actionable recommendations with a high level of accuracy. “AlgoSec will enable us to identify ways to consolidate and optimize rules, perform deep risk analysis, automate workflows and ensure compliance in ways that other products cannot match,” says Mr. Tuan. Techcombank’s IT team wants to be able to quickly identify security policy risks and see what specific steps they need to take for remediation. The bank uses AlgoSec to identify overly permissive firewall rules based on actual use as well as duplicate, unused and expired rules and objects. This information gives Techcombank the data they need to close off potential access points and help prevent attacks. AlgoSec also provides clear, detailed recommendations on how to best reorder rules for optimal firewall performance. In addition, AlgoSec validates firewall policy and rules against regulations such as PCI, as well as industry best practices and customized corporate policies to uncover and prioritize risks and track trends over time. For Mr. Tuan, one of the most valuable benefits of AlgoSec is the increased visibility into security policies across the full range of devices. “Now we can easily monitor our firewall operations and quickly detect any mistakes or non-compliant changes made. These operations used to be invisible to me.” Mr. Tuan comments. The AlgoSec deployment process went very smoothly for Techcombank. “Our team received training from AlgoSec and their partners here in Vietnam and we were fully utilizing the product almost immediately. Post-implementation support has addressed every issue quickly and enabled us to take advantage of all aspects of the product in order to optimize our firewall rules and improve our security posture even faster than we anticipated,” Mr. Tuan adds. Since implementation, AlgoSec has enabled Techcombank’s IT team to “greatly reduce our time and resources when complying with internal policies and PCI standards, and when monitoring changes in rules,” says Mr. Tuan. “We are very happy with the improved security and visibility provided by AlgoSec and will continue to use and exploit more AlgoSec features and add licenses,” he concluded. Schedule time with one of our experts

  • Partner solution brief AlgoSec and VMware - AlgoSec

    Partner solution brief AlgoSec and VMware Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Micro-segmentation from strategy to execution | AlgoSec

    Implement micro-segmentation effectively, from strategy to execution, to enhance security, minimize risks, and protect critical assets across your network. Micro-segmentation from strategy to execution Overview Learn how to plan and execute your micro-segmentation project in AlgoSec’s guide. Schedule a Demo What is Micro segmentation Micro-segmentation is a technique to create secure zones in networks. It lets companies isolate workloads from one another and introduce tight controls over internal access to sensitive data. This makes network security more granular. Micro-segmentation is an “upgrade” to network segmentation. Companies have long relied on firewalls, VLANs, and access control lists (ACL) to segment their network. Network segmentation is a key defense-in-depth strategy, segregating and protecting company data and limiting attackers’ lateral movements. Consider a physical intruder who enters a gated community. Despite having breached the gate, the intruder cannot freely enter the houses in the community because, in addition to the outside gate, each house has locks on its door. Micro-segmentation takes this an additional step further – even if the intruder breaks into a house, the intruder cannot access all the rooms. Schedule a Demo Why Micro-segment? Organizations frequently implement micro-segmentation to block lateral movement. Two common types of lateral movements are insider threats and ransomware. Insider threats are employees or contractors gaining access to data that they are not authorized to access. Ransomware is a type of malware attack in which the attacker locks and encrypts the victim’s data and then demands a payment to unlock and decrypt the data. If an attacker takes over one desktop or one server in your estate and deploys malware, you want to reduce the “blast radius” and make sure that the malware can’t spread throughout the entire data center. And if you decide not to pay the ransom? Datto’s Global State of the Channel Ransomware Report informs us that: The cost of downtime is 23x greater than the average ransom requested in 2019. Downtime costs due to ransomware are up by 200% year-over-year. Schedule a Demo The SDN Solution With software-defined networks, such as Cisco ACI and VMware NSX, micro-segmentation can be achieved without deploying additional controls such as firewalls. Because the data center is software-driven, the fabric has built-in filtering capabilities. This means that you can introduce policy rules without adding new hardware. SDN solutions can filter flows both inside the data center (east-west traffic) and flows entering or exiting the data center (north-south traffic). The SDN technology supporting your data center eliminates many of the earlier barriers to micro-segmentation. Yet, although a software-defined fabric makes segmentation possible, there are still many challenges to making it a reality. Schedule a Demo What is a Good Filtering Policy A good filtering policy has three requirements: 1 – Allows all business traffic The last thing you want is to write a micro-segmented policy and have it break necessary business communication, causing applications to stop functioning. 2 – Allows nothing else By default, all other traffic should be denied. 3 – Future-proof “More of the same” changes in the network environment shouldn’t break rules. If you write your policies too narrowly, then any change in the network, such as a new server or application, could cause something to stop working. Write with scalability in mind. How do organizations achieve these requirements? They need to know what the traffic flows are as well as what should be allowed and what should be denied. This is difficult because most traffic is undocumented. There is no clear record of the applications in the data center and what network flows they depend on. To get accurate information, you need to perform a “discovery” process. Schedule a Demo A Blueprint for Creating a Micro-segmentation Policy Micro-segmentation Blueprint Discovery You need to find out which traffic needs to be allowed and then you can decide what not to allow. Two common ways to implement a discovery process are traffic-based discovery and content-based discovery. Traffic-Based Discovery Traffic-based discovery is the process of understanding traffic flows: Observe the traffic that is traversing the data center, analyze it, and identify the intent of the flows by mapping them to the applications they support. You can collect the raw traffic with a traffic sniffer/network TAP or use a NetFlow feed. Content-based or Data-Based Approach In the content-based approach, you organize the data center systems into segments based on the sensitivity of the data they process. For example, an eCommerce application may process credit card information which is regulated by the PCI DSS standard. Therefore, you need to identify the servers supporting the eCommerce application and separate them in your filtering policy. Discovering traffic flows within a data center Micro-segmentation Blueprint Using NetFlow for Traffic Mapping The traffic source on which it is easiest to base application discovery is NetFlow. Most routers and switches can be configured to emit a NetFlow feed without requiring the deployment of agents throughout the data center. The flows in the NetFlow feed are clustered into business applications based on recurring IP addresses and correlations in time. For example, if an HTTPS connection from a client at 172.7.1.11 to 10.3.3.3 is observed at 10 AM, and a PostgreSQL connection from the same 10.3.3.3 to 10.1.1.1 is observed 0.5 seconds later, it’s clear that all three systems support a single application, which can be labeled with a name such as “Trading System”. 172.7.1.0/2410.3.3.3 TRADE SYS HTTPS10.3.3.3 TRADE SYS 10.1.1.11 DB TCP/543210.3.3.7 FOREX 10.1.1.11 DB TCP/5432 Identifying traffic flows in common, based on shared IP addresses NetFlow often produces thousands of “thin flow” records (one IP to another IP), even for a single application. In the example above, there may be a NetFlow record for every client desktop. It is important to aggregate them into “fat flows” (e.g., that allows all the clients in the 172.7.1.0/24 range). In addition to avoiding an explosion in the number of flows, aggregation also provides a higher-level understanding, as well as future-proofing the policies against fluctuations in IP address allocation. Using the discovery platform in the AlgoSec Security Management Suite to identify the flows in combination with information from your firewalls can help you decide where to put the boundaries of your segments and which policies to put in these filters. Micro-segmentation Blueprint Defining Logical Segments Once you have discovered the business applications whose traffic is traversing the data center (using traffic-based discovery) and have also identified the data sensitivity (using a content-based approach) you are well positioned to define your segments. Bear in mind that all the traffic that is confined to a segment is allowed. Traffic crossing between segments is blocked by default – and needs to be explicitly allowed by a policy rule. There are two potential starting points: Segregate the systems processing sensitive data into their own segments. You may have to do this anyway for regulatory reasons. Segregate networks connecting to client systems (desktops, laptops, wireless networks) into “human-zone” segments. Client systems are often the entry points of malware, and are always the source of malicious insider attacks. Then, place the remaining servers supporting each application, each in its own segment. Doing so will save you the need to write explicit policy rules to allow traffic that is internal to only one business application. Example segment within a data center Micro-segmentation Blueprint Creating the Filtering Policy Once the segments are defined, we need to write the policy. Traffic confined to a segment is automatically allowed so we don’t need to worry about it anymore. We just need to write policy for traffic crossing micro-segment boundaries. Eventually, the last rule on the policy must be a default-deny: “from anywhere to anywhere, with any service – DENY.” However, enforcing such a rule in the early days of the micro-segmentation project, before all the rest of the policy is written, risks breaking many applications’ communications. So start with a (totally insecure) default-allow rule until your policy is ready, and then switch to a default-deny on “D-Day” (“deny-day”). We’ll discuss D-Day shortly. What types of rules are we going to be writing? Cross segment flows – Allowing traffic between segments: e.g., Allow the eCommerce servers to access the credit-card Flows to/from outside the data center – e.g., allow employees in the finance department to connect to financial data within the data center from their machines in the human-zone, or allow access from the Internet to the front-end eCommerce web servers. Users outside the data center need to access data within the data center Micro-segmentation Blueprint Default Allow – with Logging To avoid major connectivity disruptions, start your micro-segmentation project gently. Instead of writing a “DENY” rule at the end of the policy, write an “ALLOW” rule – which is clearly insecure – but turn on logging for this ALLOW rule. This creates a log of all connections that match the default-allow rule. Initially you will receive many logs entries from the default-allow rule; your goal in the project is to eliminate them. To do this, you go over the applications you discovered earlier, write the policy rules that support each application’s cross-segment flows, and place them above the default-allow rule. This means that the traffic of each application you handle will no longer match the default-allow (it will match the new rules you wrote) – and the amount of default-allow logs will decrease. Keep adding rules, application by application, until the final allow rule is not generating any more logs. At that point, you reach the final milestone in the project: D-Day. Micro-segmentation Blueprint Preparing for “D-Day” Once logging generated by the default-allow rule ceases to indicate new flows that need to be added to your filtering policy, you can start preparing for “D-Day.” This is the day that you flip the switch and change the final rule from “default ALLOW” to “default DENY.” Once you do that, all the undiscovered traffic is going to be denied by the filtering fabric, and you will finally have a secured, micro-segmented, data center. This is a big deal! However, you should realize that D-Day is going to cause a big organizational change. From this day forward, every application developer whose application requires new traffic to cross the data center will need to ask for permission to allow this traffic; they will need to follow a process, which includes opening a change request, and then wait for the change to be implemented. The free-wheeling days are over. You need to prepare for D-Day. Consider steps such as: Get management buy-in Communicate the change across the organization Set a change control window Have “all hands on deck” on D-Day to quickly correct anything that may have been missed and causes applications to break Micro-segmentation Blueprint Change Requests & Compliance Notice that after D-Day, any change in application connectivity requires filing a “change request”. When the information security team is evaluating a change request – they need to check whether the request is in line with the “acceptable traffic” policy. A common method for managing policy at the high-level is to use a table, where each row represents a segment, and every column represents a segment. Each cell in the table lists all the services that are allowed from its “row” segment to its “column” segment. Keeping this table in a machine readable format, such an Excel spreadsheet, enables software systems to run a what-if risk-check that compares each change-request with the acceptable policy, and flags any discrepancies before the new rules are deployed. Such a what-if risk-check is also important for regulatory compliance. Regulations such as PCI and ISO27001 require organizations to define such a policy, and to compare themselves to it; demonstrating the policy is often part of the certification or audit. Schedule a Demo Enabling Micro-segmentation with AlgoSec The AlgoSec Security Management Suite (ASMS) makes it easy to define and enforce your micro-segmentation strategy inside the data center, ensuring that it does not block critical business services and does meet compliance requirements. AlgoSec’s powerful AutoDiscovery capabilities help you understand the network flows in your organization. You can automatically connect the recognized traffic flows to the business applications that use them. Once the segments are established, AlgoSec seamlessly manages the network security policy across your entire hybrid network estate. AlgoSec proactively checks every proposed firewall rule change request against the segmentation strategy to ensure that the change doesn’t break the segmentation strategy, introduce risk, or violate compliance requirements. AlgoSec enforces micro-segmentation by: Generating a custom report on compliance enforced by the micro-segmentation policy Identifying unprotected network flows that do not cross any firewall and are not filtered for an application Automatically identifying changes that violate the micro-segmentation strategy Automatically implementing network security changes Automatically validating changes Security zones in AlgoSec’s AppViz Want to learn more? Get a personal demo Schedule a Demo About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity by automating connectivity flows and security policy, anywhere.  The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.   AlgoSec’s patented application-centric view of the hybrid network enables business owners, application owners, and information security professionals to talk the same language, so organizations can deliver business applications faster while achieving a heightened security posture.  Over 1,800 of the world’s leading organizations trust AlgoSec to help secure their most critical workloads across public cloud, private cloud, containers, and on-premises networks, while taking advantage of almost two decades of leadership in Network Security Policy Management.  See what securely accelerating your digital transformation, move-to-cloud, infrastructure modernization, or micro-segmentation initiatives looks like at www.algosec.com Want to learn more about how AlgoSec can help enable micro-segmentation? Schedule a demo. Schedule a Demo Select a size Overview What is Micro segmentation Why Micro-segment? The SDN Solution What is a Good Filtering Policy A Blueprint for Creating a Micro-segmentation Policy Enabling Micro-segmentation with AlgoSec About AlgoSec Get the latest insights from the experts Choose a better way to manage your network

  • 6 best practices to stay secure in the hybrid cloud - AlgoSec

    6 best practices to stay secure in the hybrid cloud Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Hybrid & multi-cloud Security challenges | AlgoSec

    Overcome hybrid and multi-cloud security challenges with strategies to enhance visibility, enforce policies, and protect data across diverse cloud environments. Hybrid & multi-cloud Security challenges ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Choose a better way to manage your network

  • Modernize your network with Cisco Nexus & ACI | AlgoSec

    Modernize your network with Cisco Nexus and ACI solutions for enhanced performance, scalability, and security in your data center and cloud environments. Modernize your network with Cisco Nexus & ACI ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Choose a better way to manage your network

bottom of page