

Search results
614 results found with an empty search
- Algosec Cloud Enterprise (ACE) - AlgoSec
Algosec Cloud Enterprise (ACE) Case Study Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- AlgoSec | Unveiling best practices for a resilient cloud security strategy
The transition to cloud-based environments has ushered in unparalleled efficiency, scalability, and innovation. However, it has also... Hybrid Cloud Security Management Unveiling best practices for a resilient cloud security strategy Malcom Sargla 2 min read Malcom Sargla Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 8/30/23 Published The transition to cloud-based environments has ushered in unparalleled efficiency, scalability, and innovation. However, it has also magnified the importance of fortifying our digital fortresses against an array of potential risks. Considering the increasing reliance on cloud computing, it’s important to find the best practices and strategies that organizations can adopt to enhance their cloud security posture and mitigate the risks associated with cloud-based environments. Navigating the Cloud Security Landscape As organizations race to seize the transformative potential of the cloud, they are faced with a series of profound decisions. Each step forward, though laden with promise, demands a profound understanding of the evolving cloud security landscape. Choosing your guardian: Cloud providers’ security Selecting a cloud provider marks a pivotal choice. The giants of the cloud – AWS, GCP, Azure, Oracle, and IBM – have honed their commitment to delivering secure platforms. These titans weave intricate layers of cutting-edge security technologies and artificial intelligence into their infrastructures, assuring an ironclad foundation for their clients. Here, diversity shines as a beacon of strength. Many organizations, mindful of fault domains and corporate governance, choose a multi-cloud approach. This approach is further empowered by solutions like AlgoSec, streamlining security management across diverse cloud estates. The hybrid conundrum: Security beyond the divide The debate over a cloud-only versus hybrid deployment churns with vigor. It’s not merely a technical decision; it’s an embodiment of an organization’s security philosophy. Retaining an on-premises presence offers a sense of comfort, an insurance policy for vital intellectual property. To navigate the hybrid landscape successfully, a unified security approach is imperative. A single-pane view that seamlessly spans visibility, risk assessment, compliance, and intelligent policy automation is the rudder that guides this ship. Blueprint for secure migration In the digital world, where data and applications surge like currents, migrating to the cloud demands meticulous planning and a steadfast commitment to security. Application Dependency: The heartbeat of cloud migration As applications metamorphose, they weave intricate relationships with their ecosystem. Moving them recklessly can disrupt the very heartbeat of your organization. Consider AlgoSec’s partnerships with Cisco Secure Workload, Illumio, and Guardicore. Through this synergy, applications are mapped, relationships dissected, and policies laid bare. These insights power intelligent remediation, ensuring that policies serve the application, not risk its integrity. The goldilocks move: Finding the right application components When migrating applications, precision is paramount. Moving the right components in tandem is akin to choreographing a symphony. Avoiding ‘hair-pinning’ between cloud and on-premises domains is key to preserving user experience and mitigating egress traffic costs. The mantra: migrate high-dependent application tiers in harmonious unison. Purifying the legacy: Pruning unneeded policies Before the embacing the cloud, make sure to clean your digital canvas. Rid it of unneeded policies, unburden the legacy baggage, and craft a secure foundation. AlgoSec advocates a risk-mitigation approach. Tune, optimize, and refine policies. This digital spring-cleaning ensures that your cloud journey is unmarred by relics of the past. The promise of a secure sky As the digital horizon stretches ever farther, cloud security ascends as both a challenge and an opportunity. With each step we take towards a cloud-powered future, we must arm ourselves with knowledge, tools, and practices that will safeguard our data, applications, and innovations. So, the question of how to mitigate risk becomes not just a query, but a clarion call. A call to weave security into the very fabric of our cloud endeavors. A call to adopt the best practices, to forge ahead with a robust strategy, and to ensure that the cloud’s promise of a brighter future is matched only by its commitment to security. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- Cloud and datacenter security teams are now one, but the tools, workflows, and policies haven’t caught up
Webinars 5 proven ways to secure your hybrid network environment during team convergence Cloud and datacenter security teams are now one, but the tools, workflows, and policies haven’t caught up. Join ESG Principal Analyst John Grady alongside AlgoSec’s Field CTO Kyle Wickert and Product Manager Gal Yosef for a practical conversation on how leading organizations are tackling the operational challenges of security convergence. What you’ll learn: Why convergence between cloud and datacenter teams is accelerating How to reduce tool overload and policy inconsistencies What steps are teams taking to unify visibility, policy, and risk without slowing down delivery July 16, 2025 John Grady Principal Analyst | ESG Gal Yosef Product Manager | AlgoSec Kyle Wickert WW Strategic Architect Relevant resources 6 best practices to stay secure in the hybrid cloud Read Document Securing & managing hybrid network security See Documentation 6 must-dos to secure the hybrid cloud Read Document Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- How to modernize your infrastructure without neglecting your security | AlgoSec
how can you elevate digital transformation and cloud migration efforts, without neglecting your security Does it have to be one or the other, and if not, what steps should be taken in your transformation journeys to ensure that network security remains a priority Webinars Intelligent change automation for your Cisco environment and beyond Learn how transitioning to application-centric intelligent automation can save time and resources Managing modern network environments has become increasingly complex in a multi-cloud, multi -vendor environment. Network policy change implementation and ensured application connectivity also become harder in a siloed network. Transitioning to application-centric intelligent automation can save time and resources that can be shifted towards your company’s core objectives. In this webinar we show you how you can: • Accelerate application delivery through intelligent change automation • Remove blind spots in your network • Focus on the critical risks the matter • Bake hardened security policies into your application delivery pipeline January 17, 2023 Avivi Siman Tov Director of Product Jacqueline Basil Product Marketing Manager Relevant resources Automate the entire security policy change management process with zero touch Watch Video Increasing Cisco ACI adoption with AlgoSec Keep Reading Change Management A Day In The Life Read Document Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Firewall Management: 5 Challenges Every Company Must Address - AlgoSec
Firewall Management: 5 Challenges Every Company Must Address Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Infographic a day in the life change management - AlgoSec
Infographic a day in the life change management Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- PCI DSS 3.2: Automating Audits and Ensuring Continuous Compliance with AlgoSec - AlgoSec
PCI DSS 3.2: Automating Audits and Ensuring Continuous Compliance with AlgoSec Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Measures that actually DO reduce your hacking risk | AlgoSec
Robert Bigman is uniquely equipped to share actionable tips for hardening your network security against vulnerabilities Don’t miss this opportunity to learn the latest threats and how to handle them Webinars Measures that actually DO reduce your hacking risk Learn from the best how to defeat hackers and ransomware As incidents of ransomware attacks become more common, the time has come to learn from the best how to defeat hackers. Join us as Robert Bigman, the former CISO of the CIA, presents his webinar Measures that Actually do Reduce your Hacking Risk. Robert Bigman is uniquely equipped to share actionable tips for hardening your network security against vulnerabilities. Don’t miss this opportunity to learn the latest threats and how to handle them. April 20, 2022 Robert Bigman Consultant; Former CISO of the CIA Relevant resources Ensuring critical applications stay available and secure while shifting to remote work Keep Reading Reducing risk of ransomware attacks - back to basics Keep Reading Ransomware Attack: Best practices to help organizations proactively prevent, contain and Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Enterprise hybrid network management solutions | AlgoSec
Manage and secure your enterprise's hybrid network with integrated solutions that offer visibility, control, and efficiency across diverse infrastructures. Enterprise hybrid network management solutions ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Choose a better way to manage your network
- Ensure up to date compliance and tighten your hybrid network security posture with AlgoSec A32.60
AlgoSec’s latest product release provides organizations with enhanced application connectivity visibility, effective security, and continuous compliance with the most recent regulations across their multi-cloud environments. Ensure up to date compliance and tighten your hybrid network security posture with AlgoSec A32.60 AlgoSec’s latest product release provides organizations with enhanced application connectivity visibility, effective security, and continuous compliance with the most recent regulations across their multi-cloud environments. September 13, 2023 Speak to one of our experts RIDGEFIELD PARK, N.J., September 13, 2023 – AlgoSec, a global cybersecurity leader, introduces AlgoSec A32.60, the latest in application connectivity security and compliance. AlgoSec A32.60 provides an effective solution for organizations to secure application connectivity in their hybrid and multi-cloud estate. A32.60 integrates cloud security visibility into AlgoSec’s security management platform and enables organizations to ensure ongoing compliance with industry regulatory standards. The key benefits that AlgoSec A32.60 delivers to network and security experts include: Enhanced visibility and security of north-south network traffic: New integration with Palo Alto Prisma Access, now encompassing mobile user policies within the Prisma access fabric. New integration and support for SD-WAN Versa Networks, offering extended visibility into network connectivity and an intuitive topology map. Ensuring ongoing regulatory compliance: Enhanced ISO 27001 report with the latest 2022 standards, allowing organizations to ensure alignment with the most current regulations. Integration of a new ECB (European Central Bank) regulations report, allowing companies to confidently navigate evolving compliance requirements. Integrating cloud security visibility into network security policy management: Expanded integration with Microsoft Azure firewall enables centralized visibility across both cloud and traditional firewalls, all within a single, unified management solution. New automation support for Fully Qualified Domain Name (FQDN) objects in Palo Alto Panorama, Fortinet FortiManager, and Check Point. This allows users to efficiently manage and secure their network resources while embracing the flexibility of cloud environments. About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity by automating connectivity flows and security policy, anywhere. The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk, achieve compliance at the application-level and process changes at zero-touch across the hybrid network. AlgoSec’s patented application-centric view of the hybrid network enables business owners, application owners, and information security professionals to talk the same language, so organizations can deliver business applications faster while achieving a heightened security posture. Over 1,800 of the world’s leading organizations trust AlgoSec to help secure their most critical workloads across public cloud, private cloud, containers, and on-premises networks. See what securely accelerating your digital transformation, move-to-cloud, infrastructure modernization, or micro-segmentation initiatives looks like at www.algosec.com
- Check Point and AlgoSec | AlgoSec
AlgoSec & Check Point AlgoSec seamlessly integrates with Check Points NGFWs to automate application and user aware security policy management and ensure that Check Points’ devices are properly configured. AlgoSec supports the entire security policy management lifecycle — from application connectivity discovery, through ongoing management and compliance, to rule recertification and secure decommissioning. Solution brief Cloudguard datasheet How to Check Point Regulatory compliance Learn how to prepare your Check Point devices for a regulatory audit Check Point Risk Assessment Learn how assess risk on your Check Point devices with AlgoSec Mapping your Network Visualize your complex network, including your Check Point devices, with a dynamic network topology map See how Check Point Users Can Benefit from AlgoSec Schedule time with one of our experts
- AlgoSec | Sunburst Backdoor, Part II: DGA & The List of Victims
Previous Part of the analysis is available here. Next Part of the analysis is available here. Update from 19 December 2020: Prevasio... Cloud Security Sunburst Backdoor, Part II: DGA & The List of Victims Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 12/17/20 Published Previous Part of the analysis is available here . Next Part of the analysis is available here . Update from 19 December 2020: Prevasio would like to thank Zetalytics for providing us with an updated (larger) list of passive (historic) DNS queries for the domains generated by the malware. As described in the first part of our analysis, the DGA (Domain Generation Algorithm) of the Sunburst backdoor produces a domain name that may look like: fivu4vjamve5vfrtn2huov[.]appsync-api.us-west-2[.]avsvmcloud[.]com The first part of the domain name (before the first dot) consists of a 16-character random string, appended with an encoded computer’s domain name. This is the domain in which the local computer is registered. From the example string above, we can conclude that the encoded computer’s domain starts from the 17th character and up until the dot (highlighted in yellow): fivu4vjamve5vfrt n2huov In order to encode a local computer’s domain name, the malware uses one of 2 simple methods: Method 1 : a substitution table, if the domain name consists of small letters, digits, or special characters ‘-‘, ‘_’, ‘.’ Method 2 : base64 with a custom alphabet, in case of capital letters present in the domain name Method 1 In our example, the encoded domain name is “n2huov” . As it does not have any capital letters, the malware encodes it with a substitution table “rq3gsalt6u1iyfzop572d49bnx8cvmkewhj” . For each character in the domain name, the encoder replaces it with a character located in the substitution table four characters right from the original character. In order to decode the name back, all we have to do is to replace each encoded character with another character, located in the substitution table four characters left from the original character. To illustrate this method, imagine that the original substitution table is printed on a paper strip and then covered with a card with 6 perforated windows. Above each window, there is a sticker note with a number on it, to reflect the order of characters in the word “n2huov” , where ‘n’ is #1, ‘2’ is #2, ‘h’ is #3 and so on: Once the paper strip is pulled by 4 characters right, the perforated windows will reveal a different word underneath the card: “domain” , where ‘d’ is #1, ‘o’ is #2, ‘m’ is #3, etc.: A special case is reserved for such characters as ‘0’ , ‘-‘ , ‘_’ , ‘.’ . These characters are encoded with ‘0’ , followed with a character from the substitution table. An index of that character in the substitution table, divided by 4, provides an index within the string “0_-.” . The following snippet in C# illustrates how an encoded string can be decoded: static string decode_domain( string s) { string table = "rq3gsalt6u1iyfzop572d49bnx8cvmkewhj" ; string result = "" ; for ( int i = 0 ; i < s.Length; i++) { if (s[i] != '0' ) { result += table[(table.IndexOf(s[i]) + table.Length - 4 ) % table.Length]; } else { if (i < s.Length - 1 ) { if (table.Contains(s[i + 1 ])) { result += "0_-." [table.IndexOf(s[i + 1 ]) % 4 ]; } else { break ; } } i++; } } return result; } Method 2 This method is a standard base64 encoder with a custom alphabet “ph2eifo3n5utg1j8d94qrvbmk0sal76c” . Here is a snippet in C# that provides a decoder: public static string FromBase32String( string str) { string table = "ph2eifo3n5utg1j8d94qrvbmk0sal76c" ; int numBytes = str.Length * 5 / 8 ; byte [] bytes = new Byte[numBytes]; int bit_buffer; int currentCharIndex; int bits_in_buffer; if (str.Length < 3 ) { bytes[ 0 ] = ( byte )(table.IndexOf(str[ 0 ]) | table.IndexOf(str[ 1 ]) << 5 ); return System.Text.Encoding.UTF8.GetString(bytes); } bit_buffer = (table.IndexOf(str[ 0 ]) | table.IndexOf(str[ 1 ]) << 5 ); bits_in_buffer = 10 ; currentCharIndex = 2 ; for ( int i = 0 ; i < bytes.Length; i++) { bytes[i] = ( byte )bit_buffer; bit_buffer >>= 8 ; bits_in_buffer -= 8 ; while (bits_in_buffer < 8 && currentCharIndex < str.Length) { bit_buffer |= table.IndexOf(str[currentCharIndex++]) << bits_in_buffer; bits_in_buffer += 5 ; } } return System.Text.Encoding.UTF8.GetString(bytes); } When the malware encodes a domain using Method 2, it prepends the encrypted string with a double zero character: “00” . Following that, extracting a domain part of an encoded domain name (long form) is as simple as: static string get_domain_part( string s) { int i = s.IndexOf( ".appsync-api" ); if (i > 0 ) { s = s.Substring( 0 , i); if (s.Length > 16 ) { return s.Substring( 16 ); } } return "" ; } Once the domain part is extracted, the decoded domain name can be obtained by using Method 1 or Method 2, as explained above: if (domain.StartsWith( "00" )) { decoded = FromBase32String(domain.Substring( 2 )); } else { decoded = decode_domain(domain); } Decrypting the Victims’ Domain Names To see the decoder in action, let’s select 2 lists: List #1 Bambenek Consulting has provided a list of observed hostnames for the DGA domain. List #2 The second list has surfaced in a Paste bin paste , allegedly sourced from Zetalytics / Zonecruncher . NOTE: This list is fairly ‘noisy’, as it has non-decodable domain names. By feeding both lists to our decoder, we can now obtain a list of decoded domains, that could have been generated by the victims of the Sunburst backdoor. DISCLAIMER: It is not clear if the provided lists contain valid domain names that indeed belong to the victims. It is quite possible that the encoded domain names were produced by third-party tools, sandboxes, or by researchers that investigated and analysed the backdoor. The decoded domain names are provided purely as a reverse engineering exercise. The resulting list was manually processed to eliminate noise, and to exclude duplicate entries. Following that, we have made an attempt to map the obtained domain names to the company names, using Google search. Reader’s discretion is advised as such mappings could be inaccurate. Decoded Domain Mapping (Could Be Inaccurate) hgvc.com Hilton Grand Vacations Amerisaf AMERISAFE, Inc. kcpl.com Kansas City Power and Light Company SFBALLET San Francisco Ballet scif.com State Compensation Insurance Fund LOGOSTEC Logostec Ventilação Industrial ARYZTA.C ARYZTA Food Solutions bmrn.com BioMarin Pharmaceutical Inc. AHCCCS.S Arizona Health Care Cost Containment System nnge.org Next Generation Global Education cree.com Cree, Inc (semiconductor products) calsb.org The State Bar of California rbe.sk.ca Regina Public Schools cisco.com Cisco Systems pcsco.com Professional Computer Systems barrie.ca City of Barrie ripta.com Rhode Island Public Transit Authority uncity.dk UN City (Building in Denmark) bisco.int Boambee Industrial Supplies (Bisco) haifa.edu University of Haifa smsnet.pl SMSNET, Poland fcmat.org Fiscal Crisis and Management Assistance Team wiley.com Wiley (publishing) ciena.com Ciena (networking systems) belkin.com Belkin spsd.sk.ca Saskatoon Public Schools pqcorp.com PQ Corporation ftfcu.corp First Tech Federal Credit Union bop.com.pk The Bank of Punjab nvidia.com NVidia insead.org INSEAD (non-profit, private university) usd373.org Newton Public Schools agloan.ads American AgCredit pageaz.gov City of Page jarvis.lab Erich Jarvis Lab ch2news.tv Channel 2 (Israeli TV channel) bgeltd.com Bradford / Hammacher Remote Support Software dsh.ca.gov California Department of State Hospitals dotcomm.org Douglas Omaha Technology Commission sc.pima.gov Arizona Superior Court in Pima County itps.uk.net IT Professional Services, UK moncton.loc City of Moncton acmedctr.ad Alameda Health System csci-va.com Computer Systems Center Incorporated keyano.local Keyano College uis.kent.edu Kent State University alm.brand.dk Sydbank Group (Banking, Denmark) ironform.com Ironform (metal fabrication) corp.ncr.com NCR Corporation ap.serco.com Serco Asia Pacific int.sap.corp SAP mmhs-fla.org Cleveland Clinic Martin Health nswhealth.net NSW Health mixonhill.com Mixon Hill (intelligent transportation systems) bcofsa.com.ar Banco de Formosa ci.dublin.ca. Dublin, City in California siskiyous.edu College of the Siskiyous weioffice.com Walton Family Foundation ecobank.group Ecobank Group (Africa) corp.sana.com Sana Biotechnology med.ds.osd.mi US Gov Information System wz.hasbro.com Hasbro (Toy company) its.iastate.ed Iowa State University amr.corp.intel Intel cds.capilanou. Capilano University e-idsolutions. IDSolutions (video conferencing) helixwater.org Helix Water District detmir-group.r Detsky Mir (Russian children’s retailer) int.lukoil-int LUKOIL (Oil and gas company, Russia) ad.azarthritis Arizona Arthritis and Rheumatology Associates net.vestfor.dk Vestforbrænding allegronet.co. Allegronet (Cloud based services, Israel) us.deloitte.co Deloitte central.pima.g Pima County Government city.kingston. City of Kingston staff.technion Technion – Israel Institute of Technology airquality.org Sacramento Metropolitan Air Quality Management District phabahamas.org Public Hospitals Authority, Caribbean parametrix.com Parametrix (Engineering) ad.checkpoint. Check Point corp.riotinto. Rio Tinto (Mining company, Australia) intra.rakuten. Rakuten us.rwbaird.com Robert W. Baird & Co. (Financial services) ville.terrebonn Ville de Terrebonne woodruff-sawyer Woodruff-Sawyer & Co., Inc. fisherbartoninc Fisher Barton Group banccentral.com BancCentral Financial Services Corp. taylorfarms.com Taylor Fresh Foods neophotonics.co NeoPhotonics (optoelectronic devices) gloucesterva.ne Gloucester County magnoliaisd.loc Magnolia Independent School District zippertubing.co Zippertubing (Manufacturing) milledgeville.l Milledgeville (City in Georgia) digitalreachinc Digital Reach, Inc. deniz.denizbank DenizBank thoughtspot.int ThoughtSpot (Business intelligence) lufkintexas.net Lufkin (City in Texas) digitalsense.co Digital Sense (Cloud Services) wrbaustralia.ad W. R. Berkley Insurance Australia christieclinic. Christie Clinic Telehealth signaturebank.l Signature Bank dufferincounty. Dufferin County mountsinai.hosp Mount Sinai Hospital securview.local Securview Victory (Video Interface technology) weber-kunststof Weber Kunststoftechniek parentpay.local ParentPay (Cashless Payments) europapier.inte Europapier International AG molsoncoors.com Molson Coors Beverage Company fujitsugeneral. Fujitsu General cityofsacramento City of Sacramento ninewellshospita Ninewells Hospital fortsmithlibrary Fort Smith Public Library dokkenengineerin Dokken Engineering vantagedatacente Vantage Data Centers friendshipstateb Friendship State Bank clinicasierravis Clinica Sierra Vista ftsillapachecasi Apache Casino Hotel voceracommunicat Vocera (clinical communications) mutualofomahabanMutual of Omaha Bank Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call





