

Search results
616 results found with an empty search
- Gain more insights into multi cloud application connectivity with AlgoSec A32.50
AlgoSec’s latest product release provides application-based identification and risk analysis in multi-cloud environments and on-premises. Gain more insights into multi cloud application connectivity with AlgoSec A32.50 AlgoSec’s latest product release provides application-based identification and risk analysis in multi-cloud environments and on-premises. January 10, 2023 Speak to one of our experts RIDGEFIELD PARK, N.J., January 10, 2023 – AlgoSec, a global cybersecurity leader in securing application connectivity, announced today the release of its latest product version A32.50. AlgoSec A32.50 provides a powerful solution for organizations to secure application connectivity in their hybrid and multi-cloud estate. With A32.50, organizations obtain granular visibility and discovery of applications, enabling identification and risk analysis in multi-cloud environments and on-premises. The key benefits that AlgoSec A32.50 delivers to IT, network, and security experts include: Application awareness for Cisco Firepower and Palo Alto’s Panorama as part of the change management cycle Enables SecOps teams to update firewall application information as part of the firewall rules in the workflow automation Extended SASE/SSE management Provides Zscaler users management capabilities focused on risk, regulatory compliance, and policy optimization. As an early availability, A32.50 supports Prisma Access visibility of mobile users. Ensure ongoing regulatory compliance with new and updated out of the box reports Generate full audit report for the ECB security of internet payments and maintain ongoing compliance with the regulatory requirements. Additionally, utilize updated PCI and SWIFT requirement reports. Integrate cloud security into your IaC initiative while streamlining processes Embed cloud security checks into the DevSecOps native tools, allowing them to proactively identify and mitigate risk as part of their ongoing process. About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity by automating connectivity flows and security policy, anywhere. The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk, and process changes at zero-touch across the hybrid network. AlgoSec’s patented application-centric view of the hybrid network enables business owners, application owners, and information security professionals to talk the same language, so organizations can deliver business applications faster while achieving a heightened security posture. Over 1,800 of the world’s leading organizations trust AlgoSec to help secure their most critical workloads across public cloud, private cloud, containers, and on-premises networks while taking advantage of almost two decades of leadership in Network Security Policy Management. See what securely accelerating your digital transformation, move-to-cloud, infrastructure modernization, or micro-segmentation initiatives looks like at www.algosec.com
- [Panel] How Financial Institutions Can Achieve Network Security and Compliance | AlgoSec
Webinars [Panel] How Financial Institutions Can Achieve Network Security and Compliance Financial institutions have strict network security requirements, which sometimes hinder innovation and digital transformation. Security and regulatory requirements act as a barrier to innovation. However, financial institutions can enable business innovation, while still achieving network security and compliance. Watch AlgoSec’s panel discussion, as Asher Benbenisty, Director of Product Marketing, and Yitzy Tannenbaum, Product Marketing Manager, discuss how financial institutions can simplify the network security management, reduce risk and ensure continuous compliance. They discuss: How intelligent automation helps overcome security management intricacy How to make sure network changes meet compliance requirements and pass regulatory audits the first time Industry metrics so you can benchmark your own organization as well as see how the finance sector compares to other industries Case studies from other financial institutions September 8, 2020 Yitzy Tannenbaum Product Marketing Manager Asher Benbenisty Director of product marketing Relevant resources Automated Security Policy Allows Financial Institutions to make the Triple Play Keep Reading Security policy management for financial institutions Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- AlgoSec | Firewall Traffic Analysis: The Complete Guide
What is Firewall Traffic Analysis? Firewall traffic analysis (FTA) is a network security operation that grants visibility into the data... Firewall Policy Management Firewall Traffic Analysis: The Complete Guide Asher Benbenisty 2 min read Asher Benbenisty Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 10/24/23 Published What is Firewall Traffic Analysis? Firewall traffic analysis (FTA) is a network security operation that grants visibility into the data packets that travel through your network’s firewalls. Cybersecurity professionals conduct firewall traffic analysis as part of wider network traffic analysis (NTA) workflows. The traffic monitoring data they gain provides deep visibility into how attacks can penetrate your network and what kind of damage threat actors can do once they succeed. NTA vs. FTA Explained NTA tools provide visibility into things like internal traffic inside the data center, inbound VPN traffic from external users, and bandwidth metrics from Internet of Things (iOT) endpoints. They inspect on-premises devices like routers and switches, usually through a unified, vendor-agnostic interface. Network traffic analyzers do inspect firewalls, but might stop short of firewall-specific network monitoring and management. FTA tools focus more exclusively on traffic patterns through the organization’s firewalls. They provide detailed information on how firewall rules interact with traffic from different sources. This kind of tool might tell you how a specific Cisco firewall conducts deep packet inspection on a certain IP address, and provide broader metrics on how your firewalls operate overall. It may also provide change management tools designed to help you optimize firewall rules and security policies . Firewall Rules Overview Your firewalls can only protect against security threats effectively when they are equipped with an optimized set of rules. These rules determine which users are allowed to access network assets and what kind of network activity is allowed. They play a major role in enforcing network segmentation and enabling efficient network management. Analyzing device policies for an enterprise network is a complex and time-consuming task. Minor mistakes can lead to critical risks remaining undetected and expose network devices to cyberattacks. For this reason, many security leaders use automated risk management solutions that include firewall traffic analysis. These tools perform a comprehensive analysis of firewall rules and communicate the risks of specific rules across every device on the network. This information is important because it will inform the choices you make during real-time traffic analysis. Having a comprehensive view of your security risk profile allows you to make meaningful changes to your security posture as you analyze firewall traffic. Performing Real-Time Traffic Analysis AlgoSec Firewall Analyzer captures information on the following traffic types: External IP addresses Internal IP addresses (public and private, including NAT addresses) Protocols (like TCP/IP, SMTP, HTTP, and others) Port numbers and applications for sources and destinations Incoming and outgoing traffic Potential intrusions The platform also supports real-time network traffic analysis and monitoring. When activated, it will periodically inspect network devices for changes to their policy rules, object definitions, audit logs, and more. You can view the changes detected for individual devices and groups, and filter the results to find specific network activities according to different parameters. For any detected change, Firewall Analyzer immediately aggregates the following data points: Device – The device where the changes happened. Date/Time – The exact time when the change was made. Changed by – Tells you which administrator performed the change. Summary – Lists the network assets impacted by the change. Many devices supported by Firewall Analyzer are actually systems of devices that work together. You can visualize the relationships between these assets using the device tree format. This presents every device as a node in the tree, giving you an easy way to manage and view data for individual nodes, parents nodes, and global categories. For example, Firewall Analyzer might discover a redundant rule copied across every firewall in your network. If its analysis shows that the rule triggers frequently, it might recommend moving to a higher node on the device tree. If it turns out the rule never triggers, it may recommend adjusting the rule or deleting it completely. If the rule doesn’t trigger because it conflicts with another firewall rule, it’s clear that some action is needed. Importance of Visualization and Reporting Open source network analysis tools typically work through a command-line interface or a very simple graphic user interface. Most of the data you can collect through these tools must be processed separately before being communicated to non-technical stakeholders. High-performance firewall analysis tools like AlgoSec Firewall Analyzer provide additional support for custom visualizations and reports directly through the platform. Visualization allows non-technical stakeholders to immediately grasp the importance of optimizing firewall policies, conducting netflow analysis, and improving the organization’s security posture against emerging threats. For security leaders reporting to board members and external stakeholders, this can dramatically transform the success of security initiatives. AlgoSec Firewall Analyzer includes a Visualize tab that allows users to create custom data visualizations. You can save these visualizations individually or combine them into a dashboard. Some of the data sources you can use to create visualizations include: Interactive searches Saved searches Other saved visualizations Traffic Analysis Metrics and Reports Custom visualizations enhance reports by enabling non-technical audiences to understand complex network traffic metrics without the need for additional interpretation. Metrics like speed, bandwidth usage, packet loss, and latency provide in-depth information about the reliability and security of the network. Analyzing these metrics allows network administrators to proactively address performance bottlenecks, network issues, and security misconfigurations. This helps the organization’s leaders understand the network’s capabilities and identify the areas that need improvement. For example, an organization that is planning to migrate to the cloud must know whether its current network infrastructure can support that migration. The only way to guarantee this is by carefully measuring network performance and proactively mitigating security risks. Network traffic analysis tools should do more than measure simple metrics like latency. They need to combine latency into complex performance indicators that show how much latency is occuring, and how network conditions impact those metrics. That might include measuring the variation in delay between individual data packets (jitter), Packet Delay Variation (PDV), and others. With the right automated firewall analysis tool, these metrics can help you identify and address security vulnerabilities as well. For example, you could automate the platform to trigger alerts when certain metrics fall outside safe operating parameters. Exploring AlgoSec’s Network Traffic Analysis Tool AlgoSec Firewall Analyzer provides a wide range of operations and optimizations to security teams operating in complex environments. It enables firewall performance improvements and produces custom reports with rich visualizations demonstrating the value of its optimizations. Some of the operations that Firewall Analyzer supports include: Device analysis and change tracking reports. Gain in-depth data on device policies, traffic, rules, and objects. It analyzes the routing table that produces a connectivity diagram illustrating changes from previous reports on every device covered. Traffic and routing queries. Run traffic simulations on specific devices and groups to find out how firewall rules interact in specific scenarios. Troubleshoot issues that emerge and use the data collected to prevent disruptions to real-world traffic. This allows for seamless server IP migration and security validation. Compliance verification and reporting. Explore the policy and change history of individual devices, groups, and global categories. Generate custom reports that meet the requirements of corporate regulatory standards like Sarbanes-Oxley, HIPAA, PCI DSS, and others. Rule cleanup and auditing. Identify firewall rules that are either unused, timed out, disabled, or redundant. Safely remove rules that fail to improve your security posture, improving the efficiency of your firewall devices. List unused rules, rules that don’t conform to company policy, and more. Firewall Analyzer can even re-order rules automatically, increasing device performance while retaining policy logic. User notifications and alerts. Discover when unexpected changes are made and find out how those changes were made. Monitor devices for rule changes and send emails to pre-assigned users with device analyses and reports. Network Traffic Analysis for Threat Detection and Response By monitoring and inspecting network traffic patterns, firewall analysis tools can help security teams quickly detect and respond to threats. Layer on additional technologies like Intrusion Detection Systems (IDS), Network Detection and Response (NDR), and Threat Intelligence feeds to transform network analysis into a proactive detection and response solution. IDS solutions can examine packet headers, usage statistics, and protocol data flows to find out when suspicious activity is taking place. Network sensors may monitor traffic that passes through specific routers or switches, or host-based intrusion detection systems may monitor traffic from within a host on the network. NDR solutions use a combination of analytical techniques to identify security threats without relying on known attack signatures. They continuously monitor and analyze network traffic data to establish a baseline of normal network activity. NDR tools alert security teams when new activity deviates too far from the baseline. Threat intelligence feeds provide live insight on the indicators associated with emerging threats. This allows security teams to associate observed network activities with known threats as they develop in real-time. The best threat intelligence feeds filter out the huge volume of superfluous threat data that doesn’t pertain to the organization in question. Firewall Traffic Analysis in Specific Environments On-Premises vs. Cloud-hosted Environments Firewall traffic analyzers exist in both on-premises and cloud-based forms. As more organizations migrate business-critical processes to the cloud, having a truly cloud-native network analysis tool is increasingly important. The best of these tools allow security teams to measure the performance of both on-premises and cloud-hosted network devices, gathering information from physical devices, software platforms, and the infrastructure that connects them. Securing the Internet of Things It’s also important that firewall traffic analysis tools take Internet of Things (IoT) devices in consideration. These should be grouped separately from other network assets and furnished with firewall rules that strictly segment them. Ideally, if threat actors compromise one or more IoT devices, network segmentation won’t allow the attack to spread to other parts of the network. Conducting firewall analysis and continuously auditing firewall rules ensures that the barriers between network segments remain viable even if peripheral assets (like IoT devices) are compromised. Microsoft Windows Environments Organizations that rely on extensive Microsoft Windows deployments need to augment the built-in security capabilities that Windows provides. On its own, Windows does not offer the kind of in-depth security or visibility that organizations need. Firewall traffic analysis can play a major role helping IT decision-makers deploy technologies that improve the security of their Windows-based systems. Troubleshooting and Forensic Analysis Firewall analysis can provide detailed information into the causes of network problems, enabling IT professionals to respond to network issues more quickly. There are a few ways network administrators can do this: Analyzing firewall logs. Log data provides a wealth of information on who connects to network assets. These logs can help network administrators identify performance bottlenecks and security vulnerabilities that would otherwise go unnoticed. Investigating cyberattacks. When threat actors successfully breach network assets, they can leave behind valuable data. Firewall analysis can help pinpoint the vulnerabilities they exploited, providing security teams with the data they need to prevent future attacks. Conducting forensic analysis on known threats. Network traffic analysis can help security teams track down ransomware and malware attacks. An organization can only commit resources to closing its security gaps after a security professional maps out the killchain used by threat actors to compromise network assets. Key Integrations Firewall analysis tools provide maximum value when integrated with other security tools into a coherent, unified platform. Security information and event management (SIEM) tools allow you to orchestrate network traffic analysis automations with machine learning-enabled workflows to enable near-instant detection and response. Deploying SIEM capabilities in this context allows you to correlate data from different sources and draw logs from devices across every corner of the organization – including its firewalls. By integrating this data into a unified, centrally managed system, security professionals can gain real-time information on security threats as they emerge. AlgoSec’s Firewall Analyzer integrates seamlessly with leading SIEM solutions, allowing security teams to monitor, share, and update firewall configurations while enriching security event data with insights gleaned from firewall logs. Firewall Analyzer uses a REST API to transmit and receive data from SIEM platforms, allowing organizations to program automation into their firewall workflows and manage their deployments from their SIEM. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- Challenges in Managing Security in Native, Hybrid and Multi-Cloud Environments - AlgoSec
Challenges in Managing Security in Native, Hybrid and Multi-Cloud Environments Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- The predictive roadmap: Architecting Zero Trust for the hybrid reality - AlgoSec
The predictive roadmap: Architecting Zero Trust for the hybrid reality WhitePaper Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- A Customer Story: The NCR journey to effective and agile network security | AlgoSec
Learn how NCR improved network security and agility through automation and optimization with Algosec's solutions. Webinars A Customer Story: The NCR journey to effective and agile network security Managing security in a multi-billion-dollar enterprise poses many challenges, as well as opportunities. Go inside an S&P 500 company and hear how they manage their network security. Join Scott Theriault, Global Manager, Network Perimeter Security at NCR Corporation as he shares his real-world experience managing security in a global organization with Yitzy Tannenbaum, Product Marketing Manager at AlgoSec. Get insights on: Key factors managing network security in complex organizations The benefits of network policy optimization Importance of maintaining and demonstrating compliance Change management and automation in large, complex networks Driving alignment of cloud and on-premises security December 17, 2020 Yitzy Tannenbaum Product Marketing Manager Scott Theriault Global Manager, Network Perimeter Security at NCR Corporation Relevant resources AlgoSec Case Study: BT Watch Video Discovery Case Study Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Bridging NetOps and SecOps: An Experts’ Panel
Silos hurt security NetworkSecurity is the responsibility of both NetOps SecOps In this panel with Cisco, Conscia AlgoSec security experts, we’ll share how to bring the teams together Webinars Bridging NetOps and SecOps: An Experts’ Panel Silos hurt security. Your network and its security are not managed by just one team. It is the responsibility of both NetOps and SecOps, but these teams don’t always play well together. In this security experts’ panel, Doug Hurd from Cisco, Henrik Skovfoged from Conscia, Oren Amiram and Tsippi Dach from AlgoSec will share how you can bring NetOps and SecOps teams together with Cisco ACI, Cisco Secure Workload (formerly Cisco Tetration) and AlgoSec. Discover how NetOps and SecOps teams can: Bridge the NetOps/SecOps divide, improve communication, and break down the silos between network and security. Align network, security, and business application owners Improve the entire network security with Cisco Secure Workload and firewall management Automate tasks and gain network traffic visibility of networks and security controls for threat detection, analysis and response across Cisco ACI and the entire hybrid and multi-vendor network. March 16, 2021 Alex Hilton Chief Executive at Cloud Industry Forum (CIF) Tsippi Dach Director of marketing communications Relevant resources Cisco & AlgoSec achieving application-driven security across your hybrid network Keep Reading DevSecOps: Putting the Sec into the DevOps Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Firewall management solution for network policy compliance
Protect your network from cyber attacks with firewall management Configure, monitor, and update firewall policies for effective security Firewall management solution for network policy compliance Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. Firewall management How do you manage firewall rules? Firewall policy management Firewall configuration monitoring and alerts Firewall vulnerability management Firewall security compliance management Extensive multi-vendor support Distributed firewall management Best 6 Practices for Firewall Management Managing firewalls with AlgoSec Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure Solution overview See how this customer improved compliance readiness and risk Case study Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- AlgoSec FireFlow – Automate and secure policy changes | AlgoSec
Automate and secure network policy changes with AlgoSec FireFlow. Streamline workflows, ensure compliance, and reduce risks in your security environment. AlgoSec FireFlow – Automate and secure policy changes ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Choose a better way to manage your network
- AlgoSec’s 2025 State of Network Security Report Reveals Growing Adoption of Zero-Trust Architecture and Multi-Cloud Environments
Annual vendor-agnostic research found businesses continue to prioritize multi-cloud environments, with Cisco, Microsoft Azure, AWS, Palo Alto Networks and Fortinet leading the way AlgoSec’s 2025 State of Network Security Report Reveals Growing Adoption of Zero-Trust Architecture and Multi-Cloud Environments Annual vendor-agnostic research found businesses continue to prioritize multi-cloud environments, with Cisco, Microsoft Azure, AWS, Palo Alto Networks and Fortinet leading the way April 3, 2025 Speak to one of our experts RIDGEFIELD PARK, NJ, April 3, 2025 – Global cybersecurity leader AlgoSec has released its annual ‘The State of Network Security Report’, providing a comprehensive and objective, vendor-agnostic analysis of today’s network security landscape by identifying key market trends, highlighting in demand solutions and technologies and the most popular strategies being adopted by security professionals. The report identifies significant shifts in cloud platform adoption, deployment of firewalls and Software- Defined Wide Area Networks (SD-WAN), as well as Secure Access Service Edge (SASE) implementation and AI. Based on comparative findings from 2024 and 2025, AlgoSec’s research includes responses from security, network and cloud professionals across 28 countries and evaluates market leaders including Cisco, Microsoft Azure, AWS, Check Point, Palo Alto Networks and more. Key findings from the report include: Security visibility gaps are driving a shift in security management - 71% of security teams struggle with visibility, which is delaying threat detection and response. The lack of insight into application connectivity, security policies and dependencies are proving to be a significant risk Multi-cloud and cloud firewalls are now standard – Businesses continue to adopt multi-cloud environments, with Azure becoming the most widely used platform in 2025. Firewall and SD-WAN adoption grow despite complexity – Multi-vendor strategies make firewall deployment more challenging. In terms of customer base, Palo Alto Networks took the lead, but Fortinet’s NGFW is gaining traction. SD-WAN adoption jumped, with Fortinet rising from 19.1% in 2024 to 25.8% in 2025. Zero-trust and SASE gain momentum – Zero-trust awareness is at an all-time high, with 56% of businesses fully or partially implementing it, though 20% are still in the learning phase. SASE adoption is also growing, with Zscaler leading at 35%, while Netskope has gained 15% market share. AI and automation are reshaping security – AI-driven security tools are improving real-time threat detection, but implementation and privacy concerns remain a challenge. Automation is now critical, with application connectivity automation ranked as the top priority for minimizing risk and downtime. “As businesses expand their digital footprints across hybrid and multi-cloud environments, securing network infrastructure has become a top challenge,” said Eran Shiff, VP of Product at AlgoSec. “We are seeing a major shift toward automation, orchestration and risk mitigation as key security priorities. Adoption of SD-WAN and SASE continues to rise, while awareness of AI-driven security and zero-trust principles is stronger than ever.” The full report can be accessed here. About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to securely accelerate application delivery up to 10 times faster by automating application connectivity and security policy across the hybrid network environment. With two decades of expertise securing hybrid networks, over 2200 of the worlds most complex organizations trust AlgoSec to help secure their most critical workloads. AlgoSec Horizon platform utilizes advanced AI capabilities, enabling users to automatically discover and identify their business applications across multi-clouds, and remediate risks more effectively. It serves as a single source for visibility into security and compliance issues across the hybrid network environment, to ensure ongoing adherence to internet security standards, industry, and internal regulations. Additionally, organizations can leverage intelligent change automation to streamline security change processes, thus improving security and agility. Learn how AlgoSec enables application owners, information security experts, SecOps and cloud security teams to deploy business applications faster while maintaining security at www.algosec.com .
- Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires | AlgoSec
Webinars Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires The growing body of regulations and standards forces enterprises to put considerable emphasis on compliance verified by ad hoc and regular auditing of security policies and controls. While regulatory and internal audits entail a wide range of security checks, network firewalls are featured prominently as they are the first line of defense of the enterprise network. Typical networks might include tens or hundreds of firewalls from multiple vendors running thousands of rules. Auditing firewalls for compliance is becoming more complex and demanding all the time. Documentation of current rules and their evolution of changes is lacking Time and resources required to find, organize and inspect all the firewall rules to determine the level of compliance is exorbitant and growing It’s time to adopt auditing’s best practices to maintain continuous compliance. Join us in this webinar to discover the Firewall Audit Checklist, the 6 best practices that will ensure successful audits and full compliance. By adopting these best practices, security teams will significantly improve their network’s security posture and reduce the pain of ensuring compliance with regulations, industry standards and corporate policies. Tal Dayan AlgoSec security expert Relevant resources Firewall audit checklist for security policy rules review Firewall audit checklist for security policy rules review See Documentation AlgoSec AppViz - Application visibility for AlgoSec Firewall Analyzer See Documentation Firewall policy management Automate firewall rule changes See Documentation Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- BM&FBOVESPA | AlgoSec
Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. BM&FBOVESPA Invests In Security Policy Management To Improve Operational Efficiencies Organization BM&FBOVESPA Industry Financial Services Headquarters Sao Paulo, Brazil Download case study Share Customer success stories "AlgoSec helps us maintain a problem-free environment. And because of operational efficiencies, the product paid for itself within the first year. With AlgoSec, we can do more with less" Leading Latin American Stock Exchange Maintains a Secure, Compliant Trading Environment AlgoSec Business Impact • Recouped investment in AlgoSec within the first year• Reduce rule review project from 1 month to 1 day• Helps maintain a secure, compliant environment• Frees up staff to focus on other crucial security tasks Background Headquartered in Sao Paulo, Brazil, BM&FBOVESPA is the largest stock exchange in Latin America. BM&FBOVESPA has a diversified and integrated trading model offering a complete custody system. Trading takes place in an exclusively electronic environment. The Exchange enables customers to trade equities, to hedge and to execute arbitrage, investment diversification, allocation and the leveraging of positions. Challenge To keep its systems and transactions secure, BM&FBOVESPA utilizes firewalls from several vendors. In total these firewalls have about 40,000 firewall rules, with another 5,000 added annually. Even with two full-time employeesfocused on maintaining firewall rules, the steady addition of rules and objects created clutter and consumed the firewall appliances’ CPU and memory. Therefore, BM&FBOVESPA realized that an automated solution for firewall policy management was the natural next step in the maturity of its information security processes. “Manually managing our firewall policies was difficultand time consuming. We needed a solution that supported a variety of different firewall vendors and could integrate and manage all policies in an automated manner,” said Wellington Vita, Information Security Manager of BM&FBOVESPA. Solution Following a recommendation from Compugraf, one of BM&FBOVESPA’s key security partners, Vita and his team evaluated AlgoSec’s Security Management solution. The proof of concept clearly showed the value of the solution and the ease and speed with which it could be deployed. The ability to integrate and manage devices from multiple vendors and provide visibility across the entire network was also important in BM&FBOVESPA’s decision to select AlgoSec. Results BM&FBOVESPA uses AlgoSec on a daily basis to manage its firewall policies. “AlgoSec is a great product which helps us maintain the core of our environment -the firewall policy. With AlgoSec we can easily identify unused rules and objects, as well as rules that were not compliant with our information security policy.” noted Vita. “While using AlgoSec, we also discovered a new benefit. AlgoSec enables our information security architects to understand how information flows between firewalls, which helps them significantly with their information security projects.” The gains in efficiency and productivity have dramatically reduced the time consumed by firewall policy management. “Because of operational efficiencies AlgoSec paid for itself in the first year,” said Vita. In addition to cutting the time needed to perform ongoing policy management, the solution enabled BM&FBOVESPA to meet deadlines that would previously have been unachievable. “A month ago, we had to review our incoming internet access rules in two days — and did. Without AlgoSec, it would have taken us at least a month to accomplish this task,” added Vita.“AlgoSec helps us maintain a problem-free environment. And we have been able to move members of our team who previously handled these maintenance jobs onto other tasks, so we can do more with less. I recommend AlgoSec to other companies — it will help them improve their firewall policy management processes,” concluded Vita. Schedule time with one of our experts
![[Panel] How Financial Institutions Can Achieve Network Security and Compliance | AlgoSec](https://static.wixstatic.com/media/ec21dd_6e1479bf8cfc44f7a5df15b1d94f6ae5~mv2.jpg/v1/fit/w_93,h_66,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/ec21dd_6e1479bf8cfc44f7a5df15b1d94f6ae5~mv2.jpg)




