

Search results
616 results found with an empty search
- Training and certification | AlgoSec
Comprehensive training courses to help you become more efficient, and quickly understand all the features and customization options Training services and certification courses Training course methods We offer comprehensive training courses to help our customers and partners quickly understand all the features and customization options within the AlgoSec Security Management Solution. Our courses are tailored for end users and/or administrators. 1 Users First level courses cover ASMS end to end basic functionality 2 Administrators Second level course cover ASMS deployment, maintenance and troubleshooting 3 Experts Third level courses cover Firewall Analyzer and FireFlow configuration 4 Masters Forth level course cover advanced FireFlow customization Certification Courses We offer comprehensive training courses to help our customers and partners quickly understand all the features and customization options within the AlgoSec Security Management Solution. Our courses are tailored for end users and/or administrators. 1 Users AlgoSec Foundations AFA | AFF | AppViz | ACE 2 Administrators System Administrator 3 Experts AFA | AFF | AppViz Configuration 4 Masters AFA | AFF Master User AlgoSec Foundations - This course covers the basic end-to-end functionalities and operation of the AlgoSec Horizon Platform, including AlgoSec Firewall Analyzer (AFA), AlgoSec FireFlow (AFF), AppViz, and AlgoSec Cloud Enterprise (ACE). Administrator System Administrator - The AlgoSec platform requires ongoing administration, maintenance, and troubleshooting. This course focuses on deployment, system administration, maintenance, and troubleshooting at a customer level. Expert AFA Configuration - AlgoSec Firewall Analyzer can be configured for each customer’s needs and implemented in distributed deployments. This course focuses on Advanced Configuration and Integration for AFA. AFF Configuration - AlgoSec FireFlow can be configured for each customer’s needs and integrated with other systems. This course focuses on Advanced Configuration and Integration for AFF. AppViz Configuration - This course covers AppViz Configuration as part of an application-centric approach to Network Security Management. Master AFF Master - AlgoSec FireFlow can be customized for each customer’s needs and integrated with third-party systems. This advanced course focuses on FireFlow customization and integration and includes Perl programming usage. AFA Master - AlgoSec Firewall Analyzer Master course is an advanced, Master-level training designed for professionals who need to apply advanced map modeling techniques, troubleshooting complex network scenarios, and optimizing AFA network map. Training course methods We offer a variety of training course methods to fit your learning style, budget and schedule Free Online Self-Paced Modules Free short e-learning courses that allow you to study at your own time. Virtual Public Classes Live, instructor-led sessions with hands-on labs open to the public. You can view available dates on our training portal. Virtual Private Classes Live, instructor-led sessions with hands-on labs dedicated exclusively to your team. To schedule a private session, please contact Algosec Academy. Onsite Private Classes Instructor-led, in-person training with hands-on labs conducted at your location for your team only. Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Azure security best practices checklist - AlgoSec
Azure security best practices checklist Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Cloud network security report 2025 - AlgoSec
Cloud network security report 2025 Datasheet Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Media center | AlgoSec
Visit Algosec's Media Center for the latest news, press releases, and media resources on network security and policy management solutions Media Center Press Releases AlgoSec’s 2026 State of Network Security Report Reveals Rising Demand for Consolidation and Control 2/4/26 Add paragraph text. Click “Edit Text” to update the font, size and more. To change and reuse text themes, go to Site Styles. AlgoSec Security Management Solution A33.20 removes network security change friction across hybrid and multi-cloud networks 1/22/26 Add paragraph text. Click “Edit Text” to update the font, size and more. To change and reuse text themes, go to Site Styles. AlgoSec’s Horizon Platform Fuels Company Growth and Global Application-Centric Security 9/9/25 Add paragraph text. Click “Edit Text” to update the font, size and more. To change and reuse text themes, go to Site Styles. Show all press releases In the News Minimize security risks with micro-segmentation December 20, 2023 The importance of IT compliance in the digital landscape December 20, 2023 Efficiently contain cyber risks December 20, 2023 Show all news Company Overview AlgoSec enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network. AlgoSec’s patented application-centric view of the hybrid network enables business owners, application owners, and information security professionals to talk the same language, so organizations can deliver business applications faster while achieving a heightened security posture. Read more Choose a better way to manage your network Customer Reviews We proudly enable business-driven network security policy management for the world's largest and most complex organizations. Learn why over 1,800 customers in 80 countries and across every industry vertical rely on AlgoSec to help them become more agile, more secure, and continuously compliant. Read more Media Contacts AlgoSec Tsippi Dach [email protected] Public Relations USA Megan Davis [email protected] +1 706-527-9536 Public Relations UK Jenni Livesly / Patrick Giffney [email protected] +44(0) 300 124 6100 Public Relations DACH Florian Stark / Carmen Ritter [email protected] +49(0) 89 211 871 66 AlgoSec Logo Download kit Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Increasing Cisco ACI adoption with AlgoSec - AlgoSec
Increasing Cisco ACI adoption with AlgoSec Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Case Study Soitron Siber Güvenlik Servisleri - AlgoSec
Case Study Soitron Siber Güvenlik Servisleri Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Partner solution brief Manage secure application connectivity within ServiceNow - AlgoSec
Partner solution brief Manage secure application connectivity within ServiceNow Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Driving Security Through Observability: Transforming Application Risk into Resilience - AlgoSec
Driving Security Through Observability: Transforming Application Risk into Resilience WhitePaper Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- AlgoSec | How to optimize the security policy management lifecycle
Information security is vital to business continuity. Organizations trust their IT teams to enable innovation and business transformation... Risk Management and Vulnerabilities How to optimize the security policy management lifecycle Tsippi Dach 2 min read Tsippi Dach Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 8/9/23 Published Information security is vital to business continuity. Organizations trust their IT teams to enable innovation and business transformation but need them to safeguard digital assets in the process. This leads some leaders to feel that their information security policies are standing in the way of innovation and business agility. Instead of rolling new a new enterprise application and provisioning it for full connectivity from the start, security teams demand weeks or months of time to secure those systems before they’re ready. But this doesn’t mean that cybersecurity is a bottleneck to business agility. The need for speedier deployment doesn’t automatically translate to increased risk. Organizations that manage application connectivity and network security policies using a structured lifecycle approach can improve security without compromising deployment speed. Many challenges stand between organizations and their application and network connectivity goals. Understanding each stage of the lifecycle approach to security policy change management is key to overcoming these obstacles. Challenges to optimizing security policy management ` Complex enterprise infrastructure and compliance requirements A medium-sizded enterprise may have hundreds of servers, systems, and security solutions like firewalls in place. These may be spread across several different cloud providers, with additional inputs from SaaS vendors and other third-party partners. Add in strict regulatory compliance requirements like HIPAA , and the risk management picture gets much more complicated. Even voluntary frameworks like NIST heavily impact an organization’s information security posture, acceptable use policies, and more – without the added risk of non-compliance. Before organizations can optimize their approach to security policy management, they must have visibility and control over an increasingly complex landscape. Without this, making meaningful progress of data classification and retention policies is difficult, if not impossible. Modern workflows involve non-stop change When information technology teams deploy or modify an application, it’s in response to an identified business need. When those deployments get delayed, there is a real business impact. IT departments now need to implement security measures earlier, faster, and more comprehensively than they used to. They must conduct risk assessments and security training processes within ever-smaller timeframes, or risk exposing the organization to vulnerabilities and security breaches . Strong security policies need thousands of custom rules There is no one-size-fits-all solution for managing access control and data protection at the application level. Different organizations have different security postures and security risk profiles. Compliance requirements can change, leading to new security requirements that demand implementation. Enterprise organizations that handle sensitive data and adhere to strict compliance rules must severely restrict access to information systems. It’s not easy to achieve PCI DSS compliance or adhere to GDPR security standards solely through automation – at least, not without a dedicated change management platform like AlgoSec . Effectively managing an enormous volume of custom security rules and authentication policies requires access to scalable security resources under a centralized, well-managed security program. Organizations must ensure their security teams are equipped to enforce data security policies successfully. Inter-department communication needs improvement Application deliver managers, network architects, security professionals, and compliance managers must all contribute to the delivery of new application projects. Achieving clear channels of communication between these different groups is no easy task. In most enterprise environments, these teams speak different technical languages. They draw their data from internally siloed sources, and rarely share comprehensive documentation with one another. In many cases, one or more of these groups are only brought in after everyone else has had their say, which significantly limits the amount of influence they can have. The lifecycle approach to managing IT security policies can help establish a standardized set of security controls that everyone follows. However, it also requires better communication and security awareness from stakeholders throughout the organization. The policy management lifecycle addresses these challenges in five stages ` Without a clear security policy management lifecycle in place, most enterprises end up managing security changes on an ad hoc basis. This puts them at a disadvantage, especially when security resources are stretched thin on incident response and disaster recovery initiatives. Instead of adopting a reactive approach that delays application releases and reduces productivity, organizations can leverage the lifecycle approach to security policy management to address vulnerabilities early in the application development lifecycle. This leaves additional resources available for responding to security incidents, managing security threats, and proactively preventing data breaches. Discover and visualize application connectivity The first stage of the security policy management lifecycle revolves around mapping how your apps connect to each other and to your network setup. The more details can include in this map, the better prepared your IT team will be for handling the challenges of policy management. Performing this discovery process manually can cost enterprise-level security teams a great deal of time and accuracy. There may be thousands of devices on the network, with a complex web of connections between them. Any errors that enter the framework at this stage will be amplified through the later stages – it’s important to get things right at this stage. Automated tools help IT staff improve the speed and accuracy of the discovery and visualization stage. This helps everyone – technical and nontechnical staff included – to understand what apps need to connect and work together properly. Automated tools help translate these needs into language that the rest of the organization can understand, reducing the risk of misconfiguration down the line. Plan and assess security policy changes Once you have a good understanding of how your apps connect with each other and your network setup, you can plan changes more effectively. You want to make sure these changes will allow the organization’s apps to connect with one another and work together without increasing security risks. It’s important to adopt a vulnerability-oriented perspective at this stage. You don’t want to accidentally introduce weak spots that hackers can exploit, or establish policies that are too complex for your organization’s employees to follow. This process usually involves translating application connectivity requests into network operations terms. Your IT team will have to check if the proposed changes are necessary, and predict what the results of implementing those changes might be. This is especially important for cloud-based apps that may change quickly and unpredictably. At the same time, security teams must evaluate the risks and determine whether the changes are compliant with security policy. Automating these tasks as part of a regular cycle ensures the data is always relevant and saves valuable time. Migrate and deploy changes efficiently The process of deploying new security rules is complex, time-consuming, and prone to error . It often stretches the capabilities of security teams that already have a wide range of operational security issues to address at any given time. In between managing incident response and regulatory compliance, they must now also manually update thousands of security rules over a fleet of complex network assets. This process gets a little bit easier when guided by a comprehensive security policy change management framework. But most organizations don’t unlock the true value of the security policy management lifecycle until they adopt automation. Automated security policy management platforms enable organizations to design rule changes intelligently, migrate rules automatically, and push new policies to firewalls through a zero-touch interface. They can even validate whether the intended changes updated correctly. This final step is especially important. Without it, security teams must manually verify whether their new policies successfully address the vulnerabilities the way they’re supposed to. This doesn’t always happen, leaving security teams with a false sense of security. Maintain configurations using templates Most firewalls accumulate thousands of rules as security teams update them against new threats. Many of these rules become outdated and obsolete over time, but remain in place nonetheless. This adds a great deal of complexity to small-scale tasks like change management, troubleshooting issues, and compliance auditing. It can also impact the performance of firewall hardware , which decreases the overall lifespan of expensive physical equipment. Configuration changes and maintenance should include processes for identifying and eliminating rules that are redundant, misconfigured, or obsolete. The cleaner and better-documented the organization’s rulesets are, the easier subsequent configuration changes will be. Rule templates provide a simple solution to this problem. Organizations that create and maintain comprehensive templates for their current firewall rulesets can easily modify, update, and change those rules without having to painstakingly review and update individual devices manually. Decommission obsolete applications completely Every business application will eventually reach the end of its lifecycle. However, many organizations keep decommissioned security policies in place for one of two reasons: Oversight that stems from unstandardized or poorly documented processes, or; Fear that removing policies will negatively impact other, active applications. As these obsolete security policies pile up, they force the organization to spend more time and resources updating their firewall rulesets. This adds bloat to firewall security processes, and increases the risk of misconfigurations that can lead to cyber attacks. A standardized, lifecycle-centric approach to security policy management makes space for the structured decommissioning of obsolete applications and the rules that apply to them. This improves change management and ensures the organization’s security posture is optimally suited for later changes. At the same time, it provides comprehensive visibility that reduces oversight risks and gives security teams fewer unknowns to fear when decommissioning obsolete applications. Many organizations believe that Security stands in the way of the business – particularly when it comes to changing or provisioning connectivity for applications. It can take weeks, or even months to ensure that all the servers, devices, and network segments that support the application can communicate with each other while blocking access to hackers and unauthorized users. It’s a complex and intricate process. This is because, for every single application update or change, Networking and Security teams need to understand how it will affect the information flows between the various firewalls and servers the application relies on, and then change connectivity rules and security policies to ensure that only legitimate traffic is allowed, without creating security gaps or compliance violations. As a result, many enterprises manage security changes on an ad-hoc basis: they move quickly to address the immediate needs of high-profile applications or to resolve critical threats, but have little time left over to maintain network maps, document security policies, or analyze the impact of rule changes on applications. This reactive approach delays application releases, can cause outages and lost productivity, increases the risk of security breaches and puts the brakes on business agility. But it doesn’t have to be this way. Nor is it necessary for businesses to accept greater security risk to satisfy the demand for speed. Accelerating agility without sacrificing security The solution is to manage application connectivity and network security policies through a structured lifecycle methodology, which ensures that the right security policy management activities are performed in the right order, through an automated, repeatable process. This dramatically speeds up application connectivity provisioning and improves business agility, without sacrificing security and compliance. So, what is the network security policy management lifecycle, and how should network and security teams implement a lifecycle approach in their organizations? Discover and visualize The first stage involves creating an accurate, real-time map of application connectivity and the network topology across the entire organization, including on-premise, cloud, and software-defined environments. Without this information, IT staff are essentially working blind, and will inevitably make mistakes and encounter problems down the line. Security policy management solutions can automate the application connectivity discovery, mapping, and documentation processes across the thousands of devices on networks – a task that is enormously time-consuming and labor-intensive if done manually. In addition, the mapping process can help business and technical groups develop a shared understanding of application connectivity requirements. Plan and assess Once there is a clear picture of application connectivity and the network infrastructure, you can start to plan changes more effectively – ensure that proposed changes will provide the required connectivity, while minimizing the risks of introducing vulnerabilities, causing application outages, or compliance violations. Typically, it involves translating application connectivity requests into networking terminology, analyzing the network topology to determine if the changes are really needed, conducting an impact analysis of proposed rule changes (particularly valuable with unpredictable cloud-based applications), performing a risk and compliance assessment, and assessing inputs from vulnerabilities scanners and SIEM solutions. Automating these activities as part of a structured lifecycle keeps data up-to-date, saves time, and ensures that these critical steps are not omitted – helping avoid configuration errors and outages. Functions Of An Automatic Pool Cleaner An automatic pool cleaner is very useful for people who have a bad back and find it hard to manually operate the pool cleaner throughout the pool area. This type of pool cleaner can move along the various areas of a pool automatically. Its main function is to suck up dirt and other debris in the pool. It functions as a vacuum. Automatic pool cleaners may also come in different types and styles. These include automatic pressure-driven cleaners, automatic suction side-drive cleaners, and robotic pool cleaners. Migrate and deploy Deploying connectivity and security rules can be a labor-intensive and error-prone process. Security policy management solutions automate the critical tasks involved, including designing rule changes intelligently, automatically migrating rules, and pushing policies to firewalls and other security devices – all with zero-touch if no problems or exceptions are detected. Crucially, the solution can also validate that the intended changes have been implemented correctly. This last step is often neglected, creating the false impression that application connectivity has been provided, or that vulnerabilities have been removed, when in fact there are time bombs ticking in the network. Maintain Most firewalls accumulate thousands of rules which become outdated or obsolete over the years. Bloated rulesets not only add complexity to daily tasks such as change management, troubleshooting and auditing, but they can also impact the performance of firewall appliances, resulting in decreased hardware lifespan and increased TCO. Cleaning up and optimizing security policies on an ongoing basis can prevent these problems. This includes identifying and eliminating or consolidating redundant and conflicting rules; tightening overly permissive rules; reordering rules; and recertifying expired ones. A clean, well-documented set of security rules helps to prevent business application outages, compliance violations, and security gaps and reduces management time and effort. Decommission Every business application eventually reaches the end of its life: but when they are decommissioned, its security policies are often left in place, either by oversight or from fear that removing policies could negatively affect active business applications. These obsolete or redundant security policies increase the enterprise’s attack surface and add bloat to the firewall ruleset. The lifecycle approach reduces these risks. It provides a structured and automated process for identifying and safely removing redundant rules as soon as applications are decommissioned while verifying that their removal will not impact active applications or create compliance violations. We recently published a white paper that explains the five stages of the security policy management lifecycle in detail. It’s a great primer for any organization looking to move away from a reactive, fire-fighting response to security challenges, to an approach that addresses the challenges of balancing security and risk with business agility. Download your copy here . Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- Microsoft Azure & AlgoSec | AlgoSec
Algosec for Azure automates security policy management, enhances visibility, and ensures compliance across your Azure cloud environment. Microsoft Azure & AlgoSec Visibility, Risk Management and Change Automation for Azure Environments AlgoSec manages security policies across cloud, hybrid and on-prem environments, delivering proactive risk and compliance analysis, end-to-end change management and automation – all in the business application context. AlgoSec supports enterprises in their journey to the cloud by automatically mapping existing application connectivity prior to the migration, determining and facilitating required connectivity changes during the move, and ensuring continuous compliance and automated change management in the newly established hybrid cloud environment. AlgoSec completes the picture, providing clear visibility and effective management of Microsoft Azure’s native security constructs – Network Security Groups (NSGs) and Azure Firewalls – as well as 3rd party virtual firewalls deployed in the Azure cloud. AlgoSec for Microsoft Azure firewall is available now. Sign up here Automated Security Policy Management for Azure Network Security Groups With AlgoSec, you gain visibility into your entire Azure cloud estate, including network topology and connectivity, the effective security enforcement by Azure Network Security Groups, and aggregated risk and compliance analysis across Azure and 3rd party security devices. AlgoSec also provides an end-to-end change management and automation solution, covering security policies in the cloud, as well as on-premises SDN and traditional networks. Central Management for Azure Firewall Azure Firewall is a new managed, cloud-based network security service that protects your Azure Virtual Network resources. With AlgoSec, you can manage multiple instances of the Azure Firewall using a shared policy model, to facilitate and automate security policy management in multi-region cloud environments. In addition, the AlgoSec solution provides end-to-end visibility and management capabilities across the Azure Firewalls, Azure NSGs and 3rd party firewalls, in the cloud and on-prem. Key benefits Unified security Unified security policy management across cloud, SDN and on-premise networks Cloud visibility Visibility into the Azure cloud network, topology and connectivity Securing cloud estate Securing your cloud estate from misconfigurations with risk alerts as well as overall risk visibility Automation Automated Azure NSG and 3rd party firewall changes, eliminating misconfigurations and rework Proactive assessment Proactive assessment the impact of network changes to ensure continuous compliance Simplified and automate Simplified and automate internal and regulatory audits, and reduce time and costs by as much as 80% Cloud and Hybrid Environments Download infographic Schedule time with one of our experts
- BT | AlgoSec
Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Bt Streamlines Firewall Change Control And Proves Compliance Across Its Global Networks Organization BT Industry Telecom Headquarters London, UK Download case study Share Customer success stories "AlgoSec now does the heavy lifting for us. It allows the engineers to focus more on providing greater levels of security than on process and change, so we’re able to provide a much more secure infrastructure for BT" Background A leading world-wide provider of communications services and solutions, BT serves customers in more than 170 countries. Its principal activities include the provision of networked IT services globally; local, national and international telecommunications services for use at home, at work and on the move; broadband, TV and internet products and services; and converged fixed/mobile products and services. Challenge BT’s internal network is a complex, highly segmented environment that has evolved over the last two decades throughout its worldwide locations. BT’s infrastructure relies on a large number of third-party domains and business-to-business connections with over 1,000 policy enforcement points, some of which date back a number of years.“The challenge facing BT is around the size of the estate, the complexity and our ability to demonstrate at audit that the rules within the policy are still appropriate, still valid, and still authorized,” says Phil Packman, General Manager of Security Gateway Operations for BT. “Equally, we’re challenged to ensure that rules don’t make it into the rulebase unless they’re approved and authorized.” BT therefore realized that it needed automation and reporting to better control its massive rulebase, and provide an approved audit trail to both auditors and internal stakeholders. Solution BT set about to solve its security challenges by creating a set of criteria for evaluating off-the-shelf, automated security solutions. “The criteria were based on ‘total costof ownership,’ our roadmap, and probably most importantly, the willingness of the partner to work with us,” says Packman. AlgoSec uniquely met BT’s requirements.Another feature BT liked was AlgoSec’s ability to prove that policies are implemented as approved. According to Packman, this was a capability “which we’d not seen in other products, and which we couldn’t achieve with our in-house tools.”AlgoSec’s commitment to customer success and its money-back guarantee were also deciding factors in BT’s selection process. Results Immediately after deployment, AlgoSec enabled BT to reduce error rates, make improvements to their rulebase implementation process and ultimately give BT better control over its network security. Packman explains: “Most notably, we were able to track down rogue connectivity, or connectivity that we didn’t understand properly. It gave us an almost immediate view of certain high-risk situations.”In addition, by using AlgoSec’s compliance reports, Packman’s engineering team were able to instantly demonstrate that no rules could be added to the firewall policy without proper approval — saving countless hours.Simplifying the audit preparation process led to a surprise benefit for BT’s Security Gateway Operations Team, which performs rule implementation and authorization: “AlgoSec has allowed us to change the skills profile of the team because the tool does the heavy lifting for us. Now our engineers can focus more on providing greater levels of security than on process and change, so we’re able to provide a much more secure infrastructure for BT.”Packman also endorses AlgoSec’s customer service, stating that the relationship has been a very positive one. “This has really helped put our minds at rest. We believe we’ve done the right thing in terms of deploying AlgoSec.”Using AlgoSec continues to enable BT to manage the complexity of its network with confidence, as it pursues growing and competitive global markets for its IT, computing, and communications services. Packman summarizes: “We have met every objective we hoped to achieve with AlgoSec.” Schedule time with one of our experts
- Energy Supplier | AlgoSec
Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Energy supplier keeps the lights on with automated network change management Organization Energy Supplier Industry Utilities & Energy Headquarters International Download case study Share Customer success stories "AlgoSec has saved us a lot of time in managing our rule base.” Large energy supplier empowers internal stakeholders and streamlines network security policy change process Background The company is the provider of electricity and gas for their country. They are responsible for the planning, construction, operation, maintenance and global technical management of both these grids and associated infrastructures. The Challenge In order to provide power to millions of people, the company runs more than twenty IT and OT firewalls from multiple vendors that are hosted in multiple data centers throughout the country. Some of the challenges included: Lack of visibility over a complex architecture – With multiple networks, IT managers needed to know which network is behind which firewall and connect traffic flows to firewall rules. Change management processes were being managed by network diagrams created in Microsoft Visio and Microsoft Excel spreadsheets – tools that were not designed for network security policy management. Thousands of rules – Each firewall may have thousands of rules each. Many of these rules are unneeded and introduce unnecessary risk. Managing the maze of rules was time consuming and took time away from other strategic initiatives. Unnecessary requests – Business stakeholders were requesting status information about network traffic and making duplicate and unnecessary change requests for items covered by existing rules. The Solution The company was searching for a solution that provided: Visibility into their network topology, including traffic flows. Optimization of their firewall rules. Alerts before time-based rules expire. Automatic implementation of their rule base onto their firewall devices. They implemented AlgoSec Firewall Analyzer and AlgoSec FireFlow, as well as AlgoBot, AlgoSec’s ChatOps solution. AlgoSec Firewall Analyzer ensures security and compliance by providing visibility and analysis into complex network security policies. AlgoSec FireFlow improves security and saves security staffs’ time by automating the entire security policy change process, eliminating manual errors, and reducing risk. AlgoBot is an intelligent chatbot that handles network security policy management tasks. AlgoBot answers business user’s questions, submitted in plain English, and automatically assists with security policy change management processes – without requiring manual inputs or additional research. The Results Some of the ways the company benefitted from using AlgoSec include: Visibility and topology mapping – They are able to get a picture of their entire network and view traffic flows to each network device. Optimized firewall rules – They are able to adjust the placement of their rules, placing their most used rules higher in the rule base, improving performance, and also checking for unused objects or rules to clean up, removing unused rules, improving firewall performance. Improved communication and transparency for time-based rules – Before time-based rules expire (rule with an expiration date), the requester is automatically notified and asked if the rule should be extended or removed. Better, more refined rule requests – By first gathering information from AlgoBot, rule requests are better focused. Internal customers are able to check if rules are already in place before making requests, therefore avoiding requests that are already covered by existing rules. Empower internal stakeholders – Able to save the IT team’s time by empowering internal stakeholders to use AlgoBot to get the answers themselves to traffic queries. Met change implementation SLAs – By implementing their rules with AlgoSec, the company meets their internal SLAs for change implementation. Streamlined auditing processes – By documenting the changes they made in the firewalls, who made them, and when, their audit processes are streamlined. Zero-touch automation – Automatically implementing rules in multiple firewalls simultaneously ensures policy consistency across multiple devices, while preserving staff resources. This also eliminates the need to use the management consoles from individual vendors, saving time and reducing misconfigurations. Staff efficiencies – Hundreds of monthly change requests are able to be managed by a single staff member. He would not be able to do it without AlgoSec. The company switched from a competing solution because it was more user-friendly and provided greater visibility than the competing solution they were previously using. They are also impressed with AlgoSec’s scalability. “The initial setup is really easy. It has been running flawlessly since installation. Even upgrades are pretty straightforward and have never given us problems,” they noted. Schedule time with one of our experts



