

Search results
621 results found with an empty search
- Deloitte and AlgoSec Partner to Establish a Joint Network Protection Transformation Solution for Enterprises
The joint offering helps enterprises tighten their security posture, effectively mitigate Ransomware and other Cyberattacks and ensure long-term sustainability Deloitte and AlgoSec Partner to Establish a Joint Network Protection Transformation Solution for Enterprises The joint offering helps enterprises tighten their security posture, effectively mitigate Ransomware and other Cyberattacks and ensure long-term sustainability November 9, 2020 Speak to one of our experts RIDGEFIELD PARK, N.J., November 9, 2020 – The EMEA Telecom Engineering Centre of Excellence (TEE) of Deloitte (located in Portugal) and AlgoSec , the leading provider of business-driven network security management solutions, have entered into an alliance to establish a network protection transformation offer to safeguard clients against complex threats and attacks. The combined team will deliver, operate, and maintain a network protection offer with joint functions managed between Deloitte and AlgoSec. Deloitte TEE will focus on delivering business process transformation capabilities, business and technical advisory and project management to ensure reliability and sustainability on the proposed capabilities, while AlgoSec will provide technical support to customize, deploy and operate the tool to accelerate and automate the network security management, and ensure the offer is aligned with the business’ requirements. The Deloitte and AlgoSec joint offering provides a business-centric approach to network security management across the entire hybrid and multi-vendor environment. The solution offers comprehensive visibility across the network security environment and business applications, agile and secure policy change management via zero touch automation, and continuous compliance assurance. The offering also includes a Network Security Hardening Service, which begins to understand the Client’s network level of exposure, current vulnerabilities and the potential impact of network threats, before performing a transformation strategy to strengthen current capabilities and remediate network risks and vulnerabilities, followed by a Network Security Managed Service to monitor and guarantee long-term sustainability. Deloitte TEE will also become a reselling partner to support AlgoSec in the global market, using a structured offer model with advantages for the partnership and the client. Jade Kahn, AlgoSec CMO said: “Network protection should be a priority for companies to mitigate the damage caused by an increasing number of complex cyber threats. With an appropriate strategy in place, they can identify and contain threats before they are able to move freely across the network. We look forward to working alongside Deloitte and delivering value to its clients.” Pedro Tavares, Partner of Deloitte Portugal and responsible for the EMEA Telecom Engineering Centre of Excellence (TEE): “TEE focus is on delivering high value telecoms engineering consultancy services towards our customers, and under the ongoing digitalization wave and in the advent of 5G, setting up a Network Protection offer to ensure that this improvement in the connectivity, communication and user experience do not bring substantial business risks is a key stepping stone towards this strategy. We expect with this combined offer to support our clients in improving their network security, mitigating their network risks and enhancing their key Capabilities to ensure a sustainable transformation of their business”. About AlgoSec The leading provider of business-driven network security management solutions, AlgoSec helps the world’s largest organizations align security with their mission-critical business processes. With AlgoSec, users can discover, map and migrate business application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate network security changes with zero touch – across their cloud, SDN and on-premise networks. Over 1,800 enterprises, including 20 of the Fortune 50, have utilized AlgoSec’s solutions to make their organizations more agile, more secure and more compliant – all the time. Since 2005, AlgoSec has shown its commitment to customer satisfaction with the industry’s only money-back guarantee . All product and company names herein may be trademarks of their registered owners. Media Contacts:Tsippi Dach [email protected] Craig Coward Context Public [email protected] +44 (0)1625 511 966 Olga Neves Media Relations & External CommunicationsDeloitte PortugalTlm: (+351) 918 985 [email protected] About Deloitte Deloitte, us, we and our refer to one or more of Deloitte Touche Tohmatsu Limited (“DTTL”), its global network of member firms, and their related entities (collectively, the “Deloitte organization”). DTTL (also referred to as “Deloitte Global”) and each of its member firms and related entities are legally separate and independent entities, which cannot obligate or bind each other in respect of third parties. DTTL and each DTTL member firm and related entity is liable only for its own acts and omissions, and not those of each other. DTTL does not provide services to clients. Please see www.deloitte.com/about to learn more.Deloitte is a leading global provider of audit and assurance, consulting, financial advisory, risk advisory, tax and related services. Our global network of member firms and related entities in more than 150 countries and territories (collectively, the “Deloitte organization”) serves four out of five Fortune Global 500® companies. Learn how Deloitte’s more than 330,000 people make an impact that matters at www.deloitte.com . About EMEA Telecom Engineering Centre of Excellence (TEE) The EMEA Telecom Engineering Centre of Excellence (TEE) is an operational area specialized in telecom engineering services, managed by Deloitte Portugal, that offers engineering services for mobile, fixed and convergent telecom networks, service platforms and operating support systems (“OSS”) for the Europe, Middle East, Africa region (“EMEA”).
- AlgoSec | Unleash the Power of Application-Level Visibility: Your Secret Weapon for Conquering Cloud Chaos
Are you tired of playing whack-a-mole with cloud security risks? Do endless compliance reports and alert fatigue leave you feeling... Cloud Security Unleash the Power of Application-Level Visibility: Your Secret Weapon for Conquering Cloud Chaos Asher Benbenisty 2 min read Asher Benbenisty Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 7/22/24 Published Are you tired of playing whack-a-mole with cloud security risks? Do endless compliance reports and alert fatigue leave you feeling overwhelmed? It's time to ditch the outdated, reactive approach and embrace a new era of cloud security that's all about proactive visibility . The Missing Piece: Understanding Your Cloud Applications Imagine this: you have a crystal-clear view of every application running in your cloud environment. You know exactly which resources they're using, what permissions they have, and even the potential security risks they pose. Sounds like a dream, right? Well, it's not just possible – it's essential. Why? Because applications are the beating heart of your business. They're what drive your revenue, enable your operations, and store your valuable data. But they're also complex, interconnected, and constantly changing, making them a prime target for attackers. Gain the Upper Hand with Unbiased Cloud Discovery Don't settle for partial visibility or rely on your cloud vendor's limited tools. You need an unbiased, automated cloud discovery solution that leaves no stone unturned. With it, you can: Shine a Light on Shadow IT: Uncover all those rogue applications running without your knowledge, putting your organization at risk. Visualize the Big Picture: See the intricate relationships between your applications and their resources, making it easy to identify vulnerabilities and attack paths. Assess Risk with Confidence: Get a clear understanding of the security posture of each application, so you can prioritize your efforts and focus on the most critical threats. Stay Ahead of the Game: Continuously monitor your environment for changes, so you're always aware of new risks and vulnerabilities. From Reactive to Proactive: Turn Your Cloud into a Fortress Application-level visibility isn't just about compliance or passing an audit (though it certainly helps with those!). It's about fundamentally changing how you approach cloud security. By understanding your applications at a deeper level, you can: Prioritize with Precision: Focus your remediation efforts on the applications and risks that matter most to your business. Respond with Agility: Quickly identify and address vulnerabilities before they're exploited. Prevent Attacks Before They Happen: Implement proactive security measures, like tightening permissions and enforcing security policies, to stop threats in their tracks. Empower Your Teams: Give your security champions the tools they need to effectively manage risk and ensure the continuous security of your cloud environment. The cloud is an ever-changing landscape, but with application-level visibility as your guiding light, you can confidently navigate the challenges and protect your organization from harm. Don't be left in the dark – embrace the power of application understanding and take your cloud security to the next level! Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- Financial Institutions: Best Practices for Security & Compliance In the Era of Digital Transformation - AlgoSec
Financial Institutions: Best Practices for Security & Compliance In the Era of Digital Transformation Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Six levels of automation - AlgoSec
Six levels of automation Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Hybrid Cloud Security with Google and AlgoSec | AlgoSec
Learn how Google Cloud and AlgoSec solutions help companies improve visibility and reduce risk in large complex hybrid networking environments Webinars Hybrid Cloud Security with Google and AlgoSec Learn how Google Cloud and AlgoSec solutions help companies improve visibility and reduce risk in large complex hybrid networking environments Learn how Google Cloud and AlgoSec solutions help companies improve visibility and reduce risk in large complex hybrid networking environments November 15, 2023 Faye Feng Product Manager at Google Ava Chawla Global Head of Cloud Security Relevant resources Why misconfigurations continue to plague public cloud network services and how to avoid them? Keep Reading Security policy management for the hybrid cloud environment Read an Ebook Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Migrate Application Connectivity to the Cloud - AlgoSec
Migrate Application Connectivity to the Cloud Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Manage Network Security Policies From Within Servicenow - AlgoSec
Manage Network Security Policies From Within Servicenow Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- MITRE attack framework
MITRE ATT&CK offers an open source framework for understanding adversarial tactics, techniques, and common knowledge in use today. MITRE attack framework Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. What is the MITRE ATT&CK® framework? MITRE ATT&CK offers an open source framework for understanding adversarial tactics, techniques, and common knowledge in use today. It aggregates and catalogs cyber threats based on real-world adversary behavior observed across thousands of incidents, and outlines defenses to protect organizations against them. MITRE ATT&CK helps organizations understand how adversaries operate and guides them towards developing security measures to protect their assets and operations. Understanding the MITRE ATT&CK layout MITRE ATT&CK is organized into three matrices, each representing a dedicated technology domain: Enterprise Mobile Industrial control systems (ICS) Most organizations will use the enterprise matrix, which covers attacks against Windows, macOS, Linux, cloud platforms, network infrastructure, and containers. However, companies must first understand what malicious actors are seeking to achieve. Tactics The enterprise matrix opens to 14 columns representing adversary tactics, i.e., high-level goals: Initial access (getting in) through execution Reconnaissance Persistence Execution Privilege escalation Exfiltration and impact Next, comes the how. Techniques and Sub-Techniques Each tactic column leads to rows containing techniques and sub-techniques, i.e., specific methods for achieving a goal. The latest MITRE ATT&CK v18 features 8 to 47 techniques for each tactic. For example, under Reconnaissance, there are 11 techniques, including “Active Scanning” and “Phishing for Information.” Persistence lists techniques such as "Create Account" or "Boot or Logon Autostart Execution." Sub-techniques are nested within techniques for specific attack implementations. For instance, under "Phishing," you have "Spearphishing Attachment," "Spearphishing Link," "Spearphishing via Service," and “Spearphishing Voice.” This granularity is key, as you need a different technique to defend against phishing via email attachments than via compromised messaging platforms. MITRE ATT&CK Matrix The MITRE ATT&CK Matrix catalogs adversaries into groupings such as data sources, cyber threat intelligence (CTI) groups, and defense strategies. This allows users to filter their navigation to specific adversaries, tools, and campaigns relevant to their business operations. MITRE ATT&CK is constantly updated as adversaries and their tactics, techniques, and procedures (TTPs) evolve. Each version has new features based on empirical threat intelligence, incident response findings, and community research. This is especially important in the face of emerging threat trends, such as AI-assisted cyberattacks and the growth of ransomware-as-a-service (RaaS). Benefits of the MITRE ATT&CK framework MITRE ATT&CK doesn’t simply offer threat intelligence but also shapes organizations’ security operations for multiple use cases: Threat intelligence gathering: Gain context for cloud indicators of compromise (IOCs); beyond "bad IP address detected," know if the address is associated with a specific technique adversaries use for command and control. Threat hunting: Use a hypothesis-driven approach to systematically hunt for evidence of specific techniques used, instead of randomly searching logs. Attack simulation and red team exercises: Leverage real-world, standardized playbooks for testing both offensive capabilities and defensive responses; map your red team's successful tactics against your blue team's detection rates to identify coverage gaps with precision. Gap analysis: Visualize which techniques you can detect, which you can prevent, and most importantly, which represent blind spots in your security architecture. Response validation: Test whether your incident response procedures actually work against the techniques most relevant to your threat profile. The use cases above are a proof of concept, but the bottom line is the actual benefits companies reap from them: Shared understanding of the threat landscape: MITRE ATT&CK offers a common language for discussing adversaries across technical teams, executives, and even board members. Accurate simulation of attacks and validation of defenses: Mapped exercises tell you whether you can detect and respond to techniques adversaries actually use. Informed development and deployment of security policies: Craft policies that specifically address the techniques most relevant to your business risk profile. Intelligent selections of security solutions: Ask vendors which ATT&CK techniques they address and check those claims against your coverage gaps. Best practices for MITRE ATT&CK mapping The MITRE ATT&CK framework's value comes from mapping security data to specific ATT&CK techniques. But mapping without context is like having a map without knowing your starting location; it’s technically interesting, but operationally useless. The CISA best practices guide identifies two fundamental approaches to ATT&CK mapping: Mapping into finished reports (creating security insights for decision-making) Mapping into raw data (embedding ATT&CK context into operational security workflows). Understanding which approach fits your business needs is crucial. Mapping MITRE ATT&CK into finished reports This approach starts with collating incident reports, threat intelligence, or post-mortem analyses, extracting behavioral patterns, and then translating them into ATT&CK language. This creates artifacts that inform security strategy, resource allocation, and executive communication. The process follows six steps: Find the behavior. Identify specific actions the adversary took. Look beyond IoCs, such as malware names and IP addresses, to “how the adversary interacted with specific platforms and applications.” Research the behavior. Was this a standard administrative task gone rogue or a sophisticated persistence mechanism? Investigate the original source, technical details, timing, and surrounding activity. Consult malware analysis reports from reliable organizations, security reports, or your own forensic data. Translate the behavior into a tactic. Map the identified behavior to one of the tactics in the MITRE framework. Identify the technique used for the tactic. For example, within the Execution tactic, scan for the technique that best describes the method. ATT&CK provides detailed descriptions for each technique to help you map to the right one. Identify the sub-techniques. Was it a Windows scheduled task? A Linux Cron job? The sub-technique matters because detection and mitigation strategies for each differ significantly. Compare results to those of other analysts. CISA recommends that analysts treat mapping as a team sport where they work together to identify ATT&CK techniques and ensure quality control. Different analysts examining the same behavior should arrive at the same ATT&CK mapping. Mapping MITRE ATT&CK into raw data While finished reports inform strategy, mapping into raw data enables operations. This approach embeds ATT&CK context directly into your detection engineering, threat hunting, and daily security workflows. Organizations can choose from three viable starting points, each suited to different operational scenarios. 1. Start with a data source A specific data source , say, authentication logs from your cloud identity provider, allows you to see what ATT&CK techniques generate observable activity in these logs. For authentication logs, you would map to techniques like "Valid Accounts," "Brute Force," and "Credential Stuffing." You would then define procedures, i.e., the specific log patterns that indicate these techniques in action. This approach is ideal when deploying new data sources or optimizing existing ones. 2. Start with specific tools or attributes If threat intelligence indicates adversaries targeting your industry are using a specific software , malware family, or penetration testing tool, you can start mapping from there. After identifying techniques that the tool enables, you can then look up the groups and campaigns that have implemented these techniques. Cobalt Strike (S0154) , for example, maps to dozens of techniques across multiple tactics. By understanding this breadth, you can develop ways of identifying not just the tool itself but the behaviors it facilitates. 3. Start with analytics Just as adversaries use software to target businesses, analysts can use cloud enterprise tools to track adversary behavior. SIEM platforms like the AlgoSec Cloud Enterprise (ACE) have built-in detection rules that collect, log, and correlate events from multiple endpoints, cloud services, and identity providers. These events originate as raw telemetry, which are then mapped to specific MITRE ATT&CK techniques. Mapping with detection analytics from such tools is increasingly the most practical approach for organizations with mature security tooling. Note: Mapping into raw data shouldn't exist in isolation. Operational mappings should ultimately feed into finished reports. Your day-to-day detection analytics reveal what you're actually seeing in your environment. These observations, aggregated and analyzed over time, become the foundation for strategic reporting. How to ACE your operations with the MITRE ATT&CK framework Enterprises generate millions of security events daily across cloud infrastructure, endpoints, network boundaries, and SaaS applications. With this deluge, it is unreasonable to expect analysts to hand-map behaviors. Enter AlgoSec Cloud Enterprise (ACE), a cloud enterprise tool that offers full visibility into your operations by collecting log data, aggregating and contextualizing it, and then mapping it automatically to MITRE ATT&CK techniques. This transforms raw telemetry streams into structured threat intelligence aligned with the MITRE ATT&CK framework. ACE’s finished reports provide a clear, risk-oriented view of your adversary exposure, using language that every analyst and decision-maker can understand. See why more than 2,200 companies trust AlgoSec. Schedule a demo today. Get the latest insights from the experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Your path to zero trust and micro segmentation
Your path to zero trust and micro segmentation Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. Executive summary Why zero trust is a strategic imperative Making the case for micro-segmentation Why micro-segmentation can be tricky Cloud micro-segmentation best practices How AlgoSec supports micro-segmentation AlgoSec: The ultimate engine for zero trust and micro-segmentation Get the latest insights from the experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Natilik and Rothschild | AlgoSec
Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. AlgoSec Case Study: Natilik and Rothschild Organization Natilik and Rothschild Industry Financial services Headquarters Download case study Share Customer success stories AlgoSec Case Study: Natilik and Rothschild Interview details Interviewee: Robert Elgidge, Security Solutions Director at Natilik Company: Natilik, UK-based global managed service provider Client: Rothschild, a multinational financial services institution Background Natilik, a global managed service provider, collaborated with AlgoSec to address the complex security challenges faced by Rothschild, a financial services leader with over 60 offices in 40 countries and $2.5 billion in annual revenue. Rothschild’s operations include investment banking, asset management, and private banking, as well as advisory roles for governments. Given their critical global role, securing and streamlining their IT infrastructure was a top priority. As part of their modernization strategy, Natilik also leveraged AWS to support Rothschild’s expanding cloud footprint and used the AlgoSec Horizon platform to provide unified visibility and security management across both AWS and on-prem environments. This hybrid approach allowed Natilik to centralize security policy analysis, application connectivity mapping, and risk prioritization across firewalls, cloud controls, and distributed sites. Watch the interview: Natilik’s expertise spans five key solution areas: Collaboration and modern work : enabling seamless communication and productivity across teams. Customer engagement : enhancing customer experiences through tailored digital solutions. Modern networks : building secure, scalable, and high-performing network infrastructures. Multi-cloud and data centers : supporting hybrid and multi-cloud environments for agility and scalability. Cybersecurity : providing end-to-end protection, which underpins all other solution areas. Cybersecurity forms the backbone of their offerings, ensuring clients like Rothschild can navigate an evolving threat landscape while maintaining compliance and operational excellence. Primary use case Rothschild’s primary challenges stemmed from fragmented security policies and inefficient manual processes. According to Robert Elgidge: “Rothschild’s large global firewall estate led to poor visibility and cumbersome management. AlgoSec was introduced to simplify these complexities, but initially, the company struggled with change management, approvals, and deploying firewall rules. Although AlgoSec offered the technology and intelligence needed, a significant amount of manual work was required to align stakeholders and integrate workflows.” With the introduction of AWS into their hybrid architecture, Natilik used AlgoSec Horizon to bridge visibility gaps between cloud and on-prem environments. Horizon’s application-centric discovery and cross-environment policy analysis helped Natilik consolidate cloud security groups, optimize hybrid access rules, and ensure consistent enforcement across AWS and traditional firewalls. AlgoSec’s deployment ultimately allowed Rothschild to consolidate security policies and automate manual processes, reducing errors and freeing resources for higher-value projects. Most valuable features Robert highlighted several standout features of AlgoSec: “AlgoSec’s rule intelligence feature was crucial. It identified which firewall rules were essential and which could be removed, dramatically simplifying the structure. This optimization not only improved performance but also saved significant costs. Initially, Rothschild considered investing in new firewall infrastructure, but AlgoSec’s ability to streamline and prioritize existing rules negated that need. The resulting performance boost was substantial, avoiding unnecessary expenses and improving operational efficiency.” By focusing on rule prioritization and optimization, AlgoSec enhanced Rothschild’s security posture and operational outcomes. With the addition of AlgoSec’s cloud-native capabilities (via its Horizon/ACE architecture), this rule intelligence and optimization extends not only to physical and on-prem firewalls, but also to cloud-native firewalls and security-group configurations ensuring effective policy hygiene across hybrid and multi-cloud estates. Areas for improvement Despite AlgoSec’s benefits, Robert noted areas for potential improvement: “Internal challenges with workflows and approvals persisted. While AlgoSec provided the technical capabilities, a more tailored approach to building or improving management processes would have been helpful. The main difficulties lay in the bureaucratic side of things, such as aligning request and approval roles.” These challenges highlighted the importance of aligning organizational processes with advanced security technologies. Usage duration “My experience with AlgoSec began in 2022, during its deployment at Rothschild. Shortly after, I transitioned to another organization that also used AlgoSec, which gave me further insight into its capabilities across different environments.” Solution stability Robert praised AlgoSec’s reliability: “There were no stability issues. Once AlgoSec was fully integrated, it became the central authority for rule management. We removed manual admin rights from the technical team, ensuring all changes went through AlgoSec. This approach eliminated human error and reinforced the solution’s effectiveness.” This stability now also covers hybrid and cloud-native policy environments, so Rothschild benefits from the same governance and control whether rules apply to physical appliances or cloud firewalls. Customer service and support “The technical support team was highly skilled and responsive. However, in regions like Brazil, where collaboration often involves discussions and in-person meetings, a purely technical approach didn’t always fully address our needs. A more consultative support model could enhance the customer experience in these scenarios.” Initial setup “Deploying AlgoSec was challenging due to the complexity of Rothschild’s network. However, the technical support team acted quickly to address any issues, ensuring the implementation proceeded smoothly. Once the environment was stabilized, maintenance and ongoing use were straightforward.” Return on investment AlgoSec delivered a strong return on investment for Rothschild: “The money saved on after-hours work alone justified the tool within the first year. By optimizing firewall rules and automating workflows, we achieved significant operational savings. This freed up resources for other critical business initiatives, directly contributing to profitability.” With the addition of cloud-native policy management, Rothschild now sees potential additional savings by avoiding redundant firewall investments and streamlining cloud infrastructure as part of their hybrid estate. Pricing, setup costs, and licensing “Compared to other solutions like Tufin and FireMon, AlgoSec was competitively priced and stayed within budget. There were no significant additional costs apart from standard licensing fees. While we did hire new personnel to support change management, that was more related to internal processes than the technology itself.” Final insights Robert shared his advice for organizations considering AlgoSec: “AlgoSec is best suited for larger enterprises with complex environments, especially those with multiple firewall vendors and over 500 rules. For smaller setups, the added complexity of a dedicated solution might not be necessary. However, for businesses dealing with significant network complexity, AlgoSec simplifies management and delivers substantial value. With its cloud-native capabilities, hybrid-ready architecture, and unified policy management across on-prem and cloud, it’s more relevant than ever for organisations operating across diverse infrastructures.I’d rate it 10 out of 10 for companies with the right use case.” Schedule time with one of our experts
- Press releases | AlgoSec
View AlgoSec s press releases to stay on top of the latest company announcements Press releases Filter by release year AlgoSec Achieves Protected Level under the Australian Government’s Infosec Registered Assessors Programme (IRAP) Framework February 25, 2026 2026 AlgoSec Posts 37% YoY new Business Growth in 2025 as Enterprises Prioritize Application-Centric Security February 18, 2026 Over 90% gross dollar retention and 37% year-over-year new business growth reflect demand for visibility across complex hybrid environments 2026 AlgoSec’s 2026 State of Network Security Report Reveals Rising Demand for Consolidation and Control February 4, 2026 One of the market’s most comprehensive annual vendor-agnostic studies found that rapid cloud expansion, distributed workloads, and AI-driven traffic patterns are driving increased demand for unified policy control and end-to-end transparency 2024 AlgoSec Security Management Solution A33.20 removes network security change friction across hybrid and multi-cloud networks January 22, 2026 The new capabilities empower teams to move faster with clarity, control, and business-aligned risk prioritization 2024 AlgoSec’s Horizon Platform Fuels Company Growth and Global Application-Centric Security September 9, 2025 A gross dollar retention rate of over 90% and 36% year-over-year new business growth highlight adoption across industries 2025 AlgoSec Security Management solution A33.10 delivers new compliance reporting and precise discovery of application connectivity May 20, 2025 The new product version release provides extended multi-cloud hybrid network visibility, reduces risk exposure and addresses new compliance regulations in a unified platform 2024 AlgoSec Wins SC Award for Best Security Company, Global InfoSec Award for Best Service Cybersecurity Company May 14, 2025 These award wins follow a year of double-digit year-on-year annual recurring revenue growth and the launch of the AlgoSec Horizon Platform 2024 AlgoSec’s 2025 State of Network Security Report Reveals Growing Adoption of Zero-Trust Architecture and Multi-Cloud Environments April 3, 2025 Annual vendor-agnostic research found businesses continue to prioritize multi-cloud environments, with Cisco, Microsoft Azure, AWS, Palo Alto Networks and Fortinet leading the way 2024 AlgoSec Achieves Strong Growth in 2024, Expands Customer Partnerships and Services Driven by Application-Centric Vision March 20, 2025 Continued growth underscores AlgoSec’s commitment to innovation and leadership in application-centric security to drive business value 2024 2023 AlgoSec Achieves Protected Level under the Australian Government’s Infosec Registered Assessors Programme (IRAP) Framework Date AlgoSec Posts 37% YoY new Business Growth in 2025 as Enterprises Prioritize Application-Centric Security Date Over 90% gross dollar retention and 37% year-over-year new business growth reflect demand for visibility across complex hybrid environments AlgoSec’s 2026 State of Network Security Report Reveals Rising Demand for Consolidation and Control Date One of the market’s most comprehensive annual vendor-agnostic studies found that rapid cloud expansion, distributed workloads, and AI-driven traffic patterns are driving increased demand for unified policy control and end-to-end transparency AlgoSec Security Management Solution A33.20 removes network security change friction across hybrid and multi-cloud networks Date The new capabilities empower teams to move faster with clarity, control, and business-aligned risk prioritization AlgoSec’s Horizon Platform Fuels Company Growth and Global Application-Centric Security Date A gross dollar retention rate of over 90% and 36% year-over-year new business growth highlight adoption across industries AlgoSec Security Management solution A33.10 delivers new compliance reporting and precise discovery of application connectivity Date The new product version release provides extended multi-cloud hybrid network visibility, reduces risk exposure and addresses new compliance regulations in a unified platform AlgoSec Wins SC Award for Best Security Company, Global InfoSec Award for Best Service Cybersecurity Company Date These award wins follow a year of double-digit year-on-year annual recurring revenue growth and the launch of the AlgoSec Horizon Platform AlgoSec’s 2025 State of Network Security Report Reveals Growing Adoption of Zero-Trust Architecture and Multi-Cloud Environments Date Annual vendor-agnostic research found businesses continue to prioritize multi-cloud environments, with Cisco, Microsoft Azure, AWS, Palo Alto Networks and Fortinet leading the way AlgoSec Achieves Strong Growth in 2024, Expands Customer Partnerships and Services Driven by Application-Centric Vision Date Continued growth underscores AlgoSec’s commitment to innovation and leadership in application-centric security to drive business value 2022 AlgoSec Achieves Protected Level under the Australian Government’s Infosec Registered Assessors Programme (IRAP) Framework Date AlgoSec Posts 37% YoY new Business Growth in 2025 as Enterprises Prioritize Application-Centric Security Date Over 90% gross dollar retention and 37% year-over-year new business growth reflect demand for visibility across complex hybrid environments AlgoSec’s 2026 State of Network Security Report Reveals Rising Demand for Consolidation and Control Date One of the market’s most comprehensive annual vendor-agnostic studies found that rapid cloud expansion, distributed workloads, and AI-driven traffic patterns are driving increased demand for unified policy control and end-to-end transparency AlgoSec Security Management Solution A33.20 removes network security change friction across hybrid and multi-cloud networks Date The new capabilities empower teams to move faster with clarity, control, and business-aligned risk prioritization AlgoSec’s Horizon Platform Fuels Company Growth and Global Application-Centric Security Date A gross dollar retention rate of over 90% and 36% year-over-year new business growth highlight adoption across industries AlgoSec Security Management solution A33.10 delivers new compliance reporting and precise discovery of application connectivity Date The new product version release provides extended multi-cloud hybrid network visibility, reduces risk exposure and addresses new compliance regulations in a unified platform AlgoSec Wins SC Award for Best Security Company, Global InfoSec Award for Best Service Cybersecurity Company Date These award wins follow a year of double-digit year-on-year annual recurring revenue growth and the launch of the AlgoSec Horizon Platform AlgoSec’s 2025 State of Network Security Report Reveals Growing Adoption of Zero-Trust Architecture and Multi-Cloud Environments Date Annual vendor-agnostic research found businesses continue to prioritize multi-cloud environments, with Cisco, Microsoft Azure, AWS, Palo Alto Networks and Fortinet leading the way AlgoSec Achieves Strong Growth in 2024, Expands Customer Partnerships and Services Driven by Application-Centric Vision Date Continued growth underscores AlgoSec’s commitment to innovation and leadership in application-centric security to drive business value Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Application Segmentation with Cisco Secure Workload and AlgoSec - AlgoSec
Application Segmentation with Cisco Secure Workload and AlgoSec Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue



