top of page

Search results

627 results found with an empty search

  • AlgoSec Names Rafi Kretchmer as Chief Marketing Officer, and Mike Danforth as New Regional Vice President of Sales

    New appointments from well-established cybersecurity companies underscore AlgoSec’s mission to be the global leader in securing application connectivity AlgoSec Names Rafi Kretchmer as Chief Marketing Officer, and Mike Danforth as New Regional Vice President of Sales New appointments from well-established cybersecurity companies underscore AlgoSec’s mission to be the global leader in securing application connectivity May 30, 2024 Speak to one of our experts RIDGEFIELD PARK, NJ, May 30, 2024 – AlgoSec , a global cybersecurity leader, today announced the appointment of two senior executives: Rafi Kretchmer will serve as Chief Marketing Officer, and Mike Danforth will assume the role of Regional Vice President of Sales for the America’s. Together these new leaders will further support AlgoSec in enabling the world’s most complex organizations to secure their business-critical applications across the public clouds, private clouds, containers, and on-premises networks; ensuring application uptime, risk management and continuous compliance. “The addition of Rafi Kretchmer and Mike Danforth to our executive team marks a significant milestone in establishing AlgoSec as a leading global cybersecurity company,” said Yuval Baron, Chairman and CEO of AlgoSec . “With their deep expertise and tenure in the cybersecurity industry, Kretchmer and Danforth will be instrumental in leveraging their expertise to provide customers with the solutions they need to deliver business applications faster while achieving a heightened security posture.” Combined, Kretchmer and Danforth have over 40 years of cybersecurity experience, including senior leadership roles at globally-recognized cybersecurity organizations. ● Rafi Kretchmer , Chief Marketing Officer – Rafi Kretchmer has more than two decades of extensive experience heading marketing and strategy for leading global B2B enterprises, with a proven track record of driving strategic business growth across global markets. Prior to joining AlgoSec, Rafi Kretchmer served as Vice President of Marketing at Check Point Software Technologies, Ltd. Prior to that, he held multiple senior marketing leadership roles in the SaaS market, including Chief Marketing Officer at Panaya, and Head of Marketing at Nice Systems and Amdocs. ● Mike Danforth , Regional Vice President of Sales, America’s – Mike Danforth brings 20 years of sales experience across the cybersecurity landscape. He has comprehensive experience with direct sales, channel sales and strategic partnerships. Throughout his tenure, Danforth has held several key leadership positions at start-ups and large public companies. Most recently, he served as Vice President of Sales for Palo Alto Networks, helping to build the Cortex product line to a billion-dollar business unit across every major sales vertical in the U.S., Canada, and LATAM. Before his career in cybersecurity, Mike also served 10 years in the U.S. Army as a paratrooper in the 82nd Airborne Division and later as a Leader in the prestigious 75th Ranger Regiment. Today’s security leaders must maintain a strong security posture against the increase in and constantly evolving landscape of cybersecurity threats , while also maintaining business continuity. The appointments of Kretchmer and Danforth will advance AlgoSec’s commitment to ensuring customers have the tools they need to securely accelerate business application deployment and accelerate digital transformation projects. For more information about AlgoSec and its leadership team, please visit algosec.com/company/management/ and follow the company on Twitter , LinkedIn and Facebook . About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more than 1,800 of the world’s leading organizations, AlgoSec’s application-centric approach enables to securely accelerate business application deployment by centrally managing application connectivity and security policies across the public clouds, private clouds, containers, and on-premises networks. Using its unique vendor-agnostic deep algorithm for intelligent change management automation, AlgoSec enables acceleration of digital transformation projects, helps prevent business application downtime and substantially reduces manual work and exposure to security risks. AlgoSec’s policy management and CNAPP platforms provide a single source for visibility into security and compliance issues within cloud-native applications as well as across the hybrid network environment, to ensure ongoing adherence to internet security standards, industry, and internal regulations. Learn how AlgoSec enables application owners, information security experts, DevSecOps and cloud security teams to deploy business applications up to 10 times faster while maintaining security at https://www.algosec.com .

  • Prevasio sandbox 'Detonates' containers in a safe virtual environment | AlgoSec

    Enhance container security with Prevasio's sandbox. Isolate and "detonate" containers in a safe environment to uncover hidden threats and prevent breaches. Prevasio sandbox 'Detonates' containers in a safe virtual environment Network traffic analysis Prevasio Sandbox intercepts and inspects all network traffic generated by containers, including HTTPS traffic. SSL/TLS inspection is enabled with Prevasio’s MITM proxy certificate being dynamically injected into the virtual file system of the analysed container images. Currently, Prevasio Sandbox provides HTTPS interception for the 10 most common Linux distributions. The following example demonstrates an interception of HTTP and HTTPS traffic in a container spawned from a public Docker Hub image. Schedule a Demo Vulnerability scan Prevasio Sandbox scans container images for the presence of any vulnerable packages and libraries. For example, this ️ Docker Hub image contains critical vulnerabilities in 28 packages. Schedule a Demo ML classifier for malware Any x32/x64 ELF executable files created both during container image build phase and the runtime are scanned with Prevasio’s Machine Learing (ML) model. The ML model used by Prevasio relies on ELF file’s static characteristics, its entropy, and the sequence of its disassembled code. Here is an example of a malicious container image hosted️ at Docker Hub, that was picked up by Prevasio’s ML Classifier. Let’s see what happens if we recompile Mirai bot’s source code️ , by using custom domains for C2 (command-and-control) traffic. The Dockerfile with instructions to fetch, modify, and compile Mirai source code is available here️ . As you see in this example, the use of ML provides resistant detection, even if the malware was modified. Schedule a Demo Automated Pen-Test Full static visibility of the container’s internals is not sufficient to tell if a container image in question is safe indeed. During the last stage of its analysis, Prevasio Sandbox simulates attackers’ actions, first trying to fingerprint services running within the analysed container, and then engaging exploits against them. In addition to that, the pen-test performs a brute-force attack against an identified service (such as SSH, FTP or SQL), in order to find weak credentials that would allow the attackers to log in. As the pen-test is performed in an isolated environment, it poses no risk to the production environment. The following example demonstrates how the automated pen-test has identified the type of MySQL server running inside a container spawned from this️ Docker Hub image, then successfully brute-forced it and found working credentials against it. Schedule a Demo System event graph Prevasio collects kernel-level system events within a running container: File system events Network events Process lifecycle events Kernel syscalls User call events These events are then correlated into a hierarchy, visually displayed in the form of a force-directed graph. The graph allows to visually identify problematic containers and also quickly establish remote access points. Here is an example of an event graph generated for ️this Docker Hub image. Please note the geographic distribution of the bitcoin peer-to-peer nodes. Schedule a Demo Select a size Network traffic analysis Vulnerability scan ML classifier for malware Automated Pen-Test System event graph Get the latest insights from the experts A Guide to Upskilling Your Cloud Architects & Security Teams in 2023 Learn more Securing Cloud-Native Environments: Containerized Applications, Serverless Architectures, and Microservices Learn more Understanding and Preventing Kubernetes Attacks and Threats Learn more Choose a better way to manage your network

  • Turning Network Security Alerts into Action: Change Automation to the Rescue | AlgoSec

    Best practices for network security governance in AWS and hybrid network environments Webinars Turning Network Security Alerts into Action: Change Automation to the Rescue You use multiple network security controls in your organization, but they don’t talk to each other. And while you may get alerts that come with tools such as SIEM solutions and vulnerability scanners – in your security landscape, making the necessary changes to proactively react to the myriad of alerts is difficult. Responding to alerts feels like a game of whack-a-mole. Manual changes are also error-prone, resulting in misconfigurations. It’s clear that manual processes are insufficient for your multi-device, multi-vendor, and heterogeneous environment network landscape. What’s the solution? Network security change automation! By implementing change automation for your network security policies across your enterprise security landscape you can continue to use your existing business processes while enhancing business agility, accelerate incident response times, and reduce the risk of compliance violations and security misconfigurations. In this webinar, Dania Ben Peretz, Product Manager at AlgoSec, shows you how to: Automate your network security policy changes without breaking core network connectivity Analyze and recommend changes to your network security policies Push network security policy changes with zero-touch automation to your multi-vendor security devices Maximize the ROI of your existing security controls by automatically analyzing, validating, and implementing network security policy changes – all while seamlessly integrating with your existing business processes April 7, 2020 Dania Ben Peretz Product Manager Relevant resources Network firewall security management See Documentation Simplify and Accelerate Large-scale Application Migration Projects Read Document Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Secure your application delivery pipeline - AlgoSec

    Secure your application delivery pipeline Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Infographic a day in the life change management - AlgoSec

    Infographic a day in the life change management Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • MITRE attack framework

    MITRE ATT&CK offers an open source framework for understanding adversarial tactics, techniques, and common knowledge in use today. MITRE attack framework Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. What is the MITRE ATT&CK® framework? MITRE ATT&CK offers an open source framework for understanding adversarial tactics, techniques, and common knowledge in use today. It aggregates and catalogs cyber threats based on real-world adversary behavior observed across thousands of incidents, and outlines defenses to protect organizations against them. MITRE ATT&CK helps organizations understand how adversaries operate and guides them towards developing security measures to protect their assets and operations. Understanding the MITRE ATT&CK layout MITRE ATT&CK is organized into three matrices, each representing a dedicated technology domain: Enterprise Mobile Industrial control systems (ICS) Most organizations will use the enterprise matrix, which covers attacks against Windows, macOS, Linux, cloud platforms, network infrastructure, and containers. However, companies must first understand what malicious actors are seeking to achieve. Tactics The enterprise matrix opens to 14 columns representing adversary tactics, i.e., high-level goals: Initial access (getting in) through execution Reconnaissance Persistence Execution Privilege escalation Exfiltration and impact Next, comes the how. Techniques and Sub-Techniques Each tactic column leads to rows containing techniques and sub-techniques, i.e., specific methods for achieving a goal. The latest MITRE ATT&CK v18 features 8 to 47 techniques for each tactic. For example, under Reconnaissance, there are 11 techniques, including “Active Scanning” and “Phishing for Information.” Persistence lists techniques such as "Create Account" or "Boot or Logon Autostart Execution." Sub-techniques are nested within techniques for specific attack implementations. For instance, under "Phishing," you have "Spearphishing Attachment," "Spearphishing Link," "Spearphishing via Service," and “Spearphishing Voice.” This granularity is key, as you need a different technique to defend against phishing via email attachments than via compromised messaging platforms. MITRE ATT&CK Matrix The MITRE ATT&CK Matrix catalogs adversaries into groupings such as data sources, cyber threat intelligence (CTI) groups, and defense strategies. This allows users to filter their navigation to specific adversaries, tools, and campaigns relevant to their business operations. MITRE ATT&CK is constantly updated as adversaries and their tactics, techniques, and procedures (TTPs) evolve. Each version has new features based on empirical threat intelligence, incident response findings, and community research. This is especially important in the face of emerging threat trends, such as AI-assisted cyberattacks and the growth of ransomware-as-a-service (RaaS). Benefits of the MITRE ATT&CK framework MITRE ATT&CK doesn’t simply offer threat intelligence but also shapes organizations’ security operations for multiple use cases: Threat intelligence gathering: Gain context for cloud indicators of compromise (IOCs); beyond "bad IP address detected," know if the address is associated with a specific technique adversaries use for command and control. Threat hunting: Use a hypothesis-driven approach to systematically hunt for evidence of specific techniques used, instead of randomly searching logs. Attack simulation and red team exercises: Leverage real-world, standardized playbooks for testing both offensive capabilities and defensive responses; map your red team's successful tactics against your blue team's detection rates to identify coverage gaps with precision. Gap analysis: Visualize which techniques you can detect, which you can prevent, and most importantly, which represent blind spots in your security architecture. Response validation: Test whether your incident response procedures actually work against the techniques most relevant to your threat profile. The use cases above are a proof of concept, but the bottom line is the actual benefits companies reap from them: Shared understanding of the threat landscape: MITRE ATT&CK offers a common language for discussing adversaries across technical teams, executives, and even board members. Accurate simulation of attacks and validation of defenses: Mapped exercises tell you whether you can detect and respond to techniques adversaries actually use. Informed development and deployment of security policies: Craft policies that specifically address the techniques most relevant to your business risk profile. Intelligent selections of security solutions: Ask vendors which ATT&CK techniques they address and check those claims against your coverage gaps. Best practices for MITRE ATT&CK mapping The MITRE ATT&CK framework's value comes from mapping security data to specific ATT&CK techniques. But mapping without context is like having a map without knowing your starting location; it’s technically interesting, but operationally useless. The CISA best practices guide identifies two fundamental approaches to ATT&CK mapping: Mapping into finished reports (creating security insights for decision-making) Mapping into raw data (embedding ATT&CK context into operational security workflows). Understanding which approach fits your business needs is crucial. Mapping MITRE ATT&CK into finished reports This approach starts with collating incident reports, threat intelligence, or post-mortem analyses, extracting behavioral patterns, and then translating them into ATT&CK language. This creates artifacts that inform security strategy, resource allocation, and executive communication. The process follows six steps: Find the behavior. Identify specific actions the adversary took. Look beyond IoCs, such as malware names and IP addresses, to “how the adversary interacted with specific platforms and applications.” Research the behavior. Was this a standard administrative task gone rogue or a sophisticated persistence mechanism? Investigate the original source, technical details, timing, and surrounding activity. Consult malware analysis reports from reliable organizations, security reports, or your own forensic data. Translate the behavior into a tactic. Map the identified behavior to one of the tactics in the MITRE framework. Identify the technique used for the tactic. For example, within the Execution tactic, scan for the technique that best describes the method. ATT&CK provides detailed descriptions for each technique to help you map to the right one. Identify the sub-techniques. Was it a Windows scheduled task? A Linux Cron job? The sub-technique matters because detection and mitigation strategies for each differ significantly. Compare results to those of other analysts. CISA recommends that analysts treat mapping as a team sport where they work together to identify ATT&CK techniques and ensure quality control. Different analysts examining the same behavior should arrive at the same ATT&CK mapping. Mapping MITRE ATT&CK into raw data While finished reports inform strategy, mapping into raw data enables operations. This approach embeds ATT&CK context directly into your detection engineering, threat hunting, and daily security workflows. Organizations can choose from three viable starting points, each suited to different operational scenarios. 1. Start with a data source A specific data source , say, authentication logs from your cloud identity provider, allows you to see what ATT&CK techniques generate observable activity in these logs. For authentication logs, you would map to techniques like "Valid Accounts," "Brute Force," and "Credential Stuffing." You would then define procedures, i.e., the specific log patterns that indicate these techniques in action. This approach is ideal when deploying new data sources or optimizing existing ones. 2. Start with specific tools or attributes If threat intelligence indicates adversaries targeting your industry are using a specific software , malware family, or penetration testing tool, you can start mapping from there. After identifying techniques that the tool enables, you can then look up the groups and campaigns that have implemented these techniques. Cobalt Strike (S0154) , for example, maps to dozens of techniques across multiple tactics. By understanding this breadth, you can develop ways of identifying not just the tool itself but the behaviors it facilitates. 3. Start with analytics Just as adversaries use software to target businesses, analysts can use cloud enterprise tools to track adversary behavior. SIEM platforms like the AlgoSec Cloud Enterprise (ACE) have built-in detection rules that collect, log, and correlate events from multiple endpoints, cloud services, and identity providers. These events originate as raw telemetry, which are then mapped to specific MITRE ATT&CK techniques. Mapping with detection analytics from such tools is increasingly the most practical approach for organizations with mature security tooling. Note: Mapping into raw data shouldn't exist in isolation. Operational mappings should ultimately feed into finished reports. Your day-to-day detection analytics reveal what you're actually seeing in your environment. These observations, aggregated and analyzed over time, become the foundation for strategic reporting. How to ACE your operations with the MITRE ATT&CK framework Enterprises generate millions of security events daily across cloud infrastructure, endpoints, network boundaries, and SaaS applications. With this deluge, it is unreasonable to expect analysts to hand-map behaviors. Enter AlgoSec Cloud Enterprise (ACE), a cloud enterprise tool that offers full visibility into your operations by collecting log data, aggregating and contextualizing it, and then mapping it automatically to MITRE ATT&CK techniques. This transforms raw telemetry streams into structured threat intelligence aligned with the MITRE ATT&CK framework. ACE’s finished reports provide a clear, risk-oriented view of your adversary exposure, using language that every analyst and decision-maker can understand. See why more than 2,200 companies trust AlgoSec. Schedule a demo today. Get the latest insights from the experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • 솔루션 | Algosec

    Securely accelerate application delivery by automating application connectivity and security policy across the hybrid network estate. 솔루션 환영합니다! 클라우드 보안 통제 및 사내 구축 방화벽에 대한 네트워크 보안 정책의 관리는 세심한 균형을 요하는 작업입니다. 한편으로 공격 범위(attack surface)라고 불리는 외부 위협에 대한 노출을 최소화하여 리스크를 줄여야 하며, 다른 한편으로는 중요한 비즈니스 애플리케이션에 대한 연결성을 제공함으로써 생산성을 향상시켜야 합니다. 하지만, 네트워크 보안 정책 관리 프로세스는 늘 복잡하고 오류가 많아 시간 소모적이었습니다. 이제는 더 이상 그럴 필요가 없습니다. AlgoSec은 사내 (On-premise) 및 클라우드 상의 네트워크 보안 정책 관리를 간소화하고 자동화하여 기업의 민첩성과 보안을 강화하고 언제나 규정을 준수하는 환경을 제공합니다. 보안 정책 관리에 대한 독자적인 라이프사이클 접근방식 AlgoSec은 보안 정책 라이프사이클을 전반적으로 관리하여 고객의 비즈니스 애플리케이션에 대한 지속적이며 안전한 연결성을 제공한다는 점에서 독보적입니다. 단일 창을 통해 애플리케이션 연결성 요구사항을 자동으로 검색할 수 있고, 리스크를 사전에 분석하며, 네트워크 보안 변경 계획을 신속하게 수립하여 실행할 수 있으며 방화벽 규칙을 안전하게 제거할 수 있습니다. 아울러, 고객의 이기종 환경 전반에 걸쳐 이 모든 작업이 완벽히 조화를 이루어 자동으로 원활하게 이루어집니다. AlgoSec 솔루션을 이용하면 클라우드, SDN, 사내망 (on-premise)에 걸쳐 네트워크 보안 정책관리를 통합 할수 있습니다 지속적으로 규제를 준수하고, 방화벽 감사 준비에 소요되는 시간과 비용을 현저히 줄일 수 있습니다 신속하고 안전하게 애플리케이션 연결성을 제공하고, 네트워크 관련 가동중단을 방지할 수 있습니다 보안, 네트워크 및 애플리케이션 팀 간의 연계와 DevSecOps를 발전시킵니다 방화벽 변경 관리를 자동화하고 구성 오류를 제거할 수 있습니다 정확한 보안 구성 및 효과적인 네트워크 분할 을 통해 리스크를 줄일 수 있습니다 솔루션 보안 정책 네트워크 분석 더 많은 정보 AlgoSec Firewall Analyzer 보안 정책 변경 자동화 더 많은 정보 AlgoSec FireFlow ROI 계산기 AlgoSec 솔루션 브로슈어 문의하기 Algosec Korea 탁정수 지사장 Phone: +82-10-8994-7121
Email: [email protected] Algosec Korea 정욱 이사 (Sales Engineer) Phone: +82-10-9953-5717
Email: [email protected] 관련 링크 AlgoSec 솔루션 브로슈어 Schedule time with one of our experts

  • Palo Alto and AlgoSec Joint Solution Brief - AlgoSec

    Palo Alto and AlgoSec Joint Solution Brief Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Partner solution brief AlgoSec and Zscaler - AlgoSec

    Partner solution brief AlgoSec and Zscaler Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • How to modernize your infrastructure without neglecting your security | AlgoSec

    how can you elevate digital transformation and cloud migration efforts, without neglecting your security Does it have to be one or the other, and if not, what steps should be taken in your transformation journeys to ensure that network security remains a priority Webinars Intelligent change automation for your Cisco environment and beyond Learn how transitioning to application-centric intelligent automation can save time and resources Managing modern network environments has become increasingly complex in a multi-cloud, multi -vendor environment. Network policy change implementation and ensured application connectivity also become harder in a siloed network. Transitioning to application-centric intelligent automation can save time and resources that can be shifted towards your company’s core objectives. In this webinar we show you how you can: • Accelerate application delivery through intelligent change automation • Remove blind spots in your network • Focus on the critical risks the matter • Bake hardened security policies into your application delivery pipeline January 17, 2023 Avivi Siman Tov Director of Product Jacqueline Basil Product Marketing Manager Relevant resources Automate the entire security policy change management process with zero touch Watch Video Increasing Cisco ACI adoption with AlgoSec Keep Reading Change Management A Day In The Life Read Document Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Master the Zero Trust strategy for improved cybersecurity | AlgoSec

    Learn best practices to secure your cloud environment and deliver applications securely Webinars Master the Zero Trust strategy for improved cybersecurity Learn how to implement zero trust security into your business In today’s digital world, cyber threats are becoming more complex and sophisticated. Businesses must adopt a proactive approach to cybersecurity to protect their sensitive data and systems. This is where zero trust security comes in – a security model that requires every user, device, and application to be verified before granting access. If you’re looking to implement zero trust security in your business or want to know more about how it works, you’ll want to watch this webinar. AlgoSec co-Founder and CTO Avishai Wool will discuss the benefits of zero trust security and provide you with practical tips on how to implement this security model in your organization. March 15, 2023 Prof. Avishai Wool CTO & Co Founder AlgoSec Relevant resources Protecting Your Network’s Precious Jewels with Micro-Segmentation, Kyle Wickert, AlgoSec Watch Video Professor Wool - Introduction to Microsegmentation Watch Video Five Practical Steps to Implementing a Zero-Trust Network Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec Teams with TD SYNNEX to Take Partner and Customer Service to New Heights

    The new alliance is designed to meet the growing needs of AlgoSec’s partners and customers to maintain their competitiveness by delivering enhanced services AlgoSec Teams with TD SYNNEX to Take Partner and Customer Service to New Heights The new alliance is designed to meet the growing needs of AlgoSec’s partners and customers to maintain their competitiveness by delivering enhanced services October 2, 2022 Speak to one of our experts RIDGEFIELD PARK, N.J., October 3, 2022 – AlgoSec, a global cybersecurity leader in securing application connectivity, has announced its new alliance with TD SYNNEX, a leading global distributor and solutions aggregator for the IT ecosystem. This partnership will enable AlgoSec’s partners to leverage a whole host of customer-centric resources. These include extended partner support and key customer touchpoint services through TD SYNNEX’s expansive distribution channels. AlgoSec partners working through TD SYNNEX Security Solutions will benefit from: Expedited SLAs on all AlgoSec quotes and orders within less than one business day Quarter-end extended hours Access to a dedicated AlgoSec Product Manager from SYNNEX AlgoSec Partners will still have AlgoSec Channel Managers. In addition, AlgoSec customers will enjoy an enhanced service offering, including: Hands-on cybersecurity expertise through TD SYNNEX Cyber Range Dedicated security focused team Pre-sales engineering support Vulnerability assessments, Bill of Materials (BoM), design Proof of Concept (PoC) “We are excited to add AlgoSec to our portfolio of products. Securing applications and managing policy management across hybrid networks is a major challenge for IT teams.” said Scott Young, Sr. Vice President, Strategic Procurement, TD SYNNEX. Jim Fairweather, AlgoSec VP Channels adds “I am fully confident that our partnership with TD SYNNEX will enable our channel partners to accelerate time to market and improve overall support to meet customer demands”. About AlgoSec  AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity by automating connectivity flows and security policy, anywhere.  The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.   AlgoSec’s patented application-centric view of the hybrid network enables business owners, application owners, and information security professionals to talk the same language, so organizations can deliver business applications faster while achieving a heightened security posture.  Over 1,800 of the world’s leading organizations trust AlgoSec to help secure their most critical workloads across public cloud, private cloud, containers, and on-premises networks, while taking advantage of almost two decades of leadership in Network Security Policy Management.  See what securely accelerating your digital transformation, move-to-cloud, infrastructure modernization, or micro-segmentation initiatives looks like at www.algosec.com About TD SYNNEX TD SYNNEX (NYSE: SNX) is a leading global distributor and solutions aggregator for the IT ecosystem. We’re an innovative partner helping more than 150,000 customers in 100+ countries to maximize the value of technology investments, demonstrate business outcomes and unlock growth opportunities. Headquartered in Clearwater, Florida, and Fremont, California, TD SYNNEX’ 22,000 co-workers are dedicated to uniting compelling IT products, services and solutions from 1,500+ best-in-class technology vendors. Our edge-to-cloud portfolio is anchored in some of the highest-growth technology segments including cloud, cybersecurity, big data/analytics, IoT, mobility and everything as a service. TD SYNNEX is committed to serving customers and communities, and we believe we can have a positive impact on our people and our planet, intentionally acting as a respected corporate citizen. We aspire to be a diverse and inclusive employer of choice for talent across the IT ecosystem. For more information, visit www.TDSYNNEX.com or follow us on Twitter , LinkedIn , Facebook and Instagram .

bottom of page