top of page

Search results

612 results found with an empty search

  • BT | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Bt Streamlines Firewall Change Control And Proves Compliance Across Its Global Networks Organization BT Industry Telecom Headquarters London, UK Download case study Share Customer
success stories "AlgoSec now does the heavy lifting for us. It allows the engineers to focus more on providing greater levels of security than on process and change, so we’re able to provide a much more secure infrastructure for BT" Background A leading world-wide provider of communications services and solutions, BT serves customers in more than 170 countries. Its principal activities include the provision of networked IT services globally; local, national and international telecommunications services for use at home, at work and on the move; broadband, TV and internet products and services; and converged fixed/mobile products and services. Challenge BT’s internal network is a complex, highly segmented environment that has evolved over the last two decades throughout its worldwide locations. BT’s infrastructure relies on a large number of third-party domains and business-to-business connections with over 1,000 policy enforcement points, some of which date back a number of years.“The challenge facing BT is around the size of the estate, the complexity and our ability to demonstrate at audit that the rules within the policy are still appropriate, still valid, and still authorized,” says Phil Packman, General Manager of Security Gateway Operations for BT. “Equally, we’re challenged to ensure that rules don’t make it into the rulebase unless they’re approved and authorized.” BT therefore realized that it needed automation and reporting to better control its massive rulebase, and provide an approved audit trail to both auditors and internal stakeholders. Solution BT set about to solve its security challenges by creating a set of criteria for evaluating off-the-shelf, automated security solutions. “The criteria were based on ‘total costof ownership,’ our roadmap, and probably most importantly, the willingness of the partner to work with us,” says Packman. AlgoSec uniquely met BT’s requirements.Another feature BT liked was AlgoSec’s ability to prove that policies are implemented as approved. According to Packman, this was a capability “which we’d not seen in other products, and which we couldn’t achieve with our in-house tools.”AlgoSec’s commitment to customer success and its money-back guarantee were also deciding factors in BT’s selection process. Results Immediately after deployment, AlgoSec enabled BT to reduce error rates, make improvements to their rulebase implementation process and ultimately give BT better control over its network security. Packman explains: “Most notably, we were able to track down rogue connectivity, or connectivity that we didn’t understand properly. It gave us an almost immediate view of certain high-risk situations.”In addition, by using AlgoSec’s compliance reports, Packman’s engineering team were able to instantly demonstrate that no rules could be added to the firewall policy without proper approval — saving countless hours.Simplifying the audit preparation process led to a surprise benefit for BT’s Security Gateway Operations Team, which performs rule implementation and authorization: “AlgoSec has allowed us to change the skills profile of the team because the tool does the heavy lifting for us. Now our engineers can focus more on providing greater levels of security than on process and change, so we’re able to provide a much more secure infrastructure for BT.”Packman also endorses AlgoSec’s customer service, stating that the relationship has been a very positive one. “This has really helped put our minds at rest. We believe we’ve done the right thing in terms of deploying AlgoSec.”Using AlgoSec continues to enable BT to manage the complexity of its network with confidence, as it pursues growing and competitive global markets for its IT, computing, and communications services. Packman summarizes: “We have met every objective we hoped to achieve with AlgoSec.” Schedule time with one of our experts

  • 5 power tips to keep your network secure in 2021 | AlgoSec

    Discover five essential tips for securing your network in 2021 with Algosec's network security experts. Webinars 5 power tips to keep your network secure in 2021 No one could have predicted how unpredictable 2020 would be, so we’re here to help you get prepared for whatever is in store in 2021. No matter what happens in the upcoming year – there are five things you can do now to keep your network secure in 2021. Join network security experts Jade Kahn and Asher Benbenisty, and learn how to: Never fly blind: Ensure visibility across your entire hybrid network Do more with less: Accelerate digital transformation & avoid misconfigurations with automation Stay continuously compliant Fight ransomware with micro-segmentation Accelerate in the cloud January 13, 2021 Jade Kahn CMO Asher Benbenisty Director of product marketing Relevant resources 5 Network Security Management Predictions for 2020 Watch Video Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Discovery | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Discovery Streamlines Firewall Audits And Simplifies The Change Workflow Organization Discovery Industry Financial Services Headquarters Johannesberg, South Africa Download case study Share Customer
success stories "With AlgoSec we can now get, in a click of a button, what took two to three weeks per firewall to produce manually" Background Discovery Limited is a South African-founded financial services organization that operates in the healthcare, life assurance, short-term insurance, savings and investment products and wellness markets. Founded in 1992, Discovery was guided by a clear core purpose — to make people healthier and to enhance and protect their lives. Underpinning this core purpose is the belief that through innovation, Discovery can be a powerful market disruptor. The company, with headquarters in Johannesburg, South Africa, has expanded its operations globally and currently serves over 4.4 million clients across South Africa, the United Kingdom, the United States, China, Singapore and Australia.Operating in the highly regulated insurance and health sectors, Discovery monitors its compliance with international privacy laws and security criteria, includingPCI-DSS globally, Sarbanes-Oxley and HIPAA in the US, the Data Protection Act in the UK, and South Africa’s Protection of Personal Information Act. Challenge During its early years, the company managed its firewalls through an internally developed, legacy system which offered very limited visibility into the change request process.“We grew faster than anyone expected,” says Marc Silver, Security Manager at Discovery. “We needed better visibility into what changes were requested to which firewall, for what business need and also to ensure proper risk analysis.”Discovery’s growth necessitated a rapid increase in the number of firewalls deployed, and the corresponding ruleset sizes. The time required to audit them grew by orders of magnitude, ultimately taking up to three weeks per firewall. The IT Security team of four engineers recognized that it needed a fresh approach to manage risk and ensure compliance. Solution Discovery chose the AlgoSec Security Management Solution to deliver automated, comprehensive firewall operations, risk analysis and change management. Silver states that compared to AlgoSec’s competitors, “AlgoSec has a more tightly integrated change control, and is easier to manage. Another big advantage is how it finds unused rules and recommends rule consolidations,” says Silver.AlgoSec’s integration with Request Tracker (RT) change management system was also important in Discovery’s selection of a security management solution. “We use RT for our internal ticketing system, and the stability of AlgoSec’s integration with RT met our requirements. AlgoSec’s visual workflow is clear, easy to understand and more mature than the others we evaluated,” adds Silver. Results Since implementing AlgoSec, Discovery has found its security audits running more effectively. Discovery relies on AlgoSec’s built-in compliance reports to address Sarbanes-Oxley, HIPAA, PCI-DSS, and other national and international regulatory requirements. “Every year internal auditors would take our entire rulesets for each firewall pair and tell us where we needed to make improvements. AlgoSec now allows us to submit an automated report to our auditing team. It tells them what our security state is, and what needs to be remediated. The total process used to take three months. Now, in a click of a button, we can get what took two to three weeks per firewall to produce manually,” says Silver.Discovery has also found an unexpected advantage: “AlgoSec tells us what rules are in use and what rules are not. For one firewall, we were able to remove 30,000 rules. A firewall with 500,000 rules isn’t going to cope as well as one with 100,000 rules. By optimizing our devices, AlgoSec saves us money in the long term by enabling us to delay upgrading to a larger firewall,” adds Silver.In conclusion, Silver states that “Now we can see what is and isn’t happening in our security system. It has made a much bigger impact than we thought it would. With AlgoSec’s policy optimization, and the time we save on compliance, AlgoSec has given us a much stronger competitive edge than we had six months ago.” Schedule time with one of our experts

  • AlgoSec Achieves Outperformer Status in GigaOm’s Cloud Network Security Radar Report

    AlgoSec leads in automating application connectivity and security policy management, essential for complex hybrid and multi-cloud networks AlgoSec Achieves Outperformer Status in GigaOm’s Cloud Network Security Radar Report AlgoSec leads in automating application connectivity and security policy management, essential for complex hybrid and multi-cloud networks February 15, 2024 Speak to one of our experts RIDGEFIELD PARK, N.J., Feb 15, 2024 – Global cybersecurity leader AlgoSec has been named a Market Outperformer in GigaOm’s first cloud network security Radar Report, recognizing its position at the forefront of Cloud security innovation. The GigaOm Radar report highlights key cloud network security vendors to equip IT decision-makers with the information they need to select the best fit for their business. It measures selected vendors based on their execution and ability to innovate. In the report, Andrew Green, IT writer and practitioner, acknowledged several of AlgoSec’s distinguishing capabilities including Automation and Security Policy Management: “AlgoSec automates application connectivity and security policy across the hybrid network estate including public cloud, private cloud, containers, and on-premises networks.” Comprehensive Solution Suite : “AlgoSec delivers cloud network security solutions via its Firewall Analyzer, FireFlow, and AlgoSec Cloud products. AlgoSec Cloud provides application-based risk identification and security policy management across multi-cloud environments.” Real-Time Network Mapping : “A real-time network map provides a comprehensive view and connectivity flows of security and networking appliances such as firewalls, routers, and switches.” Other highlights from the report include infrastructure as code (IaC) security scanning capability, which produces “what-if” risks and vulnerability analysis scans within existing source control applications, and AlgoBot, an intelligent chatbot that assists with change management processes. Green said: “Network security policy managers have a distinct set of features, with particularly strong observability, misconfiguration, and simulation capabilities. These solutions are less invasive as they orchestrate only existing appliances without imposing architectural changes, and they can help enterprises reach the low-hanging fruit for improving their security posture. AlgoSec offers a range of innovative developments, including AlgoBot, which helps with change management processes, and the solution’s capabilities for planning and simulations.” “We are at the forefront of a pivotal shift within cloud network security”, said Eran Shiff, VP Product at AlgoSec. “To effectively address the needs of businesses working in a complex hybrid world, we are disregarding conventional norms and operating deep within the cloud application level. By understanding the business context and purpose of every application, we are enabling our customers to gain visibility, reduce overall risk and process hundreds of application changes with zero-touch across a hybrid network. Our inclusion in this report is a testament of this evolution and marks a new chapter in securing application connectivity.” AlgoSec is trusted by more than 1,800 of the world’s leading organizations including NCR Corporation, a leading global point-of-sale (POS) provider for restaurants, retailers, and banks and a provider of multi-vendor ATM software. Commenting on the partnership, Scott Theriault, Global Manager, Network Perimeter Security at NCR said: “As we aspire to achieve zero-trust, when moving into the cloud, micro-segmentation and container security come into play. Therefore, we need tools like AlgoSec to assist us in the journey because most application owners do not know what access is needed. This tool helps them learn what needs to be implemented to reduce the attack surface,” stated Theriault. About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more than 1,800 of the world’s leading organizations, AlgoSec’s application-centric approach enables to securely accelerate business application deployment by centrally managing application connectivity and security policies across the public clouds, private clouds, containers, and on-premises networks. Using its unique vendor-agnostic deep algorithm for intelligent change management automation, AlgoSec enables acceleration of digital transformation projects, helps prevent business application downtime and substantially reduces manual work and exposure to security risks. AlgoSec’s policy management and CNAPP platforms provide a single source for visibility into security and compliance issues within cloud-native applications as well as across the hybrid network environment, to ensure ongoing adherence to internet security standards, industry, and internal regulations. Learn how AlgoSec enables application owners, information security experts, DevSecOps and cloud security teams to deploy business applications up to 10 times faster while maintaining security at www.algosec.com . About GigaOm GigaOm provides technical, operational, and business advice for strategic digital enterprise and business initiatives. Enterprise business leaders, CIOs, and technology organizations partner with GigaOm for practical, actionable, strategic, and visionary advice for modernizing and transforming their business. GigaOm’s advice empowers enterprises to successfully compete in an increasingly complicated business atmosphere that requires a solid understanding of constantly changing customer demands. GigaOm works directly with enterprises both inside and outside of the IT organization to apply proven research and methodologies designed to avoid pitfalls and roadblocks while balancing risk and innovation. Research methodologies include but are not limited to adoption and benchmarking surveys, use cases, interviews, ROI/TCO, market landscapes, strategic trends, and technical benchmarks. Our analysts possess 20+ years of experience advising a spectrum of clients from early adopters to mainstream enterprises. GigaOm’s perspective is that of the unbiased enterprise practitioner. Through this perspective, GigaOm connects with engaged and loyal subscribers on a deep and meaningful level.

  • Life Insurance | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Leading Life Insurance Company Ensures Security and Compliance Organization Life Insurance Industry Financial Services Headquarters Texas, USA Download case study Share Customer
success stories "AlgoSec worked right out of the box. We got started quickly and never looked back.” A leading insurance provider of life, disability and other benefits for individuals increases efficiency and ensures continuous compliance on their networks. Background This life insurance company provides insurance and wealth-management products and services to millions of Americans. The company employs thousands of people and maintains a network of several thousand financial representatives. They offer a wide range of insurance products and services that include life insurance, disability income insurance, annuities, investments, dental and vision. Challenges For decades, the company operated a large and growing data center in Bethlehem, PA which they recently transferred to Dallas, TX. During and since the transfer, the company has been replacing much of its multi-vendor network infrastructure, consolidating on Cisco Firepower technology, but still maintaining vestiges of other routers, firewalls and network equipment. At the new data center, the company’s IT staff maintains more than 100 firewalls that host some 10,000 rules. The company’s network security engineer described the considerable pressure on the security staff: “Change requests are frequent, 25-30 per week, demanding considerable time and effort by the security team.” Due to the presence of firewalls from multiple vendors, change requests were analyzed manually and pushed to devices with great care so as not to interrupt the operation of a rapidly growing body of applications. “The change–request process was tedious and very time consuming,” declared the engineer. “as was the pressure to maintain a strong compliance posture at all times.” The company is subject to a litany of demanding insurance-industry regulations that concern the care of personal information and processes. Managing risk is critical to the success of the business and being able to ascertain compliance with regulations is always vital. Solution The security team turned to AlgoSec to help them manage network security policy across the large data center that includes firewalls from multiple vendors. After a careful review, the security team acquired AlgoSec’s Firewall Analyzer to speed up the process of firewall change management as well as to continuously quantify the degree of compliance and level of risk. Vendor-agnostic AlgoSec Firewall Analyzer delivers visibility and analysis of complex network security policies across on–premise and cloud networks. It automates and simplifies security operations including troubleshooting, auditing and risk analysis. Firewall Analyzer optimizes the configuration of firewalls, routers, web proxies and related network infrastructure to ensure security and compliance. Results After a very short installation and learning period, the security staff became proficient at operating Firewall Analyzer’s helpful capabilities. Soon thereafter, staff members undertook AlgoSec certification courses to become experts in using the solution for firewall analysis. “AlgoSec worked right out of the box,” said the engineer. “We got started quickly and never looked back.” The AlgoSec solution has significantly improved processes, delivering significantly improved results for their security team: Reduced time to analyze and optimize firewall rules, automatically checking for shadow rules and discovering other rules eligible for consolidation or deletion. Continual optimization of firewall rules across their entire network estate. Increased efficiency of security staff, enabling them to keep up with the volume of change requests. Accelerated and more accurate change verification. Audit-readiness, generating scheduled and on-demand compliance reports. The security staff looks forward to implementing AlgoSec FireFlow (AFF), that will enable them to push changes automatically to their population of firewalls, eliminating errors and further reducing risk. With AFF, the staff will be able to respond to changing business requirements with increased speed and agility. They added: “We are also checking out AlgoSec’s new cloud-security solution since we are migrating a growing number of applications to AWS.” Schedule time with one of our experts

  • AlgoSec | Router Honeypot for an IRC Bot

    In our previous post we have provided some details about a new fork of Kinsing malware, a Linux malware that propagates across... Cloud Security Router Honeypot for an IRC Bot Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. glibc_2 Tags Share this article 9/13/20 Published In our previous post we have provided some details about a new fork of Kinsing malware, a Linux malware that propagates across misconfigured Docker platforms and compromises them with a coinminer. Several days ago, the attackers behind this malware have uploaded a new ELF executable b_armv7l into the compromised server dockerupdate[.]anondns[.]net . The executable b_armv7l is based on a known source of Tsunami (also known as Kaiten), and is built using uClibc toolchain: $ file b_armv7l b_armv7l: ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), dynamically linked, interpreter /lib/ld-uClibc.so.0, with debug_info, not stripped Unlike glibc , the C library normally used with Linux distributions, uClibc is smaller and is designed for embedded Linux systems, such as IoT. Therefore, the malicious b_armv7l was built with a clear intention to install it on such devices as routers, firewalls, gateways, network cameras, NAS servers, etc. Some of the binary’s strings are encrypted. With the help of the HexRays decompiler , one could clearly see how they are decrypted: memcpy ( &key, "xm@_;w,B-Z*j?nvE|sq1o$3\"7zKC4ihgfe6cba~&5Dk2d!8+9Uy:" , 0x40u ) ; memcpy ( &alphabet, "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ. " , 0x40u ) ; for ( i = 0; i < = 64; ++i ){ if ( encoded [ j ] == key [ i ]) { if ( psw_or_srv ) decodedpsw [ k ] = alphabet [ i ] ; else decodedsrv [ k ] = alphabet [ i ] ; ++k; }} The string decryption routine is trivial — it simply replaces each encrypted string’s character found in the array key with a character at the same position, located in the array alphabet. Using this trick, the critical strings can be decrypted as: Variable Name Encoded String Decoded String decodedpsw $7|3vfaa~8 logmeINNOW decodedsrv $7?*$s7

  • AlgoSec | Zero Trust Design

    In today’s evolving threat landscape, Zero Trust Architecture has emerged as a significant security framework for organizations. One... Zero Trust Zero Trust Design Nitin Rajput 2 min read Nitin Rajput Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 5/18/24 Published In today’s evolving threat landscape, Zero Trust Architecture has emerged as a significant security framework for organizations. One influential model in this space is the Zero Trust Model, attributed to John Kinderbag. Inspired by Kinderbag’s model, we explore how our advanced solution can effectively align with the principles of Zero Trust. Let’s dive into the key points of mapping the Zero Trust Model with AlgoSec’s solution, enabling organizations to strengthen their security posture and embrace the Zero Trust paradigm. My approach of mapping Zero Trust Model with AlgoSec solution is based on John Kinderbag’s Zero Trust model ( details ) which being widely followed, and I hope it will help organizations in building their Zero trust strategy. Firstly, let’s understand what Zero trust is all about in a simple language. Zero Trust is a Cybersecurity approach that articulates that the fundamental problem we have is a broken trust model where the untrusted side of the network is the evil internet, and the trusted side is the stuff we control. Therefore, it is an approach to designing and implementing a security program based on the notion that no user or device or agent should have implicit trust. Instead, anyone or anything, a device or system that seeks access to corporate assets must prove it should be trusted. The primary goal of Zero Trust is to prevent breaches. Prevention is possible. In fact, it’s more cost effective from a business perspective to prevent a breach than it is to attempt to recover from a breach, pay a ransom, and the deal with the costs of downtime or lost customers. As per John Kinderbag, there are Four Zero Trust Design Principles and Five-Step Zero Trust Design Methodology. The Four Zero Trust Design Principles: The first and the most important principle of your Zero Trust strategy is know “What is the Business trying to achieve?”. Second, start with DAAS (Data, Application, Asset and Services) elements and protect surfaces that need protection and design outward from there. Third, determine who needs to have access to a resource in order to get their job done, commonly known as least privilege. Fourth, all the traffic going to and from a protect surface must be inspected and logged for malicious content. Define Business Outcomes Design from the inside out Determine who or what needs access Inspect and log all traffic The Five-Step Zero Trust Design Methodology To make your Zero trust journey achievable, you need a repeatable process to follow. The first step in the Zero trust is to break down your environment into smaller pieces that you need to protect (protect surfaces). The second step for deploying Zero Trust in each protect surfaces is to map the transactions flows so that we can allow only the ports and the address needed and nothing else. Everyone wants to know what products to buy to do Zero trust or to eliminate trust between digital systems, the truth is that you won’t know the answer to that until you’ve gone through the process. Which brings us to the third step in the methodology: architecting the Zero trust environment. Ultimately, we need to instantiate Zero Trust as a Layer 7 policy statement. Use the Kipling Method of Zero Trust policy writing to determine who or what can access your protect surface. The fifth design principle of Zero Trust is to inspect and log all traffic, for monitor and maintain, one needs to take all of the telemetry – whether it’s from a network detection and response tool, or from firewall or server application logs and then learn from them. As you learn over time, you can make security stronger and stronger. Define the protect surface Map the transaction flows Architect a Zero trust environment Create Zero trust policies Monitor and maintain. How AlgoSec aligns with “Map the transaction Flows” the 2nd step of Design Methodology? AlgoSec Auto-Discovery. analyses your traffic flows, turning them into a clear map. AutoDiscovery receives network traffic metadata as NetFlow, SFLOW, or full packets and then digest multiple streams of traffic metadata to let you clearly visualize your transaction flows. Once the transaction flows are discovered and optimized, the system keeps tracking changes in these flows. Once new flows are discovered in the network, the application description is updated with the new flows. Outcome: Clear visualization of transaction flows. Updated application description. Optimized transaction flows. How AlgoSec aligns with “Architect Zero Trust Policies” – the 4th step of Design Methodology? With AlgoSec, you can automate the security policy change process without introducing any element of risk, vulnerability, or compliance violation. AlgoSec allows you to ingest the discovered transaction flows as a Traffic Change request and analyze those traffic changes before they are implemented all the to your Firewalls, Public Cloud and SDN Solutions and validate successful changes as intended, all within your existing IT Service Management (ITSM) solutions. Outcome: Analyzed traffic changes for implementation. Implemented security policy changes without risk, vulnerability, or compliance violations. How Algosec aligns with “Monitor and maintain” – the 5th step of Design Methodology? AlgoSec analyzes security by analyzing firewall policies, firewall rules, firewall traffic logs and firewall change configurations. Detailed analysis of the security logs offers critical network vital intelligence about security breaches and attempted attacks like virus, trojans, and denial of service among others. With AlgoSec traffic flow analysis, you can monitor traffic within a specific firewall rule. You do not need to allow all traffic to traverse in all directions but instead, you can monitor it through the pragmatic behaviors on the network and enable network firewall administrators to recognize which firewall rules they can create and implement to allow only the necessary access. Outcome: Critical network intelligence, identification of security breaches and attempted attacks. Enhanced firewall rule creation and implementation, allowing only necessary access. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • AlgoSec | Firewall migration tips & best practices

    It goes without saying that security is the cornerstone of any organization today. This includes ensuring access to corporate data is... Firewall Change Management Firewall migration tips & best practices Joanne Godfrey 2 min read Joanne Godfrey Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. firewallmigration Tags Share this article 8/18/14 Published It goes without saying that security is the cornerstone of any organization today. This includes ensuring access to corporate data is secured, connectivity to the data center from both internal and external users is secured, and that critical security updates are installed. Now comes the big question: what if you have to migrate your security policy to a new platform? With cloud computing and distributed data centers across the world nothing in technology is ever constant anymore. So how do you control and manage a firewall migration? What if you use multiple vendors’ solutions with both virtual and physical appliances? A firewall migration can be as simple as moving from one model to another, or a lot more complicated. As an experienced cloud architect, I’ve been a part of a number of firewall migration projects. Here are three tips to help make your firewall migration project a little bit easier. Create powerful firewall and security visibility map. All aspects of your firewall must be documented and well planned before doing a migration, and you must plan for both current as well as future needs. Start by gathering information: create a visual, dynamic map of your firewall architecture and traffic, which should include all technical connectivity data. Understand, document and prepare policy migration. Once you have your visual firewall map it’s time to look under the hood. One firewall might be easy, but is it ever really just one security appliance? The dynamic nature of the modern data center means that multiple security vendors can live under one roof. So how do you create a policy migration plan around heterogeneous platforms? You need to identify and document all the security policies and services and network algorithms for each firewall end-point. Analyze business impact and create a migration path. How do your applications interact with various security policies? Do you have specific business units relying on specific firewall traffic? How are various data centers being segmented by your security policies? Migrating a firewall will have a business-wide impact. You must ensure that this impact is absolutely minimal. You need to understand how your entire business model interacts with firewall and security technologies and if any piece of the business is forgotten technological headaches may be the least of your worries. Migrating a firewall doesn’t have to be hard, but it must be well planned. With so much information traversing the modern data center, it’s imperative to have complete visibility across the security architecture. Ultimately, with the right tools to help you plan, map and actually implement a firewall change process, and lots of cups of coffee, you can greatly reduce security migration complexity. #FirewallMigration Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • AlgoSec | Navigating the currents of cybersecurity trends

    I spend my days talking with customers and prospects around their security solutions, primarily regarding securing application... Hybrid Cloud Security Management Navigating the currents of cybersecurity trends Eric Jeffery 2 min read Eric Jeffery Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. cloudsecurity, hybridcloud, hybridcloudsecurity Tags Share this article 7/13/23 Published I spend my days talking with customers and prospects around their security solutions, primarily regarding securing application connectivity. Every conversation takes its own direction. Nevertheless, I hear similar challenges and goals across industries. I heard from a manufacturing firm that cost constraints require they centralize on Microsoft. An oil and gas company mentioned their needs to align their Operating Technology (OT) environment with their corporate technology solutions (IT). A healthcare organization let me know they were asked to use more Cisco technology and decommission competitive solutions. A financial services firm stated that they were looking to consolidate with zScaler thus eliminating numerous other security solutions. A second financial services firm inquired about AlgoSec Cloud offerings , so they ensure proper monitoring and security for their Cloud deployments. These themes appear and reappear daily, highlighting key trends throughout information security. The older I get, the more I understand how “the more things change, the more they stay the same.” Trends fall perfectly into this colloquialism, as we see organizations routinely move towards newer, hotter, and hopefully more powerful technologies. Working directly with customers of cybersecurity technology, I see similarities with direction and desire for future technical goals. Some of these I’ve seen before, such as centralization and consolidation. Cloud technologies have been around for a decade or more, but I consider this a current trend due to Cloud’s nature and diversity within the technology space. While specific trends come and go, the idea of trends remains the same. Cybersecurity professionals should understand current trends around the industry and see how these movements can improve their security maturity. In the fast-paced realm of cybersecurity, trends constantly emerge and evolve, shaping the landscape in which organizations operate. As I engage with customers and prospects, I uncover recurring patterns and goals that drive the industry forward. Understanding these trends is essential for cybersecurity professionals to strengthen their defenses and adapt to emerging threats. In this blog post, we will dive into the prevailing trends in cybersecurity today, providing insights to help organizations navigate the ever-changing currents. Centralization and consolidation: Empowering organizational control One significant trend is the movement towards centralization and consolidation. Centralization involves bringing technology resources into a unified location or under a cohesive solution. Consolidation focuses on streamlining vendors or technical suites to improve efficiency and reduce costs. For instance, organizations are exploring enterprise licensing options, such as those offered by Microsoft, which provide bundled services like MS Teams, O365, and MS Defender. This consolidation empowers businesses to replace multiple tools with integrated Microsoft technologies, resulting in cost savings and streamlined operations. Enterprise licensing grows in popularity (and could very well be a trend in and of itself) providing organizations an easy way to save money while using a consolidated solution. The most common enterprise license that I run into comes from Microsoft. Businesses that have certain license levels receive additional services such as MS Teams, O365, MS Defender, or other Microsoft technologies at either no or reduced cost. This capability empowers businesses to replace Zoom and WebEx with MS Teams. On the security front companies replace Crowdstrike, McAfee, Norton, and other endpoint protection solutions with MS Defender. For endpoint vulnerability management, Nexpose and Nessus see displacement by MS Defender Vulnerability Management. QRadar, Splunk, Exabeam and other SIEM lose out to Microsoft Sentinel. With a Cisco relationship, companies can potentially save money substituting Illumio or Guardicore in lieu of Cisco Secure Workload (formerly Tetration). With cost management sitting atop the list of priorities for CFO’s , consolidation is a consummate method for technology executives to align with this consideration. Consolidation trends reoccur regularly, especially during financial turmoil. Organizations looking to align technology with financial and business concerns should look to this trend and determine if/where benefits align. After consolidation, I hear a lot about centralization. While customers don’t use this word, at the core, this is what they are looking for. The main technical consideration around this consolidation falls under secure access services edge, known as SASE . SASE inherently centralizes security inside a robust environment that passes customer traffic. COVID-19 introduced a severe need to create secure solutions for remote workers. While SASE began pre-2020, the virus really launched this business (as it did with teleconferencing, a trend back in 2020 and 2021). Entities using SASE pass end user traffic through a central location which provides numerous security services. These offerings include virtual private networks (VPN), proxy, web-filtering, virus protection, spam protection, and many others. Each of these technologies also lends themselves to the consolidation trend tying both movements together. Organizations looking to cut costs procure SASE, align this with numerous information technology teams (networks, Cloud, security, etc.) and double up on trends. Embracing the power of the Cloud The Cloud has revolutionized the information technology landscape, and cyber security is no exception. Organizations are increasingly leveraging Cloud technology as part of their digital transformation journeys. From compliance to network security, application security, and identity management, the Cloud offers a multitude of benefits. It enables organizations to offload hardware maintenance, software upgrades, and data center costs while providing scalability and flexibility. My customers look to not only expand in single clouds, primarily AWS, MS Azure, and Google Cloud, they are going across Clouds creating hybrid deployments. Hybrid solutions enhance the need for security as cross deployments require extensive monitoring and review ensuring zero gaps. Cloud attacks happen more often than ever and with this trend continuing, industry must understand and secure these environments. The importance of staying informed To thrive in the ever-changing world of cyber security, professionals must stay informed about the latest trends. Whether it’s for cost optimization, enhanced security, or delivering innovative services, organizations need to be aware of opportunities to improve their information technology landscapes. Complacency can be detrimental, and understanding the current trends allows businesses to align their goals, enhance operational capacity, and safeguard their digital assets effectively. Centralization, consolidation, and Cloud technologies are at the forefront of today’s trends, offering organizations the means to grow, add value, and protect their data. In the dynamic realm of cyber security, staying ahead of the curve is crucial for organizations seeking to fortify their defenses. Centralization, consolidation, and Cloud technologies are driving the industry forward. By understanding and embracing these trends, businesses can align their strategies, enhance security postures, and capitalize on growth opportunities. As the currents of cyber security trends continue to shift, it’s essential to navigate these waters with agility and adaptability. By doing so, organizations can confidently steer towards success in the ever-evolving world of cyber security. For more information on hybrid cloud security, please check out the latest Managing Cybersecurity podcast. #cloudsecurity #hybridcloud #HybridCloudSecurity Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Cisco ACI & AlgoSec: Achieving Application-driven Security Across your Hybrid Network | AlgoSec

    Webinars Cisco ACI & AlgoSec: Achieving Application-driven Security Across your Hybrid Network As your network extends into hybrid and multi-cloud environments, including software-defined networks such as Cisco ACI, managing security policies within your hybrid estate becomes more and more complex. Because each part of your network estate is managed in its own silo, it’s tough to get a full view of your entire network. Making changes across your entire network is a chore and validating your entire network’s security is virtually impossible. Learn how to unify, consolidate, and automate your entire network security policy management including both within the Cisco ACI fabric and elements outside the fabric. In this session Omer Ganot, AlgoSec’s Product Manager, will discuss how to: Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it. Unify, consolidate, and automate your network security policy management, including elements within and outside of the Cisco ACI fabric. Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations February 5, 2020 Omer Ganot Product Manager Relevant resources AlgoSec Joins Cisco’s Global Price List Keep Reading Migrating and Managing Security Policies in a Segmented Data Center Keep Reading AlgoSec Cisco ACI App Center Demo Watch Video Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec | When change forces your hand: Finding solid ground after Skybox

    Hey folks, let's be real. Change in the tech world can be a real pain. Especially when it's not on your terms. We've all heard the news... When change forces your hand: Finding solid ground after Skybox Asher Benbenisty 2 min read Asher Benbenisty Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 3/3/25 Published Hey folks, let's be real. Change in the tech world can be a real pain. Especially when it's not on your terms. We've all heard the news about Skybox closing its doors, and if you're like a lot of us, you're probably feeling a mix of frustration and "what now?" It's tough when a private equity decision, like the one impacting Skybox, shakes up your network security strategy. You've invested time and resources in your Skybox implementation, and now you're looking at a forced switch. But here's the thing: sometimes, these moments are opportunities in disguise. Think of it this way: you get a chance to really dig into what you actually need for the future, beyond what you were getting from Skybox. So, what do you need, especially after the Skybox shutdown? We get it. You need a platform that: Handles the mess: Your network isn't simple anymore. It's a mix of cloud and on-premise, and it's only getting more complex. You need a single platform that can handle it all, providing clear visibility and control, something that perhaps you were looking for from Skybox. Saves you time: Let's be honest, security policy changes shouldn't take weeks. You need something that gets it done in hours, not days, a far cry from the potential delays you might have experienced with Skybox. Keeps you safe : You need AI-driven risk mitigation that actually works. Has your back : You need 24/7 support, especially during a transition. Is actually good : You need proof, not just promises. That's where AlgoSec comes in. We're not just another vendor. We've been around for 21 years, consistently growing and focusing on our customers. We're a company built by founders who care, not just a line item on a private equity spreadsheet, unlike the recent change that has impacted Skybox. Here's why we think AlgoSec is the right choice for you: We get the complexity : Our platform is designed to secure applications across those complex, converging environments. We're talking cloud, on-premise, everything. We're fast : We're talking about reducing those policy change times from weeks to hours. Imagine what you could do with that time back. We're proven : Don't just take our word for it. Check out Gartner Peer Insights, G2, and PeerSpot. Our customers consistently rank us at the top. We're stable : We have a clean legal and financial record, and we're in it for the long haul. We stand behind our product : We're the only ones offering a money-back guarantee. That's how confident we are. For our channel partners: We know this transition affects you too. Your clients are looking for answers, and you need a partner you can trust, especially as you navigate the Skybox situation. Give your clients the future : Offer them a platform that's built for the complex networks of tomorrow. Partner with a leade r: We're consistently ranked as a top solution by customers. Join a stable team : We have a proven track record of growth and stability. Strong partnerships : We have a strong partnership with Cisco, and are the only company in our category included on the Cisco Global Pricelist. A proven network : Join our successful partner network, and utilize our case studies to help demonstrate the value of AlgoSec. What you will get : Dedicated partner support. Comprehensive training and enablement. Marketing resources and joint marketing opportunities. Competitive margins and incentives. Access to a growing customer base. Let's talk real talk: Look, we know switching platforms isn't fun. But it's a chance to get it right. To choose a solution that's built for the future, not just the next quarter. We're here to help you through this transition. We're committed to providing the support and stability you need. We're not just selling software; we're building partnerships. So, if you're looking for a down-to-earth, customer-focused company that's got your back, let's talk. We're ready to show you what AlgoSec can do. What are your biggest concerns about switching network security platforms? Let us know in the comments! Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • AlgoSec | Cloud Security: Current Status, Trends and Tips

    Cloud security is one of the big buzzwords in the security space along with big data and others. So we’ll try to tackle where cloud... Information Security Cloud Security: Current Status, Trends and Tips Kyle Wickert 2 min read Kyle Wickert Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 6/25/13 Published Cloud security is one of the big buzzwords in the security space along with big data and others. So we’ll try to tackle where cloud security is today, where its heading as well as outline challenges and offer tips for CIOs and CSOs looking to experiment with putting more systems and data in the cloud. The cloud is viewed by many as a solution to reducing IT costs and ultimately has led many organizations to accept data risks they would not consider acceptable in their own environments. In our State of Network Security 2013 Survey , we asked security professionals how many security controls were in the cloud and 60 percent of respondents reported having less than a quarter of their security controls in the cloud – and in North America the larger the organization, the less security controls in the cloud. Certainly some security controls just aren’t meant for the cloud, but I think this highlights the uncertainty around the cloud, especially for larger organizations. Current State of Cloud Security Cloud security has clearly emerged with both a technological and business case, but from a security perspective, it’s still a bit in a state of flux. A key challenges that many information security professionals are struggling with is how to classify the cloud and define the appropriate type of controls to secure data entering the cloud. While oftentimes the cloud is classified as a trusted network, the cloud is inherently untrusted since it is not simply an extension of the organization, but it’s an entirely separate environment that is out of the organization’s control. Today “the cloud” can mean a lot of things: a cloud could be a state-of-the-art data center or a server rack in a farm house holding your organization’s data. One of the biggest reasons that organizations entertain the idea of putting more systems, data and controls in the cloud is because of the certain cost savings. One tip would be to run a true cost-benefit-risk analysis that factors in the value of the data being sent into the cloud. There is value to be gained from sending non-sensitive data into the cloud, but when it comes to more sensitive information, the security costs will increase to the point where the analysis may suggest keeping in-house. Cloud Security Trends Here are several trends to look for when it comes to cloud security: Data security is moving to the forefront, as security teams refocus their efforts in securing the data itself instead of simply the servers it resides on. A greater focus is being put on efforts such as securing data-at-rest, thus mitigating the need to some degree the reliance on system administrators to maintain OS level controls, often outside the scope of management for information security teams. With more data breaches occurring each day, I think we will see a trend in collecting less data where is it simply not required. Systems that are processing or storing sensitive data, by their very nature, incur a high cost to IT departments, so we’ll see more effort being placed on business analysis and system architecture to avoid collecting data that may not be required for the business task. Gartner Research recently noted that by 2019, 90 percent of organizations will have personal data on IT systems they don’t own or control! Today, content and cloud providers typically use legal means to mitigate the impact of any potential breaches or loss of data. I think as cloud services mature, we’ll see more of a shift to a model where it’s not just these vendors offering software as a service, but also includes security controls in conjunction with their services. More pressure from security teams will be put on content providers to provide such things as dedicated database tiers, to isolate their organization’s data within the cloud itself. Cloud Security Tips Make sure you classify data before even considering sending it for processing or storage in the cloud. If data is deemed too sensitive, the risks of sending this data into the cloud must be weighed closely against the costs of appropriately securing it in the cloud. Once information is sent into the cloud, there is no going back! So make sure you’ve run a comprehensive analysis of what you’re putting in the cloud and vet your vendors carefully as cloud service providers use varying architectures, processes, and procedures that may place your data in many precarious places. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

bottom of page