On premise and in the cloud, AlgoSec automates and orchestrates network security policy management so you can deliver business applications quickly and easily while ensuring security and compliance.

The AlgoSec Security Policy Management Solution

Trusted by Over 1500 Customers
and 20 of the Fortune 50

“AlgoSec now does the heavy lifting for us. It allows the engineers to focus more on providing greater levels of security than on process and change."

Phil Packman, General Manager, Security Gateway Operations

"AlgoSec allowed us to reduce the IT security team’s time by 80% during our data center migration"

Bruno Roulleau, Network Security Architect

“We found that mitigating issues around firewall rulesets is very resource intensive if you don’t have the right tool, so the ROI from AlgoSec stacked up pretty quickly.”

Peter Erceg, Head of IT Security

  • BT
  • Sanofi
  • T-Mobile

Catch Up On the Latest Insights in Network Security

Visit our blog for insightful commentary and practical tips on network security policy management, cloud security, network segmentation, firewall optimization, DevSecOps and much more.

Network Security Policy Management given a benefit rating of 'High' in new Gartner report

By Joanne Godfrey on August 4, 2016

A few weeks ago Gartner released its annual Hype Cycle for Infrastructure Protection, 2016. It’s an impressive and exhaustive guide to the wide range of threat-facing technologies that help defend IT. Included among these technologies is Network Security Policy Management (NSPM) tools, which Gartner gives a benefit rating of ‘High’ – which in Gartner terms means that the technology “Enables new ways of performing horizontal or vertical processes that will result in significantly increased revenue or cost savings for an enterprise”.

Read more

Managing application connectivity securely through a merger or acquisition

By Joe DiPietro on September 22, 2016

During a merger or acquisition, you have two enterprises each running complex IT infrastructures with hundreds if not thousands of applications. Usually, these applications don’t just simply integrate together – rather, some perform overlapping functions and need to be altered or extended; some need to be used in parallel; while others need to be decommissioned and removed. This means adjusting firewall policies to accommodate the new connectivity, new applications and new servers and often new firewalls without creating IT security risks or outages.