top of page
Skybox customers looking for a new solution? We’ve got you covered.


Oren Amiram
Mar 18, 20244 min read
Why misconfigurations continue to plague public cloud network services and how to avoid them?
Oren Amiram, Director of Product at AlgoSec, explains why misconfigurations continue to plague public cloud network services and how...
2
0

Jeremiah Cornelius
Jan 4, 20243 min read
Managing the switch – Making the move to Cisco Meraki
Challenges with managing Cisco Meraki in a complex enterprise environment We have worked closely with Cisco for many years in large...
0
0

Jeremiah Cornelius
Jan 2, 20244 min read
Achieving policy-driven application-centric security management for Cisco Nexus Dashboard Orchestrat
Jeremiah Cornelius, Technical Lead for Alliances and Partners at AlgoSec, discusses how Cisco Nexus Dashboard Orchestrator (NDO) users...
6
1


Prof. Avishai Wool
Dec 18, 20232 min read
Navigating the Cybersecurity Horizon in 2024
The persistence of sophisticated ransomware In 2023, organizations faced a surge in ransomware attacks, prompting a reevaluation of...
0
0
Asher Benbenisty
Oct 31, 202311 min read
20 Best Network Security Solutions + FAQs
The best security posture is a multi-layered security posture. Enterprise security leaders understand that no single tool or solution can...
3
0


Prof. Avishai Wool
Aug 28, 20236 min read
Host-based firewalls vs. network-based firewalls for network security?
Before your organization can move business applications to the cloud, it must deploy network security solutions that can reliably block...
5
1


Tsippi Dach
Aug 9, 20236 min read
What is Network Security Policy Automation?
Security policy automation is the process of automating certain cybersecurity tasks like threat detection (ransomware, malware, security...
1
0


Kyle Wickert
Aug 9, 20237 min read
How to fix misconfigured firewalls (and prevent firewall breaches)
Firewall misconfigurations are one of the most common and preventable security issues that organizations face. Comprehensively managing...
3
0


Tsippi Dach
Aug 9, 202310 min read
How to optimize the security policy management lifecycle
Information security is vital to business continuity. Organizations trust their IT teams to enable innovation and business transformation...
1
0

Prof. Avishai Wool
Feb 8, 20225 min read
Cybersecurity predictions and best practices in 2022
While we optimistically hoped for normality in 2021, organizations continue to deal with the repercussions of the pandemic nearly two...
0
0

Jeff Yeger
Nov 15, 20214 min read
Securely accelerating application delivery
In this guest blog, Jeff Yager from IT Central Station (soon to be PeerSpot), discusses how actual AlgoSec users have been able to...
0
0

Avivi Siman Tov
Oct 21, 20214 min read
Change automation: A step-by-step guide to network security policy change management
Avivi Siman-Tov, Director of Product Management at AlgoSec, discusses the benefits of network automation and takes us through a...
1
0

Jeff Yeger
Aug 30, 20214 min read
Taking Control of Network Security Policy
In this guest blog, Jeff Yager from IT Central Station describes how AlgoSec is perceived by real users and shares how the solution meets...
0
0

Prof. Avishai Wool
Jul 22, 20213 min read
Managing network connectivity during mergers and acquisitions
Prof. Avishai Wool discusses the complexities of mergers and acquisitions for application management and how organizations can securely...
1
0

Jeffrey Starr
Apr 27, 20204 min read
Deploying NSPM to Implement a Gartner Analyst’s Work from Home Network Security Advice
Recommendations from Rajpreet Kaur, Senior Principal Analyst at Gartner, in her recent blog on remote working, and a perspective on how...
4
0

Amir Erel
Feb 3, 20202 min read
AlgoSec and ServiceNow: Managing Network Security Policies and Processes Within ServiceNow
AlgoSec’s Integration with ServiceNow allows AlgoSec users to automate security change management and accelerate application deployments...
2
0


Kevin Beaver
Jul 16, 20152 min read
Top 10 common firewall threats and vulnerabilities
Common Firewall Threats Do you really know what vulnerabilities currently exist in your enterprise firewalls? Your vulnerability scans...
3
0


Matthew Pascucci
Sep 9, 20144 min read
Avoid the Traps: What You Need to Know About PCI Requirement 1 (Part 3)
So we’ve made it to the last part of our blog series on PCI 3.0 Requirement 1. The first two posts covered Requirement 1.1...
0
0


Joanne Godfrey
Aug 18, 20142 min read
Firewall migration tips & best practices
It goes without saying that security is the cornerstone of any organization today. This includes ensuring access to corporate data is...
4
0


Matthew Pascucci
Jul 15, 20143 min read
Removing insecure protocols In networks
Insecure Service Protocols and Ports Okay, we all have them… they’re everyone’s dirty little network security secrets that we try not to...
1
0
bottom of page