

Search results
609 results found with an empty search
- AlgoSec Strengthens and Simplifies Cloud and SDN Security Management
New A32 version of Network Security Policy Management Suite deepens visibility and control over hybrid environments, enables secure micro-segmentation deployment and delivers enhanced SDN and SD-WAN integrations AlgoSec Strengthens and Simplifies Cloud and SDN Security Management New A32 version of Network Security Policy Management Suite deepens visibility and control over hybrid environments, enables secure micro-segmentation deployment and delivers enhanced SDN and SD-WAN integrations January 12, 2021 Speak to one of our experts RIDGEFIELD PARK, N.J., January 12, 2021 – AlgoSec , the leading provider of business-driven network security management solutions, has introduced enhanced application visibility and auto-discovery features, and extended its integrations with leading SDN and SD-WAN solutions, in the new version of its core Network Security Management Suite. AlgoSec A32 gives IT and security experts the most comprehensive visibility and control over security across their entire hybrid environment. It enables organizations to align and manage their network security from a business perspective, giving them new automation capabilities for seamless, zero-touch security management across SDN, cloud and on-premise networks from a single platform. The key benefits that AlgoSec A32 delivers to IT, network and security experts include: Enable secure deployment of micro-segmentation in complex hybrid networks A32 automates identifying and mapping of the attributes, flows and rules that support business-critical applications across hybrid networks with the built-in AutoDiscovery capability. This accelerates organizations’ ability to make changes to their applications across the enterprise’s heterogeneous on-premise and cloud platforms, and to troubleshoot network or change management issues – ensuring continuous security and compliance. Align and manage all network security processes from a single platform A32 gives organizations instant visibility, risk detection, and mitigation for network or cloud misconfigurations, and simplifies security policies with central management and clean-up capabilities. This makes it easy to plan and implement micro-segmentation strategies to enhance security network-wide. Seamlessly integrate with leading SDN and SD-WAN solutions for enhanced visibility and compliance A32 seamlessly integrates with leading SDN and SD-WAN solutions including Cisco ACI, Cisco Meraki and VMWARE NSX-T to enhance visibility and ensure ongoing compliance with extended support for financial regulations such as SWIFT and HKMA. “The events of 2020 have highlighted how critical it is for network security experts to be able to make changes to their organizations’ core business applications quickly, but without impacting security or compliance across complex, hybrid networks,” said Eran Shiff, Vice President, Product, of AlgoSec. “AlgoSec A32 gives IT and security teams the holistic visibility and granular control they need over their entire network to do this, enabling them to plan, check and automatically implement changes from a single console to maximize business agility and strengthen security and compliance.” AlgoSec A32 is the first version to run on the CentOS 7 operating system and is generally available . About AlgoSec The leading provider of business-driven network security management solutions, AlgoSec helps the world’s largest organizations align security with their mission-critical business processes. With AlgoSec, users can discover, map and migrate business application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate network security changes with zero touch – across their cloud, SDN and on-premise networks. Over 1,800 enterprises , including 20 of the Fortune 50, have utilized AlgoSec’s solutions to make their organizations more agile, more secure and more compliant – all the time. Since 2005, AlgoSec has shown its commitment to customer satisfaction with the industry’s only money-back guarantee . All product and company names herein may be trademarks of their registered owners. *** Media Contacts:Tsippi [email protected] Craig CowardContext Public [email protected] +44 (0)1625 511 966
- Network security policy examples & procedures | AlgoSec
A network security policy is a critical part of your IT cyber policy It helps determine what traffic is allowed on your network, keeping critical assets secure Network security policy examples & procedures ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Application-aware network security! Securing the business applications on your network Keep Reading Avoiding the Security/Agility Tradeoff with Network Security Policy Automation Keep Reading Examining the Security Policy Management Maturity Model Keep Reading Choose a better way to manage your network
- AlgoSec’s Horizon Platform Fuels Company Growth and Global Application-Centric Security
A gross dollar retention rate of over 90% and 36% year-over-year new business growth highlight adoption across industries AlgoSec’s Horizon Platform Fuels Company Growth and Global Application-Centric Security A gross dollar retention rate of over 90% and 36% year-over-year new business growth highlight adoption across industries September 9, 2025 Speak to one of our experts RIDGEFIELD PARK, NJ, September 9, 2025 – AlgoSec , a global cybersecurity leader, today announced a gross dollar retention rate of over 90% in the first half of 2025, following the launch of its AlgoSec Horizon platform. Since its release, the Horizon platform has gained adoption across industries, underscoring the market need for convergence of cloud and on-premises networks. This widespread adoption has driven a 36% increase in new annual recurring revenue (ARR) in the first half of 2025 compared to 2024. The Horizon platform utilizes advanced AI capabilities to automatically discover and identify an organization’s business applications across complex hybrid networks, and remediate risks more effectively. Its Intelligent automation minimizes misconfigurations and enhances operational resilience to accelerate application delivery from weeks to hours. In one such example, one of the largest financial institutions in the U.S. uncovered 1,800 applications and their connectivity requirements within the first two weeks of using Horizon. Throughout September and October, AlgoSec is running the Horizon Tour, a series of sessions showcasing the platform’s capabilities and expert insights for enterprise security teams across EMEA and the U.S. “Security teams today are being asked to protect applications in a hybrid world, from multi-clouds to datacenters globally,” said Chris Thomas , Chief Revenue Officer at AlgoSec. “We’re excited about our early 2025 successes and our evolving AlgoSec solutions which will help us meet our mission to enable the world’s most complex organizations to gain visibility, reduce risk and process changes. To hear first-hand AlgoSec’s strategic direction and product innovation roadmap, join us for our annual virtual AlgoSummit event on September 30.” To learn why over 2,200 of the world's most complex organizations trust AlgoSec to help secure their most critical workloads, visit www.algosec.com . About AlgoSec AlgoSec, a global cybersecurity leader, empowers organizations to securely accelerate application delivery up to 10 times faster by automating application connectivity and security policy across the hybrid network environment. With two decades of expertise securing hybrid networks, over 2200 of the world's most complex organizations trust AlgoSec to help secure their most critical workloads. AlgoSec Horizon platform utilizes advanced AI capabilities, enabling users to automatically discover and identify their business applications across multi-clouds, and remediate risks more effectively. It serves as a single source for visibility into security and compliance issues across the hybrid network environment, to ensure ongoing adherence to internet security standards, industry, and internal regulations. Additionally, organizations can leverage intelligent change automation to streamline security change processes, thus improving security and agility. Learn how AlgoSec enables application owners, information security experts, SecOps and cloud security teams to deploy business applications faster while maintaining security at www.algosec.com . MEDIA CONTACT: Megan Davis Alloy, on behalf of AlgoSec [email protected]
- Leading Bank | AlgoSec
Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Leading Bank Transforms Digitalization Journey With AlgoSec Organization Leading Bank Industry Financial Services Headquarters United States Download case study Share Customer success stories "AlgoSec is like a person sitting in my bank taking care of everything - simplifying day-to-day operations and reducing human errors because everything is automated.” Background Background The bank is a full-service commercial bank headquartered in India. It offers a wide range of banking and financial products for corporate and retail customers through retail banking and asset management services. The bank offers personal, corporate, and internet banking services including accounts, deposits, credit cards, home loans, and personal loans. The Challenges The client’s key issues related to the management of the firewalls, dealing with rule duplication and human errors. Their network security operations teams were hampered by manual, slow, and error-prone security change-management processes. It often took around four days to process a single change across their complex network environment. The frequent errors that arose from manual processes opened security gaps and put them at risk of cyberattacks. Some of their challenges included: Human errors leading to misconfiguration – The organization was handling over 30 firewalls and 30 to 40 rules in a day across multiple firewalls. They lacked the skilled resources to implement these rule changes. This led to errors and misconfigurations. Lack of visibility – They lacked visibility into their overall network and traffic flows and failed to understand which rules applied to each firewall. Duplicate rules – They had many duplicate firewall policies, negatively impacting performance. Policy optimization – The organization required policies to be frequently optimized. Lack of visibility – The organization needed visibility across their networks, allowing them to quickly find and fix issues. Time-consuming manual change management processes. Solution The organization looked for a partner that understood their challenges, could integrate into their existing solutions, and could take full responsibility for any issues. In the words of the bank’s executive vice president, “ We were looking for a partner, not a product.” The key factors that the bank was looking for were: Alignment with their digital transformation vision – They wanted to align with key stakeholders among business, operations, network, and security teams. Automation as a key focus – Automation was important to reduce human errors, align with the considerable number of requests and adapt to the agile nature of critical applications. With automation, they were looking to implement firewall changes faster. Easy to use and integrate within the existing infrastructure. Unified view of their multi-vendor firewall estate – They wanted a single console where they could see all their firewalls, understand their collective risk, and gain a holistic view of the current state of their firewall policies. As a result, the customer implemented the AlgoSec Security Management Solution. Results: The AlgoSec Security Management Solution transformed the bank’s digitalization journey, leading to: Time to implement rule changes decreased from 4-5 days to less than 48 hours – a 60% reduction. Automatically implemented changes – Changes are automatically implemented, without needing to guess which rules and devices are in path. Reduced human error and elimination of repetitive, manual tasks. Simplified daily operations. Automated change management across application-centric infrastructure. Identified and mitigated risks. Transformed digitization journey. AlgoSec now has end-to-end visibility of which firewall it needs to implement the changes on. The bank was in the process of switching from a traditional infrastructure to Cisco ACI. The transition was smooth. AlgoSec seamlessly integrated into Cisco ACI and their existing Palo Alto Network devices. “I think we are the first in India who approached AlgoSec and got these solutions implemented – getting Cisco ACI, Palo Alto, and AlgoSec working hand in hand with full integration. This is the best thing we’ve seen till now,” noted the vice president. Looking ahead, they plan to extend AlgoSec’s offering, mapping rule applications, and other capabilities to help them migrate to the cloud. Schedule time with one of our experts
- Optimizing DevOps: Enhanced release quality and faster time-to-market
DevOps security connectivity management allows for better cooperation between security DevOps Use AlgoSec to ensure secure, compliant development environments Click here for more! Optimizing DevOps: Enhanced release quality and faster time-to-market Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. What is DevOps security management? Key pain points in securing your CI/CD pipeline Streamlined security, compliance, and faster deployments Speeds up application delivery without compromising security Empower your DevOps workflow with seamless connectivity integration Lock down container security with smart threat management Key benefits of using AlgoSec Get the latest insights from the experts DevOpsifying Network Security Watch video Integrate Security Into DevOps for Faster, Safer Application Delivery Into Production Read document Best Practices for Incorporating Security Automation into the DevOps Lifecycle Watch video Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Techcombank | AlgoSec
Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. TECHCOMBANK SAVES TIME AND RESOURCES WITH SIMPLIFIED FIREWALL POLICY MANAGEMENT Organization Techcombank Industry Financial Services Headquarters Hanoi, Vietnam Download case study Share Customer success stories "AlgoSec enables us to identify ways to consolidate and optimize rules and perform deep risk analysis and automate workflows in ways that other products cannot match" Background Techcombank is one of the largest joint stock commercial banks in Vietnam. With more than 300 branches and 7,000 staff, Techcombank provides deposit products, loans, leasing, cash management and other services to more than 3.3 million individual customers and 45,000 corporate clients. Challenge Tens of firewall devices and hundreds of routers and switches protect the financial data of Techcombank’s customers, as well as the operations of hundreds of branches throughout Vietnam. As a bank, all security policies and firewall configurations must comply with PCI-DSS and ISO27001 standards. Ensuring compliance, however, created ongoing headaches for the IT security team. “With equipment from many different vendors, even simple policy audits were challenging tasks,” says Mr. Van Anh Tuan, CSO of Techcombank. “As a result of the diversity of products and lack of visibility, it was difficult for us to monitor changes to rule configurations in real time in order to maintain internal security compliance as well as PCI compliance.” “Cleaning up and fine tuning firewall policies was a particularly complex process, which made it difficult to respond quickly to the changing needs of our business applications,” adds Mr. Tuan. “We wanted a way to optimize and consolidate rules across all of our firewalls, regardless of manufacturer, and completely automate the end-to-end workflow for firewall rule change management.” In addition, Techcombank sought a solution that would simplify the process of conducting risk analysis, evaluating PCI compliance and identifying the necessary steps for remediation. Solution Following an in-depth competitive evaluation, Techcombank selected AlgoSec’s Security Management solution. “AlgoSec met many of our key requirements, better than its competitors in our evaluation,” Mr. Tuan notes. Techcombank particularly liked AlgoSec’s superior security policy analysis and ability to make actionable recommendations with a high level of accuracy. “AlgoSec will enable us to identify ways to consolidate and optimize rules, perform deep risk analysis, automate workflows and ensure compliance in ways that other products cannot match,” says Mr. Tuan. Techcombank’s IT team wants to be able to quickly identify security policy risks and see what specific steps they need to take for remediation. The bank uses AlgoSec to identify overly permissive firewall rules based on actual use as well as duplicate, unused and expired rules and objects. This information gives Techcombank the data they need to close off potential access points and help prevent attacks. AlgoSec also provides clear, detailed recommendations on how to best reorder rules for optimal firewall performance. In addition, AlgoSec validates firewall policy and rules against regulations such as PCI, as well as industry best practices and customized corporate policies to uncover and prioritize risks and track trends over time. For Mr. Tuan, one of the most valuable benefits of AlgoSec is the increased visibility into security policies across the full range of devices. “Now we can easily monitor our firewall operations and quickly detect any mistakes or non-compliant changes made. These operations used to be invisible to me.” Mr. Tuan comments. The AlgoSec deployment process went very smoothly for Techcombank. “Our team received training from AlgoSec and their partners here in Vietnam and we were fully utilizing the product almost immediately. Post-implementation support has addressed every issue quickly and enabled us to take advantage of all aspects of the product in order to optimize our firewall rules and improve our security posture even faster than we anticipated,” Mr. Tuan adds. Since implementation, AlgoSec has enabled Techcombank’s IT team to “greatly reduce our time and resources when complying with internal policies and PCI standards, and when monitoring changes in rules,” says Mr. Tuan. “We are very happy with the improved security and visibility provided by AlgoSec and will continue to use and exploit more AlgoSec features and add licenses,” he concluded. Schedule time with one of our experts
- Network Security for VMware NSX | algosec
Security Policy Management with Professor Wool Network Security for VMware NSX Network Security for VMware NSX with Professor Wool is a whiteboard-style series of lessons that examine the some of the challenges of and provide technical tips for managing security policies across the VMware NSX software-defined data center and traditional data center. Lesson 1 VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform. Migrating to NSX: Understanding the Why in Order to Figure Out the How Watch Lesson 2 When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic. Tips on How to Create Filtering Policies for NSX Watch Lesson 3 Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment. Best Practices for Bringing NSX Security Policy Management into the InfoSec Fold Watch Have a Question for Professor Wool? Ask him now Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Hybrid Cloud Security with Google and AlgoSec | AlgoSec
Learn how Google Cloud and AlgoSec solutions help companies improve visibility and reduce risk in large complex hybrid networking environments Webinars Hybrid Cloud Security with Google and AlgoSec Learn how Google Cloud and AlgoSec solutions help companies improve visibility and reduce risk in large complex hybrid networking environments Learn how Google Cloud and AlgoSec solutions help companies improve visibility and reduce risk in large complex hybrid networking environments November 15, 2023 Faye Feng Product Manager at Google Ava Chawla Global Head of Cloud Security Relevant resources Why misconfigurations continue to plague public cloud network services and how to avoid them? Keep Reading Security policy management for the hybrid cloud environment Read an Ebook Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- What is Firewall Monitoring?
Proper firewall configuration is essential for a secure network Explore how to overcome challenges and learn tips for effective firewall configuration What is Firewall Monitoring? Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. What is firewall monitoring? The importance of firewall monitoring for modern network security Key features & capabilities of firewall monitoring tools and solutions What to look for in a firewall monitoring solution? 5 Common firewall monitor challenges FAQ How does AlgoSec help with firewall monitoring? Get the latest insights from the experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Firewall rules & requirements (inbound vs. outbound) | AlgoSec
Learn how firewall rules secure your network from cyber threats. Explore types, best practices, and management strategies to optimize your firewall security. Firewall rules & requirements (inbound vs. outbound) ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec platform White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure continuous compliance Solution overview See how this customer improved compliance readiness and risk management with AlgoSec Case study Choose a better way to manage your network
- AlgoSec | Security group architecture for AWS: How to overcome security group limits
As with all cloud vendors, AWS users share responsibility for securing their infrastructure against risk. Amazon provides the tools you... AWS Security group architecture for AWS: How to overcome security group limits Prof. Avishai Wool 2 min read Prof. Avishai Wool Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 8/9/23 Published As with all cloud vendors, AWS users share responsibility for securing their infrastructure against risk. Amazon provides the tools you need to filter traffic, but configuring those tools is up to you. Firewalls are one of the tools you’ll use to filter traffic and secure Virtual Private Cloud (VPC) instances. Instead of using traditional firewalls, Amazon provides users with AWS security groups, which are flexible, stateful firewalls capable of filtering inbound and outbound traffic. However, there are limits to what you can do with AWS security groups. First, they only allow traffic – you can’t configure them to deny traffic. Second, the maximum number of rules you can set for a single group is 60. This isn’t a big issue for an Amazon EC2 instance designed to address inbound traffic. You’ll either want your AWS EC2 to accept ingress from the entire internet or you’ll want to configure access for a few internal IP addresses. But for outbound traffic, 60 rules simply isn’t enough. You’ll use a dozen of them just allowing access to GitHub’s API . Add in a few third-party partners and you’re already well past the limit. Amazon VPC resource limits explained Amazon sets clear limits on the AWS services and resources it makes available to users. In some cases, you can increase these limits by contacting AWS support. These limits are generally assessed on a per-Region basis. Here are some of the limits Amazon places on AWS users: Security group limits 2500 VPC security groups per Region 60 IPv4 rules per security group 60 IPv6 rules per security group 5 security groups per network interface VPC and subnet limits 5 VPCs per Region 200 Subnets per VPC 5 IPv4 CIDR blocks per VPC 5 IPv6 CIDR blocks per VPC Limits to elastic IP addresses and gateways 5 Elastic IP addresses per Region 2 Elastic IP Addresses per public NAT gateway 5 Egress-only internet gateways per Region 5 NAT gateways per Availability Zone One carrier gateway per VPC Prefix list limits 100 prefix lists per Region 1000 versions per prefix list 5000 prefix list references per resource type Network ACL limits 200 Network ACLs per VPC 20 Rules per Network ACL How to manage AWS cloud security group limits effectively Traditional firewalls may have thousands of security rules, including a complex combination of inbound rules and egress filters. Crucially, they can also enforce outbound rules that include denying traffic – something Amazon does not allow regular security groups to do. While AWS offers powerful tools for securing cloud workflows, Amazon VPC users must find ways to overcome these limitations. Fortunately, there are a few things you can do to achieve exactly that. Optimize your VPC security groups. Use Network Access Control Lists to secure assets at the subnet level. Use a domain name filtering system that reduces the number of IP addresses security group rules need to resolve. Optimize your Amazon virtual private cloud configuration Amazon VPC is a virtual network that contains many of the elements you’d expect from a traditional network. It has IP addresses, route tables, subnets, and internet gateways. Unlike a traditional network, you can easily configure many of your VPC environment through a command line interface (CLI). You can establish VPC peering connections, implement identity and access management (IAM) protocols, and configure elastic network interfaces without manually handling any hardware. But first, you need to set up and protect your VPC by setting up and configuring security groups. If you don’t specify a particular group, Amazon EC2 will use the default security group. If you haven’t added new security groups since creating your AWS account, you may only have that one default security group. The first step to optimizing security is expanding the number of security groups you have available. Here’s an example of the code you can use to create a new security group in the AWS console:aws ec2 create-security-group –group-name web-pci-sg –description “allow SSL traffic” –vpc-id vpc-555666777 This creates a new group named web-pci-sg and describes it as a group designed to allow SSL traffic on the network. Remember that security groups don’t support deny rules. Here is the code you would use to add a rule to that group: aws ec2 authorize-security-group-ingress \ –group-name web-pci-sg \ –protocol https \–port 443 \ –cidr This rule specifically allows SSL traffic using the HTTPS protocol to use port 443, which is the standard port for HTTPS traffic. You can use the last argument to specify the cidr block the rule will direct traffic through. This gives you the ability to manage traffic through specific subnets, which is important for the next step. This example focuses on just one type of rule in one context. To take full advantage of the security tools AWS makes available, you’ll want to create custom rules for endpoints, load balancers, nat gateways, and more. Although you’re limited to 60 rules per security group, creating many groups lets you assign hundreds of rules to any particular instance. Security architecture and network ACLs Network Access Control Lists provide AWS users with additional filtering capabilities. Network ACLs are similar to security groups in many ways, but come with a few key differences: Network ACLs can contain deny rules. You can write Network ACL rules to include explicit actions, like blocking particular IP addresses or routing VPN users in a specific way. Network ACLs are enforced at the subnet level. This means they apply to every instance in the subnet, in addition to whatever rules exist at the security group level. As mentioned above, each Network ACL can contain up to 20 rules. However, you can have up to 200 Network ACLs per VPC, which gives you a total of 4000 potential rules. Along with instance-specific security group rules, this offers much more flexibility for setting up robust AWS security architecture. Since Network ACLs can deny traffic, they are a useful tool for managing access to databases and other sensitive assets. For example, you may wish to exclude users who don’t have the appropriate permissions from your Amazon RDS instance. You may also want to filter SSH (Secure Shell) connections coming from unknown sources, or limit connections between different internal instance types. To do this effectively, you need to group these assets under the same subnet and make sure that the appropriate rules are enabled for all of them. You can also write asset-specific rules at the security group level, ensuring every asset has its own optimal configuration. The larger your AWS environment is, the more complex this process may become. Take care to avoid misconfigurations – it’s very easy to accidentally write security group rules and Network ACL rules that aren’t compatible, or that cause problems when you access the instance. To avoid this, try to condense your rules as much as possible. Avoid limits by filtering domain names directly Although you can create a large number of rules by creating additional security groups, you still may want to add more than 60 rules in a single group. There are many scenarios where this makes more sense than arbitrarily adding (and managing) new groups. For example, you might have a production instance that needs updates from several third-party partners. You also need to periodically change and update the technologies this instance relies on, so you’d like to keep its rules in a single security group. This reduces misconfiguration risk by keeping all the relevant rules in one place – not spread out across multiple groups. To overcome this limit, you need to reduce the number of IP addresses that the security group filters. You can do this by deploying a third-party solution that allows security rules to perform DNS resolution. This eliminates the need for AWS to resolve the domain name. Since AWS security groups can’t compute domain names on their own, you’ll need to deploy a third-party NAT gateway on your public VPC to filter outbound traffic in this way. Once you do this, you can write rules that filter outgoing connections based on their domain name. This effectively bypasses the 60 IP limit because you are not referring to specific IP addresses. At the same time, it simplifies management and makes rules much easier to read and understand. Instead of looking up and adding all of Github’s API IP addresses, you can write rules that reference the domain “Github.com”. If Github decides to change its IP infrastructure, your security rules will automatically reference the new addresses – you won’t have to go back and update them. The earlier you address AWS security group limits, the better There is an unlimited number of ways you can arrange your security groups and Network ACLs. Even in a small environment, the prospect may seem daunting. However, the flexibility Amazon provides to its cloud users is a valuable security feature. Those who go the process enjoy clear security performance benefits. If you start to planning for the architecture of your security and filtering policies early, you’ll be better equipped to scale those policies upwards as your organization grows. This will prevent security processes from becoming a growth bottleneck and maintain a high level of efficiency even as those policies become larger and more complex. See me explain this issue in person in my new whiteboard video: Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- AlgoSec | Cybersecurity predictions and best practices in 2022
While we optimistically hoped for normality in 2021, organizations continue to deal with the repercussions of the pandemic nearly two... Risk Management and Vulnerabilities Cybersecurity predictions and best practices in 2022 Prof. Avishai Wool 2 min read Prof. Avishai Wool Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 2/8/22 Published While we optimistically hoped for normality in 2021, organizations continue to deal with the repercussions of the pandemic nearly two years on. Once considered temporary measures to ride out the lockdown restrictions, they have become permanent fixtures now, creating a dynamic shift in cybersecurity and networking. At the same time, cybercriminals have taken advantage of the distraction by launching ambitious attacks against critical infrastructure. As we continue to deal with the pandemic effect, what can we expect to see in 2022? Here are my thoughts on some of the most talked about topics in cybersecurity and network management. Taking an application-centric approach One thing I have been calling attention to for several years now has been the need to focus on applications when dealing with network security. Even when identifying a single connection, you have a very limited view of the “hidden story” behind it, which means first and foremost, you need a clear cut answer to the following: What is actually going on with this application? You also need the broader context to understand the intent behind it: Why is the connection there? What purpose does it serve? What applications is it supporting? These questions are bound to come up in all sorts of use cases. For instance, when auditing the scope of an application, you may ask yourself the following: Is it secure? Is it aligned? Does it have risks? In today’s network organization chart, application owners need to own the risk of their application; the problem is no longer the domain of the networking team. Understanding intent can present quite a challenge. This is particularly the case in brownfield situations, where hundreds of applications are running across the environment and historically poor record keeping. Despite the difficulties, it still needs to be done now and in the future. Heightening ransomware preparedness We’ve continued to witness more ransomware attacks running rampant in organizations across the board, wreaking havoc on their security networks. Technology, food production and critical infrastructure firms were hit with nearly $320 million of ransom attacks in 2021, including the largest publicly known demand to date. Bad actors behind the attacks are making millions, while businesses struggle to recover from a breach. As we enter 2022, it is safe to expect that a curbing of this trend is unlikely to occur. So, if it’s not a question of “will a ransomware attack occur,” it begs the question of “how does your organization prepare for this eventuality?” Preparation is crucial, but antivirus software will only get you so far. Once an attacker has infiltrated the network, you need to mitigate the impact. To that end, as part of your overall network security strategy, I highly recommend Micro-segmentation, a proven best practice to reduce the attack surface and ensure that a network is not relegated to one linear thread, safeguarding against full-scale outages. Employees also need to know what to do when the network is under attack. They need to study, understand the corporate playbook and take action immediately. It’s also important to consider the form and frequency of back-ups and ensure they are offline and inaccessible to hackers. This is an issue that should be addressed in security budgets for 2022. Smart migration to the cloud Migrating to the cloud has historically been reserved for advanced industries. Still, increasingly we are seeing the most conservative vertical sectors, from finance to government, adopt a hybrid or full cloud model. In fact, Gartner forecasts that end-user spending on public cloud services will reach $482 billion in 2022. However, the move to the cloud does not necessarily mean that traditional data centers are being eliminated. Large institutions have invested heavily over the years in on-premise servers and will be reluctant to remove them entirely. That is why many organizations are moving to a hybrid environment where certain applications remain on-premise, and newly adopted services are predominantly transitioning to cloud-based software. We are now seeing more hybrid environments where organizations have a substantial and growing cloud estate and a significant on-premise data center. All this means that with the presence of the old historical software and the introduction of the new cloud-based software, security has become more complicated. And since these systems need to coexist, it is imperative to ensure that they communicate with each other. As a security professional, it is incumbent upon you to be mindful of that; it is your responsibility to secure the whole estate, whether on-premise, in the cloud, or in some transition state. Adopting a holistic view of network security management More frequently than not, I am seeing the need for holistic management of network objects and IP addresses. Organizations are experiencing situations where they manage their IP address usage using IPAM systems and CMDBs to manage assets. Unfortunately, these are siloed systems that rarely communicate with each other. The consumers of these types of information systems are often security controls such as firewalls, SDN filters, etc. Since each vendor has its own way of doing these things, you get disparate systems, inefficiencies, contradictions, and duplicate names across systems. These misalignments cause security problems that lead to miscommunication between people. The good news is that there are systems on the market that align these disparate silos of information into one holistic view, which organizations will likely explore over the next twelve months. Adjusting network security to Work from Home demands The pandemic and its subsequent lockdowns forced many employees to work from remote locations. This shift has continued for the last two years and is likely to remain part of the new normal, either in full or partial capacity. According to Reuters, decision-makers plan to move a third of their workforce to telework in the long term. That figure has doubled compared to the pre COVID period and subsequently, the cybersecurity implications of this increase have become paramount. As more people work on their own devices and need to connect to their organization’s network, one that is secure and provides adequate bandwidth, it also requires new technologies to be deployed. As a result, this has led to the SASE (Secure Access Security Edge) model, where security is delivered over the cloud- much closer to the end user. Since the new way of working appears to be here to stay in one shape or another, organizations will need to invest in the right tooling to allow security professionals to set policies, gain visibility for adequate reporting and control hybrid networks. The Takeaway If there’s anything we’ve learned from the past two years is that we cannot confidently predict the perils looming around the corner. However, there are things that we can and should be able to anticipate that can help you avoid any unnecessary risk to your security networks, whether today or in the future. To learn how your organization can be better equipped to deal with these challenges, click here to schedule a demo today. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call





