top of page

Search results

609 results found with an empty search

  • Prevasio network security | AlgoSec

    Unlock comprehensive cloud security with AlgoSec s Prevasio Network Security Safeguard your network with ease Discover more now Cloud network topology aware Schedule a demo Watch a video Watch a video Cloud network configuration and security policy across the multi-cloud estate AI Powered applications discovery Gain visibility into your cloud applications and their dependencies. Never miss a critical app or connection again. Learn more Reduce cloud-network security risks exposure Lock down your cloud with flexible security & powerful risk detection. Get 150+ checks for total network protection. Focus on the threats that matter most to your business. Watch video Central management of security policies Manage all your security groups, firewalls, and network policies across clouds, accounts, and regions from one place. Reduce errors and save time with consistent security policies that protect your entire infrastructure. Watch video Reduce cloud attack surface Clean up your network security policies for improved performance and stronger protection. Our solution helps you identify unnecessary rules, tighten access controls, and ensure your network is running at its best. Watch video Get the latest insights from the experts Unveiling best practices for a resilient cloud security strategy Read More Shaping tomorrow: Leading the way in cloud security Read blog CSPM importance for CISOs. What security issues can be prevented\defended with CSPM? Read blog Schedule time and secure your cloud Schedule time and secure your cloud Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • FinTech Provider | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Leading FinTech Provider Reduces Security Risks With AlgoSec Organization FinTech Provider Industry Technology Headquarters Download case study Share Customer
success stories "With AlgoSec, we get a holistic view of how our entire network operates.” FinTech company gains a holistic view of hybrid network, enhances compliance posture. BACKGROUND The company has thousands of employees and annual revenue over a billion euros. The company manages 168,750 banking workstations, over 82.2 million customer accounts and ensures nationwide smooth cash supply with its 34,000 ATMs and self-service terminals. THE CHALLENGE The company relies on over 170 firewalls from Check Point Software, Juniper, and Cisco. They also have over 48,000 virtual servers, and security controls including proxies, security gateways, DDoS protection, and intrusion protection systems (IPS) from vendors including Check Point, Juniper, Cisco, and F5. Their networks process approximately 3.17 petabytes daily. Some of the challenges included: Difficulty maintaining internal toolset. High maintenance costs for their internal tools. Lack of visibility into their network. THE SOLUTION The company was searching for a solution that provided: Automation for their entire network, including software-defined networks. Visibility of the required communications of the business applications. Review and approval of traffic flows. Ability to apply a predefined set of firewall rules to newly deployed virtual machines. Following an in-depth evaluation, the company selected AlgoSec’s security policy management solution. “The main reason we chose AlgoSec was extensive support for multiple firewall vendors,” said their IT systems engineer. “We have a multi-vendor strategy, and AlgoSec fully supports all of the vendors that we are using.” For over a decade, they have been using AlgoSec’s Security Policy Management Solution, which includes AlgoSec Firewall Analyzer and AlgoSec FireFlow. After several years of relying just on Firewall Analyzer and FireFlow, they also added AlgoSec AppViz and AppChange (formerly AlgoSec BusinessFlow) to their toolkit. AlgoSec Firewall Analyzer ensures security and compliance by providing visibility and analysis into complex network security policies. AlgoSec FireFlow improves security and saves security staffs’ time by automating the entire security policy change process, eliminating manual errors, and reducing risk. AlgoSec AppViz provides critical security information regarding the firewalls and firewall rules supporting each connectivity flow by letting users discover, identify, and map business applications. AlgoSec AppChange empowers customers to make changes at the business application level, including application migrations, server deployment, and decommissioning projects. “AppViz and AppChange provide a more application-centric viewpoint. It’s really helpful for communication within our business departments,” said their IT engineer. THE RESULTS By using the AlgoSec Security Management solution, the company was able to automate their network policy change management processes, enhance their compliance posture, accelerate hardware migrations, and gain deep visibility into their hybrid network. Some of the benefits gained include: Deep integration and visibility into their hybrid network. Faster firewall migrations and deployments of virtual firewalls. Eliminated unnecessary policy changes and reduced the time required to process policy changes. Ability to review and approve communication flows (a PCI DSS requirement). Automatic assessment and reporting for regulations including PCI DSS and Sarbanes-Oxley (SOX). “The network map is one of the keys in AlgoSec,” said their network engineer. “The greatest benefit we had from AlgoSec is the integration into the network and holistic view of how our entire network operated,” added the network engineer. “AlgoSec really fits into our environment. You can customize AlgoSec to fit into your business processes and workflows,” noted the engineer. “We have a long partnership with AlgoSec and really appreciate working together and the great support we receive.” Schedule time with one of our experts

  • Reece Group | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Reece Group Gets Change Requests Flowing Organization Reece Group Industry Retail & Manufacturing Headquarters Victoria, Australia Download case study Share Customer
success stories "The reason we chose AlgoSec is because we saw the benefits of what it would give us for the business. The time it has taken to make a change has dropped significantly..." Leading plumbing and HVAC company empowers business and IT teams with ChatOps, reduce troubleshooting time, so they can focus on building their business. Background The Reece Group is a leading distributor of plumbing, waterworks and HVAC-R products to commercial and residential customers through 800 branches in Australia, New Zealand and the United States.Established in 1920, this includes 10 specialized business units servicing the plumbing, bathroom, building, civil, irrigation, heating, air conditioning and refrigeration industries. The Challenge Some of the Reece Group’s challenges included: Commissioning and decommissioning – As firewall upgrades and migrations were frequently handled by third-party suppliers, there was a lack of business alignment and visibility into their entire multi-vendor hybrid network. Clarity and understanding of security rules – They had difficulty understanding what rules were in place across their entire network and understanding and what services the rules applied to. The Solution The Reece Group searched for a solution that provided: Baseline compliance – To ensure that their rules did not introduce unnecessary risk or compliance violations. Visibility into risk – So they could understand what their rules did in order to not cause an outage. They implemented AlgoSec Firewall Analyzer and AlgoSec FireFlow. They also use AlgoBot, AlgoSec’s ChatOps solutions. AlgoSec Firewall Analyzer provides visibility and analyzes complex network security policies across on-premise, cloud, and hybrid networks. It automates and simplifies security operations including troubleshooting, auditing, and risk analysis. Using Firewall Analyzer, the client can optimize the configuration of firewalls, and network infrastructure to ensure security and compliance. AlgoSec FireFlow enables security staff to automate the entire security policy change process from design and submission to proactive risk analysis, implementation, validation, and auditing. Its intelligent, automated workflows save time and improve security by eliminating manual errors and reducing risk. AlgoBot is an intelligent chatbot that handles network security policy management tasks for you. AlgoBot answers your questions, submitted in plain English, and personally assists with security policy change management processes – without requiring manual inputs or additional research. The Result Reece Group choose AlgoSec because it aligned with their business needs. Some of benefits they got by using AlgoSec include: Empowering application developers – Developers are able to proactively check within Slack if the reason an application isn’t working is because of the firewall is blocking traffic or if the application is misconfigured. Faster request and response time – Application developers are quickly able to identify if a network change request is needed. They spend less time on troubleshooting and can proactively make valid change requests. IT also ceased becoming a bottleneck for application developers and were able to complete firewall changes in less than two hours from the initial change request. Reduced firewall ruleset by 85% –Rules declined from 3,000 rules to 450 rules. More time to work on business-critical projects – Firewall administrators are able to save time with easy-to-understand dashboards and automation, freeing up time to work on other business-critical projects. Clear understanding of risks and compliance – Easy out-of-the box dashboards and flags for risk and compliance issues make it easy for the company to understand and identify risks and compliance violations Schedule time with one of our experts

  • Cloud Security Alliance Releases Latest Survey Report on State of Cloud Security Concerns, Challenges, and Incidents

    Survey finds that 58% of respondents are concerned about security in the cloud, while misconfigurations are one of the leading causes of breaches and outages as public cloud adoption doubles over past two years Cloud Security Alliance Releases Latest Survey Report on State of Cloud Security Concerns, Challenges, and Incidents Survey finds that 58% of respondents are concerned about security in the cloud, while misconfigurations are one of the leading causes of breaches and outages as public cloud adoption doubles over past two years March 30, 2021 Speak to one of our experts SEATTLE – March 30, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and AlgoSec , a leading provider of business-driven network and cloud security management solutions, today announced the results of a new study titled, “ State of Cloud Security Concerns, Challenges, and Incidents .” The survey, which queried nearly 1,900 IT and security professionals from a variety of organization sizes and locations, sought to gain deeper insight into the complex cloud environment that continues to emerge and that has only grown more complex since the onset of the pandemic. The survey found that over half of organizations are running 41 percent or more of their workloads in public clouds, compared to just one-quarter in 2019. In 2021, 63 percent of respondents expect to be running 41 percent or more of their workloads in public cloud, indicating that adoption of public cloud will only continue. Sixty-two percent of respondents use more than one cloud provider, and the diversity of production workloads (e.g. container platforms, virtual machines) is also expected to increase. Key findings include: Security tops concerns with cloud projects : Respondents’ leading concerns over cloud adoption were network security (58%), a lack of cloud expertise (47%), migrating workloads to the cloud (44%), and insufficient staff to manage cloud environments (32%). It’s notable that a total of 79 percent of respondents reported staff-related issues, highlighting that organizations are struggling with handling cloud deployments and a largely remote workforce. Cloud issues and misconfigurations are leading causes of breaches and outages : Eleven percent of respondents reported a cloud security incident in the past year with the three most common causes being cloud provider issues (26%), security misconfigurations (22%), and attacks such as denial of service exploits (20%). When asked about the impact of their most disruptive cloud outages, 24 percent said it took up to 3 hours to restore operations, and for 26 percent it took more than half a day. Nearly one-third still manage cloud security manually : Fifty-two percent of respondents stated they use cloud-native tools to manage security as part of their application orchestration process, and 50 percent reported using orchestration and configuration management tools such as Ansible, Chef and Puppet. Twenty-nine percent said they use manual processes to manage cloud security. Who controls cloud security is not clear-cut : Thirty-five percent of respondents said their security operations team managed cloud security, followed by the cloud team (18%), and IT operations (16%). Other teams such as network operations, DevOps and application owners all fell below 10 percent, showing confusion over exactly who owns public cloud security. “The use of cloud services has continued to increase over the past decade. Particularly now, in the wake of the COVID-19 public health crisis. With organizations struggling to address a largely remote workforce, many enterprises’ digital transformations have been accelerated to enable employees to work from home,” said Hillary Baron, lead author and research analyst, Cloud Security Alliance. “As an ever-more complex cloud environment continues to evolve, the need for supplementary security tools to improve public cloud security will, as well.” “In the face of complex environments, a dearth of security staff, and an overall lack of cloud knowledge, organizations are turning to security tools that can help supplement their workforce. Three of the top four benefits organizations look for in security management tools involve proactive detection of risks and automation. These types of tools can supplement the challenges many organizations are experiencing with lack of expertise (47%) and staff (32%), as well as improve visibility as they move toward an ever-changing cloud environment,” said Jade Kahn, AlgoSec Chief Marketing Officer.AlgoSec commissioned the survey to add to the industry’s knowledge about hybrid-cloud and multi-cloud security. Sponsors of CSA research are CSA Corporate Members, who support the findings of the research project but have no added influence on content development nor editing rights. The report and its findings are vendor-agnostic and allow for global participation. Download the free eBook now. About Cloud Security Alliance The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA’s activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org , and follow us on Twitter @cloudsa. About AlgoSec The leading provider of business-driven network security management solutions, AlgoSec helps the world’s largest organizations align security with their mission-critical business processes. With AlgoSec, users can discover, map and migrate business application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate network security changes with zero touch – across their cloud, SDN and on-premise networks. Over 1,800 enterprises, including 20 of the Fortune 50, have utilized AlgoSec’s solutions to make their organizations more agile, more secure and more compliant – all the time. Since 2005, AlgoSec has shown its commitment to customer satisfaction with the industry’s only money-back guarantee. www.algosec.com

  • Firewall rule cleanup & performance optimization tool

    Efficiently improve network security and performance by cleaning up and optimizing your firewall rules Streamline operations and meet compliance requirements with ease Firewall rule cleanup & performance optimization tool Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. Streamlining firewall policies: cleanup & optimization Dangers of outdated firewall rulesets How to audit your existing firewall policy How to properly perform a firewall cleanup Firewall optimization best practices Automate firewall configurations with AlgoSec Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec Copy White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure Copy Solution overview See how this customer improved compliance readiness and risk Copy Case study Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec | What is CIS Compliance? (and How to Apply CIS Benchmarks)

    CIS provides best practices to help companies like yours improve their cloud security posture. You’ll protect your systems against... Cloud Security What is CIS Compliance? (and How to Apply CIS Benchmarks) Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 6/20/23 Published CIS provides best practices to help companies like yours improve their cloud security posture. You’ll protect your systems against various threats by complying with its benchmark standards. This post will walk you through CIS benchmarks, their development, and the kinds of systems they apply to. We will also discuss the significance of CIS compliance and how Prevasio may help you achieve it. What are CIS benchmarks? CIS stands for Center for Internet Security . It’s a nonprofit organization that aims to improve companies’ cybersecurity readiness and response. Founded in 2000, the CIS comprises cybersecurity experts from diverse backgrounds. They have the common goal of enhancing cybersecurity resilience and reducing security threats. CIS compliance means adhering to the Center for Internet Security (CIS) benchmarks. CIS benchmarks are best practices and guidelines to help you build a robust cloud security strategy. These CIS benchmarks give a detailed road map for protecting a business’s IT infrastructure. They also encompass various platforms, such as web servers or cloud bases. The CIS benchmarks are frequently called industry standards. They are normally in line with other regulatory organizations, such as ISO, NIST, and HIPAA. Many firms adhere to CIS benchmarks to ensure they follow industry standards. They also do this to show their dedication to cybersecurity to clients and stakeholders. The CIS benchmarks and CIS controls are always tested through on-premises analysis by leading security firms. This ensures that CIS releases standards that are effective at mitigating cyber risks. How are the CIS benchmarks developed? A community of cybersecurity professionals around the world cooperatively develops CIS benchmarks. They exchange their knowledge, viewpoints, and experiences on a platform provided by CIS. The end result is consensus-based best practices that will protect various IT systems. The CIS benchmark development process typically involves the following steps: 1. Identify the technology: The first step is to identify the system or technology that has to be protected. This encompasses a range of applications. It can be an operating system, database, web server, or cloud environment. 2. Define the scope: The following stage is to specify the benchmark’s parameters. It involves defining what must be implemented for the technology to be successfully protected. They may include precise setups, guidelines, and safeguards. 3. Develop recommendations: Next, a community of cybersecurity experts will identify ideas for safeguarding the technology. These ideas are usually based on current best practices, norms, and guidelines. They may include the minimum security requirements and measures to be taken. 4. Expert consensus review: Thereafter, a broader group of experts and stakeholders assess the ideas. They will offer comments and suggestions for improvement. This level aims to achieve consensus on the appropriate technical safeguards. 5. Pilot testing: The benchmark is then tested in a real-world setting. At this point, CIS aims to determine its efficacy and spot any problems that need fixing. 6. Publication and maintenance: The CIS will publish the benchmark once it has been improved and verified. The benchmark will constantly be evaluated and updated to keep it current and useful for safeguarding IT systems. What are the CIS benchmark levels? CIS benchmarks are divided into three levels based on the complexity of an IT system. It’s up to you to choose the level you need based on the complexity of your IT environment. Each level of the benchmarks offers better security recommendations than the previous level. The following are the distinct categories that benchmarks are divided into: Level 1 This is the most basic level of CIS standards. It requires organizations to set basic security measures to reduce cyber threats. Some CIS guidelines at this level include password rules, system hardening, and risk management. The level 1 CIS benchmarks are ideal for small businesses with basic IT systems. Level 2 This is the intermediate level of the CIS benchmarks. It is suitable for small to medium businesses that have complex IT systems. The Level 2 CIS standards offer greater security recommendations to your cloud platform. It has guidelines for network segmentation, authentication, user permissions, logging, and monitoring. At this level, you’ll know where to focus your remediation efforts if you spot a vulnerability in your system. Level 2 also covers data protection topics like disaster recovery plans and encryption. Level 3 Level 3 is the most advanced level of the CIS benchmarks. It offers the highest security recommendations compared to the other two. Level 3 also offers the Security Technical Implementation Guide (STIG) profiles for companies. STIG are configuration guidelines developed by the Defense Information Systems Agency. These security standards help you meet US government requirements. This level is ideal for large organizations with the most sensitive and vital data. These are companies that must protect their IT systems from complex security threats. It offers guidelines for real-time security analytics, safe cloud environment setups, and enhanced threat detection. What types of systems do CIS benchmarks apply to? The CIS benchmarks are applicable to many IT systems used in a cloud environment. The following are examples of systems that CIS benchmarks can apply to: Operating systems: CIS benchmarks offer standard secure configurations for common operating systems, including Amazon Linux, Windows Servers, macOS, and Unix. They address network security, system hardening, and managing users and accounts. Cloud infrastructure: CIS benchmarks can help protect various cloud infrastructures, including public, private, and multi-cloud. They recommend guidelines that safeguard cloud systems by various cloud service providers. For example, network security, access restrictions, and data protection. The benchmarks cover cloud systems such as Amazon Web Services (AWS), Microsoft Azure, IBM, Oracle, and Google Cloud Platform. Server software: CIS benchmarks provide secure configuration baselines for various servers, including databases (SQL), DNS, Web, and authentication servers. The baselines cover system hardening, patch management, and access restrictions. Desktop software: Desktop apps such as music players, productivity programs, and web browsers can be weak points in your IT system. CIS benchmarks offer guidelines to help you protect your desktop software from vulnerabilities. They may include patch management, user and account management, and program setup. Mobile devices: The CIS benchmarks recommend safeguarding endpoints such as tablets and mobile devices. The standards include measures for data protection, account administration, and device configuration. Network devices: CIS benchmarks also involve network hardware, including switches, routers, and firewalls. Some standards for network devices include access restrictions, network segmentation, logging, and monitoring. Print devices: CIS benchmarks also cover print devices like printers and scanners. The CIS benchmark baselines include access restrictions, data protection, and firmware upgrades. Why is CIS compliance important? CIS compliance helps you maintain secure IT systems. It does this by helping you adhere to globally recognized cybersecurity standards. CIS benchmarks cover various IT systems and product categories, such as cloud infrastructures. So by ensuring CIS benchmark compliance, you reduce the risk of cyber threats to your IT systems. Achieving CIS compliance has several benefits: 1. Your business will meet internationally accepted cybersecurity standards . The CIS standards are developed through a consensus review process. This means they are founded on the most recent threat intelligence and best practices. So you can rely on the standards to build a solid foundation for securing your IT infrastructure. 2. It can help you meet regulatory compliance requirements for other important cybersecurity frameworks . CIS standards can help you prove that you comply with other industry regulations. This is especially true for companies that handle sensitive data or work in regulated sectors. CIS compliance is closely related to other regulatory compliances such as NIST, HIPAA, and PCI DSS. By implementing the CIS standards, you’ll conform to the applicable industry regulations. 3. Achieving CIS continuous compliance can help you lower your exposure to cybersecurity risks . In the process, safeguard your vital data and systems. This aids in preventing data breaches, malware infections, and other cyberattacks. Such incidents could seriously harm your company’s operations, image, and financial situation. A great example is the Scottish Oil giant, SSE. It had to pay €10M in penalties for failing to comply with a CIS standard in 2013. 4. Abiding by the security measures set by CIS guidelines can help you achieve your goals faster as a business. The guidelines cover the most important and frequently attacked areas of IT infrastructure. 5. CIS compliance enhances your general security posture. It also decreases the time and resources needed to maintain security. It does this by providing uniform security procedures across various platforms. How to achieve CIS compliance? Your organization can achieve CIS compliance by conforming to the guidelines of the CIS benchmarks and CIS controls. Each CIS benchmark usually includes a description of a recommended configuration. It also usually contains a justification for the implementation of the configuration. Finally, it offers step-by-step instructions on how to carry out the recommendation manually. While the standards may seem easy to implement manually, they may consume your time and increase the chances of human errors. That is why most security teams prefer using tools to automate achieving and maintaining CIS compliance. CIS hardened images are great examples of CIS compliance automation tools. They are pre-configured images that contain all the necessary recommendations from CIS benchmarks. You can be assured of maintaining compliance by using these CIS hardened images in your cloud environment. You can also use CSPM tools to automate achieving and maintaining CIS compliance. Cloud Security Posture Management tools automatically scan for vulnerabilities in your cloud. They then offer detailed instructions on how to fix those issues effectively. This way, your administrators don’t have to go through the pain of doing manual compliance checks. You save time and effort by working with a CSPM tool. Use Prevasio to monitor CIS compliance. Prevasio is a cloud-native application platform (CNAPP) that can help you achieve and maintain CIS compliance in various setups, including Azure, AWS, and GCP. A CNAPP is basically a CSPM tool on steroids. It combines the features of CSPM, CIEM, IAM, and CWPP tools into one solution. This means you’ll get clearer visibility of your cloud environment from one platform. Prevasio constantly assesses your system against the latest version of CIS benchmarks. It then generates reports showing areas that need adjustments to keep your cloud security cyber threat-proof. This saves you time as you won’t have to do the compliance checks manually. Prevasio also has a robust set of features to help you comply with standards from other regulatory bodies. So using this CSPM tool, you’ll automatically comply with HIPAA, PCI DSS, and GDPR. Prevasio offers strong vulnerability evaluation and management capabilities besides CIS compliance monitoring. It uses cutting-edge scanning algorithms to find known flaws, incorrect setups, and other security problems in IT settings. This can help you identify and fix vulnerabilities before fraudsters can exploit them. The bottom line on CIS compliance Achieving and maintaining CIS compliance is essential in today’s continually changing threat landscape . However, doing the compliance checks manually takes time. You may not also spot weaknesses in your cloud security in time. This means that you need to automate your CIS compliance. And what better solution than a cloud security posture management tool like Prevasio? Prevasio is the ideal option for observing compliance and preventing malware that attack surfaces in cloud assets. Prevasio offers a robust security platform to help you achieve CIS compliance and maintain a secure IT environment. This platform is agentless, meaning it doesn’t run on the cloud like most of its competitors. So you save a lot in costs every time Prevasio runs a scan. Prevaiso also conducts layer analysis. It helps you spot the exact line of code where the problem is rather than give a general area. In the process, saving you time spent identifying and solving critical threats. Try Prevasio today! Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Optimizing security and efficiency in the cloud - AlgoSec

    Optimizing security and efficiency in the cloud Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • ARCON | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Arcon Maintains Security Across Diverse Customer Networks With AlgoSec Organization ARCON Industry Financial Services Headquarters Rio de Janeiro, Brazil Download case study Share Customer
success stories "Using AlgoSec is a double benefit to us because we can reduce the cost and number of errors in our daily operation and also expand our offerings to our customers" Global Managed Services Company Optimizes Firewall Policies and Reduces Risks AlgoSec Business Impact • Improve security and assure compliance of its customers • Deliver comprehensive reports • Reduce costs and misconfiguration errors • Expand offerings to Arcon’s customers Background Founded in 1995, Arcon is the leading MSSP in Brazil. The company operates facilities in Rio de Janeiro, Sao Paulo, Brasília, Flórida, Salvador and Belém, managing the networks of many of Brazil’s top 100 companies, including banks, retailers, manufacturers and telecom companies. Arcon protectsmore than 600,000 users across five continents and processes more than one billion transactions each day. In addition to strategic management of IT security, Arcon protects data, servers, workstations and mobile devices and helps customers identify and control access to their systems. The company also evaluates risks in applications and provides technology infrastructure to support its customers’ businesses. Challenge Arcon provides security services to hundreds of other companies, including major retailers and banks, which require the tools that enable it to rapidly identify compliance issues and assess risks associated with network configurations. It must also be able to determine how to best optimize customers’ security policies and track changes made to firewall rules. With so many customers and service level agreements that require near immediate responses, Arcon needed visibility across the networks it manages and into reports allowing them to quickly find and fix issues and to counsel customers on changes that would improve their systems’ security. Solution Flavio Carvalho, the Security Management Services Director at Arcon, was charged with maintaining security across its own network, as well as diverse customers’ networks. Carvalho and his team selected the AlgoSec Security Management solution. “The combination of ease-of-use and the value add of AlgoSec’s reports, the ability to manage different technologies from multiple vendors, the cost per device managed, and the visibility across customer’s networks were key for us,” comments Carvalho.The quality of the AlgoSec’s reports clinched the deal. “With AlgoSec, we can quickly and easily provide PCI compliance reports to our customers, including banks and large retail stores. The excellent quality of the reports adds value to the services we manage for them,” says Carvalho. Results Arcon’s clients expect regular updates on the security of their networks — including recommendations for policy optimization, risk mitigation strategies, compliance verification and the impact of rule changes. “It would be impossible for us to deliver all of these in monthly reports without AlgoSec,” Carvalho notes. We have a big retail customer with SLAs of just one hour. “With AlgoSec we have been able to meet these SLAs much more easily than before. A report that previously took a day to generate can now be completed in a few minutes at the click of a button,” Carvalho notes.Shortly after implementation, Arcon’s experience with one large bank customer validated their decision to use AlgoSec — and made their customer very happy. “Our customer was under pressure because of high CPU utilization in their main firewall cluster,” explains Carvalho. “They needed us to investigate what was going on and to solve the issue as quickly and cost-effectively as possible. Using AlgoSec, we were able to easily identify a series of duplicate and poorly-written rules that were causing the trouble, and we solved the problem at no cost to the customer.”“Using AlgoSec is a double benefit to us because we can reduce the cost and number of errors in our daily operations and also expand our offerings to our customers,” adds Carvalho. “It’s easy to work with AlgoSec, as we have a direct contact and an excellent AlgoSec support team, which is always available to help us when necessary” concludes Carvalho. Schedule time with one of our experts

  • AlgoSec | Understanding Security Considerations in IaaS/PaaS/SaaS Deployments

    Knowing how to select and position security capabilities in different cloud deployment models is critical to comprehensive security... Cloud Security Understanding Security Considerations in IaaS/PaaS/SaaS Deployments Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 11/24/22 Published Knowing how to select and position security capabilities in different cloud deployment models is critical to comprehensive security across your organization. Implementing the right pattern allows you to protect the confidentiality, integrity, and availability of cloud data assets. It can also improve incident response to security threats. Additionally, security teams and cloud security architects no longer have to rely on pre-set security templates or approaches built for on-premises environments. Instead, they must adapt to the specific security demands of the cloud and integrate them with the overall cloud strategy. This can be accomplished by re-evaluating defense mechanisms and combining cloud-native security and vendor tools. Here, we’ll break down the security requirements and best practices for cloud service models like IaaS, PaaS, and SaaS. Do you have cloud security architects on board? We’ll also cover their roles and the importance of leveraging native security tools specific to each model. Managing Separation of Responsibilities with the Cloud Service Provider Secure cloud deployments start with understanding responsibilities. Where do you stand, and what is expected of you? There are certain security responsibilities the cloud security provider takes care of and those that the customer handles. This division of responsibilities means adjusting focus and using different measures to ensure security is necessary. Therefore, organizations must consider implementing compensating controls and alternative security measures to make up for any limitations in the cloud service provider’s security offerings. Security Considerations for SaaS (Software-as-a-Service) Deployments The specific security requirements in SaaS deployments may vary between services. However, it’s important to consider the following areas: Data protection During cloud deployments, protecting data assets is a tough nut to crack for many organizations. As a SaaS provider, ensuring data protection is crucial because you handle and store sensitive customer data. Encryption must be implemented for data in transit and at rest. Protecting data at rest is the cloud provider’s responsibility, whereas you are responsible for data in transit. The cloud provider implements security measures like encryption, access controls, and physical security to protect the data stored in their infrastructure. On the other hand, it’s your responsibility to implement secure communication protocols like encryption, ensuring data remains protected when it moves between your SaaS application. Additionally, best practice solutions may offer you the option of managing your encryption keys so that cloud operations staff cannot decrypt customer data. Interfacing with the Cloud Service There are a number of security considerations to keep in mind when interacting with a SaaS deployment. These include validating data inputs, implementing secure APIs, and securing communication channels. It’s crucial to use secure protocols like HTTPS and to ensure that the necessary authentication and authorization mechanisms are in place. You may also want to review and monitor access logs frequently to spot and address any suspicious activity. Application Security in SaaS During SaaS deployments, it’s essential to ensure application security. For instance, secure coding practices, continuous vulnerability assessments, and comprehensive application testing all contribute to effective SaaS application security. Cross-site scripting (XSS) and SQL injection are some of the common web application cyber-attacks today. You can improve the application’s security posture by implementing the right input validation, regular security patches from the SaaS provider, and web application firewalls (WAFs). Cloud Identity and Access Controls Here, you must define how cloud services will integrate and federate with existing enterprise identity and access management (IAM) systems. This ensures a consistent and secure access control framework. Implementing strong authentication mechanisms like multifactor authentication (MFA) and enforcing proper access controls based on roles and responsibilities are necessary security requirements. You should also consider using Cloud Access Security Broker (CASB) tools to provide adaptive and risk-based access controls. Regulatory Compliance Using a cloud service doesn’t exempt one from regulatory compliance, and cloud architects must design the SaaS architecture to align with these requirements. But why are these stringent requirements there in the first place? The purpose of these regulations is to protect consumer privacy by enforcing confidentiality, integrity, availability, and accountability. So, achieving compliance means you meet these regulations. It demonstrates that your applications and tech stack maintain secure privacy levels. Failure to comply could cost money in the form of fines, legal action, and a damaged reputation. You don’t want that. Security Considerations for PaaS (Platform-as-a-Service) Deployments PaaS security considerations during deployments will address all the SaaS areas. But as a PaaS customer, there are slight differences you should know. For example, more options exist to configure how data is protected and who can do what with it. As such, the responsibility of user permissions may be given to you. On the other hand, some PaaS providers may have built-in tools and mechanisms for managing user permissions. So, what are the other key areas you want to address to ensure a secure environment for PaaS deployments? We’ll start with the application security. Application Security The customer is responsible for securing the applications they build and deploy on the PaaS platform. Securing application platforms is necessary, and cloud architects must ensure this from the design and development stage. So, what do you do to ensure application security? It all starts from the onset. From secure coding practices, addressing application vulnerabilities, and conducting regular security testing. You’ll often find that most security vulnerabilities are introduced from the early stages of software development. If you can identify and fix potential flaws using penetration testing and threat modeling practices, you’re on your way to successful deployment. Data Security PaaS cloud security deployments offer more flexibility and allow customers control over their data and user entitlements. What this means is you can build and deploy your own applications on the platform. You can configure security measures and controls within your applications by defining who has access to applications, what they can do, and how data is protected. Here, cloud security architects and security teams can ensure data classification and access controls, determining appropriate encryption keys management practices, secure data integration and APIs, and data governance. Ultimately, configuring data protection mechanisms and user permissions provides customers with greater customization and control. Platform Security The platform itself, including the operating system, underlying infrastructure, data centers, and middleware, need to be protected. This is the responsibility of the PaaS provider. They must ensure that the components that keep the platform up are functional at all times. Network Security In PaaS environments, identity and roles are primarily used for network security to determine access to resources and data in the PaaS platform. As such, the most important factor to consider in this case is verifying the user identity and managing access based on their roles and permissions. Rather than relying on traditional network security measures like perimeter controls, IDS/IPS, and traffic monitoring, there is a shift to user-centric access controls. Security Considerations for IaaS (Infrastructure-as-a-Service) Cloud Deployments When it comes to application and software security, IaaS security during cloud deployment is similar. If you’re an IaaS customer, there are slight differences in how IaaS cloud deployment is handled. For example, while the cloud provider handles the hypervisor or virtualized layer, everything else is the customers’ responsibility. So, you must secure the cloud deployment by implementing appropriate security measures to safeguard their applications and data. Due to different deployment patterns, some security tools that work well for SaaS may not be suitable for IaaS. For example, we discussed how CASB could be excellent for cloud identity, data, and access controls in SaaS applications. However, this may not be effective in IaaS environments. Your cloud architects and security teams must understand these differences when deploying IaaS. They should consider alternative or additional security measures in certain areas to ensure more robust security during cloud deployments. These areas are: Access Management IaaS deployment requires you to consider several identity and access management (IAM) dimensions. For example, cloud architects must consider access to the operating system, including applications and middleware installed on them. Additionally, they must also consider privileged access, such as root or administrative access at the OS level. Keep in mind that IaaS has additional access layers. These consist of access to the IaaS console and other cloud provider features that may offer insights about or impact the operation of cloud resources. For example, key management and auditing and resource configuration and hardening. It’s important to clarify who has access to these areas and what they can do. Regular Patching There are more responsibilities for you. The IaaS customer is responsible for keeping workloads updated and maintained. This typically includes the OS itself and any additional software installed on the virtual machines. Therefore, cloud architects must apply the same vigilance to cloud workloads as they would to on-premises servers regarding patching and maintenance. This ensures proactive, consistent, and timely updates that ensure the security and stability of cloud workloads. Network Security IaaS customers must configure and manage security mechanisms within their virtual networks. This includes setting firewalls, using intrusion detection and intrusion prevention systems (IDS/IPS), establishing secure connections (VPN), and network monitoring. On the other hand, the cloud provider ensures network security for the underlying network infrastructure, like routers and switches. They also ensure physical security by protecting network infrastructure from unauthorized access. Data Protection While IaaS providers ensure the physical security of data centers, IaaS customers must secure their own data in the IaaS environment. They need to protect data stored in databases, virtual machines (VMs), and any other storage system provisioned by the IaaS provider. Some IaaS providers, especially large ones, offer encryption capabilities for the VMs created on their platform. This feature is typically free or low-priced. It’s up to you to decide whether managing your own encryption keys is more effective or to choose the provider’s offerings. If you decide to go for this feature, it’s important to clarify how encrypting data at rest may affect other services from the IaaS provider, such as backup and recovery. Leveraging Native Cloud Security Tools Just like the encryption feature, some cloud service providers offer a range of native tools to help customers enforce effective security. These tools are available for IaaS, PaaS, and SaaS cloud services. While customers may decide not to use them, the low financial and operational impact of native cloud security tools on businesses makes them a smart decision. It allows you to address several security requirements quickly and easily due to seamless control integration. However, it’s still important to decide which controls are useful and where they are needed. Conclusion Cloud security architecture is always evolving. And this continuous change makes cloud environments more complex and dynamic. From misconfigurations to data loss, many challenges can make secure cloud deployments for IaaS, PaaS, and SaaS services more challenging. Prevasio, an AlgoSec company, is your trusted cloud security partner that helps your organization streamline cloud deployments. Our cloud-native application provides increased risk visibility and control over security and compliance requirements. Contact us now to learn more about how you can expedite your cloud security operations. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • AlgoSec | Sunburst Backdoor, Part III: DGA & Security Software

    In the previous parts of our blog ( part I and part II ), we have described the most important parts of the Sunburst backdoor... Cloud Security Sunburst Backdoor, Part III: DGA & Security Software Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 12/22/20 Published In the previous parts of our blog ( part I and part II ), we have described the most important parts of the Sunburst backdoor functionality and its Domain Generation Algorithm (DGA). This time, let’s have a deeper look into the passive DNS requests reported by Open-Source Context and Zetalytics . The valid DNS requests generated by the malware fall into 2 groups: DNS requests that encode a local domain name DNS requests that encode data The first type of DNS requests allows splitting long domain names into separate requests. These requests are generated by the malware’s functions GetPreviousString() and GetCurrentString() . In general, the format of a DNS request that encodes a domain name may look like: USER_ID.NUM.COMPUTER_DOMAIN[.]appsync-api.us-west-2[.]avsvmcloud[.]com where: USER_ID is an 8-byte user ID that uniquely identifies a compromised host, encoded as a 15-character string NUM is a number of a domain name – either 0 or 1, encoded as a character COMPUTER_DOMAIN is an encoded local computer domain Let’s try decoding the following 3 DNS requests: olc62cocacn7u2q22v02eu.appsync-api.us-west-2.avsvmcloud.com r1qshoj05ji05ac6eoip02jovt6i2v0c.appsync-api.us-west-2.avsvmcloud.com lt5ai41qh5d53qoti3mkmc0.appsync-api.us-west-2.avsvmcloud.com String 1 Let’s start from the 1st string in the list: olc62cocacn7u2q22v02eu.appsync-api.us-west-2.avsvmcloud.com. In this string, the first 15-character string is an encoded USER_ID : “olc62cocacn7u2q” . Once it is base-64 decoded, as explained in the previous post, it becomes a 9-byte byte array: 86 7f 2f be f9 fb a3 ae c4 The first byte in this byte array is a XOR key: 0x86 . Once applied to the 8 bytes that follow it, we get the 8-byte user ID – let’s take a note and write it down, we will need it later: f9 a9 38 7f 7d 25 28 42 Next, let’s take the NUM part of the encoded domain: it’s a character “2” located at the position #15 (starting from 0) of the encrypted domain. In order to decode the NUM number, we have to take the first character of the encrypted domain, take the reminder of its division by 36 , and subtract the NUM ‘s position in the string “0123456789abcdefghijklmnopqrstuvwxyz” : num = domain[0] % 36 – “0123456789abcdefghijklmnopqrstuvwxyz”.IndexOf(domain.Substring(15, 1)); The result is 1 . That means the decrypted domain will be the 2nd part of a full domain name. The first part must have its NUM decoded as 0. The COMPUTER_DOMAIN part of the encrypted domain is “2v02eu” . Once decoded, using the previously explained method, the decoded computer domain name becomes “on.ca” . String 2 Let’s decode the second passive DNS request from our list: r1qshoj05ji05ac6eoip02jovt6i2v0c.appsync-api.us-west-2.avsvmcloud.com Just as before, the decoded 8-byte user ID becomes: f9 a9 38 7f 7d 25 28 42 The NUM part of the encoded domain, located at the position #15 (starting from 0), is a character “6” . Let’s decode it, by taking the first character ( “r” = 114 ), take the reminder of its division by 36 ( 114 % 36 = 6 ), and subtracting the position of the character “6” in the “0123456789abcdefghijklmnopqrstuvwxyz” , which is 6 . The result is 0 . That means the decrypted domain will be the 1st part of the full domain name. The COMPUTER_DOMAIN part of the encrypted domain is “eoip02jovt6i2v0c” . Once decoded, it becomes “city.kingston.” Next, we need to match 2 decrypted domains by the user ID, which is f9 a9 38 7f 7d 25 28 42 in both cases, and concatenate the first and the second parts of the domain. The result will be “city.kingston.on.ca” . String 3 Here comes the most interesting part. Lets try to decrypt the string #3 from our list of passive DNS requests: lt5ai41qh5d53qoti3mkmc0.appsync-api.us-west-2.avsvmcloud.com The decoded user ID is not relevant, as the decoded NUM part is a number -29 . It’s neither 0 nor 1 , so what kind of domain name that is? If we ignore the NUM part and decode the domain name, using the old method, we will get “thx8xb” , which does not look like a valid domain name. Cases like that are not the noise, and are not some artificially encrypted artifacts that showed up among the DNS requests. This is a different type of DNS requests. Instead of encoding local domain names, these types of requests contain data. They are generated by the malware’s function GetNextStringEx() . The encryption method is different as well. Let’s decrypt this request. First, we can decode the encrypted domain, using the same base-64 method, as before . The string will be decoded into 14 bytes: 7c a5 4d 64 9b 21 c1 74 a6 59 e4 5c 7c 7f Let’s decode these bytes, starting from the 2nd byte, and using the first byte as a XOR key. We will get: 7c d9 31 18 e7 5d bd 08 da 25 98 20 00 03 In this array, the bytes marked in yellow are an 8-byte User ID, encoded with a XOR key that is selected from 2 bytes marked in red. Let’s decode User ID: for ( int i = 0 ; i < 8 ; i++) { bytes[i + 1 ] ^= bytes[ 11 - i % 2 ]; } The decoded byte array becomes: 7c f9 a9 38 7f 7d 25 28 42 25 98 20 00 03 The User ID part in marked in yellow. Does it look familiar? Indeed, it’s the same User ID we’ve seen before, when we decoded “city.kingston.on.ca” . The next 3 bytes marked in red are: 25 98 20 . 2 0x59820 The first number 2 stands for the size of data that follows – this data is 00 03 (selected in green). The number 0x59820 , or 366,624 in decimal, is a timestamp. It’s a number of 4-second periods of time since 1 January 2010. To obtain the real time stamp, we need to multiple it by 15 to get minutes, then add those minutes to 1 January 2010: var date = ( new DateTime( 2010 , 1 , 1 , 0 , 0 , 0 , DateTimeKind.Utc)).AddMinutes(timestamp * 15 ); For the number 0x59820 , the time stamp becomes 16 July 2020 12:00:00 AM – that’s the day when the DNS request was made. The remaining 2 bytes, 00 03 , encrypt the state of 8 security products, to indicate whether each one of them is running or whether it is stopped. The 8 security products are: Windows Live OneCare / Windows Defender Windows Defender Advanced Threat Protection Microsoft Defender for Identity Carbon Black CrowdStrike FireEye ESET F-Secure 2 states for 8 products require 2 * 8 = 16 bits = 2 bytes. The 2 bytes 00 03 in binary form are: 00 00 00 00 00 00 00 11 Here, the least-significant bits 11 identify that the first product in the list, Windows Live OneCare / Windows Defender, is reported as ‘running’ ( 1 ) and as ‘stopped’ ( 1 ). Now we know that apart from the local domain, the trojanised SolarWinds software running on the same compromised host on “city.kingston.on.ca” domain has also reported the status of the Windows Defender software. What Does it Mean? As explained in the first part of our description, the malware is capable of stopping the services of security products, be manipulating registry service keys under Administrator account. It’s likely that the attackers are using DNS queries as a C2 channel to first understand what security products are present. Next, the same channel is used to instruct the malware to stop/deactivate these services, before the 2nd stage payload, TearDrop Backdoor, is deployed. Armed with this knowledge, let’s decode other passive DNS requests, printing the cases when the compromised host reports a running security software. NOTES: As a private case, if the data size field is 0 or 1 , the timestamp field is not followed with any data. Such type of DNS request is generated by the malware’s function GetNextString() . It is called ‘a ping’ in the listing below. If the first part of the domain name is missing, the recovered domain name is pre-pended with ‘*’ . The malware takes the time difference in minutes, then divides it by 30 and then converts the result from double type to int type; as a result of such conversion, the time stamps are truncated to the earliest half hour. 2D82B037C060515C SFBALLET Data: Windows Live OneCare / Windows Defender [running] 11/07/2020 12:00:00 AM Pings: 12/07/2020 12:30:00 AM 70DEE5C062CFEE53 ccscurriculum.c Data: ESET [running] 17/04/2020 4:00:00 PM Pings: 20/04/2020 5:00:00 PM AB902A323B541775 mountsinai.hospital Pings: 4/07/2020 12:30:00 AM 9ACC3A3067DC7FD5 *ripta.com Data: ESET [running] 12/09/2020 6:30:00 AM Pings: 13/09/2020 7:30:00 AM 14/09/2020 9:00:00 AM CB34C4EBCB12AF88 DPCITY.I7a Data: ESET [running] 26/06/2020 5:00:00 PM Pings: 27/06/2020 6:30:00 PM 28/06/2020 7:30:00 PM 29/06/2020 8:30:00 PM 29/06/2020 8:30:00 PM E5FAFE265E86088E *scroot.com Data: CrowdStrike [running] 25/07/2020 2:00:00 PM Pings: 26/07/2020 2:30:00 PM 26/07/2020 2:30:00 PM 27/07/2020 3:00:00 PM 27/07/2020 3:00:00 PM 426030B2ED480DED *kcpl.com Data: Windows Live OneCare / Windows Defender [running] 8/07/2020 12:00:00 AM Carbon Black [running] 8/07/2020 12:00:00 AM Full list of decoded pDNS requests can be found here . An example of a working implementation is available at this repo. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Micro-segmentation: From Strategy to Execution - AlgoSec

    Micro-segmentation: From Strategy to Execution Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Retirement fund | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Australia’s Leading Superannuation Provider Organization Retirement fund Industry Financial Services Headquarters Australia Download case study Share Customer
success stories "It’s very easy to let security get left behind. We want to make sure that security is not a roadblock to business performance,” said Bryce. “We need to be agile and we need to make sure we can deploy systems to better support our members. Automation can really help you see that return-on-investment." Network Security Policy Automation helps Superannuation company reduce costs to provide higher returns to members Background The company is one of Australia’s leading superannuation (pension) providers. Their job is to protect their client’s money, information, and offer long-term financial security. Challenges The company’s firewalls were managed by a Managed Service Security Provider (MSSP) and there had not been enough insight and analysis into their network over the years, leading to a bloated and redundant network infrastructure. Firewalls and infrastructure did not get the care and attention they needed. As a result, some of their challenges included: Legacy firewalls that had not been adequately maintained Difficulty identifying and quantifying network risk Lack of oversight and analysis of the changes made by their Managed Services Security Provider (MSSP) Change requests for functionality that was already covered by existing rules The Solution The customer was searching for a solution that provided: A strong local presence Repeatable and recordable change management processes As a result, the customer implemented AlgoSec. The client selected AlgoSec’s Security Policy Management Solution, which includes AlgoSec Firewall Analyzer and AlgoSec FireFlow. AlgoSec Firewall Analyzer delivers visibility and analysis of complex network security policies across on-premise, cloud, and hybrid networks. It automates and simplifies security operations including troubleshooting, auditing, and risk analysis. Using Firewall Analyzer, they can optimize the configuration of firewalls, and network infrastructure to ensure security and compliance. AlgoSec FireFlow enables security staff to automate the entire security policy change process from design and submission to proactive risk analysis, implementation, validation, and auditing. Its intelligent, automated workflows save time and improve security by eliminating manual errors and reducing risk. The Results “Straight away, we were able to see a return-on-investment,” said Stefan Bryce, Security Manager, a leading Australian superannuation provider. By using the AlgoSec Security Management Solution, the customer gained: Greater insight and oversight into their firewalls and other network devices Identification of risky rules and other holes in their network security policy. Easier cleanup process due to greater visibility Audits and accountability into their network security policy changes. They were able to ensure ongoing compliance and make sure that rules submitted did not introduce additional risk Identification and elimination of duplicate rules Faster implementation of policy changes Business agility and innovation because employees are better motivated to make changes due to seamless policy change process. Consolidation of their virtual firewall internal infrastructure Reduced ongoing costs to their MSSP Schedule time with one of our experts

bottom of page