
Your path to zero trust and micro segmentation

Can AlgoSec be used for continuous compliance monitoring?
Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to.
A firewall log is a record of the network connections (allowed and blocked) that a firewall inspects, capturing each event between your systems and the internet.
Depending on the configuration, a firewall log may include all inspected traffic or only what the firewall allows to pass into the environment (what “gets past” the firewall).
Each entry of a firewall log will specify the following data:
Field | Description |
Timestamp | Exact date and time traffic was processed |
Action | Decision made by the firewall (Allow, Deny, Drop) |
Rule ID | Specific firewall rule that triggered the action |
Source IP & Port | IP address and port from where traffic originated |
Destination IP & Port | IP address and port that the traffic was trying to reach |
Protocol | Network protocol used (TCP, UDP, ICMP) |
Bytes/Session | Amount of data transferred during a session |
Zones | Source and destination security zones (Trust, Untrust, DMZ) |
Which network