Welcome!

News Feed Item

AlgoSec Enables Security Zoning Policy Enforcement in Data Centers and Networks

Latest Release of the AlgoSec Suite Raises the Bar for Automating Security Change Implementation, Provisioning 400 Firewall Rules in Less Than 10 Minutes at a Fortune 50 Customer Environment

BOSTON, MA -- (Marketwired) -- 05/20/14 -- AlgoSec, the market leader for Security Policy Management, today announced the general availability of the latest version of the AlgoSec Security Management Suite, which further simplifies and automates the management and enforcement of security policies in complex environments. This new release of the AlgoSec Security Management Suite now enables organizations to define and continuously enforce security zoning policies for improved protection against cyber- attack propagation. Additionally, the release provides end-to-end automation of the security change process across Check Point, Cisco and Juniper devices.

The AlgoSec Security Management Suite delivers an automated and application-centric solution for orchestrating the management of complex policies across firewalls and related network devices to improve both security and business agility. The AlgoSec Suite aligns IT teams by streamlining security operations and change management, ensuring continuous compliance, accelerating the provisioning of application connectivity and delivering a tighter security policy.

New features announced today in version 6.6 include:

  • Security Zoning Policy Enforcement - The AlgoSec Suite makes it easy to define and enforce authorized network traffic between security zones. AlgoSec proactively analyzes every change to ensure security zoning and network segmentation is maintained.
  • Extended Policy Push - Approved security changes can now be automatically pushed to Cisco ASA, FWSM and PIX firewalls as well as Juniper SRX devices via AlgoSec ActiveChange™ technology. A Fortune 50 telecommunications company was recently able to push 400 security changes into production in less than 10 minutes using this advanced capability.
  • New Out-of-the-box Compliance Reporting - The AlgoSec Suite now automatically generates compliance reports for PCI-DSS 3.0, NIST 800-41, Federal Information Security Management Act (FISMA), Australian Signals Directorate (ASD) and Gramm-Leach-Bliley Act (GLBA), adding to what is already the largest selection of out-of-the-box compliance reports, including ISO 27001, SOX, NERC-CIP, Basel II and more.
  • Superior Network Topology Analysis - An accurate analysis of the underlying topology is the foundation of any sound security policy management solution -- especially as network complexity continues to rise. The AlgoSec Suite now delivers complete visibility of traffic flowing through Cisco and Check Point virtual routers and allows these devices and flows to be displayed on the interactive network map. Additionally, AlgoSec now considers NAT to provide more accurate visibility of traffic flowing through the network as well as IPV6 support for making changes on Cisco devices.
  • Extended Web Services API - Key information from the AlgoSec Suite can be easily exported and leveraged for further integration with other systems in an organization's network, including change management systems, IT portals and GRC solutions.

"Enterprises are looking for ways to simplify, automate and orchestrate security operations, to enable services at the speed of the business, while maintaining security and compliance," said Avishai Wool, CTO, AlgoSec. "With the latest release of the AlgoSec Suite, we're giving organizations more control and automation to accurately define and enforce security policies across complex networks and data centers."

The AlgoSec Security Management Suite was selected as the only "Best Buy" among 22 Risk and Policy Management vendors reviewed by SC Magazine. Pricing for the AlgoSec Suite starts at $10,000.

About AlgoSec
AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1000 of the world's leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.

AlgoSec's application-centric approach orchestrates the management of complex policies across firewalls and related network devices, aligning IT teams for improved business agility.

AlgoSec is committed to the success of every single customer, and offers the industry's only money-back guarantee. For more information, visit www.AlgoSec.com.

Online Resources:

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
Many banks and financial institutions are experimenting with containers in development environments, but when will they move into production? Containers are seen as the key to achieving the ultimate in information technology flexibility and agility. Containers work on both public and private clouds, and make it easy to build and deploy applications. The challenge for regulated industries is the cost and complexity of container security compliance. VM security compliance is already challenging, ...
As cloud and storage projections continue to rise, the number of organizations moving to the cloud is escalating and it is clear cloud storage is here to stay. However, is it secure? Data is the lifeblood for government entities, countries, cloud service providers and enterprises alike and losing or exposing that data can have disastrous results. There are new concepts for data storage on the horizon that will deliver secure solutions for storing and moving sensitive data around the world. ...
In his session at 18th Cloud Expo, Bruce Swann, Senior Product Marketing Manager at Adobe, will discuss how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Bruce Swann has more than 15 years of experience working with digital marketing disciplines like web analytics, social med...
Designing IoT applications is complex, but deploying them in a scalable fashion is even more complex. A scalable, API first IaaS cloud is a good start, but in order to understand the various components specific to deploying IoT applications, one needs to understand the architecture of these applications and figure out how to scale these components independently. In his session at @ThingsExpo, Nara Rajagopalan is CEO of Accelerite, will discuss the fundamental architecture of IoT applications, ...
As machines are increasingly connected to the internet, it’s becoming easier to discover the numerous ways Industrial IoT (IIoT) is helping to shape the business world. This is exactly why we have decided to take a closer look at this pervasive movement and to examine the desire to connect more things! Now if you need a refresher on IIoT and how it is changing the world, take a moment and listen to Greg Gorbach with ARC Advisory Group. Gorbach believes, "IIoT will significantly change the worl...
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
What a difference a year makes. Organizations aren’t just talking about IoT possibilities, it is now baked into their core business strategy. With IoT, billions of devices generating data from different companies on different networks around the globe need to interact. From efficiency to better customer insights to completely new business models, IoT will turn traditional business models upside down. In the new customer-centric age, the key to success is delivering critical services and apps wit...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit y...
Cloud computing changed data analytics for good. It enabled companies to drastically decrease resources and architecture previously assigned with business intelligence departments. It also enabled laymen to run advanced business analytics. Cloud was also the architecture of choice for storing and processing big data. Data piling is a continuous process, which is going to explode with emerging Internet of Things concept. Answer to this issue developers found in new concept called fog computing. ...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will discuss the vast to...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
SYS-CON Events announced today that Enzu, a leading provider of cloud hosting solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to foc...
SYS-CON Events announced today the How to Create Angular 2 Clients for the Cloud Workshop, being held June 7, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Angular 2 is a complete re-write of the popular framework AngularJS. Programming in Angular 2 is greatly simplified. Now it’s a component-based well-performing framework. The immersive one-day workshop led by Yakov Fain, a Java Champion and a co-founder of the IT consultancy Farata Systems and...