Welcome!

News Feed Item

AlgoSec Enables Security Zoning Policy Enforcement in Data Centers and Networks

Latest Release of the AlgoSec Suite Raises the Bar for Automating Security Change Implementation, Provisioning 400 Firewall Rules in Less Than 10 Minutes at a Fortune 50 Customer Environment

BOSTON, MA -- (Marketwired) -- 05/20/14 -- AlgoSec, the market leader for Security Policy Management, today announced the general availability of the latest version of the AlgoSec Security Management Suite, which further simplifies and automates the management and enforcement of security policies in complex environments. This new release of the AlgoSec Security Management Suite now enables organizations to define and continuously enforce security zoning policies for improved protection against cyber- attack propagation. Additionally, the release provides end-to-end automation of the security change process across Check Point, Cisco and Juniper devices.

The AlgoSec Security Management Suite delivers an automated and application-centric solution for orchestrating the management of complex policies across firewalls and related network devices to improve both security and business agility. The AlgoSec Suite aligns IT teams by streamlining security operations and change management, ensuring continuous compliance, accelerating the provisioning of application connectivity and delivering a tighter security policy.

New features announced today in version 6.6 include:

  • Security Zoning Policy Enforcement - The AlgoSec Suite makes it easy to define and enforce authorized network traffic between security zones. AlgoSec proactively analyzes every change to ensure security zoning and network segmentation is maintained.
  • Extended Policy Push - Approved security changes can now be automatically pushed to Cisco ASA, FWSM and PIX firewalls as well as Juniper SRX devices via AlgoSec ActiveChange™ technology. A Fortune 50 telecommunications company was recently able to push 400 security changes into production in less than 10 minutes using this advanced capability.
  • New Out-of-the-box Compliance Reporting - The AlgoSec Suite now automatically generates compliance reports for PCI-DSS 3.0, NIST 800-41, Federal Information Security Management Act (FISMA), Australian Signals Directorate (ASD) and Gramm-Leach-Bliley Act (GLBA), adding to what is already the largest selection of out-of-the-box compliance reports, including ISO 27001, SOX, NERC-CIP, Basel II and more.
  • Superior Network Topology Analysis - An accurate analysis of the underlying topology is the foundation of any sound security policy management solution -- especially as network complexity continues to rise. The AlgoSec Suite now delivers complete visibility of traffic flowing through Cisco and Check Point virtual routers and allows these devices and flows to be displayed on the interactive network map. Additionally, AlgoSec now considers NAT to provide more accurate visibility of traffic flowing through the network as well as IPV6 support for making changes on Cisco devices.
  • Extended Web Services API - Key information from the AlgoSec Suite can be easily exported and leveraged for further integration with other systems in an organization's network, including change management systems, IT portals and GRC solutions.

"Enterprises are looking for ways to simplify, automate and orchestrate security operations, to enable services at the speed of the business, while maintaining security and compliance," said Avishai Wool, CTO, AlgoSec. "With the latest release of the AlgoSec Suite, we're giving organizations more control and automation to accurately define and enforce security policies across complex networks and data centers."

The AlgoSec Security Management Suite was selected as the only "Best Buy" among 22 Risk and Policy Management vendors reviewed by SC Magazine. Pricing for the AlgoSec Suite starts at $10,000.

About AlgoSec
AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1000 of the world's leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.

AlgoSec's application-centric approach orchestrates the management of complex policies across firewalls and related network devices, aligning IT teams for improved business agility.

AlgoSec is committed to the success of every single customer, and offers the industry's only money-back guarantee. For more information, visit www.AlgoSec.com.

Online Resources:

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...