Professional Documents
Culture Documents
Company Overview
The Leader in Network Security Policy Management
Award Winning Security Management Suite
800+ customers in 45 countries.
13 of the Fortune 50
Fast growing - 95% growth in 2011
Technology Partners include Check Point, Cisco, Juniper, Fortinet, Palo
Alto Networks, Blue Coat, HP, CA
Complexity
Large , unmanageable
rulesets
Multiple Vendors and
Technologies
Rules/Applications are
never decommissioned
Increasing rate of change
Distributed, complex
Networks
Insufficient
Processes
Do not keep up with the
pace of business
Poor change management
Span multiple teams
(Ops, Security, Compliance)
Manual, disjointed and
error-prone
MSSP models introduce
additional challenges
Inefficient Operations
Lack of Compliance
Risk
Complexity
Insufficient
Processes
Inefficient Operations
Lack of Compliance
Risk
Visibility and
Control
Workflow
Automation
Efficient Operations
Continuous Compliance
Improved Security
Visibility and
Control
Streamline management
across multiple vendors and
technologies
Policy simulation
Intelligent Optimization
Risk and Compliance
Assessment
Workflow
Automation
Improved response time
Improved accuracy
Governance and
accountability
Improved alignment
internally/with MSSP
Efficient Operations
Continuous Compliance
Improved Security
AlgoSec FireFlow
Intelligent Change Workflow Automation
10
Traffic Queries
See how the security
policy impacts traffic
Fast troubleshooting
What-If Analysis
Topology-Aware
11
12
13
Risk Analysis
Identify and mitigate
firewall policy risk
Broadest out-of-the-box
risk knowledgebase
Easily build and edit
custom risk profiles
Identifies all risky rules
Provides risk details and
remediation guidance
Supports regulations
Security rating provides
instant visibility of
security posture
14
15
PCI DSS
SOX
ISO 27001
Basel II
NERC CIP
J-SOX
16
Change Monitoring
Monitor all changes
in the security policy
All changes are tracked
in near real time
Receive automatic alerts
on changes
Generate audit reports
Connect to virtually any
network device using
AlgoSec Extension
Framework (AEF)
17
Firewall Migration
Simplify Migration
Projects
Compare old policy to
new policy
Compare any two firewall
vendors
Validate correct policy
migration
18
FireFlow
19
Execute the
change
Verify correct
execution to
avoid outages
Perform risk
assessment
Audit and
govern the
change
process
Validate that
the change is
needed
Clarify user
request
20
Manual
Process
Measure SLA
Request
Analysis
Proactive Risk
Assessment
Optimal
Implementation
Design
Verify Correct
Execution
Audit the
Change Process
Recertify Rules
Security
Operations
Operations
Measure SLAs
Compliance Executive
21
22
23
24
25
Auto-validation
Validates that changes exist on the network to get it right first time
Prevents premature closing of tickets
Informs requestor of implementation
26
Auto-Matching
All changes are automatically detected and matched to requests
Unaccounted changes and are discovered as well as changes that
are wider than the request
27
28
Flexible Workflows
Fully Customizable to Your Business Process
29
Adding rules
Removing rules
Changing objects
Recertifying rules
Web Proxy (Blue Coat) changes
30
Architecture
Enterprise-grade solution with support for:
Geographical Distribution
High-Availability/DR
Secondary
Primary
Active
Standby
Secondary
Automatic synchronization
Automatic failover
Support for Disaster Recovery
Why AlgoSec?
The Market Leader
Intelligent Technology
Automation
Customer Satisfaction