AlgoSec Platform - Full Demo

AlgoSec
1 Jun 202122:03

Summary

TLDRYitzi Tenenbaum introduces AlgoSec's security management solution, emphasizing its business-driven approach to automate network security policy management across cloud, SDN, and enterprise networks. The demonstration showcases key features like application visibility, risk analysis, compliance assurance, and change automation, highlighting how AlgoSec simplifies security policy management, reduces risk, and ensures continuous compliance with minimal manual intervention.

Takeaways

  • 🔒 Algosec provides a business-driven approach to security policy management, aligning security with business processes.
  • 🤖 The solution automates and orchestrates network security policy management across cloud, SDN, and on-premise networks.
  • 🌐 Key features include automatic discovery of application connectivity requirements, visibility across the entire network, and proactive risk analysis.
  • 🔍 AppViz offers application visibility, allowing owners and architects to track connectivity status and vulnerability of business applications.
  • 🛡️ Algosec integrates with leading vulnerability management tools to provide application context and visibility into risks.
  • 🌟 The solution supports zero-touch automation for security changes, enhancing efficiency and reducing manual intervention.
  • 🚦 The automated workflow includes risk checks, policy implementation, and smart validation to ensure secure and efficient changes.
  • 🛠️ Fireflow is the orchestration tool within Algosec, facilitating intelligent automation and integration with third-party ticketing solutions.
  • 📊 Firewall Analyzer offers reporting, analytics, and infrastructure fundamentals, including risk analysis, policy optimization, and regulatory compliance.
  • 🔧 The platform supports comprehensive policy management, including optimization, cleanup, and auditing, across diverse network environments.

Q & A

  • What is AlgoSec's approach to security policy management?

    -AlgoSec's approach to security policy management is business-driven, enabling organizations to automatically manage security based on business applications that power their business.

  • How does AlgoSec's solution automate network security policy management?

    -AlgoSec's solution intelligently automates and orchestrates network security policy management across cloud, SDN, and on-premise enterprise networks.

  • What is AppVids and how does it provide application visibility?

    -AppVids is a component of AlgoSec's solution that provides application visibility into an organization's business applications, geared towards application owners and architects, and helps bridge the communication gap between business and IT.

  • How does AlgoSec help in discovering application connectivity requirements?

    -AlgoSec can automatically discover application connectivity requirements by analyzing network traffic data, which can be collected in multiple ways including NetFlow, sFlow, offline client-based sensors, or live packet forwarding.

  • What is the purpose of the AlgoSec's auto-discovery feature?

    -Auto-discovery enables customers to map their organization's business applications and connectivity flows by analyzing network traffic data, simplifying the process of understanding and managing network security policies.

  • How does AlgoSec assist in managing security changes with zero touch automation?

    -AlgoSec's solution automates time-consuming security changes and enhances them with business-relevant context, allowing for zero-touch automation of policy changes across multiple devices without causing outages.

  • What is the role of FireFlow in AlgoSec's suite of tools?

    -FireFlow is the operational glue that ties AlgoSec's suite together, providing end-to-end intelligent orchestration and automation for network security policy management.

  • How does AlgoSec help in ensuring continuous compliance?

    -AlgoSec's solution ensures continuous compliance by automatically pushing changes directly onto devices, automating time-consuming security changes, and providing visibility and management of network security across the entire enterprise network.

  • What kind of reports does AlgoSec Firewall Analyzer provide?

    -AlgoSec Firewall Analyzer provides a wide variety of powerful, actionable reports including risk analysis, policy optimization, troubleshooting, regulatory compliance, and more.

  • How does AlgoSec's solution support application portability and cloud migrations?

    -AlgoSec's solution supports application portability by enabling faster migrations to public or private clouds and micro-segmentation, providing visibility and management of application connectivity flows independent of underlying security policies.

  • What is the significance of AlgoSec's traffic simulation accuracy?

    -AlgoSec's traffic simulation accuracy is significant as it provides a high level of proficiency in the security policy management space, supported by experience in the world's largest networks and a wide range of routing implementations.

Outlines

00:00

🛠️ AlgoSec Security Management Solution Overview

Yitzi Tenenbaum introduces the AlgoSec security management solution, emphasizing its unique business-driven approach to policy management. The solution automates network security policy management across various network types, offering features like application discovery, risk analysis, compliance assurance, and policy change automation. The demo will showcase how to use AlgoSec to gain visibility into business applications, manage security policies efficiently, and ensure network security aligns with business processes.

05:01

🔍 AppViz for Application Visibility and Connectivity Management

The paragraph delves into AppViz, a component of AlgoSec that provides visibility into an organization's business applications. It discusses how AppViz can help application owners and architects understand application connectivity, identify vulnerabilities, and manage security risks. The functionality includes traffic simulation, automated architecture diagrams, and the ability to compute changes for maintaining connectivity with new IP addresses, all while integrating with vulnerability management tools for a comprehensive view of application security.

10:02

🔗 FireFlow for Change Automation and Orchestration

FireFlow is presented as the operational backbone of the AlgoSec suite, offering end-to-end automation of network changes. It supports various methods for change request submissions and integrates with third-party ticketing solutions. The paragraph explains the initial planning stage, traffic simulation for understanding device requirements, risk checks to prevent policy risk, and the work order process for translating traffic plans into security policies. FireFlow's ActiveChange technology enables zero-touch automation, allowing for efficient policy implementation across different devices.

15:02

📊 Firewall Analyzer for Reporting and Analytics

AlgoSec Firewall Analyzer is highlighted for its role in network abstraction and policy analysis. It collects data from firewalls and routers to deliver reports on risk analysis, policy optimization, troubleshooting, and regulatory compliance. The capabilities include a scalable network map for visibility in large networks, traffic simulation for troubleshooting, and detailed analysis of individual devices. The Analyzer also provides actionable insights for policy optimization and regulatory compliance, streamlining the process of maintaining secure network policies.

20:04

🌐 AlgoSec's Unified Network Security Management Capabilities

The final paragraph summarizes AlgoSec's core capabilities, emphasizing its ability to provide unified visibility and management of network security across enterprise networks, both on-premise and in the cloud. It underscores AlgoSec's automation of security change management, risk reduction, and continuous compliance. The speaker invites viewers to explore AlgoSec's website for more information, personal demos, and to learn about additional capabilities and use cases.

Mindmap

Keywords

💡Algosec

Algosec is a security management solution that is central to the video's theme. It is a business-driven approach to security policy management that automates and orchestrates network security policies across various environments. The term is repeatedly used throughout the script to describe the suite of tools and services that help organizations manage security based on business applications.

💡Security Policy Management

Security Policy Management refers to the process of creating, implementing, and enforcing rules to protect an organization's network and data. In the context of the video, it is the core function of Algosec, which aims to align security with business processes and automate the management of security policies.

💡Business Applications

Business Applications are software solutions that organizations use to perform their operations. The video emphasizes that Algosec's approach is unique because it focuses on managing security based on what matters most to the business: the applications that power the business. This is evident when discussing the automatic discovery of application connectivity requirements.

💡AppViz

AppViz is a component of the Algosec solution that provides visibility into an organization's business applications, particularly for application owners and architects. It is used to understand how applications are changing over time and to identify any potential application availability issues or vulnerabilities.

💡Connectivity Status

Connectivity Status in the video refers to the ability of applications to function correctly from a network layer 3 standpoint. It is a critical aspect of AppViz, where the script mentions that users can see which applications can and cannot correctly function, indicating potential availability issues.

💡Vulnerability Management

Vulnerability Management is the process of identifying, assessing, and mitigating vulnerabilities in an organization's systems. The script mentions that AppViz integrates with leading vulnerability management vendors to provide business application context to vulnerability data, which is crucial for understanding and managing risks.

💡Auto Discovery

Auto Discovery is a feature within Algosec that allows customers to map their organization's business applications and connectivity flows by analyzing network traffic data. It is highlighted as a way to collect network traffic information and create a comprehensive view of the network topology.

💡Fireflow

Fireflow is described as the operational glue within the Algosec suite, providing end-to-end intelligent orchestration and automation. It is integral to the workflow, where it adds unique intelligence to the process of managing security changes and ensuring they are implemented efficiently and securely.

💡Risk Profiles

Risk Profiles in the video are used to define the organization's specific network security guidance and to assess the risk associated with security policies. They are part of the risk check process in Fireflow, which helps prevent new policy risk from entering the environment.

💡Policy Optimization

Policy Optimization refers to the process of improving the efficiency and effectiveness of security policies. In the context of the video, Algosec provides analytics for policy optimization, such as identifying covered rules, unused rules, and consolidation opportunities, which help in maintaining the integrity of the security policy.

💡Regulatory Compliance

Regulatory Compliance in the script refers to the adherence to various industry standards and regulations such as PCI, SOX, ISO 27000, GDPR, etc. Algosec automates the generation of compliance reports, helping organizations ensure they meet these regulatory requirements.

💡Active Change Technology

Active Change Technology is a unique feature of Algosec that allows for the implementation of security policies on devices with zero-touch automation. It is highlighted as a way to streamline the process of applying changes across multiple devices, potentially of different brands, with a single action.

Highlights

Algosec's security management solution aligns security with business processes through a business-driven approach.

The solution automates network security policy management across cloud, SDN, and on-premise enterprise networks.

Key features of Algosec include automatic discovery of application connectivity requirements and visibility across the network infrastructure.

Proactive risk analysis from a business perspective and ensuring continuous compliance are integral to Algosec's approach.

Algosec enables automatic pushing of changes to devices with zero touch, streamlining security changes.

AppViz provides application visibility for application owners and architects, focusing on business applications.

App Change facilitates top-down change management, bridging the communication gap between business and IT.

Algosec integrates with leading vulnerability management vendors for comprehensive application security.

Auto Discovery maps business applications and connectivity flows by analyzing network traffic data.

Algosec's algorithms create 'thick flows' for easier management and fewer firewall rules.

Application Dashboard offers a window into business application connectivity for owners and architects.

AppViz supports application portability with connectivity divided from underlining security policies.

Algosec's Connectivity Check assists in understanding application connectivity and potential network policy-related outages.

Fireflow provides end-to-end intelligent orchestration and automation within the Algosec suite.

Algosec's Active Change technology enables zero-touch automation for policy implementation on various devices.

Smart Validation serves as an automated peer review, ensuring changes are implemented correctly without human interaction.

Algosec Firewall Analyzer collects log data and configurations for comprehensive reporting and analytics.

Algosec leads in traffic simulation accuracy, supporting a wide range of routing implementations.

Risk Report and Risky Rules provide reactive and proactive methods for viewing and preventing policy risk.

Policy Optimization analytics help identify and action unnecessary or covered rules, streamlining policy management.

Regulatory Compliance Reporting automates compliance efforts for various industry standards, ensuring continuous compliance.

Algosec offers unified visibility and management of network security, automating change management and reducing risk.

Transcripts

play00:00

hi i'm yitzi tenenbaum and i'm a product

play00:02

marketing manager

play00:03

at algosec today i'm going to give you a

play00:06

demonstration of the algosex security

play00:08

management solution

play00:11

security today must align with business

play00:13

processes

play00:15

therefore algosex unique business driven

play00:17

approach to security policy management

play00:19

enables the world's largest and most

play00:21

complex organizations

play00:24

to automatically manage security based

play00:26

on what matters most

play00:28

the business applications that power

play00:29

your business

play00:31

the algosex security management solution

play00:33

intelligently automates and orchestrates

play00:36

network security policy management

play00:38

across cloud

play00:40

sdn and on-premise enterprise networks

play00:44

during today's demo i'll walk you

play00:46

through some of the key features

play00:47

of the algosex security management

play00:49

solution and show you how you can use it

play00:51

to

play00:52

automatically discover application

play00:53

connectivity requirements

play00:55

and get visibility of security across

play00:57

your entire network infrastructure

play00:59

including business applications and

play01:01

their connectivity flows

play01:02

proactively analyze and mitigate risk

play01:05

from the business perspective

play01:06

and ensure continuous compliance

play01:09

automatically push

play01:10

changes directly onto devices all

play01:13

with zero touch automate time consuming

play01:16

security changes

play01:18

and enhance them with business relevant

play01:20

context

play01:22

and at the end decommission redundant

play01:24

security policies without causing

play01:26

outages to close up security holes in

play01:28

your network perimeter

play01:30

now let's move on to the demo and i'll

play01:31

show you how it all works

play01:34

let's begin our demonstration with

play01:36

appvids

play01:38

appvids provides application visibility

play01:40

into the organization's business

play01:41

applications

play01:43

geared towards the application owners

play01:45

and application architects of the world

play01:48

app change will then allow us to drive

play01:49

change from the business downwards

play01:52

and bridge the communication gap that

play01:54

exists between business

play01:55

and i.t in the center of the homepage

play01:58

i'm provided high-level matrix

play02:00

around those applications i can

play02:02

understand

play02:03

how the applications i own are changing

play02:05

over time

play02:07

i'm presented with applications by

play02:08

connectivity status

play02:10

representing which applications can and

play02:12

cannot

play02:13

correctly function from a layer 3

play02:15

standpoint potentially indicating an

play02:17

application availability issue

play02:20

additionally i can see the most

play02:21

vulnerable applications which i own

play02:24

based on vulnerability scan data

play02:25

collected from qualis

play02:27

nessus rapid7 or tenable

play02:30

appviz integrates with the leading

play02:31

vulnerability management vendors

play02:33

to provide business application contacts

play02:36

to vulnerability data for application

play02:38

owners

play02:40

to provide the application intelligence

play02:41

and visibility we first need to discover

play02:44

all the application flows in the network

play02:47

we can do this in multiple ways either

play02:49

by receiving the flows from application

play02:50

discovery solutions

play02:52

such as cisco titration uploading them

play02:55

from a csv

play02:56

file or using algosec auto discovery

play03:01

auto discovery enables customers to map

play03:03

their organization's business

play03:04

applications and connectivity flows

play03:07

by analyzing network traffic data there

play03:10

are multiple ways to collect the

play03:11

required network traffic information

play03:13

including netflow s flow offline

play03:17

client-based sensors or live packet

play03:20

forwarding

play03:22

in this network topology view we can see

play03:24

all the discovered endpoints and the

play03:26

relationships across the entire

play03:28

environment

play03:29

you can quickly identify and focus on

play03:31

any endpoint of interest

play03:33

to view all of its discovered

play03:34

connectivity flows if desired

play03:38

algosex innovative algorithms create

play03:41

thick flows out of multiple connections

play03:44

these thick flows are easier to read and

play03:46

manage

play03:47

and it allows us to eventually create a

play03:49

few critical rules on the firewalls

play03:51

instead of hundreds of rules

play03:53

adding so many rules can crash the

play03:54

fireworld and make it difficult to

play03:56

manage

play03:57

by clicking on applications on the

play03:59

appvids homepage i'm presented with a

play04:01

list of business applications previously

play04:03

discovered

play04:05

here i can see all business applications

play04:07

i have visibility to

play04:08

including their connectivity health

play04:10

indicated in red

play04:11

green or gray during today's

play04:14

demonstration let's focus on a specific

play04:16

business application

play04:18

crm the application dashboard is

play04:22

designed to provide a window into

play04:23

business application connectivity

play04:25

for application owners and architects

play04:28

the details and structure of the

play04:30

application dashboard is very similar to

play04:32

application architecture documents your

play04:34

organization may create manually today

play04:38

here we can see all the general

play04:39

information around the crm application

play04:42

including business criticality

play04:44

expiration information

play04:46

business unit as well as any other

play04:48

customized metadata you might wish to

play04:50

capture

play04:52

apis provides a robust labeling

play04:54

infrastructure which allows filtering

play04:56

and reporting on business applications

play04:58

with the states containing thousands of

play05:00

business applications

play05:02

finally we can quickly understand the

play05:04

relevant business context

play05:06

for this business application

play05:10

the flow section contains all

play05:11

connectivity flows this application

play05:13

requires to function on the network

play05:16

connectivity flows are defined using

play05:19

objects within

play05:20

appvids allowing application

play05:22

connectivity to be divided from

play05:23

underlining security policies supporting

play05:26

them

play05:26

across the network this supports

play05:28

application portability

play05:30

enabling faster migrations to the public

play05:32

or private clouds and micro segmentation

play05:36

algo set connectivity check assists our

play05:38

customers in providing their application

play05:40

owners a self-serve portal

play05:42

for understanding their application

play05:43

connectivity

play05:45

application owners can quickly identify

play05:48

network policy related outages

play05:50

while network engineers leverage this

play05:51

capability to quickly restore

play05:53

availability

play05:55

by clicking connectivity for a specific

play05:56

flow we are presented with the results

play05:58

of algosex traffic simulation

play06:01

underpinning this particular flow for

play06:03

this flow we can see it supported by

play06:05

traffic

play06:06

routed from the internet through the

play06:08

data center

play06:09

filtered by a checkpoint and a juniper

play06:11

device and path

play06:13

scrolling further down we can see the

play06:15

relevant viral policy

play06:17

allowing traffic on each device this

play06:20

answers the age-old question

play06:22

which firewall rule is supporting my

play06:24

business application

play06:27

in the next section appvids provides an

play06:29

automated application architecture

play06:31

diagram

play06:33

outlining all application endpoints

play06:35

their relationships and zones

play06:38

the arrows between endpoints indicate

play06:40

the connectivity flows

play06:41

their health and directionality the

play06:44

diagram will also show for each

play06:46

application

play06:47

which network zone it's associated with

play06:50

for example

play06:51

part of the crm application is hosted in

play06:53

the pci zone

play06:56

moving forward into the vulnerability

play06:58

and risks section

play06:59

we begin to see how appvids allows

play07:01

application owners to gain visibility to

play07:04

and own the risk their applications

play07:06

introduce into environments

play07:08

today in most organizations network and

play07:10

security teams

play07:11

unknowingly own the risks introduced by

play07:14

security policy changes

play07:16

appviz allows application owners their

play07:18

own tailored view

play07:19

into the risks which their applications

play07:21

introduce

play07:22

allowing a clearer understanding and

play07:24

informed remediation efforts

play07:27

for example if this application now

play07:29

connects to a new database

play07:31

once that database is added and scanned

play07:34

and if it's found to be vulnerable

play07:36

it's going to affect my security rating

play07:37

for the application

play07:40

here we can see that appvids provides a

play07:42

holistic security rating for the

play07:43

business application

play07:44

and the specific endpoints it utilizes

play07:46

to function

play07:47

based on the data collected from the

play07:49

vulnerability management tooling

play07:52

often undefined network space within

play07:54

vulnerability management tooling creates

play07:56

unquantified risk by simply not allowing

play07:59

successful scans

play08:01

appviz also provides a listing of

play08:03

unscanned servers

play08:04

these are endpoints which crm requires

play08:06

to function however no

play08:08

scanned data was available which amounts

play08:10

to unquantified risk in the environment

play08:15

the risks section utilizes algosec risk

play08:18

profiles to allow application owners to

play08:21

understand

play08:22

how their application connectivity flows

play08:24

overlap with device security policies

play08:27

which violate

play08:27

corporate governance in this example

play08:30

we see connectivity flow is violating

play08:33

infosec policy and allowing traffic

play08:35

into the pci zone which is a clear

play08:37

violation of any corporate network

play08:39

security standard

play08:40

this view will allow application owners

play08:42

to understand the risk their application

play08:44

is introducing to the network

play08:47

let's use our app vis functionality to

play08:50

see how application owners can manage

play08:52

connectivity requirements for their

play08:53

applications

play08:55

for this demonstration let's say the

play08:57

application owner needs to provision

play08:59

connectivity

play09:00

to a time clock server in aws

play09:03

appvis will automatically compute all

play09:05

the changes you need to make to the

play09:06

network infrastructure to

play09:08

maintain the existing connectivity but

play09:10

with this new ip address

play09:11

we can see here that app is open to

play09:13

change requests that will now be routed

play09:15

for approval

play09:16

per the organization's workflow and

play09:17

processes for handling changes

play09:20

all of this with no manual reviewing of

play09:22

excel spreadsheets

play09:23

no need to pass it to senior network

play09:25

engineers all of this complexity

play09:27

is handled under the hood by appviz

play09:30

we'll now continue with this ticket in

play09:32

the algosec change automation workflow

play09:35

fireflow fireflow

play09:38

is the operational glue that ties the

play09:40

suite together

play09:41

providing end-to-end intelligent

play09:43

orchestration and automation

play09:45

within this workflow is where algosec

play09:48

adds unique

play09:49

intelligence which you'll see during

play09:50

this demonstration

play09:52

we've just seen a submission of a change

play09:54

request via direct integration with

play09:56

appvids

play09:57

fireflow also exposes request templates

play10:00

for web-based submission

play10:01

industry-leading rich apis allowing for

play10:04

third-party integration

play10:05

and email xls parsing abilities to

play10:08

handle bulk submissions

play10:10

traditionally the majority of algosec

play10:12

customers will integrate fireflow with a

play10:14

third-party ticketing solution

play10:16

such as servicenow or remedy to avoid

play10:18

duplicate submission efforts

play10:21

regardless of which change request

play10:23

submission method is used

play10:24

all requests first pass through the

play10:26

initial planning stage

play10:28

the purpose of the initial plan is to

play10:30

automate a significant

play10:32

portion of work effort associated with a

play10:34

network analyst planning a change

play10:35

request

play10:36

we can observe that fireflow has

play10:38

automatically detected a change request

play10:40

is required on a checkpoint device

play10:42

a juniper device and an aws security

play10:45

group in the cloud

play10:47

if a network analyst processing a change

play10:49

request wishes to understand

play10:51

how algosec has selected devices

play10:53

requiring a change

play10:54

they can review the results by clicking

play10:56

find out why

play10:59

utilizing algosex traffic simulation

play11:01

functionality we've seen earlier

play11:03

the analysts can learn what are the

play11:05

devices and paths that require change to

play11:07

allow

play11:08

traffic to flow freely between two ips

play11:12

we can see that the requested traffic is

play11:14

actually permitted

play11:15

through the cisco nexus core switches in

play11:17

the data center and blocked by all

play11:19

devices onward

play11:20

including the aws security group in the

play11:22

cloud

play11:24

algosec's built-in already works check

play11:26

automatically closes

play11:28

changes where connectivity is already

play11:29

functioning in your environment

play11:31

on all devices and paths this reduces

play11:34

processing of unnecessary changes

play11:36

and eliminates potential for policy

play11:38

bloat on devices

play11:40

typically large customers see 15 to 20

play11:43

percent of changes

play11:44

close as already work this creates a

play11:47

tangible portion of the algosic fireflow

play11:49

roi

play11:51

by clicking on confirm devices we'll

play11:53

move to the next intelligent automation

play11:55

step

play11:56

the risk check the risk check

play11:59

enables our customers to proactively

play12:01

prevent net new policy risk from

play12:03

entering the environment

play12:05

the risk check automatically compares

play12:07

the traffic plan for implementation

play12:09

against the defined algosec risk profile

play12:12

defined to the chosen devices

play12:14

risk profiles which support the risk

play12:16

check can be tailored to your

play12:18

organization's specific network security

play12:20

guidance

play12:21

allowing for infinite combinations of

play12:23

requirement security governance

play12:26

we can see for example in this case that

play12:29

we have a high level risk

play12:30

where unauthorized traffic is allowed

play12:33

into the pci zone

play12:34

and a low level risk where ftp traffic

play12:37

is entering the network

play12:39

in reality we likely wouldn't approve

play12:41

such a risky change

play12:43

but for the sake of this demonstration

play12:45

we'll click approve and continue to the

play12:46

next intelligent step

play12:48

the work order the work order is where

play12:52

algosec fireflow begins to translate our

play12:55

requested traffic

play12:56

into security policies to be implemented

play12:58

on devices

play13:00

the work order aims to design the most

play13:02

efficient method of implementing

play13:04

policies

play13:05

this may involve reuse of existing

play13:07

objects modification of existing rules

play13:09

or creating new rules or objects

play13:12

this logic maintains the overall policy

play13:14

optimization integrity of the security

play13:16

policy

play13:17

by reusing existing objects and even

play13:19

opting for rule modifications were

play13:21

possible

play13:22

all the while while maintaining least

play13:24

privileged access

play13:27

as we now have a defined policy to be

play13:29

implemented on devices

play13:31

algosec active change technology can

play13:33

take over

play13:34

and implement these policies on devices

play13:36

requiring a change

play13:39

activechange technology is unique to

play13:41

algosec and allows us to provide

play13:42

end-to-end zero-touch automation

play13:45

customers can choose to stage or fully

play13:47

commit policy to devices

play13:49

depending on their comfort levels and

play13:51

goals for automation

play13:53

a single action can implement policy

play13:55

across multiple devices

play13:58

which may be entirely different brands

play13:59

of devices

play14:01

active change can also be configured to

play14:03

push policy during a specific device

play14:05

change window if desired

play14:07

now the policies have been implemented

play14:09

on devices we can move

play14:11

into smart validation smart validation

play14:14

should be thought of as

play14:16

automated peer review allowing

play14:18

implementation engineers to be confident

play14:20

changes are implemented

play14:22

and the business can proceed without

play14:23

delay under normal circumstances

play14:26

smart validation occurs entirely without

play14:29

human interaction

play14:30

and implementation engineers are

play14:31

notified if an issue occurs

play14:34

this information can quickly allow an

play14:36

implementation engineer to make the

play14:37

necessary corrections

play14:39

before the change window ends driving

play14:41

change for the business

play14:42

faster by clicking resolve the change

play14:46

request is now completed

play14:47

and audible in fireflow algosex

play14:51

automated change process

play14:52

saves customers time and eliminates

play14:54

human error

play14:55

each step in the workflow can be done

play14:57

manually or automatically

play15:00

many algoset customers choose to adopt

play15:02

the zero touch

play15:03

strategy algosec zero touch

play15:05

functionality

play15:06

allows any intelligent step in the

play15:08

workflow to occur without human

play15:10

interaction

play15:11

drastically speeding up change delivery

play15:13

to business owners

play15:15

for example if your organization is

play15:17

processing 100 requests per week

play15:19

it makes more sense to deeply assess the

play15:21

10 percent which introduce tangible risk

play15:24

versus all 100 requests less thoroughly

play15:27

the risk check can be zero touched

play15:29

enabled

play15:30

to automatically move changes forward

play15:32

which introduce no tangible risk

play15:35

this concludes and rounds out the entire

play15:37

security policy lifecycle

play15:40

let's move into firewall analyzer to

play15:42

discuss the reporting

play15:43

analytics and infrastructure

play15:45

fundamentals

play15:47

algosec firewall analyzer is a network

play15:50

abstraction

play15:50

and policy analysis component of the

play15:53

algosex security management solution

play15:56

it reaches out to all your firewalls

play15:58

routers

play15:59

and network infrastructure and collects

play16:01

log data configuration

play16:02

and routing information to deliver all

play16:05

of the suites reporting and analytics

play16:08

algostec firewall analyzer provides a

play16:10

wide variety of powerful

play16:11

actionable reports including risk

play16:13

analysis policy optimization

play16:16

troubleshooting regulatory compliance

play16:18

and many more

play16:20

let's start by diving into algosex

play16:22

network topology intelligence

play16:25

algosec's superscalable network map

play16:28

based on html5

play16:29

automatically compresses

play16:31

interconnections allowing clear

play16:33

visibility

play16:33

even in network topologies exceeding 30

play16:36

000 nodes

play16:37

algosec is a leader in traffic

play16:39

simulation accuracy

play16:40

within the security policy management

play16:42

space this proficiency comes through

play16:45

experience in the world's largest

play16:47

networks

play16:47

and support for wide range of routing

play16:49

implementations

play16:50

such as mpls multi-hop bgp

play16:54

nat l2 transparent devices vrfs and many

play16:58

others

play17:00

the same traffic simulations which

play17:01

underpin fireflow app vis

play17:03

and app change automation capabilities

play17:06

can run ad hoc within algosec firewall

play17:08

analyzer

play17:09

traffic simulation can quickly be used

play17:11

to drive troubleshooting during network

play17:12

connectivity issues

play17:14

enabling network analysts to determine

play17:17

it's not the firewall

play17:24

in this example of a traffic simulation

play17:26

we can observe

play17:27

traffic passing from the data center

play17:29

into the azure cloud

play17:30

through a cisco router we can also

play17:33

understand that a security group in

play17:35

azure is blocking this traffic

play17:38

this information can help us accelerate

play17:40

cloud migrations and troubleshooting

play17:41

when working on cloud migrations

play17:44

let's continue our demonstration by

play17:46

reviewing a specific analysis for a

play17:48

unique device

play17:49

in this case a palo alto networks

play17:51

firewall

play17:53

although the analysis is normalized and

play17:55

provides identical analytics across all

play17:57

supported vendors

play17:59

algosec provides point-in-time analysis

play18:02

of devices

play18:02

enabling thorough visibility to a number

play18:04

of aspects of the security policy

play18:07

the homepage of each analysis provides a

play18:09

high-level overview of all the available

play18:11

data including security ratings

play18:14

changes compliance optimization and more

play18:18

the first analysis section with tangible

play18:20

analytics

play18:21

is a risk section while fireflow aims to

play18:24

proactively prevent risk

play18:26

the risk report is a reactive method of

play18:28

viewing risk introduced by the firewall

play18:30

policy today

play18:32

based on the defined risk profile i can

play18:35

drill down on any specific risk to

play18:37

understand the details

play18:38

and exposure and drill deeper into the

play18:40

firewall policy creating this risk

play18:43

risky rules provide an alternative

play18:45

method of viewing device risk and

play18:47

vulnerabilities

play18:48

enabling you to understand the risk and

play18:50

vulnerabilities each particular policy

play18:52

introduces

play18:54

algosec integrates with vulnerability

play18:56

scanners to present the vulnerabilities

play18:58

associated with each risky rule

play19:00

for example we can see that this

play19:02

particular rule introduces these

play19:04

specific risks and a set of

play19:05

vulnerabilities that correlate to this

play19:07

specific risky rule

play19:10

simply by the nature of algosex

play19:12

visibility to devices

play19:13

we create an audit trail capturing all

play19:16

changes to rules

play19:17

objects topology and more

play19:20

continuing forward we have the policy

play19:22

optimization section

play19:24

the majority of algosec customers spend

play19:26

a significant amount of time

play19:28

reviewing policy optimization purely

play19:30

because of the amount of analytics

play19:31

available

play19:33

algosec provides all industry standard

play19:35

policy optimization opportunities

play19:37

including covered rules unused rules

play19:40

consolidation opportunities

play19:41

and more while it's valuable to provide

play19:44

policy optimization analytics

play19:46

making these results actionable allows

play19:49

organizations to quickly realize cleanup

play19:51

efforts

play19:52

algosec leads the industry by allowing

play19:54

policy optimization reporting to be

play19:56

actioned automatically

play19:58

significantly speeding up any policy

play20:00

cleanup effort

play20:02

simply by choosing policies eligible for

play20:04

cleanup and clicking disable

play20:06

i can automatically create a rule

play20:08

removal request in algosec fireflow

play20:10

to remove policies in a controlled

play20:13

automated and audible manner

play20:16

algosec provides a wide variety of

play20:18

regulatory compliance reporting

play20:20

automating efforts which are typically

play20:22

performed by outside consultants or

play20:24

internal auditors with the click of a

play20:26

button

play20:27

algosec automatically generates

play20:29

regulatory compliance for all leading

play20:31

industry standards including pci

play20:34

sox iso 2700 gdpr

play20:37

and many more each regulatory compliance

play20:40

report provides a standard pass

play20:42

fail report card view covering each

play20:44

specific requirement for the regulation

play20:47

to ensure continuous compliance

play20:50

finally baseline compliance performs os

play20:53

level configuration compliance auditing

play20:56

which can be tailored to your

play20:57

organization's specific platform

play20:58

security standards

play21:00

baseline compliance also provides a pass

play21:03

fail report card view

play21:04

for each defined compliance check

play21:07

scrolling further down through the

play21:08

report

play21:09

we can drill into a specific technical

play21:11

criteria

play21:12

for each test and rationale for any

play21:14

compliance failure

play21:18

this demo highlighted just a few of

play21:20

algosec's core capabilities which enable

play21:22

you to address a multitude of business

play21:24

challenges

play21:26

to summarize algoset gives you unified

play21:28

visibility and management of network

play21:30

security

play21:31

across the entire enterprise network on

play21:34

premise and in the cloud

play21:36

algosec also enables you to automate

play21:38

security change management

play21:40

reduce risk and ensure continuous

play21:42

compliance if you want to expand more in

play21:45

one of the topics we discussed today

play21:47

or learn about other algosec

play21:48

capabilities and use cases

play21:50

visit algosec.com and schedule a live

play21:53

personal demo

play21:54

today thank you so much for tuning in

Rate This

5.0 / 5 (0 votes)

الوسوم ذات الصلة
Network SecurityPolicy ManagementAutomationBusiness AlignmentCloud SecuritySDNOn-PremiseSecurity ComplianceRisk MitigationDemo ShowcaseAlgosec Solutions
هل تحتاج إلى تلخيص باللغة الإنجليزية؟