Automate security policy management for business applications
Posted on 01 November 2012.
AlgoSec announced BusinessFlow, a new product that automates security policy management for business applications and provides the link between application connectivity requirements and the underlying security policy.


“Enterprise applications fuel an organization’s business, but network operations and application management are owned by different groups that have not had an effective way to bridge the gap between application connectivity requirements, network changes and the security policy,” said Avishai Wool, CTO, AlgoSec.

Managing the complex connectivity requirements of business applications is a struggle for nearly every large organization. Now, with BusinessFlow, application deployment and ongoing connectivity updates can be executed at a fraction of the time and firewall rules can be removed when applications are decommissioned - without impacting the performance or availability of other applications or creating security risks.

Part of the AlgoSec Security Management Suite, BusinessFlow leverages AlgoSec’s Deep Policy Inspection technology and integrates with AlgoSec Firewall Analyzer for policy analysis, traffic simulation and visualization, and AlgoSec FireFlow for security policy change management.

Additional capabilities include:

Automatic translation of application connectivity requirements to firewall rule changes – BusinessFlow allows administrators to process changes for evolving application connectivity requirements by automatically computing the necessary changes to the underlying firewall rules and triggering the relevant change requests in AlgoSec FireFlow.

Impact assessment of network changes on business applications – BusinessFlow provides visibility of the impact that network changes, such as server migrations, may have on business applications and triggers the necessary firewall change requests to ensure application availability.

Network access removal for decommissioned applications – BusinessFlow enables organizations to safely remove network access that is no longer required for decommissioned applications. This ensures that the security policy is hardened without impacting the availability or performance of other applications.

Centralized application connectivity portal – BusinessFlow provides a consolidated and up-to-date view of required application connectivity, enabling security and network teams to communicate more effectively with business application owners for accelerated service delivery.

Application connectivity mapping – BusinessFlow delivers discovery capabilities that enable firewall and router access rules to be automatically mapped to existing applications, reducing the time and effort to populate the centralized repository of application connectivity requirements.

Complete audit trail of all application connectivity changes – BusinessFlow simplifies audits and proof of compliance by maintaining a complete history of every change made to the application supporting both internal and external compliance mandates.





Spotlight

Leveraging network intelligence and deep packet inspection

Posted on 26 November 2014.  |  Tomer Saban, CEO of WireX Systems, talks about how deep packet inspection helps with identifying emerging threats, the role of network intelligence, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 28th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //