Hear from our customers: real users talk about AlgoSec


Getting honest, unbiased, real-life customer feedback is extremely valuable to both prospective customers and the product vendors themselves, but it’s not always easy to come by. IT Central Station, provides a great outlet for real users to share and their experiences with enterprise products. Here’s some of the latest feedback from real customers on how they’re using AlgoSec to manage their network security across their own organizations.

Cybersecurity brain drain: the silent killer


Many organizations are facing a cyber threat which is quietly and stealthily eroding their defenses. What’s worse, this threat cannot be detected by any enterprise security products, yet it presents a very real long-term risk to their organizations: the cybersecurity brain drain.

Protecting Web applications with network controls - Is it effective?


When it comes to securing Web sites and applications, many people rely on network-based controls to, presumably, keep everything in check. Be it next-generation firewalls, intrusion prevention systems, or dedicated WAFs, the assumption is that everything is safe and sound at the Web layer as long as one of these controls is in place. Based on the Web security vulnerabilities that I see in my work, I’m not convinced that it’s all that simple.

Cyber Security Awareness Month - AlgoSec’s recommendations for ‘Every Day Steps Towards Online Safety’


October is National Cyber Security Awareness Month. Organized by the Department for Homeland Security it is an annual campaign to raise awareness about cybersecurity. Staying safe online is, of course, at the core of AlgoSec’s business so in support of Cyber Security Awareness Month, we’ve taken a look back through our blogs post over the past year to provide our own ‘Every Day Steps Towards Online Safety’.

Combining security groups and NACLs to work around AWS capacity limitations


AWS security is very flexible and granular, however it has some limitations in terms of the number of rules you can have in a NACL and security group. In this blog post, Professor Wool explains how to combine security groups and NACLs filtering capabilities in order to bypass these capacity limitations and achieve the granular filtering needed to secure enterprise organizations.

Using AWS Security Groups and NACLs for advanced traffic filtering in the cloud


With AWS NACLs you can manage security tasks in a way that you cannot do with security groups alone. However, an AWS instance inherits security rules from both the security groups, and from the NACLs – so how do these interact? In this post Professor Wool provides some tips and tricks on how to use these two features together for the most effective and flexible traffic filtering for your enterprise.

Tips for managing application connectivity securely through a merger or acquisition


During a merger and acquisition, you have two enterprises each running complex IT infrastructures with hundreds if not thousands of applications. Usually, these applications don’t just simply integrate together – rather, some perform overlapping functions and need to be altered or extended; some need to be used in parallel; while others need to be decommissioned and removed. This means amending, altering and updating firewall policies to accommodate new connectivity, new applications and new servers and often new firewalls – crucially, without creating IT security risks or outages.

Adopting an application-centric approach to security management: getting business leaders interested

Kyle - board

IT security often believe that business managers may not be interested in an application-centric approach, as the effort to get there appears to be too much, when there is so much else to do. The key here is how to frame the issue to the business. If the business isn’t interested, the value proposition hasn’t been framed properly. It should be structured, above all, around business enablement, and the IT security team needs to see itself and be perceived as a trusted advisor to the rest of the business by ‘translating’ its own jargon into concrete business benefits.

Adopting an application-centric approach to security management: managing resources

Kyle - expectations

The key to an application centric approach is being able to identify and map critical applications and their respective traffic flows, and then associate them to vulnerabilities. This is critical in order to prioritize risk mitigation efforts based on business needs.

Adopting an application-centric approach to security management: we mature enough?

kyle - maturity

Rather than viewing security from the traditional posture of infrastructure and firewall rules, Security needs to be assessed from an application-centric perspective – specifically the business applications that actually generate revenue. Through this approach businesses identify and map their critical applications and their respective traffic flows, in order to understand how both the firewall rules and vulnerabilities affect them. In turn this enables IT teams to implement security policies and operational risk management which is entirely focused on serving the needs of the business.

Common causes of security oversight of today’s networks

kevin blog

As we get older we’ve all experienced that feeling of time passing faster and faster. What used to seem like a long year ahead to get various IT and security projects accomplished has turned into, Wow – where did the year go; we haven’t gotten hardly anything done! Experts say this is related to how aging brains view time and past experiences. There’s also the reality of more and more responsibilities as we move up through the ranks. The trouble with all of this, however, is the reality that the security of our network systems often takes a backseat and isn’t getting the attention it dese

New Professor Wool whiteboard video course on Network Security for VMware NSX


In preparation for VMworld next week Professor Wool has created a new whiteboard-style course on Network Security for VMware NSX. Each lesson focuses on a specific challenge of and provides technical tips for managing security policies across the VMware NSX software-defined data center and traditional data center.