SlideShare a Scribd company logo
Max Shirshov
+7-967-0693828
max.shirshov@algosec.com
AlgoSec Security Management Suite
Firewall Breaches Datacenter Automation
5% Vulnerabilities
95% Misconfiguration
The Security Management Balancing Act
Confidential 2
Security
Agility
Prevent Cyber
Attacks
Enable Business
Applications
Resource Time to
Provision
Server Minutes
Storage Minutes
Security
Access Days/Weeks
Security Management Challenges
Confidential 3
Complexity
• Thousands of security access
rules
• Highly-connected business
critical applications
Change
• Network changes -
virtualization, cloud,
acquisitions
• Applications changes -
agile development
Compliance
• Complex regulations and
internal mandates
• Time-consuming audits
Communication
• Disconnect between
application, security and
operation teams
• Terminology gaps
Challenges
Fast growing -
55% annual
growth in 2010-12
Company Overview
Confidential 4
1000+ customers
in 50 countries
including 15 of
the Fortune 50
The Leader in
Security Policy
Management
“Obsession”
for Customer
Satisfaction
Technology
Partners
Award Winning
Security
Management
Suite
Proudly serving over 1000 customers
5
Financial Telecom MSSP Energy Consultant Other
…
What Customers are Saying
Confidential 6
Because AlgoSec now does
the heavy lifting for us, our
engineers can focus more on
providing greater levels of
security than on process and
change
- Phil Packman, General Manager
Security Gateway Operations, BT
Security
Infrastructure
Business
Applications
Security Management at the Speed of Business
Confidential 7
Application Owners SecurityNetwork Operations
Faster Security
Provisioning for
Business
Applications
Align Teams for
Improved Agility
and Accountability
ROI in less than 1 Year!
Gain Total
Visibility and
Control of your
Security Policy
AlgoSec Security Management Suite
Security
Infrastructure
Business
Applications
The AlgoSec Suite - BusinessFlow
8
Application Owners SecurityNetwork Operations
AlgoSec Security Management Suite
BusinessFlow
Application-Centric Policy Management
• Align teams for faster security provisioning of critical
applications
• Visibility of connectivity requirements for improved
availability
• Translate business requirements to underlying policy
What Customers are Saying
Confidential 9
AlgoSec helped us reduce
80% of the time required to
migrate the security of our
applications as part of our
datacenter consolidation
project
- Bruno Rolleau, Network Security
Architect, Sanofi
Business
Applications
Security
Infrastructure
The AlgoSec Suite – Firewall Analyzer
Confidential 10
Application Owners SecurityNetwork Operations
AlgoSec Security Management Suite
BusinessFlow Firewall Analyzer
Security Policy Analysis
• Automate and streamline firewall operations
• Ensure a secure and optimized policy
• Conduct audits in hours instead of weeks
What Customers are Saying
Confidential 11
We could use AlgoSec to
prove compliance in a very
short period of time, taking
up much less resources for
audits
- Peter Erceg, Head of IT Security,
T-Mobile
Business
Applications
Security
Infrastructure
The AlgoSec Suite – FireFlow
Confidential 12
Application Owners
AlgoSec Security Management Suite
BusinessFlow FireFlow Firewall Analyzer
Security Policy Change Automation
• Process changes 2x-4x faster
• Improve accuracy and accountability
• Ensure continuous compliance and security
SecurityNetwork Operations
What Customers are Saying
Confidential 13
With AlgoSec, we reduced
change implementation
time by 50%, and achieved
significant cost savings
- Vincent Laurent, Head of IT
Security, Dexia Technology Services
Business Impact
Confidential 14
Annual Saving
Reduction in auditing expenses $192,000
Reduction in Change Request Processing Time $180,000
Reduction in Troubleshooting Resolution Time $90,000
Extended Lifespan of Hardware $47,500
Total Annual Savings $509,500
3 Year Savings $1,528,500
• Security provisioning of
business applications
2x-4x faster
• Significantly minimize outages
• Better protection against
cyber-attacks through correct
device configuration
• Improved organizational
alignment and accountability
• Productivity gains from
automation
• And… measurable ROI
Sample Organization
• 50 Network Firewalls
• Loaded IT cost - $60/hour
• 2 changes per firewall per month
Generate your own ROI report at AlgoSec.com/ROI
Deployment and Licensing
• Software Only
• Installed on a Linux server
Software Only
Deployment Options
Confidential 16
• Fast and simple installation
• Pre-installed, hardened Linux OS and AlgoSec software
• Ideal for consultants & auditors
• Simple, turnkey deployment
• Scales to the support the largest environments
• High-Availability via active/standby mode
• Data replication
• Load sharing for report generation
Model
Optimal
#Firewalls*
Max
#Firewalls*
2040 100 175
2160 600 1000
2320 1200 2000
AlgoSec Appliance
Virtual Appliance
* Number may vary based on the size of the policy and log files
Geographical Distribution
Master
Slave
Slave
Load Sharing (Clustering)
Active Standby
High-Availability/DR
Enterprise-grade solution with support for:
Confidential 17
Remote appliances collect data
and transmit it to a central
management appliance for
processing.
For large environments:
Report generation workload
shared across multiple
appliances.
Automatic synchronization
Automatic failover
Support for Disaster Recovery
Central
Manager
Remote
SiteRemote
Site
Remote
Site
Why AlgoSec
Confidential 18
Intelligent TechnologyThe Market Leader
Customer SatisfactionMore Automation
• Trusted by the most companies
• Unrivaled expertise, obtained through
serving the world’s leading
organizations
Hear from Customers!
AlgoSec.com/Testimonials
• Focus on business agility and
application-centric visibility
• Delivers the most actionable
results and highest accuracy
• Automating more business
processes
• Rich and customizable
automated workflows, out-of-
the-box
• All purchases backed by the
industry's only money-back-guarantee
• Easy to do business with
Learn more!
AlgoSec.com/Satisfaction
Connect with AlgoSec on:
www.AlgoSec.com
Security Management at the Speed of Business

More Related Content

What's hot

Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
AlgoSec
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
Liraz Goldstein
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
AlgoSec
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changes
AlgoSec
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management
AlgoSec
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
Tripwire
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Alert Logic
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
AlgoSec
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy Changes
AlgoSec
 
compliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarcompliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinar
AlgoSec
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
Alert Logic
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
AlgoSec
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
AlgoSec
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
Maytal Levi
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...
AlgoSec
 
Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
Maytal Levi
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Tripwire
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
AlgoSec
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
UTD Computer Security Group
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
AlgoSec
 

What's hot (20)

Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changes
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy Changes
 
compliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarcompliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinar
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...
 
Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
 

Similar to Algo sec suite overview 2013 05

Transformation As A Service
Transformation As A ServiceTransformation As A Service
Transformation As A Service
Papu Bhattacharya
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
AlgoSec
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
Skybox Security
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
terrencebarr
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
Eduardo Patrocinio
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
MarketingArrowECS_CZ
 
Blue Chip Tek Connect and Protect Presentation #1
Blue Chip Tek Connect and Protect Presentation #1Blue Chip Tek Connect and Protect Presentation #1
Blue Chip Tek Connect and Protect Presentation #1
Kimberly Macias
 
Arraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro PresentationArraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions
 
GE iFIX
GE iFIXGE iFIX
GE iFIX
GE코리아
 
EarthLink Business Cloud Hosting
EarthLink Business Cloud HostingEarthLink Business Cloud Hosting
EarthLink Business Cloud Hosting
Mike Ricca
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Dell World
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM Events
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
PROIDEA
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
Zscaler
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
CloudPassage
 
Mindshare Hosting Presentation
Mindshare Hosting PresentationMindshare Hosting Presentation
Mindshare Hosting Presentation
Christian_A_Breaux
 
Cloud Service Provider in India | Cloud Solution and Consulting
Cloud Service Provider in India | Cloud Solution and ConsultingCloud Service Provider in India | Cloud Solution and Consulting
Cloud Service Provider in India | Cloud Solution and Consulting
KAMLESHKUMAR471
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud finalsapenov
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
PT Datacomm Diangraha
 

Similar to Algo sec suite overview 2013 05 (20)

Transformation As A Service
Transformation As A ServiceTransformation As A Service
Transformation As A Service
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
Blue Chip Tek Connect and Protect Presentation #1
Blue Chip Tek Connect and Protect Presentation #1Blue Chip Tek Connect and Protect Presentation #1
Blue Chip Tek Connect and Protect Presentation #1
 
Arraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro PresentationArraya Solutions UPENN VMworld Intro Presentation
Arraya Solutions UPENN VMworld Intro Presentation
 
GE iFIX
GE iFIXGE iFIX
GE iFIX
 
EarthLink Business Cloud Hosting
EarthLink Business Cloud HostingEarthLink Business Cloud Hosting
EarthLink Business Cloud Hosting
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
 
Mindshare Hosting Presentation
Mindshare Hosting PresentationMindshare Hosting Presentation
Mindshare Hosting Presentation
 
Cloud Service Provider in India | Cloud Solution and Consulting
Cloud Service Provider in India | Cloud Solution and ConsultingCloud Service Provider in India | Cloud Solution and Consulting
Cloud Service Provider in India | Cloud Solution and Consulting
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud final
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
 

More from hoanv

Hd lab vpn ipsec site to - site
Hd lab vpn ipsec site   to - siteHd lab vpn ipsec site   to - site
Hd lab vpn ipsec site to - site
hoanv
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Presentation gamatronic
Presentation gamatronicPresentation gamatronic
Presentation gamatronichoanv
 
Nexans Catalog
Nexans CatalogNexans Catalog
Nexans Cataloghoanv
 
Liverpool hospital
Liverpool hospitalLiverpool hospital
Liverpool hospital
hoanv
 
Firetide introduction-2011
Firetide introduction-2011Firetide introduction-2011
Firetide introduction-2011hoanv
 
Emg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaperEmg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaper
hoanv
 
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405Forti gate ssl_vpn_user_guide_01-30004-0348-20070405
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405hoanv
 

More from hoanv (8)

Hd lab vpn ipsec site to - site
Hd lab vpn ipsec site   to - siteHd lab vpn ipsec site   to - site
Hd lab vpn ipsec site to - site
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Presentation gamatronic
Presentation gamatronicPresentation gamatronic
Presentation gamatronic
 
Nexans Catalog
Nexans CatalogNexans Catalog
Nexans Catalog
 
Liverpool hospital
Liverpool hospitalLiverpool hospital
Liverpool hospital
 
Firetide introduction-2011
Firetide introduction-2011Firetide introduction-2011
Firetide introduction-2011
 
Emg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaperEmg821511050D3 data center_whitepaper
Emg821511050D3 data center_whitepaper
 
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405Forti gate ssl_vpn_user_guide_01-30004-0348-20070405
Forti gate ssl_vpn_user_guide_01-30004-0348-20070405
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Algo sec suite overview 2013 05

  • 2. Firewall Breaches Datacenter Automation 5% Vulnerabilities 95% Misconfiguration The Security Management Balancing Act Confidential 2 Security Agility Prevent Cyber Attacks Enable Business Applications Resource Time to Provision Server Minutes Storage Minutes Security Access Days/Weeks
  • 3. Security Management Challenges Confidential 3 Complexity • Thousands of security access rules • Highly-connected business critical applications Change • Network changes - virtualization, cloud, acquisitions • Applications changes - agile development Compliance • Complex regulations and internal mandates • Time-consuming audits Communication • Disconnect between application, security and operation teams • Terminology gaps Challenges
  • 4. Fast growing - 55% annual growth in 2010-12 Company Overview Confidential 4 1000+ customers in 50 countries including 15 of the Fortune 50 The Leader in Security Policy Management “Obsession” for Customer Satisfaction Technology Partners Award Winning Security Management Suite
  • 5. Proudly serving over 1000 customers 5 Financial Telecom MSSP Energy Consultant Other …
  • 6. What Customers are Saying Confidential 6 Because AlgoSec now does the heavy lifting for us, our engineers can focus more on providing greater levels of security than on process and change - Phil Packman, General Manager Security Gateway Operations, BT
  • 7. Security Infrastructure Business Applications Security Management at the Speed of Business Confidential 7 Application Owners SecurityNetwork Operations Faster Security Provisioning for Business Applications Align Teams for Improved Agility and Accountability ROI in less than 1 Year! Gain Total Visibility and Control of your Security Policy AlgoSec Security Management Suite
  • 8. Security Infrastructure Business Applications The AlgoSec Suite - BusinessFlow 8 Application Owners SecurityNetwork Operations AlgoSec Security Management Suite BusinessFlow Application-Centric Policy Management • Align teams for faster security provisioning of critical applications • Visibility of connectivity requirements for improved availability • Translate business requirements to underlying policy
  • 9. What Customers are Saying Confidential 9 AlgoSec helped us reduce 80% of the time required to migrate the security of our applications as part of our datacenter consolidation project - Bruno Rolleau, Network Security Architect, Sanofi
  • 10. Business Applications Security Infrastructure The AlgoSec Suite – Firewall Analyzer Confidential 10 Application Owners SecurityNetwork Operations AlgoSec Security Management Suite BusinessFlow Firewall Analyzer Security Policy Analysis • Automate and streamline firewall operations • Ensure a secure and optimized policy • Conduct audits in hours instead of weeks
  • 11. What Customers are Saying Confidential 11 We could use AlgoSec to prove compliance in a very short period of time, taking up much less resources for audits - Peter Erceg, Head of IT Security, T-Mobile
  • 12. Business Applications Security Infrastructure The AlgoSec Suite – FireFlow Confidential 12 Application Owners AlgoSec Security Management Suite BusinessFlow FireFlow Firewall Analyzer Security Policy Change Automation • Process changes 2x-4x faster • Improve accuracy and accountability • Ensure continuous compliance and security SecurityNetwork Operations
  • 13. What Customers are Saying Confidential 13 With AlgoSec, we reduced change implementation time by 50%, and achieved significant cost savings - Vincent Laurent, Head of IT Security, Dexia Technology Services
  • 14. Business Impact Confidential 14 Annual Saving Reduction in auditing expenses $192,000 Reduction in Change Request Processing Time $180,000 Reduction in Troubleshooting Resolution Time $90,000 Extended Lifespan of Hardware $47,500 Total Annual Savings $509,500 3 Year Savings $1,528,500 • Security provisioning of business applications 2x-4x faster • Significantly minimize outages • Better protection against cyber-attacks through correct device configuration • Improved organizational alignment and accountability • Productivity gains from automation • And… measurable ROI Sample Organization • 50 Network Firewalls • Loaded IT cost - $60/hour • 2 changes per firewall per month Generate your own ROI report at AlgoSec.com/ROI
  • 16. • Software Only • Installed on a Linux server Software Only Deployment Options Confidential 16 • Fast and simple installation • Pre-installed, hardened Linux OS and AlgoSec software • Ideal for consultants & auditors • Simple, turnkey deployment • Scales to the support the largest environments • High-Availability via active/standby mode • Data replication • Load sharing for report generation Model Optimal #Firewalls* Max #Firewalls* 2040 100 175 2160 600 1000 2320 1200 2000 AlgoSec Appliance Virtual Appliance * Number may vary based on the size of the policy and log files
  • 17. Geographical Distribution Master Slave Slave Load Sharing (Clustering) Active Standby High-Availability/DR Enterprise-grade solution with support for: Confidential 17 Remote appliances collect data and transmit it to a central management appliance for processing. For large environments: Report generation workload shared across multiple appliances. Automatic synchronization Automatic failover Support for Disaster Recovery Central Manager Remote SiteRemote Site Remote Site
  • 18. Why AlgoSec Confidential 18 Intelligent TechnologyThe Market Leader Customer SatisfactionMore Automation • Trusted by the most companies • Unrivaled expertise, obtained through serving the world’s leading organizations Hear from Customers! AlgoSec.com/Testimonials • Focus on business agility and application-centric visibility • Delivers the most actionable results and highest accuracy • Automating more business processes • Rich and customizable automated workflows, out-of- the-box • All purchases backed by the industry's only money-back-guarantee • Easy to do business with Learn more! AlgoSec.com/Satisfaction
  • 19. Connect with AlgoSec on: www.AlgoSec.com Security Management at the Speed of Business