First, review all the compatibilities within different brands. You must be very clear what the different security zones are because a lot of the reports that come with AlgoSec will have a lot of false positives. You need to know what the network is like and what are the inside and outside zones, along with what the DMZ is. The security reports point out a lot of risks, but some are false. You must know why they're not true and do all the customizations for a better security rating.
systems security engineer at a tech company with 1-10 employees
Real User
Top 10
2022-12-04T19:35:00Z
Dec 4, 2022
I would rate AlgoSec a ten out of ten. A small part of our infrastructure is in the cloud, with the majority being on-prem. This solution is not an SMB-level solution. It's an enterprise-class solution. AlgoSec is the perfect solution for an organization that has multiple firewalls that can't be managed by a human or small team.
Network Infrastructure Engineer at Cigna/Express Scripts
Real User
2021-10-21T06:13:00Z
Oct 21, 2021
This is definitely a product that I recommend because of its ability to handle multiple requests at once, and check blocks. Having the Firewall Analyzer and the FireFlow utilization help to make your life much easier for firewall requests. I would rate this solution a ten out of ten.
Sr. Design Architect - Network Security at a retailer with 10,001+ employees
Real User
2021-08-03T07:15:00Z
Aug 3, 2021
AlgoSec FireFlow is an amazing tool that automates the firewall staging process for the support teams, but I don't know if it is a patented one from AlgoSec. We are currently in the process of adopting FireFlow. After FireFlow is installed and Firewall Analyzer gets the new policy onboarded or downloads a new policy from the Firewall Management servers, by using our risk profile, it will be able to identify the risky rules being implemented. It will give an overview to the cybersecurity team. So, the cybersecurity team will use it to define the posture of our perimeter firewalls and our internal firewalls. It is helpful, but it also depends on how good are your risk profiles. It is a great tool. There isn't any other tool that works in the same way. I would rate AlgoSec a nine out of 10.
I would advise knowing what you want to get out of the tool. Why do you want to use the tool? Is it just for a workflow as we use it, or is it the analysis? It seems there are other tools that equally do workflows as well. Then it comes down to your analysis in terms of what answers are you looking for, and then you evaluate if the tool can handle the questions to get the answers. In terms of AlgoSec providing full visibility into the risk involved in firewall change requests, what I've seen recently, which wasn't there a few years ago, is that it does risk analysis, and then it says something like no risks. The strange thing is even when it says no risks, the security people do not automatically approve the change. They still need to go over the nitty-gritty of the flow, which makes me ask the question about its value and how valuable is this. It can be two things. We either do not trust the tool, or the tool just doesn't give a correct assessment of the risks. That could be for multiple reasons. I don't know if this is something that comes out of the box and cannot be configured, or is this something where you need to tell the tool what is the security policy, and based on that, it will do the analysis. It anyways gives a score. I've seen it, but I doubt the usability of it. It has not reduced the time it takes to implement firewall rules in our organization. For me, the speed of delivery hasn't really changed because there is still internal validation, and that process takes a long time. This is basically independent of AlgoSec. I use it onsite and in the cloud environment. I use it in both, but I do not know which specific features AlgoSec has concerning clouds. I also don't know if it is good or bad when it comes to preparing for audits and ensuring our firewalls are in compliance. In terms of implementation, I can't say whether automation has helped to reduce human errors and misconfiguration. I can only say from another point of view. I'm doing academic research at the moment. My research is about the evolvability of firewall rule basis. The management of rule basis is pretty complicated and the bigger they become, the more complicated it gets. I've done some fundamental research on this, and I've come up with some interesting conclusions. I know that the information that I got from algorithms that I wrote myself, which are not fairly complicated, gives a lot more visibility in terms of what's wrong within the policy, as compared to what the tools do. I'm 100% sure of that. Based on what I've seen on AlgoSec and some webinars, there is a lot of information in there, but it doesn't give the real clarity on what's wrong with my rule base. I would rate AlgoSec a six out of 10.
Cyber Security Architect at a tech services company with 5,001-10,000 employees
Real User
2021-05-24T17:09:00Z
May 24, 2021
I probably wouldn't look at anything else if you're not going to integrate the API. Although a head-to-head trial is a good idea, a lot of people don't really have the time for all of that. Just start with AlgoSec. It is number one in a lot of markets for a reason. We work with multiple security vendors for different tools and functionality. AlgoSec is an absolute leader when it comes to integrating with the leading vendors. I need to have things that are leading their sectors because that is the only way of answering security controls for risk. We haven't had a breach as far as I know. However, I feel like if we were breached, this would be a critical tool because people would want to know what the firewalls saw. This is the best of the very best firewall tools. When you need something that tells you what is happening with top security devices and tools, this would be the first place where we would get intelligence about the breach. If we use AlgoSec, then we will use it 90 to 100 percent. If this solution gets the go ahead, then we may get the rest of the suite. Though, we are pretty much using the entire suite. I would rate this solid nine (out of 10).
IT Security Analyst at a retailer with 5,001-10,000 employees
Real User
2021-05-03T23:10:00Z
May 3, 2021
It has not really reduced the time it takes to implement rules in my organization. We use AlgoSec more for the clean-up after the fact. It's more of an after the fact tool that we use it for. It definitely has not helped simplify my job. It just cuts out the middleman of having to ask someone a very specific question. Identifying those are very hard to do, and we wouldn't be doing it if we didn't have AlgoSec to do it for us. If we had a couple of thousand rules in the firewall, it would be a number of increased things that the business would need to consider. We would need an additional firewall administrator to manage these rules. Rules would take a lot longer to be introduced into the firewalls. There's a delay in a developer spinning up a new server and then the firewall actually allows that new server through. There's just the overall complexity and documentation would take a lot longer if we had multiple rules. Even just the cleanup and management like general overhead would be significantly more. If you look at it that way, AlgoSec has saved the business maybe a couple of years of salary. It's simplified the rules to such a point where it's manageable. The rules are still manageable by fewer administrators. There is more human work. There's more flexibility for staff to be working in other areas as opposed to having multiple people assigned to the firewalls, looking at complex rule sets. It does the job. It's very good at taking something complex and simplifying it into something that's a lot easier to understand and manage. It's one of those tools that takes a little bit of time to get set up and used to, but once it does, it's very powerful with what it can do. I would rate AlgoSec a seven out of ten. The functionality on the platform is extremely good. But getting it set up and the complexity to install new features and stuff like that, brings it down a little bit.
Security Manager at a transportation company with 1,001-5,000 employees
Real User
2021-04-28T12:27:00Z
Apr 28, 2021
It does its job. I don't expect more than that. We use it to manage the firewall and the firewall is such a mature product, and everything is satisfied. We don't use it to help us in speeding up setting the firewall ruleset or doing testing phases, because our development cycle is a little bit different. The developers have to state what they need and then we apply it. We only use AlgoSec to cross-check when the testing result moves to production. It doesn't help us much in the development stage. In terms of the cloud, we are just beginning to build a CoE, a core of excellence. There are many other native solutions provided by the CSP and there are some CASPI solutions—CWP, PP, and CSPM—that will help us with the governance of firewalls or the network security policies. We haven't determined our direction yet.
I would rate AlgoSec as a nine out of 10. Overall, my experience with this tool and its technologies have been very good. I am aware that AlgoSec works with multiple vendors. We use it with FTD firewalls and SonicWall firewalls. We also have to integrate it with Check Point, Cisco, and Palo Alto. So, the solution is helpful when working with different vendors. For the integration part, it is very easy and user-friendly. We need to know about their rules, admin password, and the virtual IP address of the firewalls that we have to enter. After that, it provides the information and gets the topology.
Prevasio is an agentless cloud-native application protection platform (CNAPP) that provides increased visibility into security and compliance gaps, enabling cloud operations and security teams to prioritize risks and ensure compliance with internet security benchmarks.
Prevasio combines cloud-native security with SRI International's proprietary AI capabilities and AlgoSec’s expertise in securing 1,800 of the world’s most complex organizations.
First, review all the compatibilities within different brands. You must be very clear what the different security zones are because a lot of the reports that come with AlgoSec will have a lot of false positives. You need to know what the network is like and what are the inside and outside zones, along with what the DMZ is. The security reports point out a lot of risks, but some are false. You must know why they're not true and do all the customizations for a better security rating.
I would rate AlgoSec a ten out of ten. A small part of our infrastructure is in the cloud, with the majority being on-prem. This solution is not an SMB-level solution. It's an enterprise-class solution. AlgoSec is the perfect solution for an organization that has multiple firewalls that can't be managed by a human or small team.
This is definitely a product that I recommend because of its ability to handle multiple requests at once, and check blocks. Having the Firewall Analyzer and the FireFlow utilization help to make your life much easier for firewall requests. I would rate this solution a ten out of ten.
I would rate it a nine out 10. It would get a perfect 10 if they fixed the many bugs in the new version.
AlgoSec FireFlow is an amazing tool that automates the firewall staging process for the support teams, but I don't know if it is a patented one from AlgoSec. We are currently in the process of adopting FireFlow. After FireFlow is installed and Firewall Analyzer gets the new policy onboarded or downloads a new policy from the Firewall Management servers, by using our risk profile, it will be able to identify the risky rules being implemented. It will give an overview to the cybersecurity team. So, the cybersecurity team will use it to define the posture of our perimeter firewalls and our internal firewalls. It is helpful, but it also depends on how good are your risk profiles. It is a great tool. There isn't any other tool that works in the same way. I would rate AlgoSec a nine out of 10.
I would advise knowing what you want to get out of the tool. Why do you want to use the tool? Is it just for a workflow as we use it, or is it the analysis? It seems there are other tools that equally do workflows as well. Then it comes down to your analysis in terms of what answers are you looking for, and then you evaluate if the tool can handle the questions to get the answers. In terms of AlgoSec providing full visibility into the risk involved in firewall change requests, what I've seen recently, which wasn't there a few years ago, is that it does risk analysis, and then it says something like no risks. The strange thing is even when it says no risks, the security people do not automatically approve the change. They still need to go over the nitty-gritty of the flow, which makes me ask the question about its value and how valuable is this. It can be two things. We either do not trust the tool, or the tool just doesn't give a correct assessment of the risks. That could be for multiple reasons. I don't know if this is something that comes out of the box and cannot be configured, or is this something where you need to tell the tool what is the security policy, and based on that, it will do the analysis. It anyways gives a score. I've seen it, but I doubt the usability of it. It has not reduced the time it takes to implement firewall rules in our organization. For me, the speed of delivery hasn't really changed because there is still internal validation, and that process takes a long time. This is basically independent of AlgoSec. I use it onsite and in the cloud environment. I use it in both, but I do not know which specific features AlgoSec has concerning clouds. I also don't know if it is good or bad when it comes to preparing for audits and ensuring our firewalls are in compliance. In terms of implementation, I can't say whether automation has helped to reduce human errors and misconfiguration. I can only say from another point of view. I'm doing academic research at the moment. My research is about the evolvability of firewall rule basis. The management of rule basis is pretty complicated and the bigger they become, the more complicated it gets. I've done some fundamental research on this, and I've come up with some interesting conclusions. I know that the information that I got from algorithms that I wrote myself, which are not fairly complicated, gives a lot more visibility in terms of what's wrong within the policy, as compared to what the tools do. I'm 100% sure of that. Based on what I've seen on AlgoSec and some webinars, there is a lot of information in there, but it doesn't give the real clarity on what's wrong with my rule base. I would rate AlgoSec a six out of 10.
I probably wouldn't look at anything else if you're not going to integrate the API. Although a head-to-head trial is a good idea, a lot of people don't really have the time for all of that. Just start with AlgoSec. It is number one in a lot of markets for a reason. We work with multiple security vendors for different tools and functionality. AlgoSec is an absolute leader when it comes to integrating with the leading vendors. I need to have things that are leading their sectors because that is the only way of answering security controls for risk. We haven't had a breach as far as I know. However, I feel like if we were breached, this would be a critical tool because people would want to know what the firewalls saw. This is the best of the very best firewall tools. When you need something that tells you what is happening with top security devices and tools, this would be the first place where we would get intelligence about the breach. If we use AlgoSec, then we will use it 90 to 100 percent. If this solution gets the go ahead, then we may get the rest of the suite. Though, we are pretty much using the entire suite. I would rate this solid nine (out of 10).
It has not really reduced the time it takes to implement rules in my organization. We use AlgoSec more for the clean-up after the fact. It's more of an after the fact tool that we use it for. It definitely has not helped simplify my job. It just cuts out the middleman of having to ask someone a very specific question. Identifying those are very hard to do, and we wouldn't be doing it if we didn't have AlgoSec to do it for us. If we had a couple of thousand rules in the firewall, it would be a number of increased things that the business would need to consider. We would need an additional firewall administrator to manage these rules. Rules would take a lot longer to be introduced into the firewalls. There's a delay in a developer spinning up a new server and then the firewall actually allows that new server through. There's just the overall complexity and documentation would take a lot longer if we had multiple rules. Even just the cleanup and management like general overhead would be significantly more. If you look at it that way, AlgoSec has saved the business maybe a couple of years of salary. It's simplified the rules to such a point where it's manageable. The rules are still manageable by fewer administrators. There is more human work. There's more flexibility for staff to be working in other areas as opposed to having multiple people assigned to the firewalls, looking at complex rule sets. It does the job. It's very good at taking something complex and simplifying it into something that's a lot easier to understand and manage. It's one of those tools that takes a little bit of time to get set up and used to, but once it does, it's very powerful with what it can do. I would rate AlgoSec a seven out of ten. The functionality on the platform is extremely good. But getting it set up and the complexity to install new features and stuff like that, brings it down a little bit.
It does its job. I don't expect more than that. We use it to manage the firewall and the firewall is such a mature product, and everything is satisfied. We don't use it to help us in speeding up setting the firewall ruleset or doing testing phases, because our development cycle is a little bit different. The developers have to state what they need and then we apply it. We only use AlgoSec to cross-check when the testing result moves to production. It doesn't help us much in the development stage. In terms of the cloud, we are just beginning to build a CoE, a core of excellence. There are many other native solutions provided by the CSP and there are some CASPI solutions—CWP, PP, and CSPM—that will help us with the governance of firewalls or the network security policies. We haven't determined our direction yet.
I would rate AlgoSec as a nine out of 10. Overall, my experience with this tool and its technologies have been very good. I am aware that AlgoSec works with multiple vendors. We use it with FTD firewalls and SonicWall firewalls. We also have to integrate it with Check Point, Cisco, and Palo Alto. So, the solution is helpful when working with different vendors. For the integration part, it is very easy and user-friendly. We need to know about their rules, admin password, and the virtual IP address of the firewalls that we have to enter. After that, it provides the information and gets the topology.