Products

Firewall Policy Builder

Locking down open security policies on your next generation firewall deployment is now made easy with firewall policy builder – allowing you to lock down in weeks rather than months or even years.

Group 81
Lock OPEN firewall security policies

Assists in locking down OPEN firewall security policies

Group 82
Reduce high security risks

Reduces exposure from high-risk OPEN security policies

Group 83
Meet compliance requirements

Helps meet compliance requirement of granular security policies on need to know basis

Group 84
NGFW firewall deployments

Assists in new NGFW firewall deployments in your data center where firewalls never existed

Firewall Policy Builder

Lock down OPEN Firewall Security Policies

Firewall Policy Builder will guide and help you drive security effectiveness through configuration optimization of NGFWs and NGIPS devices.

How It Works

The appliance is installed at the organization’s management network.

The newly deployed next-generation firewall sends traffic logs in the form of SYSLOG to the firewall policy builder tool which performs real-time analysis and storing the communication flow matrix in a series of complex databases.

Firewall Policy Builder

With custom developed advanced algorithms, the tool populates the database with the communication flow as the firewall continues to send traffic SYSLOG to the tool.

After sufficient time-span of a few weeks to capture sufficient traffic flow, that tool can then be instructed to the group, coalesce and combine traffic flow of similar characteristics. For example, ten source IP addresses communicating to the same destination IP address with five TCP and UDP ports are grouped into a single policy and single communication flow matrix.

Once grouped the firewall policy builder can then generate the CLI configuration commands of the grouped security policies in different formats.

Firewall policy builder supports various next-generation firewall technology vendors. Once the configuration commands are generated the IT department can simply copy and paste the configuration to the firewalls and apply the changes resulting in open security policies on firewalls being locked down in a short period of time.

Firewall Policy Builder

Technical Features

Firewall Policy Builder
Lock down OPEN Firewall Security Policies
Firewall Policy Builder will guide and help you drive security effectiveness through configuration optimization of NGFWs and NGIPS devices.
Firewall Policy Builder
How It Works

The appliance is installed at the organization’s management network.

The newly deployed next-generation firewall sends traffic logs in the form of SYSLOG to the firewall policy builder tool which performs real-time analysis and storing the communication flow matrix in a series of complex databases.

With custom developed advanced algorithms, the tool populates the database with the communication flow as the firewall continues to send traffic SYSLOG to the tool.

After sufficient time-span of a few weeks to capture sufficient traffic flow, that tool can then be instructed to the group, coalesce and combine traffic flow of similar characteristics. For example, ten source IP addresses communicating to the same destination IP address with five TCP and UDP ports are grouped into a single policy and single communication flow matrix.

Once grouped the firewall policy builder can then generate the CLI configuration commands of the grouped security policies in different formats.

Firewall policy builder supports various next-generation firewall technology vendors. Once the configuration commands are generated the IT department can simply copy and paste the configuration to the firewalls and apply the changes resulting in open security policies on firewalls being locked down in a short period of time.

Firewall Policy Builder
Technical Features

Interested in Firewall Policy Builder?

Assist your organization meet compliance requirements by locking down high-risk OPEN security policies in real-time.