Enforce rigorous network security policy hygiene by automatically analyzing hundreds of thousands of rules across firewall rule bases from multiple vendors – all from a single point. Map firewall network interfaces to security zones to ensure prohibited traffic cannot move between zones, and combine this with a comprehensive understanding of the rule base to:
Enforce clean, optimized, and compliant rule bases and take firewall performance to the next level. Identify and remediate unused, shadowed, redundant and overly permissive rules that would otherwise negatively impact performance and increase risk. Perform in-depth Rule Usage Analysis (RUA) to:
Monitor the configuration of every firewall platform in the estate to detect and mitigate vulnerabilities and drive down the risk of a breach. Analyze firewall configuration by device, vendor, and severity. Get instant insights into firewall platform configuration, hardening, baselining, and vulnerability status informed by the Skybox Threat Intelligence Service.
Maintain continuous compliance with firewall management best practices. Use out-of-the-box or custom policies to automatically ensure rule bases, network access, and platform configurations comply with industry best practices and vendor recommendations and reduce audit preparation time from weeks to minutes.
Track every firewall change across the estate to maintain compliance and ensure accountability. Analyze changes by firewall, type, implementer, and reconciliation status. Zoom in to identify current, new, deleted, and modified firewall access rules.
Compare current and previous rule bases side-by-side to see immediately what changes were made and: