Security Change Management

Every day firewall rules change, new access lists are created on routers, and temporary exceptions are configured for testing purposes. Since new projects always take priority, cleaning up often falls by the wayside.

Our tools can help you to optimize your rules through automated analysis, and perform ongoing security audits in accordance with your company's security policies. That way you can manage even complex rule sets, track rules according to the projects they were created for, and see when rules are no longer in use.

An integrated change management process allows various IT teams to all obtain insight what communication relationships exist, and how these are configured on the firewalls. Introducing a new system or removing an obsolete one is now an easy task. The entire change process is now transparent and many tasks can be automated.