IT infrastructures can include firewall, attack prevention systems and network products from many different manufacturers. Configurations on these components need to be checked for compliance with certain regulatory and institutional standards. Some features can be used at this point;
With the help of Firewall Control, you can perform many independent checks, normalization, hidden risk factors, weakness analysis on all firewalls within your infrastructure within the framework of specific legislation, corporate standards and special criteria you can determine and you can get customized reports for them.
With the help of Network Configuration Control, it provides network visibility from medium-sized infrastructures to large-scale infrastructures. You can create a network topology model, including end-to-end physical, virtual, and cloud infrastructure, and control compliance with legislation and enterprise standards using all network components on the resulting model. You can also test targeted configuration test scenarios and communication problems on the generated network model.
With the help of Change Control, you can put all the changes on the firewall components in the infrastructure into a workflow and follow up the process by the security units. In this way, every rule change can be converted into a demand and checked whether it is implemented in a way appropriate to the workflow.