What is our primary use case?
We use it for planning firewall changes and traffic simulation queries.
We use AFA (AlgoSec Firewall Analyzer) and FireFlow. Our network environment is mostly on-premises.
How has it helped my organization?
It has improved the way our organization functions in that, for our change process, we now require all changes to be planned using AlgoSec so that the security team has visibility into the changes and we're aware of any risks. We also are using the covered rules and risky-rule detection to improve our security posture.
We haven't fully implemented the processes, so we haven't measured any reduction in human error as a result of using the solution, but subjectively, it has reduced human error.
It has also helped to simplify the jobs of our security engineers.
What is most valuable?
The most valuable features for us are the functionality it provides for our two main use cases: planning firewall changes and traffic simulation queries.
We haven't used it yet to prepare for audits and ensure our firewalls are in compliance, but I think it will be very helpful for that. That's one of the main reasons we bought it.
We are using it with a couple of Cisco technologies and we're also sending events out to our Microsoft Sentinel workspace. We have a couple of other security technologies in there as well. AlgoSec integrates well with the Cisco ACI environment and with our Firepowers, our FTDs. There are still some bugs but it generally works well.
What needs improvement?
The overall visibility it gives us into our network security policies is pretty good but it has some bugs and shortcomings. It doesn't support all features on our firewalls. For instance, planning changes, which include net rules, doesn't work. It didn't integrate so well with the ACI network. It doesn't work with all firewall rules or with net rules on our firewalls.
For about 70 percent of firewall changes it does show us the risks, while for 30 percent of the changes, we can't plan because of these bugs and shortcomings.
For how long have I used the solution?
I have been using AlgoSec for about a year.
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
We've had no problems in terms of scalability.
I'm sure we will continue to add firewalls to it and we want to do more with the FireFlow.
How are customer service and support?
Their technical support is good but it can be slow.
How would you rate customer service and support?
How was the initial setup?
The initial setup was straightforward.
We have about 10 engineers using it, and just one person who looks after it, maintenance-wise.
What about the implementation team?
We used their personal services to help us set it up. We had an onboarding package. It wasn't me doing the configuration but it seemed straightforward with their support.
Our experience with them was good overall. We had some frustrations and surprises in the early days with the product not being completely compatible with our environment. But over the last year, they've been fixing the bugs which is making it much more usable. When we started, it had a lot of problems with our environment. We were only able to plan something like 40 percent of the changes, and the traffic simulations weren't working with our network environment. But now, we're up to close to 70 percent.
It took about nine months before it was properly integrated and enough of the bugs had been fixed for it to be helpful.
What was our ROI?
We are not measuring the effort saved or the errors avoided, but we think it's a good investment.
What's my experience with pricing, setup cost, and licensing?
Initially, it was more expensive, but we managed to negotiate the price. It's about average now.
In addition to the standard fees, we bought the Jumpstart package to help us configure it.
Which other solutions did I evaluate?
We looked into Tufin. We chose AlgoSec because of its support for Cisco ACI. Tufin was just releasing that and we felt that AlgoSec was a more mature product.
What other advice do I have?
At the moment, it hasn't reduced the time it takes to implement firewall rules in our organization. It's being used to improve the quality of the changes we make and improve visibility. But we haven't fully implemented the FireFlow features. That's our problem, rather than the tool. We just haven't finished implementing it.
We're only using AlgoSec for on-premises, but we do have environments in the cloud and we plan to use it for those in the future. It would help us manage these multiple environments in a single pane of glass, but for the moment we aren't using it in that way. However, we do have a number of firewalls that we have onboarded from acquisitions, so we are not just using it for our data centers. We're using it for smaller acquisitions' firewalls as well to understand the security posture of companies that we are purchasing.
My advice would be to make sure that the solution is completely compatible with whatever infrastructure you have. We should have spent more time evaluating its support for our infrastructure to avoid some of the problems or surprises we had when we implemented it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.