RedSeal Expands Hybrid Network Modeling Capabilities to Include Google Cloud PlatformNovember 6, 2019
With the addition of Google Cloud Platform, RedSeal consolidates network data from the most prevalent public and private cloud offerings including Amazon Web Services, Microsoft Azure, VMware NSX, Cisco ACI, as well as physical networks.
RedSeal is the only solution that automates fundamental cybersecurity activities, including evaluating devices to see if they’re securely configured, making sure there are no unintended access paths to critical data, monitoring network changes, and keeping a network compliant with relevant policies and regulations. Considered a force multiplier for existing security products, RedSeal increases confidence that there are no unintended openings in a network.
“Security teams, CISOs and CIOs struggle to understand their complex and dynamic network environments,” said Kurt Van Etten, chief product officer at RedSeal. “RedSeal gives them the visibility and understanding they need.”
RedSeal’s cyber risk modeling platform brings complex hybrid multi-cloud, software-defined networks and on-premise environments into one, unified model. With the unprecedented visibility RedSeal provides, teams can:
- Quickly visualize network risk, including all possible access across and within their entire network – whether intended or not. When a workload in the cloud is compromised, teams can determine if physical or SDN assets are also at risk.
- Discover unknown or unmanaged assets.
- Ensure the right controls are in place and the network remains in compliance with policies and regulations.
- Accelerate investigation of incidents and vulnerabilities and prioritize them based on risk to each network.
- Minimize impact of an attack, and keep valuable assets and operations
running in the face of cyberattacks.
RedSeal also delivers the Digital Resilience Score, a metric indicating a networks’ ability to respond to and rebound from incidents. The score measures how networks are actually set up, taking into account unmapped areas, how accessible vulnerabilities are – and where a compromised system could reach.