How RedSeal’s cyber terrain analytics platform works.

The primary input for your network model comes from configuration files RedSeal takes in from switches, routers, firewalls and load balancers. RedSeal integrates with your public cloud and private cloud managers to include all your network environments in the network model. And, RedSeal’s cyber terrain analytics platform imports host and vulnerability data from vulnerability scanners and other sources.

This network modeling is done without agents, span ports or taps and without being in line with production traffic or consuming net flow data.

RedSeal Model Your As Built Network

With this information, RedSeal uses its patented algorithms to calculate an accurate model of your network and how data can move through it. You can liken this to the roads on a map. RedSeal can show you how (or if) data can move from any point to another with network modeling.

Next, in network modeling, RedSeal overlays the host and endpoint information, along with identified vulnerabilities. This is like placing houses and buildings along the roads – with information about broken doors and windows.

But, this is not a map, it’s a cyber risk model. A visual, responsive cyber risk model you can update daily, ask questions and learn from.

Risk and compliance managers can see if their network was set up as intended, and get alerts if anything changes. They can see if networking devices are securely configured and know exactly what line in the configuration to fix to make them more secure. RedSeal shows them their entire network and network security infrastructure, so they aren’t surprised by risks from datacenters they thought were decommissioned or unauthorized AWS instances. And, they will get a single metric — RedSeal’s Digital Resilience Score — to communicate with their executives. This metric can also demonstrate the network’s security posture to cyber insurance providers.

Vulnerability managers can identify areas of their network their scanners are missing and determine the best places to put those scanners. They can also improve their prioritization, since RedSeal’s cyber risk scoring calculates vulnerability risk scores that consider not only vulnerability severity and asset value, but also how accessible that vulnerability is from an untrusted network, such as the internet or a partner network. The network security risk score calculation includes assets downstream from the vulnerability.

Incident responders can speed their investigation and containment with the network situational awareness RedSeal supplies. RedSeal connects with SIEMs, quickly locating compromised devices and determining which assets bad actors could reach from there. RedSeal’s cyber situational awareness provides the specific information they need to implement containment options, so they can decide what action to take – from increasing monitoring to placing honey pots, to changing firewall rules, to simply unplugging the device.

Network security personnel, using the RedSeal cyber terrain analytics platform, will be able to validate and manage their network segmentation and see their network security infrastructure. They’ll be able to analyze proposed network changes and determine if they violate a policy or introduce new security risks.

Network operations personnel will benefit from one comprehensive view of their network infrastructure they can use for troubleshooting. They can get detailed access information across private cloud, public cloud and physical assets. And, they can see a record of changes to their network.

See how RedSeal works.

RedSeal Overview: How RedSeal Works

Understand the benefits RedSeal’s cyber terrain analytics platform can bring to your network.

RedSeal’s Model of Your Network

See how RedSeal provides the foundation for digital and cybersecurity resilience.

RedSeal Accelerates Incident Response

See how RedSeal’s cyber terrain analytics platform can accelerate your incident response time at every stage of the process.

Model Hybrid Data Centers with RedSeal

See how RedSeal can model all of your network, including public cloud, private cloud and physical assets. You’ll be able to see all access within and between environments.

[December 8 Webinar] Help Your Auditors Help You -Register Now