From Gestalt IT

In today’s rapidly evolving digital landscape, maintaining a robust and secure network infrastructure is crucial for businesses. Network observability – which is the ability to gather updates with each collection contextual data and draw out valuable inference – plays a fundamental role in ensuring secure network operations. 

However, achieving observability is especially challenging in multi-cloud environments, where disparate cloud providers offer varying levels of visibility... [KEEP READING on Gestalt IT]

The Globee Awards for Disruptors recognizes and celebrates organizations and individuals who have significantly contributed to disruptive innovation across various industries. These awards acknowledge the trailblazers who have challenged the status quo, introduced groundbreaking ideas, and transformed traditional practices through their disruptive approaches.  

Forward Networks was honored because: 

Because the tools network and security operations use to validate connectivity and security for on-premises networking are entirely different from those used for the cloud, it’s nearly impossible for teams to verify that the security policy is being enforced on-prem and throughout the multi-cloud environment.  

Deploying traditional security controls is ineffective in the cloud since defensible perimeters are erased, component virtualization and decentralization obscures visibility, and automated configuration tools are required at scale. 

Using read-only permissions, Forward Enterprise collects config and state data from all on-premises devices, such as routers, switches, and firewalls. The SaaS platform uses publicly available APIs to gather similar read-only information from public cloud accounts to create a digital network twin encompassing physical, virtual, and cloud estates. This information is presented in an integrated (and vendor-agnostic) way, enabling engineers to verify compliance throughout the estate. Anytime a non-compliant change is detected within the cloud estate, the appropriate teams will receive specific, actionable information about which instantiation is non-compliant and why, enabling rapid resolution.  

Unique Cloud Security Features within Forward Enterprise: 

Single source of truth.

Networking, security, and cloud professionals can work from a consistent, always up-to-date set of facts when troubleshooting or verifying network behaviors, drastically reducing MTTR. 

Verification that cloud security posture complies with corporate policy.  

Users gain unprecedented access to behavioral data to hasten troubleshooting, prevent incidents, and deliver timely alerts any time a cloud configuration is outside of policy. Timely alerts enable teams to quickly remediate issues and limit risk. 

Secure, automated application provisioning in the cloud.  

Organizations can ensure that the connectivity configurations of new applications adhere to corporate governance policies. Eliminating manual policy checks streamlines the process, so applications can be launched with greater confidence and speed, and companies can recognize revenue on new offerings more quickly.  

Hop by hop visibility.  

Forward computes all possible traffic flows and provides detailed insight into how on-premises devices and cloud elements transform and direct traffic.  

Search capabilities across the entire estate. 

Forward performs complete end-to-end path analyses across the network for both on-premises and cloud infrastructure. Users can locate devices and access detailed information on their location, configuration, and state in milliseconds. 

Learn more about Forward Enterprise Cloud Security by reading the use case or requesting a demo.

PRNewswire

Forward Networks Wins Hot Company in Cloud Security Award in 11th Annual Global InfoSec Awards

SANTA CLARA, Calif., May 9, 2023 /PRNewswire/ -- Forward Networks announced today it has been recognized with the Hot Company in Cloud Security Award from Cyber Defense Magazine's 2023 Global InfoSec Awards. The company is revolutionizing the way large networks are managed through its advanced software that delivers a "digital twin" of the network, enabling network operators to visualize the network, confirm policy compliance, and simplify network management. The platform supports devices from all major networking vendors and cloud operators, including AWS, Azure, and Google Cloud Platform.

Forward Networks is the only company that provides an integrated view of the entire hybrid multi-cloud network with the ability to drill down to single devices or instances. This single source of truth provides NOC and SOC engineers the data and insight needed to ensure security policies are enforced and the network is reliable. By collecting and parsing information on all devices in the network and their behavior, Forward is taking the pain out of critical but tedious and time consuming tasks like identifying and remediating CVEs that impact the network, identifying the blast radius of a compromised host, understanding endpoint vulnerabilities and proving the security posture is being enforced as intended.

"We're honored to receive the Hot Company in Cloud Security award from Cyber Defense Magazine's Global InfoSec Awards," said David Erickson, CEO and co-founder, Forward Networks. "This award continues to build upon Forward's recent momentum as we achieved 139% year-over-year growth last year and raised a $50M Series D in January. We're focused on providing network and security teams alike with the tools they need to be successful, both in the cloud and on-premises."

Global InfoSec judges, all CISSP, FMDHS, CEH, certified security professionals, voted based on their independent review of submitted materials and were looking for best of breed, next generation InfoSec solutions.

"We scoured the globe looking for cybersecurity innovators that could make a huge difference and potentially help turn the tide against the exponential growth in cyber-crime. Forward Networks is absolutely worthy of this coveted award and consideration for deployment in your environment," said Yan Ross, Editor of Cyber Defense Magazine.

The full list of 2023 Cyber Defense Magazine Global InfoSec Award winners can be found here: http://www.cyberdefenseawards.com/

About Forward Networks
Forward Networks is revolutionizing the way large networks are managed. Forward's advanced software delivers a digital twin of the network, enabling network operators to ensure that the network is secure, reliable, and agile. The platform supports devices from all major networking vendors and cloud operators, including AWS, Azure, and Google Cloud Platform. Forward Networks was founded in 2013 by four Stanford Ph.D. graduates and is headquartered in Santa Clara, California. Investors include MSD Partners, Goldman Sachs, Andreessen Horowitz, Threshold Ventures, Section 32, Omega Venture Partners, and A. Capital. For more information, visit www.forwardnetworks.com.

About CDM InfoSec Awards
This is Cyber Defense Magazine's tenth year of honoring InfoSec innovators from around the Globe. Our submission requirements are for any startup, early stage, later stage, or public companies in the INFORMATION SECURITY (INFOSEC) space who believe they have a unique and compelling value proposition for their product or service. Learn more at www.cyberdefenseawards.com.

About Cyber Defense Magazine
Cyber Defense Magazine is the premier source of cyber security news and information for InfoSec professions in business and government. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products, and services in the information technology industry. We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conferences. CDM is a proud member of the Cyber Defense Media Group. Learn more about us at https://www.cyberdefensemagazine.com and visit https://www.cyberdefensetv.com and https://www.cyberdefenseradio.com to see and hear some of the most informative interviews of many of these winning company executives. Join a webinar at https://www.cyberdefensewebinars.com and realize that infosec knowledge is power.

[READ PRESS RELEASE on PR NEWSWIRE]

I don’t know which is more exciting: the fact that there’s no rain forecast for the next two weeks or that we’re hosting Cloud Field Day 16 at the Forward Networks headquarters in Santa Clara, CA. It’s a nice dose of synchronicity that we get a break in the rain to dry out and clean up and we get to host several of the top minds in cloud computing.

One of the toughest challenges our customers face is securing their traffic in a multi-cloud environment. Ensuring traffic passes through choke points in the on-prem network is hard enough; once it enters the cloud, traffic becomes much more difficult to monitor.  

Our co-founder, Peyman Kazemian, and senior cloud field engineer, Craig Johnson, will demonstrate how Forward Networks' digital twin can verify security policies in multi-cloud networks. We’re excited to show the delegates and attendees how our platform offers single-pane-of-glass visualization and verification across the entire network.  

Using the example of a company merger, Craig will demonstrate how we discover all possible traffic paths a packet can take and verify that security policies are enforced on-prem and in the cloud. 

Craig and Peyman are up first at 8:00 a.m. Pacific, Wednesday, January 25, 2023. You can view presentations live via the Tech Field Day LinkedIn page. If you can’t attend live, the recordings will be available on demand via YouTube.

By George Lawton, VentureBeat

Designing, testing, and provisioning updates to data digital networks depends on numerous manual and error-prone processes. Digital twins are starting to play a crucial role in automating more of this process to help bring digital transformation to network infrastructure. These efforts are already driving automation for campus networks, wide area networks (WANs), and commercial wireless networks... [READ MORE on VentureBeat]

By George Lawton, VentureBeat

This is the second of a two-part series. Read part 1 about the current state of networking and how digital twins are being used to help automate the process, and the shortcomings involved.

As noted in part 1, digital twins are starting to play a crucial role in automating the process of bringing digital transformation to networking infrastructure. Today, we explore the future state of digital twins – comparing how they’re being used now with how they can be used once the technology matures.... [READ MORE on VentureBeat]

By Craig Johnson, Senior Technical Solutions Architect, Forward Networks

Visibility and complexity, problems that have plagued cybersecurity and IT practitioners for decades, are still huge issues. A 2021 IDG survey found that 81% of practitioners struggle to identify the depth of a breach, and 68% find it challenging to identify what devices are in the network and its topology. This is not surprising. The network is now a piece of critical infrastructure that can't afford to go down, and its depth and breadth in the cloud and on premise is not something that many organizations could have imagined in the early ‘90s.

A Problem Already Too Big, and Growing

Security practitioners have always maintained that you cannot secure what you can't see, but what we can't see keeps growing. Take common vulnerabilities as an example. As of June 10, 2022, there were over 177,000 known CVEs (Common Vulnerabilities and Exposures) listed in the NIST Database. While security teams KNOW that remediating these vulnerabilities should be a priority, keeping up with numbers that high just isn't scalable for even the largest and most well-funded organizations.

While statistics may vary, security organizations are dealing with almost 55 critical vulnerabilities PER DAY  and some recent data shows that organizations are taking nearly two months to remediate critical risk vulnerabilities, with an average mean time to remediate (MTTR) of 60 days. This is due to sheer volume, as well as difficulty in sharing prioritized, actionable information in a manner that is easy for network engineers to understand and act on. For example, when the network team receives the information, it's a raw report lacking specificity (e.g. which alerts are new). Without this level of detail, the process is still time-consuming and prone to human error... [READ MORE on VMBLOG]

The cloud offers agility and speed for DevOps teams. Being able to spin up environments and create applications in a fraction of the time previously required helps organizations launch new capabilities for customers, employees, and vendors quickly. For most companies, this means reduced time to market and the ability to recognize revenue faster.

IT teams recognize the benefits of a DevOps culture, but they also know that by their very nature, new applications are prone to security errors that can put the business at risk. So, they require a security review prior to pushing new applications live. Nobody would argue with the need to ensure security compliance; however, most people would also agree that slowing down the process of launching new applications is not ideal. Companies today cannot afford to choose between speed and security — nor do they need to.

The only way to effectively address this issue is to automate the process of verifying the connectivity and security posture of cloud applications. Without automation, your IT teams cannot keep up with the demand to prove compliance for the rapidly growing volume of cloud applications.

The verification feature within the Forward Enterprise platform enables automated compliance checks for new applications in hybrid and multi-cloud environments. Developers are notified of the required changes if there's an issue, and compliant apps can be provisioned automatically with confidence. The intent and Network Query Engine (NQE) check feature also lets you continuously audit cloud configurations to prevent real-time changes from diluting security policy. If a non-compliant change is detected, the appropriate teams will receive specific, actionable data as to what the issue is and why it’s happening, enabling rapid resolution.

The ability to automate security for cloud app provisioning is just one of many powerful features in the Forward Enterprise platform that can help your organization reduce risk and enforce critical security policies as you deploy new cloud apps or migrate on-prem apps to the cloud. To learn more about how Forward Networks can help your business take the security and compliance guesswork out of cloud application deployment for good, read this use case or join our educational webinar.

Do cloud environments really have to be so foggy? Absolutely not. Yet, many enterprises have come to accept that not having full visibility into their cloud estate is just “how it is.”

That’s a risky position, as deploying or migrating third-party cloud platforms without a complete view of network traffic patterns can easily lead to security gaps and make troubleshooting a daunting task.

Most enterprises today use multiple cloud platforms like Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure as part of their hybrid cloud estate. Visualizing their environment for troubleshooting requires multiple applications and often several experts within the team. As cloud use expands and providers release new services, the visibility problem is worsening quickly — and exponentially.

Sure, network and security teams have tools to validate connectivity and security for on-premises networking. But they’re not useful for the cloud. It’s like asking your teams to use a drill to hammer a nail. Plus, each cloud provider has its own nomenclature, methodology, and toolset. What network or security pro has time to learn and master all of that?

Thankfully, they don’t even have to try (unless they really want to). Forward Networks can help your teams make sense of your organization’s cloud estate and ensure the same policies you have in place on-prem are being enforced in the cloud. We’ve extended the visualization, search, and verification capabilities of Forward Enterprise to support AWS, Azure, and GCP. The Forward Enterprise platform now enables engineers to visualize the entire cloud estate alongside the on-prem environment in a single, normalized (vendor agnostic) view.

Want to learn more about the Cloud features of Forward Enterprise? Visit www.forwardnetworks/cloud.

Try a free 14 day trial of Forward Cloud through AWS Marketplace.

Top cross