arrow down
Arrow down
Arrow down
Arrow down

Platform honored for simplifying vulnerability management in network devices and end-points 

During a very busy RSA Conference, Forward Networks was named a market leader in vulnerability assessment, remediation, and management at the 12th annual Global Infosec Awards hosted by Cyber Defense Magazine. This is the second consecutive year that Forward Networks has taken top honors in security. 

Last year, NIST published 28,902 critical vulnerabilities. The volume and complexity of vulnerabilities make it virtually impossible for IT teams to ensure they are not vulnerable to cyberattacks. Forward Networks helps organizations ensure they are not exposed by creating a network digital twin that identifies exactly which vulnerabilities are present in the network and their severity and then delivers a prioritized remediation plan. Forward’s secure, agentless collection method gathers current device and state information and combines it with Forward’s proprietary mathematical model to create a digital twin of the network.  

It can be difficult to prioritize which vulnerabilities and devices should be updated first. Monitoring the latest descriptions and automatically checking them against the device configurations in the network is best performed by software. Forward Networks eliminates manual, error-prone hunting for those configurations on every single “possibly affected” device. The platform delivers an always accurate list of devices that are actually vulnerable. Remediation efforts can then be prioritized based on risk severity.  

Forward Exposure Analysis combines the host vulnerability data provided by vulnerability scanners like Rapid7 or Tenable with Forward Networks' modeling capabilities to help security teams prioritize vulnerability remediation. By integrating with these tools, Forward Networks empowers security teams to identify in seconds any impacted hosts with critical vulnerabilities that can be accessed from the Internet or any other critical exposure point. This provides SecOps teams with unprecedented visibility into their security posture and helps them prioritize vulnerability remediation with mathematical certainty.  

Many tools evaluate device vulnerabilities, but without the knowledge of how that device is connected to the network, SecOps teams only have a limited view of potential exposure. With established Rapid7 and Tenable integrations, Forward Networks is the only company that can show an organization’s actual risk, including on-premises, multi-cloud, and SD-WAN in an actionable, single screen.  

One of Forward’s customers confided, “Prior to adopting Forward Enterprise, the number of CVEs overwhelmed staff, and we were unable to respond to them all. We claimed the network was in compliance, even though we could not prove it. With Forward Enterprise, we immediately know if a CVE impacts our network, its severity, and have a remediation plan.”  

To learn more about how Forward Networks supports CVE remediation, read the use case or request a personalized technical session with one of our field engineers.

In the fast-paced world of cybersecurity, Security Operations (SecOps) teams face an ever-evolving landscape of threats and challenges. As a professional in the NetOps, SecOps, or CloudOps field, you understand the critical importance of staying ahead of cyber adversaries and safeguarding your network infrastructure. That's where Forward Networks steps in, offering innovative solutions that revolutionize SecOps by supercharging your network insights and capabilities.

Our Co-Founder, Nikhil Handigol offers "5 Ways to Supercharge SecOps with Network Insights," where he unveils how SecOps engineers can elevate their SecOps game using digital twin technology. Let's explore five key takeaways that can transform the way you approach security operations:

1. Unlocking Vulnerability Management: Navigating the vast sea of vulnerabilities across servers and applications can be daunting. With a true network digital twin, you can instantly see which vulnerabilities are present in your network ranked by severity, making it easy to prioritize remediation and have mathematical confidence the network is compliant.

2. Attack Surface Management: Understanding your network's attack surface is crucial in fortifying your defenses against cyber threats. With Forward Networks' advanced capabilities, proactively identify areas where your network is out of compliance and analyze your exposure. By visualizing attack vectors and vulnerable hosts, you can proactively defend your network infrastructure.

3. Harnessing the Power of Software: Modern networks demand sophisticated solutions that go beyond use-specific tools. By leveraging network digital twin technology, you can validate your network's security posture with precision. Say goodbye to manual validation processes and embrace the efficiency of AI-driven insights.

4. Enhancing Network Visibility: In the realm of SecOps, visibility is key. Forward Networks' digital twin empowers security engineers with comprehensive insights into network connectivity and configurations. Real-time visibility into your network's traffic flow and behavior enables proactive threat detection and rapid incident response.

5. Transforming Security Operations with Network Insights: Unleash the full potential of your Security Operations Center (SoC) by integrating network insights into your security strategy. With Forward Networks' cutting-edge solutions, bridge the gap between network operations and security, fostering collaboration and efficiency across teams.

Are you eager to learn more? Nikhil goes into greater detail and demonstrates how the network insights delivered by true digital twin technology can supercharge SecOps teams. View the session on demand.

Join the revolution in SecOps with Forward Networks and embrace a future where network security knows no bounds. Stay tuned for more insights, advancements, and partnerships that shape the future of cybersecurity.

If we were lucky enough to meet with you at Cisco Live EMEA – thank you for trusting us with your time! Thanks to great attendance and interest in our new Generative AI feature, we met more people than ever and had more 1:1 technical sessions than ever before. Did we miss you?

Not to worry, one of our sessions was recorded and is now available on demand.

Network Insights through Generative AI

Viewing this content is free but requires you to register.

Discover the transformative power of Generative AI in unlocking network insights with co-founder, Nikhil Handigol. In this session, Nikhil demonstrated how Forward Networks seamlessly incorporates generative AI into its network digital twin, revolutionizing the accessibility of crucial information for NetOps, SecOps, and CloudOps engineers.

Alternatively, view a more in-depth BrightTALK session.

Supercharging SecOps with Data and Visibility

Why is network data your most valuable asset to ensure compliance? Chiara Regale, SVP of Product and UX for Forward Networks, discusses our integrations with Tenable and Rapid7 and how our integrations deliver complete attack surface visibility that empowers SecOps teams to proactively identify impacted hosts with critical vulnerabilities accessible from the Internet or other critical exposure points within seconds. Due to technical difficulties, this session was not recorded. Please view, instead, this in-depth BrightTALK session.

Are you headed to Cisco Live U.S.? Then carve out some time to come talk to us. We’ll have our top technical experts and co-founders on hand to provide solutions to your toughest problems! If that’s not enough to entice you, we’ll have yummy treats, eye-popping drawings, and super-cool in-booth giveaways. Only a clown would miss it!

Cisco Live Amsterdam is kicking off in less than a week! We hope you'll stop by our stand (C13), grab a coffee from our barista, and learn about our new AI-supported feature, AI Assist, which was recently featured in Network World.

We're giving away three electric bikes! Attend a theater demo or talk to one of our onsite technical experts for a chance to win.

Theater presentations are every half-hour in the booth. Learn about:

Join our live sessions:

How a Global Financial Services Company Saved Millions with Accurate Data

Steve Allie, Vice President Technical Services

Wednesday, February 7 at 12:00 p.m. - 12:10 p.m. CET

Speakers Corner


Network Insights through Generative AI

Discover the transformative power of Generative AI in unlocking network insights with Co-Founder, Nikhil Handigol. In this session, explore how Forward Networks seamlessly incorporates generative AI into its network digital twin, revolutionizing the accessibility of crucial information for NetOps, SecOps, and CloudOps engineers.

Wednesday, February 7 at 2:30 p.m. - 2:50 p.m. CET

Partner Theater


Supercharging SecOps with Data and Visibility

Why is network data your most valuable asset to ensure compliance? Join Chiara Regale, SVP of Product and UX for Forward Networks, to explore our integrations with Tenable and Rapid7. The demo will highlight how our solutions deliver complete attack surface visibility that empowers SecOps teams to proactively identify impacted hosts with critical vulnerabilities accessible from the Internet or other critical exposure points within seconds.

Thursday, February 8 at 11:50 a.m. - 12:10 p.m. CET

Partner Theater

SANTA CLARA, Calif., Dec. 13, 2023 /PRNewswire/ -- Forward Networks announced today that it has been named to the Fortune Magazine 2023 Cyber 60 List. Fortune compiled this prestigious list of the 60 most successful companies in the cybersecurity space after reviewing a pool of several hundred entries.

Forward Networks is modernizing the way large networks are managed by providing actionable, accessible, and insightful data that puts operators back in control of the network. Forward's advanced software creates a mathematical model, or digital twin, of the network by collecting and analyzing state and configuration data across all network devices and public cloud environments. The digital twin delivers an always-accurate topology, calculates all possible paths within the network, analyzes detailed behavioral information, makes network configuration and behavior searchable and verifiable, and proves security compliance. Forward Networks' digital twin supports devices from all major networking vendors and cloud operators, including AWS, Azure, and Google Cloud Platform.

"Robust cybersecurity depends on detailed and accessible network data," said David Erickson, CEO and Co-Founder of Forward Networks. "Several years ago our customers asked us to create features that helped the SecOps team ensure compliance, remediate attacks, and ensure the overall health of their security posture. We've made significant investments in delivering on this request.  Being named to the 2023 Fortune Cyber 60 list is a tremendous honor that validates the security benefits of our network digital twin. We're continuing to develop new security features to protect the network."

Forward Enterprise enables SecOps teams to find misconfigurations and vulnerabilities on hosts and devices before a breach occurs. Using data collected from the network, integration with the NIST database, and integrations with vulnerability scanning and assessment tools, the platform identifies risks and delivers a prioritized remediation plan for SecOps teams. Forward Enterprise's security features include:

About the Fortune Cyber 60
The Cyber 60 was generated from a list of over 200 private cybersecurity companies based on data about funding rounds and valuation from Pitchbook. The companies selected were surveyed and asked to provide growth rate and revenue data in bands, to indicate their relative strength and success in the market. Publicly accessible reporting and other market data were used to add companies to the Pitchbook list. Respondents were required to provide data in order to be considered for the list. FORTUNE reviewed the data and list selection criteria with Lightspeed to ensure a fair and unbiased process. Some companies that chose not to provide data were considered for inclusion on the final list based on previously reported publicly available information. Lightspeed's Enterprise Investment Committee reviewed the final composition of the list prior to publication, in conjunction with FORTUNE. No private data or preferential treatment was given to Lightspeed portfolio companies.

Trying to convince SecOps teams they need more data is like trying to convince a drowning person they need more water. SecOps teams are so overwhelmed they can’t even respond to 67% of the alerts they receive. On average, SecOps teams receive 4,484 alerts per day and spend over three hours per day manually triaging the alerts, costing $3.3 billion annually in the US alone. (Source: Vectra 2023 State of Threat Detection)

The problem is that the high-volume of data they are receiving lacks context. When you receive over 20,000 CVE announcements and over 1.5 million alerts, you do not need more data; what you need is actionable, timely data that provides context and a path for remediation.

Forward Enterprise is integrated with the NIST database and endpoint scanning solutions, Rapid7 and Tenable. This integration provides security teams a prioritized remediation report of the vulnerabilities that exist in their network ranked by exposure.

Join our co-founder, Nikhil Handigol on Thursday, August 24th at 2:00 p.m. EDT/11:00 a.m. PDT to see this in action.

During a live technical session, Nikhil will demonstrate our Tenable integration and highlight how the solution delivers complete attack surface visibility, empowering SecOps to proactively identify impacted hosts with critical vulnerabilities accessible from the Internet or other critical exposure points in seconds.

You’ll see how the integration with Tenable delivers an actionable exposed host report that incudes:

Most importantly, Nikhil will demonstrate how a mathematical model of the network helps make the plethora of network vulnerability data actionable.

Register for your seat now. [If you miss the live session, it will be immediately available on-demand via that same link.]

Network complexity is at an all-time high. Between legacy technology, hybrid-multi-cloud environments, and networks cobbled together by mergers and acquisitions, it’s impossible for people to keep track of the network, its topology, and behavior. The idea of trying to trace a path through a multi-cloud network seems akin to being asked to pull a rabbit out of your hat.

Chris Gundermann of Gestalt IT recently wrote about “Multi-Cloud Security Requires Multi-Cloud Observability with Forward Networks.” Chris is an expert on networking and multi-cloud technology. In the article he covers the importance of observability and its benefits.

According to Gundermann, “Network observability serves as a linchpin for maintaining a secure and resilient network infrastructure. In the realm of multi-cloud, achieving that observability is even more challenging due to the absence of unified visibility across cloud platforms. Forward Networks has risen to that challenge by extending their digital twin technology to major cloud providers.”

Read the full article to understand how Forward Enterprise helps SecOps teams control their network and prevent incidents.

There is no shortage of alerts concerning security vulnerabilities. Unfortunately, the deluge of data available is overwhelming and not specific enough to be actionable. We don’t think that’s very helpful, so we’ve integrated our platform with Rapid7 InsightVM to ensure that our customers have full visibility into their security posture, including endpoints, and that they know how to prioritize remediation.

The Forward Enterprise platform already collects detailed topology, configuration, and state information across the on-premises network. This information and our mathematical model is used to create a digital twin of the network capable of determining all possible traffic paths. Combining this data with the end-point security visibility and analytics of Rapid7 provides SecOps teams unprecedented visibility into their security posture and helps them prioritize vulnerability remediation with mathematical certainty: SecOps teams are now able to identify within seconds which end-host impacted by critical vulnerabilities can be accessed from the internet and which compromised end-hosts can access internal critical infrastructure.

Given the ever-worsening security talent shortage, SecOps teams cannot afford to waste a single second. There are many tools that evaluate device vulnerabilities, but without the knowledge of how that device is connected to the network, security teams only have a limited view of potential exposure. Often, they choose to focus on keeping devices up to date no matter what vulnerabilities are detected, or they focus on vulnerabilities without considering the exposure of individual systems and devices. With the Rapid7 integration, Forward Networks is the only company that can show an organization’s actual risk including on-premises, multi-cloud, and SD-WAN in an actionable single screen. This type of data presentation helps teams focus on the work that will most impact the network.

The Rapid7 integration is part of Forward Networks’ ongoing commitment to support security professionals with actionable data, so less time is spent reacting, and more time is spent enhancing the security posture.

The Rapid7 integration is included in standard Forward Enterprise licensing at no additional cost. Learn more about the security capabilities of Forward Enterprise at: www.forwardnetworks.com/security

Last June, Forward Networks announced several enhancements to the platform designed to help SecOps teams prove compliance, automate CVE (common vulnerabilities and exposures) responses, and remediate threats quickly.

Today, we’re happy to share that we’ve continued to build out our security use cases by adding new functionality to our security posture security matrix (previously known as zone-to-zone security matrix) and delivering Layer 7 application connectivity analysis. The enhancements will help security teams quickly verify compliance with mathematical certainty or instantly identify unwanted connectivity or isolation at L2, L4, and L7.

New options for defining security zones

In its initial release, the security posture matrix feature used firewall rules to determine if zones had full, partial, or zero connectivity (and if the isolation was intentional or due to misconfiguration). We used this methodology in our first release because it's commonly relied on and understood by enterprise IT shops. However, with our expansion into the cloud and continued focus on providing value to our customers with minimal change to their routines, we’ve added new ways to define zones using the L2 through L4 segmentation methodology they’ve employed in their network, e.g. VRFs, on-premises and cloud subnets, and cloud security groups. This enhancement provides engineering teams the flexibility to view the matrix in the same manner as they’ve segmented their network.

In the Security Posture matrix, admins can immediately see which zones have full connectivity, partial connectivity, or zero connectivity (full isolation). Unlike traditional security tools, Forward Enterprise analyzes L2 through L4 traffic patterns, which makes it simple for administrators to determine if isolation is due to security policies or if access is dropping due to a misconfigured router, thus giving a full picture of what is happening, and why it is happening in a single-pane-of-glass.

Layer 7 Security Analysis

As security becomes more advanced, vendors such as Palo Alto Networks and Silver Peak have added the ability to regulate connectivity at L7 using attributes such as user IDs, user group IDs, and application IDs. This gives administrators more flexibility and granular control for protecting the network. To ensure that this flexibility comes with insight, Forward Enterprise has added path search capabilities at L7. Now, using the same procedure as L2 and L4 path tracing, administrators can construct more intelligent queries that detail connectivity and security posture at the application and user ID level.

By providing connectivity traceability at L7, we are enriching the troubleshooting capabilities for administrators, so they spend less time trying to define the problem and more time on proactive strategic initiatives. Within seconds, a path trace can determine if a connectivity issue is caused by application configuration or device configuration, putting the administrator that much closer to solving the issue.

As always, we are committed to making hard things easy for operations engineers. We are excited to offer these new capabilities within the platform and will continue to find new ways to glean insight into network behavior and present them in a normalized (vendor agnostic), intuitive, and actionable manner.

Top cross