Cisco Live Amsterdam is kicking off in less than a week! We hope you'll stop by our stand (C13), grab a coffee from our barista, and learn about our new AI-supported feature, AI Assist, which was recently featured in Network World.
We're giving away three electric bikes! Attend a theater demo or talk to one of our onsite technical experts for a chance to win.
Theater presentations are every half-hour in the booth. Learn about:
How a Global Financial Services Company Saved Millions with Accurate Data
Steve Allie, Vice President Technical Services
Wednesday, February 7 at 12:00 p.m. - 12:10 p.m. CET
Discover the transformative power of Generative AI in unlocking network insights with Co-Founder, Nikhil Handigol. In this session, explore how Forward Networks seamlessly incorporates generative AI into its network digital twin, revolutionizing the accessibility of crucial information for NetOps, SecOps, and CloudOps engineers.
Wednesday, February 7 at 2:30 p.m. - 2:50 p.m. CET
Why is network data your most valuable asset to ensure compliance? Join Chiara Regale, SVP of Product and UX for Forward Networks, to explore our integrations with Tenable and Rapid7. The demo will highlight how our solutions deliver complete attack surface visibility that empowers SecOps teams to proactively identify impacted hosts with critical vulnerabilities accessible from the Internet or other critical exposure points within seconds.
Thursday, February 8 at 11:50 a.m. - 12:10 p.m. CET
SANTA CLARA, Calif., Dec. 13, 2023 /PRNewswire/ -- Forward Networks announced today that it has been named to the Fortune Magazine 2023 Cyber 60 List. Fortune compiled this prestigious list of the 60 most successful companies in the cybersecurity space after reviewing a pool of several hundred entries.
Forward Networks is modernizing the way large networks are managed by providing actionable, accessible, and insightful data that puts operators back in control of the network. Forward's advanced software creates a mathematical model, or digital twin, of the network by collecting and analyzing state and configuration data across all network devices and public cloud environments. The digital twin delivers an always-accurate topology, calculates all possible paths within the network, analyzes detailed behavioral information, makes network configuration and behavior searchable and verifiable, and proves security compliance. Forward Networks' digital twin supports devices from all major networking vendors and cloud operators, including AWS, Azure, and Google Cloud Platform.
"Robust cybersecurity depends on detailed and accessible network data," said David Erickson, CEO and Co-Founder of Forward Networks. "Several years ago our customers asked us to create features that helped the SecOps team ensure compliance, remediate attacks, and ensure the overall health of their security posture. We've made significant investments in delivering on this request. Being named to the 2023 Fortune Cyber 60 list is a tremendous honor that validates the security benefits of our network digital twin. We're continuing to develop new security features to protect the network."
Forward Enterprise enables SecOps teams to find misconfigurations and vulnerabilities on hosts and devices before a breach occurs. Using data collected from the network, integration with the NIST database, and integrations with vulnerability scanning and assessment tools, the platform identifies risks and delivers a prioritized remediation plan for SecOps teams. Forward Enterprise's security features include:
About the Fortune Cyber 60
The Cyber 60 was generated from a list of over 200 private cybersecurity companies based on data about funding rounds and valuation from Pitchbook. The companies selected were surveyed and asked to provide growth rate and revenue data in bands, to indicate their relative strength and success in the market. Publicly accessible reporting and other market data were used to add companies to the Pitchbook list. Respondents were required to provide data in order to be considered for the list. FORTUNE reviewed the data and list selection criteria with Lightspeed to ensure a fair and unbiased process. Some companies that chose not to provide data were considered for inclusion on the final list based on previously reported publicly available information. Lightspeed's Enterprise Investment Committee reviewed the final composition of the list prior to publication, in conjunction with FORTUNE. No private data or preferential treatment was given to Lightspeed portfolio companies.
Trying to convince SecOps teams they need more data is like trying to convince a drowning person they need more water. SecOps teams are so overwhelmed they can’t even respond to 67% of the alerts they receive. On average, SecOps teams receive 4,484 alerts per day and spend over three hours per day manually triaging the alerts, costing $3.3 billion annually in the US alone. (Source: Vectra 2023 State of Threat Detection)
The problem is that the high-volume of data they are receiving lacks context. When you receive over 20,000 CVE announcements and over 1.5 million alerts, you do not need more data; what you need is actionable, timely data that provides context and a path for remediation.
Forward Enterprise is integrated with the NIST database and endpoint scanning solutions, Rapid7 and Tenable. This integration provides security teams a prioritized remediation report of the vulnerabilities that exist in their network ranked by exposure.
Join our co-founder, Nikhil Handigol on Thursday, August 24th at 2:00 p.m. EDT/11:00 a.m. PDT to see this in action.
During a live technical session, Nikhil will demonstrate our Tenable integration and highlight how the solution delivers complete attack surface visibility, empowering SecOps to proactively identify impacted hosts with critical vulnerabilities accessible from the Internet or other critical exposure points in seconds.
You’ll see how the integration with Tenable delivers an actionable exposed host report that incudes:
Most importantly, Nikhil will demonstrate how a mathematical model of the network helps make the plethora of network vulnerability data actionable.
Register for your seat now. [If you miss the live session, it will be immediately available on-demand via that same link.]
Network complexity is at an all-time high. Between legacy technology, hybrid-multi-cloud environments, and networks cobbled together by mergers and acquisitions, it’s impossible for people to keep track of the network, its topology, and behavior. The idea of trying to trace a path through a multi-cloud network seems akin to being asked to pull a rabbit out of your hat.
Chris Gundermann of Gestalt IT recently wrote about “Multi-Cloud Security Requires Multi-Cloud Observability with Forward Networks.” Chris is an expert on networking and multi-cloud technology. In the article he covers the importance of observability and its benefits.
According to Gundermann, “Network observability serves as a linchpin for maintaining a secure and resilient network infrastructure. In the realm of multi-cloud, achieving that observability is even more challenging due to the absence of unified visibility across cloud platforms. Forward Networks has risen to that challenge by extending their digital twin technology to major cloud providers.”
Read the full article to understand how Forward Enterprise helps SecOps teams control their network and prevent incidents.
There is no shortage of alerts concerning security vulnerabilities. Unfortunately, the deluge of data available is overwhelming and not specific enough to be actionable. We don’t think that’s very helpful, so we’ve integrated our platform with Rapid7 InsightVM to ensure that our customers have full visibility into their security posture, including endpoints, and that they know how to prioritize remediation.
The Forward Enterprise platform already collects detailed topology, configuration, and state information across the on-premises network. This information and our mathematical model is used to create a digital twin of the network capable of determining all possible traffic paths. Combining this data with the end-point security visibility and analytics of Rapid7 provides SecOps teams unprecedented visibility into their security posture and helps them prioritize vulnerability remediation with mathematical certainty: SecOps teams are now able to identify within seconds which end-host impacted by critical vulnerabilities can be accessed from the internet and which compromised end-hosts can access internal critical infrastructure.
Given the ever-worsening security talent shortage, SecOps teams cannot afford to waste a single second. There are many tools that evaluate device vulnerabilities, but without the knowledge of how that device is connected to the network, security teams only have a limited view of potential exposure. Often, they choose to focus on keeping devices up to date no matter what vulnerabilities are detected, or they focus on vulnerabilities without considering the exposure of individual systems and devices. With the Rapid7 integration, Forward Networks is the only company that can show an organization’s actual risk including on-premises, multi-cloud, and SD-WAN in an actionable single screen. This type of data presentation helps teams focus on the work that will most impact the network.
The Rapid7 integration is part of Forward Networks’ ongoing commitment to support security professionals with actionable data, so less time is spent reacting, and more time is spent enhancing the security posture.
The Rapid7 integration is included in standard Forward Enterprise licensing at no additional cost. Learn more about the security capabilities of Forward Enterprise at: www.forwardnetworks.com/security
Last June, Forward Networks announced several enhancements to the platform designed to help SecOps teams prove compliance, automate CVE (common vulnerabilities and exposures) responses, and remediate threats quickly.
Today, we’re happy to share that we’ve continued to build out our security use cases by adding new functionality to our security posture security matrix (previously known as zone-to-zone security matrix) and delivering Layer 7 application connectivity analysis. The enhancements will help security teams quickly verify compliance with mathematical certainty or instantly identify unwanted connectivity or isolation at L2, L4, and L7.
In its initial release, the security posture matrix feature used firewall rules to determine if zones had full, partial, or zero connectivity (and if the isolation was intentional or due to misconfiguration). We used this methodology in our first release because it's commonly relied on and understood by enterprise IT shops. However, with our expansion into the cloud and continued focus on providing value to our customers with minimal change to their routines, we’ve added new ways to define zones using the L2 through L4 segmentation methodology they’ve employed in their network, e.g. VRFs, on-premises and cloud subnets, and cloud security groups. This enhancement provides engineering teams the flexibility to view the matrix in the same manner as they’ve segmented their network.
In the Security Posture matrix, admins can immediately see which zones have full connectivity, partial connectivity, or zero connectivity (full isolation). Unlike traditional security tools, Forward Enterprise analyzes L2 through L4 traffic patterns, which makes it simple for administrators to determine if isolation is due to security policies or if access is dropping due to a misconfigured router, thus giving a full picture of what is happening, and why it is happening in a single-pane-of-glass.
As security becomes more advanced, vendors such as Palo Alto Networks and Silver Peak have added the ability to regulate connectivity at L7 using attributes such as user IDs, user group IDs, and application IDs. This gives administrators more flexibility and granular control for protecting the network. To ensure that this flexibility comes with insight, Forward Enterprise has added path search capabilities at L7. Now, using the same procedure as L2 and L4 path tracing, administrators can construct more intelligent queries that detail connectivity and security posture at the application and user ID level.
By providing connectivity traceability at L7, we are enriching the troubleshooting capabilities for administrators, so they spend less time trying to define the problem and more time on proactive strategic initiatives. Within seconds, a path trace can determine if a connectivity issue is caused by application configuration or device configuration, putting the administrator that much closer to solving the issue.
As always, we are committed to making hard things easy for operations engineers. We are excited to offer these new capabilities within the platform and will continue to find new ways to glean insight into network behavior and present them in a normalized (vendor agnostic), intuitive, and actionable manner.