Try our new research platform with insights from 80,000+ expert users
reviewer1449057 - PeerSpot reviewer
Cloud and Digital Transformation Architect at a tech services company with 10,001+ employees
Real User
Feb 16, 2023
Risky-rule detection helps improve our security, but solution doesn't doesn't support all features on our firewalls
Pros and Cons
  • "The most valuable features for us are the functionality it provides for our two main use cases: planning firewall changes and traffic simulation queries."
  • "It doesn't support all features on our firewalls. For instance, planning changes, which include net rules, doesn't work. It didn't integrate so well with the ACI network."

What is our primary use case?

We use it for planning firewall changes and traffic simulation queries.

We use AFA (AlgoSec Firewall Analyzer) and FireFlow. Our network environment is mostly on-premises.

How has it helped my organization?

It has improved the way our organization functions in that, for our change process, we now require all changes to be planned using AlgoSec so that the security team has visibility into the changes and we're aware of any risks. We also are using the covered rules and risky-rule detection to improve our security posture.

We haven't fully implemented the processes, so we haven't measured any reduction in human error as a result of using the solution, but subjectively, it has reduced human error.

It has also helped to simplify the jobs of our security engineers.

What is most valuable?

The most valuable features for us are the functionality it provides for our two main use cases: planning firewall changes and traffic simulation queries.

We haven't used it yet to prepare for audits and ensure our firewalls are in compliance, but I think it will be very helpful for that. That's one of the main reasons we bought it.

We are using it with a couple of Cisco technologies and we're also sending events out to our Microsoft Sentinel workspace. We have a couple of other security technologies in there as well. AlgoSec integrates well with the Cisco ACI environment and with our Firepowers, our FTDs. There are still some bugs but it generally works well.

What needs improvement?

The overall visibility it gives us into our network security policies is pretty good but it has some bugs and shortcomings. It doesn't support all features on our firewalls. For instance, planning changes, which include net rules, doesn't work. It didn't integrate so well with the ACI network. It doesn't work with all firewall rules or with net rules on our firewalls.

For about 70 percent of firewall changes it does show us the risks, while for 30 percent of the changes, we can't plan because of these bugs and shortcomings.

Buyer's Guide
AlgoSec
March 2026
Learn what your peers think about AlgoSec. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,732 professionals have used our research since 2012.

For how long have I used the solution?

I have been using AlgoSec for about a year.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

We've had no problems in terms of scalability.

I'm sure we will continue to add firewalls to it and we want to do more with the FireFlow.

How are customer service and support?

Their technical support is good but it can be slow.

How was the initial setup?

The initial setup was straightforward.

We have about 10 engineers using it, and just one person who looks after it, maintenance-wise.

What about the implementation team?

We used their personal services to help us set it up. We had an onboarding package. It wasn't me doing the configuration but it seemed straightforward with their support.

Our experience with them was good overall. We had some frustrations and surprises in the early days with the product not being completely compatible with our environment. But over the last year, they've been fixing the bugs which is making it much more usable. When we started, it had a lot of problems with our environment. We were only able to plan something like 40 percent of the changes, and the traffic simulations weren't working with our network environment. But now, we're up to close to 70 percent.

It took about nine months before it was properly integrated and enough of the bugs had been fixed for it to be helpful.

What was our ROI?

We are not measuring the effort saved or the errors avoided, but we think it's a good investment.

What's my experience with pricing, setup cost, and licensing?

Initially, it was more expensive, but we managed to negotiate the price. It's about average now.

In addition to the standard fees, we bought the Jumpstart package to help us configure it.

Which other solutions did I evaluate?

We looked into Tufin. We chose AlgoSec because of its support for Cisco ACI. Tufin was just releasing that and we felt that AlgoSec was a more mature product.

What other advice do I have?

At the moment, it hasn't reduced the time it takes to implement firewall rules in our organization. It's being used to improve the quality of the changes we make and improve visibility. But we haven't fully implemented the FireFlow features. That's our problem, rather than the tool. We just haven't finished implementing it.

We're only using AlgoSec for on-premises, but we do have environments in the cloud and we plan to use it for those in the future. It would help us manage these multiple environments in a single pane of glass, but for the moment we aren't using it in that way. However, we do have a number of firewalls that we have onboarded from acquisitions, so we are not just using it for our data centers. We're using it for smaller acquisitions' firewalls as well to understand the security posture of companies that we are purchasing.

My advice would be to make sure that the solution is completely compatible with whatever infrastructure you have. We should have spent more time evaluating its support for our infrastructure to avoid some of the problems or surprises we had when we implemented it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Security Consultant at a computer software company with 501-1,000 employees
MSP
Jan 19, 2023
Is user-friendly, reduces the time it takes to implement firewall rules, and is stable
Pros and Cons
  • "One of the features that I like about AlgoSec is the topology table. It helps us understand where the traffic flows through, where it gets interconnected, and how the traffic flows from our device to the other device."
  • "Certain firewalls don't integrate with AlgoSec, and it would be great if this bug could be fixed."

What is our primary use case?

We have around 200 firewalls that we manage through AlgoSec. We use it for automation purposes in certain cases. We have 10 to 12 team members who use AlgoSec.

We have around 100 plus on-premises devices. However, we are moving over to the cloud. At present, we mainly have Microsoft Azure, and we are going to deploy AWS and Google Cloud soon.

We use AlgoSec FireFlow as well. 

How has it helped my organization?

The amount of time spent on doing simple tasks, such as adding a particular rule or giving access to a particular person, or doing the same repetitive task has been reduced. We don't have to manually look into duplicate rules or look into traffic that is not getting hits. It will be automatically taken into consideration by AlgoSec, and the information will be given to us so that we can take action on that part. It saved us a lot of time.

When the staff is doing the same repetitive task all the time, there will be errors. AlgoSec helped to reduce human error and misconfigurations to a great extent.

What is most valuable?

One of the features that I like about AlgoSec is the topology table. It helps us understand where the traffic flows through, where it gets interconnected, and how the traffic flows from our device to the other device.

The other good feature that I have come across is that it suggests best practices. For example, we had a case where there was a legacy rule that was a wide-open rule. AlgoSec identified what IP traffic got hit and based on that suggested allowing those particular IPs instead of maintaining a wide-open rule.

In terms of the overall visibility that AlgoSec gives into our network security policies, I like the best practice assessment in terms of compliance. It helps us deal with wide-open rules and duplicates, and provides suggestions on how the rules can be written, restructured, and reordered.

AlgoSec reduced the time it takes to implement firewall rules. Also when it is upgraded, which we are in the process of doing, when a user tries to raise a ticket, that ticket will be associated with AlgoSec FireFlow. Then, the user will be able to access it themselves.

We work with multiple security vendors, but not all vendors integrate with AlgoSec. As a result, our team has both AlgoSec and Tufin. In terms of integrations, it's going well so far.

AlgoSec helped to simplify the job of our security engineers. For example, a new user who tries to gain access will have to raise a case, and automation will take that into consideration. It helped us to disable rules that are not being utilized, merge any duplicate rules, and reorder rules based on traffic hits to have a good flow. Any rule works from top to bottom, and AlgoSec will place the major items at the top. These helped to reduce latency as well.

What needs improvement?

Certain firewalls don't integrate with AlgoSec, and it would be great if this bug could be fixed.

AlgoSec looks into compliance and is helpful. However, it would be nice to have validations that can run before the changes are posted and implemented. Now, if something goes wrong the user would need to reach out to us, and then we would have to troubleshoot. Instead of that, if there are validations for simple tasks, it would be great.

I've also heard from our AlgoSec vendor about a feature that is coming up in the future. With the topology table, we can see the interconnected devices to understand the traffic flow. I was told that with this new feature, if we find a blockage, maybe on a firewall, that we would be able to go to that firewall and allow traffic through a specific rule. This would be done just by right-clicking on that particular device and getting the change implemented through automation. This would be a helpful feature.

For how long have I used the solution?

I've been using AlgoSec for about a year.

What do I think about the stability of the solution?

The stability has been okay so far. There are a few bugs, but no device is perfect.

Which solution did I use previously and why did I switch?

We previously used FireMon and switched to AlgoSec because we were not satisfied with it. FireMon was good but was not user-friendly.

What other advice do I have?

I recommend AlgoSec because it has good features and is more user-friendly than FireMon. AlgoSec has fewer options in terms of tabs, so you'll be able to navigate and explore everything. From a technical point of view, AlgoSec is good for a newcomer. Therefore, I would give AlgoSec an overall rating of eight on a scale from one to ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
AlgoSec
March 2026
Learn what your peers think about AlgoSec. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,732 professionals have used our research since 2012.
reviewer2054421 - PeerSpot reviewer
R. Engineer at a tech services company with 11-50 employees
Real User
Jan 11, 2023
It helps us audit complex environments to ensure firewalls are in compliance
Pros and Cons
  • "The most valuable feature of AlgoSec is integration because it needs the be integrated with vendors' firewalls and other security products. AlgoSec has intelligent policy tuners."
  • "The documentation could be better."

What is our primary use case?

AlgoSec provides a secure connection between applications and helps customers maintain regulatory compliance.

How has it helped my organization?

The benefit depends on the type of client. Our banking customers are impressed with the compliance features, automatic policy installation, and FireFlow. They also realize performance improvements of approximately 20 percent. 

AlgoSec has simplified the work of security engineers. If I had to give that a grade, I would give it a nine out of ten. We used the solution to implement and manage micro-segmentation initiatives. Still, it has been limited since this is a private cloud version, and many of our customers use regular firewalls. 

We deal with customers with a mixture of environments, including private cloud, public cloud, and on-premises. Many of them have on-premises and private cloud environments. AlgoSec provides a single pane of glass for managing these mixed environments, making management more effortless. 

What is most valuable?

The most valuable feature of AlgoSec is integration because it needs the be integrated with vendors' firewalls and other security products. AlgoSec has intelligent policy tuners. 

It's easy to integrate AlgoSec with solutions from other vendors. It's currently integrated with the products of three or four vendors. We integrate AlgoSec with AppViz and other products to get complete visibility into our network policies, and FireFlow helps us manage risks from firewall change requests. It has reduced the time it takes to implement firewall rules by about 20%, according to the ROI calculator on the AlgoSec website. It varies, depending on the structure of the customer's environment. 

AlgoSec also helps us audit complex environments to ensure firewalls are in compliance. The benefit is marginal if there is only one firewall and a few policies, but it's significant when you have three firewall clusters and 60 devices. 

What needs improvement?

The documentation could be better. 

For how long have I used the solution?

I've been using AlgoSec for six years.

What do I think about the stability of the solution?

AlgoSec is stable.

What do I think about the scalability of the solution?

It's a scalable solution but there is room for improvement in that area. It has a high-availability structure, but some features need to be distributed using a collector, for example.

How are customer service and support?

I rate AlgoSec's support eight out of ten. I don't use it much, but it has improved greatly in the last two years. 

How would you rate customer service and support?

Positive

How was the initial setup?

Setting up AlgoSec isn't complicated. You can install it in half an hour, but the configuration time depends on the environment. Sometimes, it takes a day, but it could take up to a week to analyze the files, etc. We have a two-person team responsible for deployment and maintenance, but we also have partners. In all, we have about 10 technicians supporting our customers.

What's my experience with pricing, setup cost, and licensing?

I don't know about pricing because I'm a technical guy. I can say the licensing model is straightforward and should be in the future. It isn't an issue for our customers. 

What other advice do I have?

I rate AlgoSec an eight out of ten. I would recommend AlgoSec, depending on the client's structure and requirements. It's a good solution for regulatory compliance and analytics. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Distributor
PeerSpot user
Gabriel Borlean - PeerSpot reviewer
Network Specialist at UFST.dk
User
Aug 14, 2022
Great search tools, good firewall cleanup functionality, and very user-friendly
Pros and Cons
  • "The user-friendliness, visibility, compliance and efficiency are unparalleled in the industry."
  • "I would say that the cases opened with AlgoSec could be solved faster or escalated sooner to the senior engineers/2nd or 3rd tier."

What is our primary use case?

We use the solution for firewall management (with AFA - AlgoSec Firewall Analyzer) and application network visibility (with AppViz).  

We are running multiple firewalls and hundreds of users who request firewall connectivity.  

How has it helped my organization?

When it comes to a large organization with many vendors/partners, our firewalls are more easily managed using the AlgoSec AFA component.  The ease of use, visibility, compliance, and efficiency is unmatched in the industry. 

We have used AlgoSec AFA to have more visibility into the network and know what firewalls to activate. 

AlgoSec AFA has great search tools and firewall cleanup functionality. 

The Algsec AppViz is a newer Algosec element that we will use to improve application security and visibility in our complex network.

What is most valuable?

The firewall management tool and AppViz for application visibility and security in the network are great. 

The user-friendliness, visibility, compliance and efficiency are unparalleled in the industry. We have more visibility into the network and now we know what firewalls to activate. 

AlgoSec AFA has great search tools.

The firewall cleanup functionality is helpful. 

We also enjoyed the use of AlgoCare which speeds up the ticket troubleshooting process with AlgoSec Support.

What needs improvement?

I would say that the cases opened with AlgoSec could be solved faster or escalated sooner to the senior engineers/2nd or 3rd tier. AlgoSec Support is very good at responding very fast (faster than the required SLA) and very timely. Their engineers are based either in India or Israel. Each region has its sales person and technical engineer person.  

Another pet peeve is that there are hotfixes for new issues or bugs at least once a month, if not more frequently.  Overall, AlgoSec is trying to improve its case-resolution support team and process, and we are optimistic that our issues or bugs will be fixed much timelier.

For how long have I used the solution?

We've used the solution for over three years.

What do I think about the stability of the solution?

It is a very stable product.

What do I think about the scalability of the solution?

The solution is very scalable.

How are customer service and support?

Customer service and support are very prompt, always complying with SLAs. However, the time to resolution can be improved.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We did not use a different solution previously.

How was the initial setup?

The initial setup is very straightforward, and the online documentation and AlgoSec engineer support are more than adequate.

What about the implementation team?

We set up the solution in-house.

What was our ROI?

I am not privy to the financial benefits or ROI for this product.

What's my experience with pricing, setup cost, and licensing?

I am not privy to the cost of the product, as I am a Network Specialist.

Which other solutions did I evaluate?

The AlgoSec solution was selected before I joined the organization.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1901940 - PeerSpot reviewer
Network Engineer at a tech services company with 1,001-5,000 employees
Real User
Jul 7, 2022
It has worked very well for our compliance needs
Pros and Cons
  • "The solution provides us with full visibility into the risk involved in firewall change requests. This is very important for us because we are regulated according to the FDA. It shows us which changes have been made and why. So, it has worked very well for our compliance needs."
  • "I would rate the support as six or seven out of 10."

What is our primary use case?

We use FireFlow, AppViz, and AppChange. We use them mainly to visualize our firewalls.

We have three data centers, but we are also providing the public cloud as well.

How has it helped my organization?

We implemented it to get a better, clearer view. It has supported us very well.

The solution provides us with full visibility into the risk involved in firewall change requests. This is very important for us because we are regulated according to the FDA. It shows us which changes have been made and why. So, it has worked very well for our compliance needs.

AlgoSec is a tool that really supports our work in compliance and our customers' requirements, fulfilling their FDA requirements.

Our security has been stronger due to AlgoSec. We don't have human errors.

What is most valuable?

The most valuable feature is its ease of use.

It provides a very good, clear view. I really love the product. 

Overall, it gives a better overview of our firewalls. This is a tool that we cannot live without because it is easy to view and maintain.

For how long have I used the solution?

I have been using this solution for four years.

What do I think about the stability of the solution?

Overall, the stability is good. It supports our work. We are happy and our customers are happy.

What do I think about the scalability of the solution?

It has very good scalability.

How are customer service and support?

The technical support is fast and very good. I would rate the support as six or seven out of 10.

How would you rate customer service and support?

Neutral

What was our ROI?

We have seen ROI on time. AlgoSec has reduced the time it takes to implement firewall rules in our organization. It used to take around an hour, and we can now implement them in 20 minutes.

It is a good investment due to the losses that a customer will have if they are not aligning with the FDA. That would be in the millions, so it is a good investment from our side and the customer's side.

What's my experience with pricing, setup cost, and licensing?

Quality has a price. 

Which other solutions did I evaluate?

We have tried other vendors. This is the best solution that we came up with due to our requirements and demands.

What other advice do I have?

It is good for integrating with leading security vendors.

I would rate the solution as eight out of 10. If you have requirements with very strict alignment for firewall rule processes, then I would really recommend this product.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user1708719 - PeerSpot reviewer
Information Security Specialist at a financial services firm with 10,001+ employees
Real User
Nov 23, 2021
Provides a lot of information regarding network segmentation, and the information is very well organized
Pros and Cons
  • "Firewall Analyzer and AppViz are the most important features because they provide a lot of information regarding network segmentation. For us, this is a valuable input in order to provide network segmentation for various applications that we have developed in-house or that we bought from vendors. Our network is not properly segmented right now, but we plan to do it using AlgoSec. This is the most important feature for us right now."
  • "The Firewall Analyzer module can be improved to implement a vulnerability management solution, or they can link Firewall Analyzer with a vulnerability management solution in order to get a better overview of what's going on in our network in terms of vulnerabilities."

What is our primary use case?

We use AlgoSec Firewall Analyzer and AppViz. We have bought the FireFlow license, but we do not use it currently. We plan to use it, but we are not using it right now. 

Firewall Analyzer is helpful for network assurance and meeting some requirements of PCI DSS. 

We use it to manage only our on-prem environment. Our network environment is mostly on-prem. We do not use cloud networking. We have an internal cloud, which is hosted in the Netherlands, but it is like a private cloud.

How has it helped my organization?

It gives us a pretty good understanding of what's going on in our network in terms of network security policies. In terms of the overall visibility that it gives into our network security policies, I would rate it a nine out of 10.

For preparing for audits and ensuring that our firewalls are in compliance, Firewall Analyzer gives a great overview of what's going on with the firewalls in terms of rules, etc. It offers a great input for auditors or for reporting to auditors.

We use Firewall Analyzer in order to monitor the PCI DSS network area. It is helpful for meeting some requirements of PCI DSS.

We work with multiple security vendors. It works when it comes to integrating it with the leading vendors. We didn't have any problems integrating with the solutions of our top three vendors.

What is most valuable?

Firewall Analyzer and AppViz are the most important features because they provide a lot of information regarding network segmentation. For us, this is a valuable input in order to provide network segmentation for various applications that we have developed in-house or that we bought from vendors. Our network is not properly segmented right now, but we plan to do it using AlgoSec. This is the most important feature for us right now. We also plan to use FireFlow in order to automate the firewall change management.

What needs improvement?

The Firewall Analyzer module can be improved to implement a vulnerability management solution, or they can link Firewall Analyzer with a vulnerability management solution in order to get a better overview of what's going on in our network in terms of vulnerabilities.

For how long have I used the solution?

We started implementing AlgoSec in April this year.

What do I think about the stability of the solution?

So far, so good. We didn't have any problems. It is pretty stable.

What do I think about the scalability of the solution?

From what I've heard and what I've read on their portal, it is pretty scalable. There are no issues around this.

How are customer service and support?

We have not opened any tickets on the portal. We have a dedicated support person who assists us in the deployment. They are pretty fast to react. If I ask them a question today, they will respond very quickly.

Which solution did I use previously and why did I switch?

We didn't have a different solution.

How was the initial setup?

It was pretty straightforward. We started implementing AlgoSec in April this year. We are not fully into production, but we have been using it since May. Technically, it took less than a month, but we still have to do some paperwork in terms of security procedures, security monitoring, etc. So, it has been all paperwork from May till today.

The patching process of this solution is also pretty straightforward. They provide monthly patches, and it doesn't take a whole bunch of people to maintain it. Just one or two people can do the job.

What about the implementation team?

Even though we had a reseller involved in this process, we did it on our own but with a little help from AlgoSec.

What was our ROI?

We have not yet seen an ROI. We are currently at the beginning of implementing the solution, and there is still a lot of time before we see a return on investment.

What's my experience with pricing, setup cost, and licensing?

Price is not my concern. If a tool does its job, it is not my concern to obtain a good price for it. If a tool is needed, we are going to buy it.

Which other solutions did I evaluate?

We evaluated other solutions such as Skybox, Tufin. We found the graphical user interface of AlgoSec to be very user-friendly. It provides the information that you need. The information that you need is very well organized as compared to other solutions.

What other advice do I have?

It depends on your needs. If you want to have a better overview of your network, AlgoSec is a tool that you can rely on. You can have an overview of your network by using your own equipment, but you have to dig in deeper. AlgoSec provides better visibility with a little amount of effort.

We haven't had any breaches in the past. We have not used it to implement and manage microsegmentation initiatives. We use it for network segmentation, which is done at the network level which includes firewalls, switches routers, and so on. Network segmentation is an ongoing process. 

I would rate it a nine out of 10.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
it_user1575456 - PeerSpot reviewer
Sr. Network and Security Administrator at a insurance company with 501-1,000 employees
Real User
Jun 9, 2021
Out-of-the-box, you can run a compliance check against your environment that tells you exactly what needs to be fixed and why
Pros and Cons
  • "It gives us 100% visibility into our network security policies. It has given us a couple of surprises. Over the years, the network that we are administrating has been subject to people who have an idea of how a network should be set up. That differs from technician to technician or engineer to engineer. So, we are finding little pockets of hidden little self-engineered configurations and the way things were done that nobody knew about. Once the engineer left, the knowledge of that setup disappeared. You don't know about those until something either goes wrong, or you get something like AlgoSec to discover it for you, and it says, "Hey, there is this going on over here.""
  • "The reports are lacking information when they come out. They will not pull the URL or application information from Cisco FTDs. I know this works for Palo Alto Firewalls, which we currently do not have. If they could improve the integration with Cisco FTDs as a whole, that would be immensely helpful."

What is our primary use case?

We have actually played around quite a bit with the network flow piece of it (with the routers). That has helped us troubleshoot a few things with data flow and where it might be stopped or redirected to an incorrect location.

We use the following components of AlgoSec: AlgoSec Firewall Analyzer (AFA), FireFlow, and AppViz. We have a very limited cloud deployment at the moment.

We have a very complex network environment. It requires very specific compliance protocols to be put in place, including HIPAA compliance, PCI compliance, and HITRUST compliance. Therefore, we have very specific rules that we have to adhere to. We have 13 sites with very complex setups at each site to allow for redundancy and security, utilizing multiple vendors and technologies to achieve that. 

We are currently developing and going to have a hybrid deployment for the cloud and on-prem. Right now, 98% of our stuff is on-prem, and that will change. We are probably going to be about 75% on-prem and 25% in the cloud, which is very complex. This will allow our external vendors and external clients in as well as all our internal resources.

How has it helped my organization?

They have compliance rules built right into the system. Right out-of-the-box, you can run a compliance check against your environment that tells you exactly what needs to be fixed and why. Their compliance check is phenomenal. They even have a base compliance check. So, you can set your own standards to make sure that all your equipment meets those base compliances that you have for internal standards.

AlgoSec has reduced the time it takes to implement firewall rules in our organization. While our usage of it has been fairly limited to what we have tested so far, it has probably reduced the time by about 30%.

It gives us 100% visibility into our network security policies. It has given us a couple of surprises. Over the years, the network that we are administrating has been subject to people who have an idea of how a network should be set up. That differs from technician to technician or engineer to engineer. So, we are finding little pockets of hidden little self-engineered configurations and the way things were done that nobody knew about. Once the engineer left, the knowledge of that setup disappeared. You don't know about those until something either goes wrong, or you get something like AlgoSec to discover it for you, and it says, "Hey, there is this going on over here." 

It has helped us figure out how it was set up and why it was set up that way, then allowed us to engineer it so it fits a little better into our standards. We found a couple of secrets in our network that nobody would have known about. If we had an outage on those, nobody would have been able to figure them out without a tool like AlgoSec. This would have been a complete outage for our organization. Since we are healthcare insurance, that is a significant amount of money.

It has helped to simplify the job of our security engineers. We have a snapshot of where we are at with the correct data that we need to be able to fix the issues that we have. We keep finding little secret pockets of out-of-standard configurations that need to be addressed.

AlgoSec absolutely provides us with full visibility into the risk involved in firewall change requests. There is a risk analysis piece of it that allows us to go in and run that risk analysis against it, figuring out what rules we need to be able to change, then make our environment a little more secure. This is incredibly important for compliance and security of our clients. We deal a lot with patient health information that needs to be secure for physicians who are dealing with it and the patients themselves.

What is most valuable?

The most valuable for us so far has been the firewall rule analysis. Just to be able to get to a point where our infrastructure is secure and stable. The analysis runs everything that we actually need. When we run a report, we need to look at the report, then go back to the analysis because the analysis has all the information for us. We just have to match up the analysis to the report.

We have a security vendor who runs an analysis on the logs that we send them. We have multiple vendors who come in and do an annual security assessment. We have multiple vendors who come in and do an annual penetration test. We have vendors who deal with the end clients as well as vendors who deal with the servers for security, in addition to our firewalls, routers, and public interfaces. AlgoSec takes all of the information on our network, puts it into one single pane of glass where we can go and request what we need from the vendors. Plus, there are reports in AlgoSec that we can run and send out to our vendors so they have an eye into what we are looking at.

What needs improvement?

The reports are lacking information when they come out. They will not pull the URL or application information from Cisco FTDs. I know this works for Palo Alto Firewalls, which we currently do not have. If they could improve the integration with Cisco FTDs as a whole, that would be immensely helpful.

For how long have I used the solution?

We are actually in the process of purchasing AlgoSec. We have gone through a proof of concept with them. Right off the bat, running through that proof of concept with them was absolutely fantastic. Usually, they have an offsite proof of concept server that you connect up to, then kind of take a look at their technology to see how everything works and if you like it. However, we have a different setup onsite for some of our firewall rules. We wanted to make sure that their application/appliance worked on our internal environment. They were more than willing to set up an onsite PoC for us so we could make sure everything did work.

What do I think about the stability of the solution?

The stability is fantastic. We haven't had an issue with stability at all.

Two people are needed for maintenance (someone for backup plus me). Maintenance on it is fairly limited. It is very automated in the way that it handles all our data and firewall needs.

What do I think about the scalability of the solution?

The scalability is easy, just add more licenses if needed, then turn up another virtual machine. It is pretty straightforward.

There will probably be a dozen of us actually utilizing AlgoSec. This will mainly be the network and security team, then the security team themselves.

How are customer service and technical support?

During deployment, the technical support fixed our issue within 30 minutes of the phone call.

Which solution did I use previously and why did I switch?

We are in the process of doing microsegmentation right now. That is one of the reasons why we started looking into a utility like this because we needed to get that current snapshot of where we are at and where we need to go. AlgoSec is beyond phenomenal for helping to create and manage this type of initiative. With the automation piece and the fact that we can take a look at the traffic that is currently running through our firewalls and automate the rules being created for that. This will take a lot of manual work off of our shoulders that would have taken many man-hours to be able to implement.

How was the initial setup?

We ran into some errors/issues, so it probably took us a week to fully deploy it. The process was straightforward except for the typos that we had in the programming. Without those typos, it would have been up within half a day.

We had an implementation strategy that we laid out beforehand and went forward with that.

What about the implementation team?

James, the AlgoSec engineer who was working with me, spent about two weeks on and off with me trying to get the solution up and running, and he was successful at it. This was so we could utilize their proof of concept in our environment to make sure that it would fit our needs.

What was our ROI?

Because we went from having no unified tool to having AlgoSec, it has improved our security platform by probably 80% in just the short time that we have had and used it. It is invaluable. There is no question in my mind that it is a tool for anybody who has multiple sites, firewalls, and routers. It is something that everybody needs to look into getting because it is invaluable.

Even if we were to pay the first quote that we got, AlgoSec would be worth it. Just having the automation and that overall look into your security platform, you can't be without it.

What's my experience with pricing, setup cost, and licensing?

We are working with our finance department right now to be able to purchase it. The AlgoSec team is doing everything that they can in their power to get the costs down to where our budget is. They have worked a lot on it. They have cut the cost in half for us so far by questioning, "This is in the quote. Is this something that is actually needed?" They have pulled some stuff out and cut our costs down by 50% for the product itself.

Which other solutions did I evaluate?

There were four of us involved in the evaluation of the product.

We compared this tool to two other different tools. Even with their higher-end solution, when we had the full budget for this, AlgoSec was less expensive than some of the other top tools. We looked at FireMon and Tufin. The reason why we said, "No," when we had budget to FireMon and Tufin is because they were not pulling in the application data or URL data. 

AlgoSec actually pulls application data and URL data in. AlgoSec is a little easier to use than the other solutions. Cisco recommended AlgoSec to us.

What other advice do I have?

Don't trust what you think you know about your network. There are surprises everywhere, and sometimes it takes a utility like this to find those.

Don't don't hesitate. Go get it. If somebody came and asked me for an analysis tool, AlgoSec would be at the top of my list.

The integration is fine.

Migration to the cloud is on our roadmap. 

We have not set up any automation quite yet, but that is on the roadmap. That will make the tool even better.

I would rate this solution as a nine (out of 10).

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
reviewer1571316 - PeerSpot reviewer
Senior Technical Analyst at a maritime company with 1,001-5,000 employees
Real User
Jun 4, 2021
Gives us a high level of confidence that our ACLs and our risk components are in line with our expectations
Pros and Cons
  • "AlgoSec gives us a high level of confidence that our ACLs and our risk components are actually in line with our expectations. Because we run a lot of our firewalls as an internal change control boundary, we rely on them heavily to segregate vendor networks. It gives us a high level of confidence that those third-party networks that ride on the backbone are segregated and appropriately defined."
  • "We have a fairly complex routing environment that AlgoSec struggled with having dual routers and first hop routing protocols. The initial period when we were doing an installation with their support desk was fairly challenging."

What is our primary use case?

We use AlgoSec Firewall Analyzer and FireFlow. 

Our primary infrastructure is all on-premise. We tend to leverage only SaaS components of the public cloud. We have over ninety sites including branch offices and Data Centers.

We have over on hundred firewalls and we are a PCI compliant organization. So, we use it for all of our change control around all of our firewall ACL deployments, as well as our risk profiling. We use Fireflow for the change management and audit control. The IT security department uses it for ACL reviews and ACL change requests.

How has it helped my organization?

Specifically, with FireFlow, we've managed to integrate that into our overall change advisory and request for change control process: requests flow through a ticket, through AlgoSec Fireflow, through our IT security department for approvals. We've taken advantage of all that. We generally do not have any out-of-band changes and those that happen are logged, tracked and reported on.

The Active Change component has helped reduce human error and given people more confidence the ACL changes have been applied as they requested.

AlgoSec has helped to simplify the job of our security auditors. Primarily, from an audit perspective, it's much faster than it ever was because they can review the ACLs all in one tool now, as opposed to asking for plain text CSV dumps of firewall rules. They can also respond a lot faster now to requests for ACLs as to whether or not they're valid or required because they can review the traffic simulator.

AlgoSec enables us to manage our dispersed environments in a single pane of glass for the firewalls. Seeing all of those firewalls in one view, we no longer need to use things like the Cisco ASDM for day-to-day ACL management. 

What is most valuable?

AlgoSec gives us a high level of confidence that our ACLs and our risk components are actually in line with our expectations. Because we run a lot of our firewalls as an internal change control boundary, we rely on them heavily to segregate security zones. It gives us a high level of confidence that things like third-party networks that ride on the backbone are segregated and appropriately defined.

The features I find the most valuable are the:

  • Duplicate objects
  • Unused rules
  • Duplicate rules.

The traffic simulation has been really valuable, especially with other business units that aren't familiar with the firewalls but are looking to see whether or not traffic they're using or going to be putting on the network through projects is going to be impacted.

The overall visibility that AlgoSec gives into our network security policies is high. Our firewalls are our primary control boundary on the LAN. They give us the most amount of visibility we can get at that layer without microsegmentation.

AlgoSec provides us with full visibility into the risk involved in firewall change requests. That feature is important to us because we're a heavily risk-averse organization when it comes to IT control and changes, It allows us to verify, for the most part, that the controls that IT security is putting in place are being maintained and tracked at the security boundaries.

It has reduced the time it takes to implement firewall rules. We can sometimes do 20 to 30 ACL either adds, removes, or changes in a week. In some cases those changes are now down to minutes. Prior to AlgoSec, we would have to do all the manual verification which meant potentially logging into every related firewall, checking every ACL, and making sure that we got the placement correct.

What needs improvement?

We have a fairly complex routing environment that AlgoSec struggled with. The initial period when we were doing an installation with their support desk was fairly challenging.

For how long have I used the solution?

I have been using AlgoSec for about a year and a half to two years.

What do I think about the stability of the solution?

We have not had any issues with stability.

What do I think about the scalability of the solution?

So far, we haven't had any issues with scalability. We're at 100+ firewalls, all of them logging directly to the product without issue, and we're using it daily.

How are customer service and technical support?

We've had a mixed experience with their support. It's swung the gamut from someone who will just reference their own publicly available knowledge base right up to someone going directly to the developers. That process has felt inconsistent. I never know which one I'm getting.

Which solution did I use previously and why did I switch?

We were not previously using another solution. We chose AlgoSec because we knew that we were going to be managing ACLs globally at a rapid rate going forward and we needed a solution for that.

How was the initial setup?

For our implementation strategy, we used their JumpStart process where they actually had an AlgoSec representative come to us and get us through the implementation. That resource was here for about a week. By the end of the week, it was up and running enough for us to complete the more organization specific components of the implementation.

We had three staff involved in the deployment and there's typically a team of about five of us involved in the daily maintenance and operations. We were all part of the JumpStart. 

About a dozen people now use the tool regularly and that number continues to increase.

What was our ROI?

For us, on the network team specifically, we're a small team relative to the number of devices that we manage. Having so many firewall rule changes come in on a regular basis, we were likely going to lose a body if not two, just to managing ACL adds and changes.

What's my experience with pricing, setup cost, and licensing?

Initially, the licensing was a little bit unclear. We run a of our firewalls with high availability solutions and how licenses got presented and accounted for was unclear. Overall though, the licensing is pretty straightforward.

The licensing and support cost is fairly significant, likely out of reach for any small and most medium sized businesses without a significant security requirement.

Which other solutions did I evaluate?

We looked at Tufin and FireMon. At the time, FireMon was cloud-based and we had a policy that didn't allow us to use it.

We had met with AlgoSec a couple of times over the years at Cisco Live. We were familiar with their platform.

What other advice do I have?

My advice would be to be ready to find out the things you probably didn't know. For us, there were a lot of rules that were implemented that weren't being used, a lot of objects that were duplicates.  We were unknowingly hoarding all kinds of configuration data that was no longer relevant.

Overall, I would rate AlgoSec a solid eight out of 10.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Download our free AlgoSec Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free AlgoSec Report and get advice and tips from experienced pros sharing their opinions.