Application Connectivity Management

SecureApp™ is a groundbreaking approach to managing network security policies top-down, from the application perspective. With SecureApp, security professionals and application owners can easily define, update, monitor and remove applications - without analyzing long lists of access rules on multiple firewalls and routers.

SecureApp separates business requirements from underlying security policy rules with a simple, graphical interface.

To define application connectivity, all you need to know is the source, service and destination. Knowledge of the firewalls or routers on the network is not necessary.

SecureApp maintains a repository of all of your applications. You can quickly assess application connectivity status and relevant ticket status at any time.

With SecureApp, you don't need to understand the network topology or firewall rules to define connectivity - just source, service, and destination.

To decommission a server, delete the connection, and create a SecureChange ticket to modify the required firewall rules.

Define and maintain dependencies between applications and services. Allow application owners to view connections that were initiated from external applications.

To create the connection, simply click Create Ticket, and an access request is generated for SecureChange.

The new ticket is populated with the application connectivity requirements. 

Use the SecureChange Policy Designer to identify the firewall rules to be created, modified, or automatically provisioned.

Quickly assess application connectivity status and relevant ticket status.

To keep requirements up to date, simply change the connectivity requirements and generate SecureChange tickets that make the change.

SecureApp uses Network Topology Intelligence and Policy Analysis technologies to analyze connectivity status.

SecureApp maintains a history of all of the changes to application connectivity including tickets, firewall policy rules and ACLs.

SecureApp provides the connectivity documentation and justification required by standards such as PCI DSS.

Application owners and security team members can communicate easily regarding the comprehensive documentation and history of each application.;