Blog      Demo      Contact      888.845.8169
RedSeal Networks

Heartbleed FAQ

RedSeal is here to answer all your questions regarding the Heartbleed bug. Want to know what it is? What it is not? How it affects RedSeal products? If your organization is vulnerable? Read this brief to get you up-to-speed!

Download Brochure

RedSeal Networks Company Overview

RedSeal’s end-to-end network modeling and analysis delivers the comprehensive situational awareness CIOs, CISOs and security professionals need to prioritize risk and close gaps between point solutions to ensure compliance, prevent cyber-attacks and protect intellectual property.

Download Data Sheet

RedSeal Appliance

Provides detailed specs for the RedSeal appliance.

Download Data Sheet

RedSeal Continuous Monitoring Solution

RedSeal provides the intelligence necessary for federal agencies to proactively improve defenses, maintain continuous compliance and mitigate real-world risks.

Download Data Sheet

RedSeal Networks Global Customer Support

RedSeal Networks provides enterprise-class support programs that accelerate security effectiveness.

Download Data Sheet

RedSeal Server Manager

RedSeal Server Manager offers centralized administration and monitoring of multiple RedSeal servers. It aims to improve the overall operational efficiency in an organization through centralized administration, automation of administrative tasks, troubleshooting support, and monitoring key health indicators and security metrics across multiple RedSeal servers.

Download Data Sheet

RedSeal Networks Integration with McAfee

Delivering the industry’s most powerful security visualization and predictive threat modeling for enterprise networks, RedSeal Networks integration with McAfee solutions enables organizations to continuously monitor access controls, prioritize vulnerability remediation efforts, dramatically cut compliance costs and optimize their security architectures.

Download Data Sheet

RedSeal Networks Integration with Symantec Control Compliance Suite

Providing the industry’s most powerful security visualization and predictive threat modeling for enterprise networks, RedSeal Networks certified integration with Symantec™ Control Compliance Suite enables organizations to streamline the incident management process and focus resources on the most significant elements of risk, effectively helping to close the window of potential compromise.

Download Data Sheet

RedSeal Networks Integration with HP ArcSight ESM

As an ArcSight CEF-certified solution, the RedSeal Platform combines network infrastructure access violations to policy, best practice violations and topology aware vulnerability prioritization data with security event information.

Download Data Sheet

RedSeal Networks Continuous Monitoring Solutions

RedSeal Networks capabilities have widespread applicability throughout both the Federal government and private enterprise as organizations strive to improve their overall security posture. The RedSeal platform automatically assesses the security infrastructure of a network so organizations can strengthen their cyber-defenses.

Download Brief

Proactive Network Intelligence Solutions for PCI DSS Compliance

Through auditing, monitoring, reporting and proactive network intelligence based on all layer 3 devices, RedSeal’s solution can help organizations address multiple sections in the 12 PCI requirements. RedSeal Networks solutions help organizations meet PCI DSS compliance requirements as part of a holistic approach to network security.

Download Brief

Executive Guide to Pragmatic Network Security Management

Discover how you can effectively managing a network security program through a combination of maintaining visibility and adjusting security controls for the inevitable continuous change.

Download Whitepaper

For Dummies: Network Infrastructure Security Management

Discover how NISM can make your life easier with network visibility to prevent automated analytics and real-time compliance visibility to prevent cyber attacks, automated analytics on your complex, real-time compliance, information on network security.

Download Whitepaper

Proactive Network Visibility: The Missing Piece in Continuous Monitoring.

In this white paper you will learn how RedSeal’s Continuous Monitoring Solution will help you gain near real-time visibility, understand threats in your environment, and comply with FISMA.

Download Whitepaper

Fact-Based Network Security: Metrics and the Pursuit of Prioritization

This Securosis white paper looks at defining 'risk', understanding the metrics that drive decisions, working on systematic ways to collect data and make those decisions, and understanding the compliance aspects of the process.

Download Whitepaper

Network monitoring: A move to the next level.

As network threats and changes to systems management evolve, companies and government agencies are shifting their approach to how they monitor network security, reports Karen Epper Hoffman.

Download Whitepaper

What a Vulnerability Assessment Scanner Can’t Tell You, Leveraging Network Context to Prioritize Remediation Efforts and Identity Options

Vulnerability scanning is a standard approach to identifying vulnerabilities in the IT infrastructure but unfortunately, scanning falls short at providing the visibility necessary to accurately prioritize remediation efforts or identify all possible remediation options. Learn how RedSeal can take your vulnerability efforts to the next level by providing enterprise wide network visibility.

Download Whitepaper

Building the Airtight Financial Institution:
Risk-Aware Network Visualization

Financial institutions face an increasingly difficult challenge from persistent and virulent attacks. Drawing on limited resources, IT security teams have to protect complex networks that are growing in size and complexity.

A new approach to network device and access management is helping IT security teams detect vulnerabilities, prioritize mitigation approaches and enable a safer deployment of configuration changes to network devices.

Download Whitepaper

The Challenge of Continuous Monitoring

It’s a daunting responsibility: keeping an enterprise network secure and in compliance with government regulations. This customized white paper gives you strategies for doing, based on the specific demands of your industry and whether you are a security or IT pro.

Download Whitepaper

RedSeal Networks: A Nexus for Continuous Audit and Control Monitoring

To modernize risk management and situational awareness, large organizations are establishing continuous monitoring practices. Continuous audit and control monitoring must be built on the back of existing security and IT operations tools and serve as a nexus for data collection, correlation, and analysis across the entire enterprise network to provide an up-to-date view of network security health and behavior. While continuous monitoring is an emerging “lean forward” practice, RedSeal Networks has established itself as a pioneer in this burgeoning—and necessary—product space.

Download Report

RedSeal-Dimensional RSA Survey: Security Pros Still Searching for Metrics

Based on a survey of roughly 800 IT security pros at the RSA Security Conference 2012, some 73% find it hard to understand IT risk based on data overload; 81% said solutions offering improved metrics would increase their effectiveness.

Download Report

Continuous Monitoring Report: Federal Security Professionals Say Agencies Are Unprepared

Based on a survey of more than 200 government information security pros working for nearly every major government agency, only 28% believe they will have the right tools and process in place to meet the 2012 federally mandated security monitoring requirements.

Download Report

Continuous Monitoring and Real-Time Risk Management, RedSeal and NIST SP 800-53 Rev 3

Continuous Monitoring and Real-Time Risk Management are the corner stones to NIST SP 800-53, which serves as the requirements for FISMA compliance. Learn how RedSeal is the only vendor to provide both for network security in a single solution.

Download Whitepaper

The ROS (Return on Security) of RedSeal

What's the ROI on RedSeal? Here's your chance to learn from independent experts. In this white paper, IANs scholars and RedSeal customer Polk look at the costs and benefits related to adopting the product and find some pretty impressive results. Care to save millions? Read the report.

Download Report

Managing the Risk of Network Change

There is no better way to proactively secure your enterprise then by accurately assessing the risk of network changes before they occur. Learn how RedSeal can enable you to accurately and effectively assess the risk and impact of proposed network changes.

Download Whitepaper

Hackers Versus Enterprise Security: A Survey of IT Security Professionals

Among the findings ... more than 75 percent of network management and security professionals believe that today’s hacking tools have surpassed the capabilities of the defensive technologies that most organizations have adopted to protect their critical systems and data. Download this report to learn more about what your peers are saying.

Download Report

New Money, a New CEO and a New Product Release Buoy RedSeal's Expansion

By casting itself as a provider of "proactive security intelligence" with metrics that trend security effectiveness and added ability to help organizations track the impact of change, RedSeal has made the moves necessary to differentiate and expand, according to 451 Group.

Download Report

PG&E Case Study: Network Clarity

A critical infrastructure company in Northern California gained visibility into its network...while securing its clients, reports Greg Masters.

Download Case Study

Interval International

“We provided the configurations for 50 production routers and RedSeal reported that nearly 20 of them had been misconfigured. Some even had multiple services and ports enabled out-of-the-box, which was just the sort of thing we need to uncover. At that point, we knew RedSeal was a must have for Interval.”

Download Case Study

Polk

“RedSeal helps us solve one of our most daunting security challenges — making sure that the network only allows the access that is absolutely necessary for the business.”

Download Case Study

UMB

“Before RedSeal it was challenging to give our CEO a true assessment of the company’s IT risk. With RedSeal, we now have a clear picture of our ongoing risk posture and continuously know where we stand.”

Download Case Study

Making Security Work: A Pragmatic guide to network security management

Making Security Work: A Pragmatic guide to network security management

Managing network security at scale is never easy, but the organizations that do it the best tend to follow a predictable, repeatable pattern. In this webinar you'll learn lessons about a pragmatic process designed for larger organizations, or those with more complicated networks (like a medium-sized business with multiple locations).

You'll get insight into:

  • A practical, achievable process that accounts for real-world limits
  • Improving your efficiency and security in a complex infrastructure
  • Developing core workflows to bridge the gaps between different operational teams

We won't make the false claim that this magical process is easy, but it's certainly easier than many alternatives. Even if you only pick out a few tidbits it should help you refine and operate your network security more efficiently.

View Webinar

Measuring and Reporting On Your Organization’s Security Posture

Measuring and Reporting On Your Organization’s Security Posture

How safe is our enterprise? Unfortunately, answering that question is no simple task.

Join this webinar to see how you can:

  • Develop a baseline set of metrics to benchmark your enterprise’s security posture
  • Implement practical methods for reporting changes in security risk
  • Create benchmarks for accurately measuring the performance of your IT security team
  • Understand how new threat intelligence data may help you measure security posture
  • Improve your ability to harvest data from security systems and mine it for security posture reporting
  • Create methods for measuring security risks and performance that non-IT executives can understand
  • Gain the best methods for measuring security risk and benchmarking security performance over time.

View Webinar

Lessons Learned in Security Automation

Lessons Learned in Security Automation

Providing network security is hard - too many security products, too much information, too many vulnerabilities and weaknesses. Security automation is about bringing order to the chaos – integrating data from different products, building a system-wide picture, and managing risk by finding the most important defects to fix first. This talk will illustrate successful approaches to combining host vulnerability data with network countermeasures, to reduce the overload and find the key signal in the noise. Providing network security is hard - too many security products, too much information, too many vulnerabilities and weaknesses. Security automation is about bringing order to the chaos – integrating data from different products, building a system-wide picture, and managing risk by finding the most important defects to fix first. This talk will illustrate successful approaches to combining host vulnerability data with network countermeasures, to reduce the overload and find the key signal in the noise.

View Webinar

Using Security Visualization and Predictive Threat Modeling to Manage Network Complexity and Control

Using Security Visualization and Predictive Threat Modeling to Manage Network Complexity and Control Access Risk

Financial institutions spend billions of dollars on firewalls, proxies, routers and other devices to prevent unauthorized access to their network, but security breaches continue to plague the industry.

While faced with a barrage of attacks, CISOs are dealing with increasingly complex networks due to the cumulative demands of users as well as connectivity requirements, business operations and regulatory compliance mandates. As a result of this increased complexity, financial organizations' IT resources are struggling to meet today's required security standards.

Join Wall Street & Technology senior editor Melanie Rodier and RedSeal Networks for this webcast, and learn how to:

  • Effectively pinpoint weaknesses and risk through complete end to end network visibility.
  • Proactively protect your network against security breaches and prioritize vulnerabilities for more effective remediation.
  • Gain the ability to comply with internal and external compliance requirements while cutting compliance costs.

Register Now

Demo: Jumpstart to RedSeal Live!

Demo: Jumpstart to RedSeal Live!

The “Jumpstart to RedSeal” demo provides you with a 20 minute overview of the company, what the product does, customer challenges, and how the RedSeal 5 Platform can address them. The highlight - a 15 minute demonstration of the RedSeal UI and reporting features - details how networks can improve their attack defenses, prioritize vulnerabilities based on exposure, evaluate for compliance, and enhance firewall change management processes.

Register Now

How To Use Predictive Network Threat Modeling To Eliminate Internal and External Cyber Threats

How To Use Predictive Network Threat Modeling To Eliminate Internal and External Cyber Threats

A Wall Street & Technology Webcast
With cyber espionage currently responsible for $13 billion in losses to the U.S. economy, according to the FBI, finding ways to predict and prevent future cyber attacks is vital for businesses. On Wall Street, as the number of devices on enterprise networks continues to grow, cyber espionage perpetrators are capitalizing on the increased complexity of network access to compromise critical data assets. A proactive approach that includes predictive security using visualized network modeling can help you identify access pathways and the associated vulnerabilities and quickly pinpoint the specific systems and devices most susceptible to attack.

Register Now

Tips to Avoid the Mortal Sins That Undermine Network Security

Tips to Avoid the Mortal Sins That Undermine Network Security

Prevent the hellish mistakes that undermine security effectiveness. Join network security experts Eric Hanselman, Analyst at 451 Research, and Dr. Mike Lloyd, CTO at RedSeal, for this fact-filled webcast where they’ll share their list of the most egregious errors found in network security management, based on hands-on analysis and observation of some of the most complex network environments in the world. This session will include details on how and why these painful mistakes manifest themselves, and tips on what you can do to prevent them, followed by open Q&A.

Register Now

Security Metrics That Matter With Dr. Mike Lloyd

Security Metrics That Matter With Dr. Mike Lloyd

Security Metrics for improving management have long been an issue of discussion and debate around the industry. Some experts and practitioners content that we need these key indicators
if we’re ever going to drive down risk.

Register Now

What’s the ROI on RedSeal? Applying the IANS “Return on Security” Model

What's the ROI on RedSeal? Applying the IANS "Return on Security" Model

One of the hardest questions today's IT security practitioners face is "what's the ROI" on the investments they make. Enter IANS with its "Return on Security" model with its unique model for measuring success. In this webinar, featuring IANS scholar and industry analyst Diana Kelley, along with RedSeal customer Ethan Steiger, CSO at Polk, you'll hear about:

  • How IANS developed its ROS process – and how can apply it to your own organization
  • Polk's RedSeal use case – and the many millions of dollars IANS says the company has saved
  • What RedSeal can do for you – from lowering risk to attaining compliance and planning projects

Register Now

Network Security – Measuring the Immeasurable

Network Security – Measuring the Immeasurable

Security is inherently intangible, so answering questions such as "Is my network secure?” are considerably complex. The ultimate goal is the absence of a breach – how do you measure and show improvement to your internal and external audience? Featuring Mike Rothman, president, Securosis, this webinar discusses:

  • Today's security metrics – what most organizations are collecting today vs actionable and useable metrics for decision support
  • What and how to communicate network security metrics – internal vs external audiences
  • Practical measurement of risk – technology to assess how well your work is preventing problems

Register Now

RedSeal Networks Introduction

Fast-forward your network security with proactive security intelligence solutions.

Watch Video

RedSeal Vulnerability Advisor Introduction

An introduction to Vulnerability Advisor and how it performs a virtual penetration test by correlating vulnerabilities with network access.

Watch Video

RedSeal Network Advisor Introduction

An introduction to Network Advisor and how it maps end-to-end network access and provides powerful network topology visualizations.

Watch Video

AVNET discusses measuring and communicating vulnerability risk to the business

Hear how AVNET leverages RedSeal’s Proactive Security Intelligence solution to correlate vulnerability assessment findings with their network defenses – enabling accurate risk measurement and communicating risk in the context of their business’ priorities.

Watch Video

Cisco Customer Story: Automating Network Security Assessment

Automating Network Security Assessment with RedSeal Networks

Watch Video