Read blog
What happens if you can't trust your "source of truth"? 
read more

What’s New at IP Fabric? Unlock Enhanced Visibility For End-to-End Network Security and Compliance

IP Fabric 7.2 delivers the most comprehensive understanding of network security, incorporating insights from next-generation firewalls, transparent firewalls, IPSec tunnels, and enriched intent checks.  
Improve network security with IP Fabric 7.2
We're cooking up something special...

If you’re like most IT leaders, you’d rather your network be down than breached. On top of disrupting the business, breaches can take a staggering financial toll, setting organizations back nearly $5 million per breach, or $3 million per ransomware incident–that is, before factoring in any compliance-related expenses or lost revenue caused by customer churn.  

These costs underscore a fundamental truth: the success of a business is inextricably tied to its network security. And yet, security and IT teams often struggle to align their priorities due to an inconsistent and incomplete view of said network. Without a source of truth to bring these teams together, it’s all too easy for critical vulnerabilities (CVEs) and misconfigured security controls to fall between the cracks. 

The key to more effective governance? A unified view of all cloud, network, and security systems.  

What’s New in IP Fabric?

In IP Fabric’s proof-of-concept sessions, we uncover as much as a 20% discrepancy between what an organization thinks they have in their network versus what’s actually there. In other words, as much as a fifth of the network is unmonitored and unmanaged at any given time, leaving security gaps for threat actors to exploit. 

IP Fabric’s latest update addresses the visibility challenge head-on by delivering the most accurate and complete view of network behavior. Paired with assurance, this latest update empowers confident governance on-prem, in the cloud, and across the network edge. 

Simulate & Manage Next-Gen Firewall Behavior 

Get a detailed breakdown of every device involved in packet delivery, all with IP Fabric’s enhanced end-to-end path lookups. Equipped with a 100% accurate inventory, organizations can leverage IP Fabric’s digital twin capabilities to simulate next-gen firewall behavior before and after making changes. Users also have the opportunity for more detailed security analysis by collecting URL filtering rules and FortiGate threat feed configurations directly from the firewalls themselves.   

If firewall behavior deviates from business intent, IP Fabric automatically creates tickets in integrated ITSM solutions (e.g. ServiceNow), and validates changes after they’re implemented. This process not only strengthens governance but also preserves your organization’s security posture by upholding a Segregation of Duties (SoD)

Simulate firewall behavior with IP Fabric 7.2's dynamic digital twin capabilities and granular filters for URLs and threat feeds.

Run next-gen firewall simulations, and collect data from URL filters and threat feeds.

Analyze Transparent Firewalls 

Organizations often implement transparent firewalls for an extra layer of security that doesn’t require changes to IP addresses or routing—with the added bonus that they’re difficult for threat actors to detect. However, this can be a double-edged sword, as it also means organizations might lose track of transparent firewalls themselves.  

In IP Fabric 7.2, users can now incorporate insights about transparent firewalls from Forcepoint, Cisco Firepower, Fortinet, and Palo Alto Networks in their snapshots and path lookups.

Prove That Critical Paths Are Protected

IPSec tunnels are crucial for encrypting data in secure communication channels, as is required by leading security frameworks (e.g. ISO 27001), and regulatory standards (e.g. DORA, NIS2). IP Fabric 7.2 offers detailed mapping and documentation of secure paths within IPSec tunnels, helping teams to identify unencrypted traffic, address gaps in defense, and automatically collect evidence to confirm that critical paths are secured. 

Visualize IPSec tunnels for enhanced visibility and infrastructure security / network security.

Map, analyze, and document IPSec tunnels in your network snapshots.

Implement Access Controls for Security Extensions 

Access controls are a key element of any Zero Trust approach. IP Fabric 7.2 equips organizations with advanced tools to manage access controls for security extensions, allowing organizations to define permissions for critical actions like deploying and editing automation scripts. These controls not only help maintain compliance with security (e.g. NIST, ISO 27001) and regulatory (e.g. HIPAA, PCI-DSS) frameworks, but also prevent automation errors from propagating throughout the network.  

Fine-Tune Custom Intent Checks  

Start every day knowing that your network is secure and compliant by tracking intent checks in IP Fabric’s user-friendly dashboards. Checks are built on security best practices and compliance requirements to ensure that segmentation, device hardening, and other critical security controls are in place.  

Organizations can now inject external data into attribute tables, so it can be used to enrich compliance checks. This data can also be used to tailor custom checks without needing advanced knowledge of code of query languages. 

Run enhanced intent checks to ensure continuous compliance and infrastructure security / network security.

Track intent checks in IP Fabric’s user-friendly GUI.

Achieve End-to-End Network Governance

Whether you’re looking to strengthen your security posture or meet board-level compliance mandates, IP Fabric 7.2 offers the insights to build proactive security and compliance into daily network operations.

  • Close visibility gaps: Automatically uncover and remediate any gaps in network defenses, like bypassed firewalls or unencrypted data. 
  • Align IT and security teams: Leverage vendor-neutral insights and self-serve reporting so every team shares a common understanding of network behavior. 
  • Ensure audit readiness: Meet requirements for security and regulatory frameworks with automated, timestamped snapshots. 
  • Protect your bottom line: Reduce the risk of ransomware, fines, and other unplanned expenses to safeguard your organization’s budget. 

In short, IP Fabric 7.2 was built to help your organization focus on what matters most: protecting your network operations and setting the stage for future revenue-driving initiatives. 

Take a Closer Look at IP Fabric 7.2 

Tune in to our upcoming webinar to learn how you can implement 7.2 into your security strategy. In the meantime, you can always download our whitepaper on network security automation, and view the release notes in our documentation.

Want to know more?

Are you looking to know more about the article or the platform?
Please chat with our experts or try out the guided demo.

Newsletter