AlgoSec - Experts & Thought Leaders
Latest AlgoSec news & announcements
AlgoSec, a cybersecurity pioneer, announced a gross dollar retention rate of over 90% in the first half of 2025, following the launch of its AlgoSec Horizon platform. Since its release, the Horizon platform has gained adoption across industries, underscoring the market need for convergence of cloud and on-premises networks. This widespread adoption has driven a 36% increase in new annual recurring revenue (ARR) in the first half of 2025 compared to 2024. Advanced AI capabilities The Horizon platform utilises advanced AI capabilities to automatically discover and identify an organisation’s business applications across complex hybrid networks and remediate risks more effectively. Its intelligent automation minimises misconfigurations and enhances operational resilience to accelerate application delivery from weeks to hours. Insights for enterprise security teams AlgoSec is running the Horizon Tour, a series of sessions showcasing the platform’s abilities and expert insights In one such example, one of the largest financial institutions in the U.S. uncovered 1,800 applications and their connectivity requirements within the first two weeks of using Horizon. Throughout September and October, AlgoSec is running the Horizon Tour, a series of sessions showcasing the platform’s capabilities and expert insights for enterprise security teams across EMEA and the U.S. Evolving AlgoSec solutions “Security teams today are being asked to protect applications in a hybrid world, from multi-clouds to datacentres globally,” said Chris Thomas, Chief Revenue Officer at AlgoSec. “We’re excited about our early 2025 successes and our evolving AlgoSec solutions, which will help us meet our mission to enable the world’s most complex organisations to gain visibility, reduce risk and process changes." "To hear first-hand AlgoSec’s strategic direction and product innovation roadmap, join us for our annual virtual AlgoSummit event on September 30th.” To learn why over 2,200 of the world's most complex organisations trust AlgoSec to help secure their most critical workloads, visit the website.
AlgoSec, a global cybersecurity pioneer, announced a gross dollar retention rate of over 90% in the first half of 2025, following the launch of its AlgoSec Horizon platform. Since its release, the Horizon platform has gained adoption across industries, underscoring the market need for convergence of cloud and on-premises networks. This widespread adoption has driven a 36% increase in new annual recurring revenue (ARR) in the first half of 2025 compared to 2024. Advanced AI capabilities The Horizon platform utilises advanced AI capabilities to automatically discover and identify an organisation’s business applications across complex hybrid networks, and remediate risks more effectively. Its Intelligent automation minimises misconfigurations and enhances operational resilience to accelerate application delivery from weeks to hours. In one such example, one of the largest financial institutions in the U.S. uncovered 1,800 applications and their connectivity requirements within the first two weeks of using Horizon. Platform’s capabilities Throughout September and October, AlgoSec is running the Horizon Tour, a series of sessions showcasing the platform’s capabilities and expert insights for enterprise security teams across EMEA and the U.S. “Security teams today are being asked to protect applications in a hybrid world, from multi-clouds to datacenters globally,” said Chris Thomas, Chief Revenue Officer at AlgoSec. He adds, “We’re excited about our early 2025 successes and our evolving AlgoSec solutions, which will help us meet our mission to enable the world’s most complex organisations to gain visibility, reduce risk and process changes. To hear first-hand AlgoSec’s strategic direction and product innovation roadmap, join us for our annual virtual AlgoSummit event on September 30.”
A new study from Enterprise Strategy Group (ESG), commissioned by cybersecurity pioneer AlgoSec, has revealed that most organisations are struggling to secure applications across fragmented, hybrid cloud environments. As more applications are spread between on-premises data centres and multiple cloud providers, traditional approaches to network security are proving ineffective. The report, “The Case for Convergence in Hybrid Multi-cloud, Application-centric Networks,” shows that 89% of organisations are using different tools and policies to secure various parts of their infrastructure, making it harder to maintain consistency and control. Key findings Key findings from the research include: Hybrid is the new normal: 85% of organisations use two or more cloud service providers, but 43% of applications are still on-premises. Most expect that mix to stay for the foreseeable future. Security tools are siloed: Nearly 80% use firewalls from cloud providers, while others rely on third-party tools or micro segmentation solutions, leading to inconsistent policies and limited visibility. Attacks are happening: 43% of organisations experienced a public cloud attack in the past two years. Common issues include malware moving across systems (44%), misconfigurations (32%), and open ports (26%). Collaboration is still lacking: Even as some teams merge responsibilities for on-prem and cloud security, 55% say they still need to improve coordination between security, cloud, networking, and application teams. Real business impact: Beyond risk reduction, companies see strong operational gains. The top expected benefits of better network security include greater efficiency (63%), lower costs (48%), and faster cloud migrations (46%).
Insights & Opinions from thought leaders at AlgoSec
Hybrid cloud computing enables organisations to segregate their resources and workloads on-premise, in a private cloud, or a public cloud. But despite its many benefits, the hybrid environment also creates security concerns. AlgoSec’s co-founder and CTO, Prof. Avishai Wool shares his expert insights on some of these concerns and offers best practices to boost hybrid cloud security. Hybrid cloud computing Hybrid cloud computing combines on-premises infrastructure, private cloud services, and one or more public clouds. Going hybrid provides businesses with enhanced flexibility, agility, cost savings, and scalability to innovate, grow, and gain a competitive advantage. So, how can you simplify and strengthen security operations in the hybrid cloud? It all starts with visibility – you can’t protect what you can’t see Hybrid environments are highly complex, which can create security blind spots Security teams need to know what these assets are and where they reside to protect their entire hybrid infrastructure, applications, workloads, and data. They also need to see the entire hybrid estate and not just the individual elements. However, complete visibility is a serious hybrid cloud security challenge. Hybrid environments are highly complex, which can create security blind spots, which then prevent teams from identifying, evaluating, and most importantly, mitigating risk. No fragmented security approaches Another hybrid cloud security concern is that you cannot implement a fragmented security approach to control the entire network. With thousands of integrated and interdependent resources and data flowing between them, vulnerabilities crop up, increasing the risk of cyberattacks or breaches. For complete hybrid cloud security, you need a holistic approach that can help you control the entire network. Is DevSecOps the panacea? Not quite In many organisations, DevSecOps teams manage cloud security because they have visibility into what’s happening inside the cloud. However, in the hybrid cloud, many applications have servers or clients outside the cloud, which DevSecOps may not have visibility. Also, the protection of data flowing into and out of the cloud is not always under their remit. Other teams are required to manage security operations and minimise hybrid cloud risks to compensate for these gaps. These additional processes and team members must be coordinated to ensure continuous security across the entire hybrid network environment. But this is easier said than done. IaC-based security IaC-based security defines security best practices in template files, which minimise risks and enhance security posture Using IaC to balance automation with oversight is key, but you shouldn’t solely rely on it Infrastructure as code (IaC) will help you automatically deploy security controls in the hybrid cloud to prevent misconfiguration errors, non-compliance, and violations while in the production stage and pre-application testing. With IaC-based security, you can define security best practices in template files, which will minimise risks and enhance your security posture. But there’s an inherent risk in putting all your eggs in the automation and IaC basket. Hybrid cloud issues Since all the controls are on the operational side, it can create serious hybrid cloud security issues. And without human attention and action, vulnerabilities may remain unaddressed and open the door to cyberattacks. Since security professionals who are not on the operational side must oversee the cloud environment, it could easily open the door to miscommunication and human errors, a very costly proposition for organisations. For this very reason, you should also implement a process to regularly deploy automatic updates without requiring time-consuming approvals that slow down workflows and weaken security. Strive for 95% automated changes and only involve a person for the remaining 5% that requires human input. Hybrid cloud security best practices – start early, start strong When migrating from on-prem to the cloud, you can choose a greenfield migration or a lift-and-shift migration. Greenfield means rolling out a brand-new application. In this case, ensure that security considerations are “baked in” from the beginning and across all processes. This “shift left” approach helps build an environment that’s secure from the get-go. This ensures that all team members adhere to a unified set of security policy rules to minimise vulnerabilities and reduce security risks within the hybrid cloud environment. Migration planning measurements You can also leverage hybrid cloud security solutions to detect and mitigate security problems in real-time If you lift and shift on-prem applications to the cloud, note any security assumptions made when they were designed. This is important because they were not built for the cloud and may incorporate protocols that increase security risks. Next, implement appropriate measures during migration planning. For example, implement an Application Load Balancer if applications leverage plaintext protocols, and use sidecars to encrypt applications without having to modify the original codebase. You can also leverage hybrid cloud security solutions to detect and mitigate security problems in real time. Matching cloud security with application structure is no longer optional Before moving to a hybrid cloud, map the business logic, application structure, and application ownership into the hybrid cloud estate’s networking structure. To simplify this process, here are some tried and proven ways to consider. Break up your environment into a virtual private cloud (VPC) or virtual network. With the VPC, you can monitor connections, screen traffic, create multiple subnets, and restrict instance access to improve security posture. Use networking constructs to segregate applications into different functional and networking areas in the cloud. This way, you can deploy network controls to segment your cloud estate and ensure that only authorized users can access sensitive data and resources. Tag all resources based on their operating system, business unit, and geographical area. Tags with descriptive metadata can help to identify resources. They also establish ownership and accountability, provide visibility into cloud consumption, and help with the deployment of security policies. Conclusion In today’s fast-paced business environment, hybrid cloud computing can benefit your organisation in many ways. But to capture these benefits, you should make an effort to boost hybrid cloud security. Incorporate the best practices discussed here to improve security and take full advantage of your hybrid environment.
Artificial Intelligence in Security
DownloadElevating security through multi-sensing solutions and large-scale AI
DownloadOpen credential standards and the impact on physical access control
DownloadCombining security and networking technologies for a unified solution
DownloadWhat is a universal RFID reader?
Download