Eliminate Your Firewall Vulnerabilities
Using advanced and detailed logic, FCAT parses a given configuration file and outputs a report displaying all of the firewall rules and firewall NAT rules deemed potentially “risky,” in ascending order of severity.
FCAT can also compare two firewall configuration files from the same company, normally between quarters, generating a report showing any changes between the two provided rulesets.
Our service is simple, fast, effective, and reusable.
To comply with FFIEC, financial institutions are required to have their “Firewall Rules audited or verified at least quarterly” via the FFIEC Cybersecurity Assessment Tool guidelines. Use our FCAT service which combines logically precise automation with careful manual review to meet and exceed regulatory expectations.
Create an account on our website, let us know that you want to use our FCAT service, upload your configuration file or files, and we will do the rest.
We support traditional, next-gen, and cloud firewalls. Currently, Cisco, Palo Alto, and Fortigate configuration files are compatible with FCAT.
Compatibility with the following companies soon to come: Juniper, iptables, and more!
CyanLine is your go-to for all your computer forensics and network security needs.