
IP Fabric unveils upgrade to boost firewall visibility & compliance
IP Fabric has launched a new release designed to enhance firewall discovery and simulation for enterprise security and compliance.
The upgrade introduces features that support IT and security teams in achieving complete visibility into network traffic, focusing on encrypted data transfers, misconfiguration identification, and policy enforcement across both local and cloud-based systems.
The company has pointed to research suggesting that up to 20% of enterprise networks have misconfigurations, including critical firewalls that help stop malicious activity. These faults contribute to security vulnerabilities that organisations need to tackle to comply with global regulatory frameworks such as NIST, CIS, ISO 27001 and SOC 2.
The new version, named IP Fabric 7.2, provides firewall filtering simulation, transparent firewall discovery and visualisation, enhanced compliance checks, and more granular access control mechanisms. These tools work across various vendors and are intended to help organisations streamline their security operations and respond more effectively to network risks.
The platform allows users to visualise firewall devices, Layer 2 transparent firewalls, encrypted IPSec tunnels, and to model various network elements, including misconfigurations and traffic paths, providing what the company describes as comprehensive insight into an organisation's infrastructure.
Pavel Bykov, CEO and co-founder of IP Fabric, commented on the release: "Infrastructure defence shouldn't live in silos, but too often our tools and teams do. We're giving IT and security teams a shared, end-to-end understanding of how traffic flows, including how it's encrypted, filtered and enforced across transparent firewalls and IPSec tunnels. When you can visualise devices, end-to-end paths, misconfigurations and gaps in your defence in context, you can take informed action to strengthen your security posture, prove continuous compliance and avoid unbudgeted costs."
The update offers several specific enhancements. The firewall filtering simulation feature enables teams to see how traffic is permitted or blocked on the basis of URLs, threat intelligence feeds and domain names. Transparent firewall discovery and visualisation now include support for hardware from Palo Alto Networks, FortiGate, and Firepower, providing broader monitoring capabilities and aiding the detection of network defence gaps.
Compliance and intent checks have also received attention. The new tools allow users to identify all devices involved in a traffic path, correlate vulnerabilities using mapped CVEs, and conduct tailored assessments to flag misconfigurations that may lead to regulatory non-compliance. These checks are intended to speed up audit preparations in line with the requirements of international industry frameworks.
Access control improvements allow organisations to enforce stricter user permissions on who can deploy or alter automation scripts. This measure is aimed at reducing the likelihood of unauthorised network changes and supporting compliance needs.
The company describes its firewall management approach as next-generation, with the capability to ensure consistent security policy enforcement across on-premises installations and public cloud infrastructures, regardless of the firewall vendor. This is expected to help enterprises react rapidly to any compliance or behavioural changes detected within their network.
The company said in its release that, "By delivering unparalleled visibility and control into security policies, firewall enforcement and compliance posture, IP Fabric's latest release empowers enterprises to close security gaps before attackers exploit them."
The new release is aimed at helping customers meet fiduciary and regulatory demands for secure and cost-effective infrastructure management, providing audit-ready insights and actionable intelligence to reduce risk. The feature set is intended to fit into existing operational environments by supporting integration with commonly used firewall management systems.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
10-06-2025
- Techday NZ
Datadog unveils AI-powered security tools for cloud & code
Datadog has introduced a suite of artificial intelligence security tools designed to detect and mitigate risks across cloud and AI environments. New AI agent The company has launched Bits AI Security Analyst, an AI agent that autonomously investigates potential threats and supports teams in managing risks with greater efficiency and accuracy. Integrated into Datadog Cloud SIEM, this agent triages security signals—starting with those generated by AWS CloudTrail—and performs detailed investigations into possible threats. Actionable, context-driven recommendations are then provided to help security teams respond more swiftly. "AI has exponentially increased the ever-expanding backlog of security risks and vulnerabilities organizations deal with. This is because AI-native apps are not deterministic; they're more of a black box and have an increased surface area that leaves them open to vulnerabilities like prompt or code injection," said Prashant Prahlad, Vice President of Products, Security at Datadog. "The latest additions to Datadog's Security Platform provide preventative and responsive measures—powered by continuous runtime visibility—to strengthen the security posture of AI workloads, from development to production." Enhancing code security Datadog Code Security, now generally available, aims to help developers and security teams detect and prioritise vulnerabilities not just in proprietary code but also within open-source libraries. The platform is specifically designed to uncover issues that may be present in large language model (LLM) integrations and AI-powered code, as these can be difficult to identify using traditional static analysis tools. The solution also uses artificial intelligence to facilitate the remediation of complex problems and ranks risks based on runtime activity and business impact. Deep integrations with widely-used developer environments, including integrated development environments (IDEs) and GitHub, are intended to allow faster remediation workflows without interrupting established development processes. Strengthening AI application security With AI-native applications operating autonomously and often in unpredictable ways, new types of attacks such as prompt injection have become more prevalent. Datadog's updated security offerings include features to help organisations implement stronger security controls through measures such as separation of privileges, finely-tuned authorisation, and data classification throughout their AI application landscape and infrastructure. Datadog LLM Observability, now also generally available, monitors the integrity of AI models, with tools to identify harmful or toxic behaviours across prompts and responses in enterprise AI applications. Other updates to Datadog Cloud Security support compliance with standards such as the NIST AI framework. This suite can uncover and remediate misconfigurations, unpatched vulnerabilities, and instances of unauthorised data or infrastructure access. The Sensitive Data Scanner, now supporting AWS S3 and RDS instances in preview, helps prevent personal or sensitive information from inadvertently being incorporated in LLM training data or inference processes. Monitoring runtime risks The complexity of AI-based applications increases the challenge for security analysts to manage alerts, distinguish credible threats from benign signals, and respond in a timely manner. According to Datadog, AI applications are at particular risk of attacks that could lead to resource exhaustion or financial damage if not detected early. Bits AI Security Analyst is designed to reduce the workload on Security Operations Centres by providing initial investigations and filtering for more relevant threats. The new solution aims to enable teams to act on rich context and prioritised guidance so they can focus resources where they matter most. Additional updates include Datadog Workload Protection, which now features LLM Isolation capabilities in preview. This enables continuous monitoring of interactions between LLMs and their host environments, helping to detect and prevent exploitation of vulnerabilities while enforcing controls to protect production AI models. Datadog's new security features encompass Code Security, updated Cloud Security tools, Sensitive Data Scanner, Cloud SIEM, Workload and Application Protection, and expanded abilities within LLM Observability. These updates are designed to give organisations multiple layers of risk mitigation as they increasingly deploy AI in critical workflows.


Techday NZ
10-06-2025
- Techday NZ
Nasuni bolsters executive team amid global hybrid cloud push
Nasuni has announced the appointment of three executives to its leadership team, strengthening its focus on talent, information technology, and security functions. The company has named Alison Bayiates as Chief People Officer, Dalan Winbush as Chief Information Officer, and Elyse Gunn as Chief Information Security Officer, reflecting its intent to support business growth in the hybrid cloud storage sector and enhance its global operations. Leadership appointments Bayiates joins Nasuni with significant experience in scaling people strategies for technology firms and has previously held leadership posts at RSA and Veracode. Winbush, who becomes CIO, brings over 25 years of responsibility for enterprise IT, data, cybersecurity, and artificial intelligence projects, including experience at Quickbase and Comcast. Gunn, as the new CISO, will lead on global security and compliance, having established security and compliance practices in earlier roles at Pax8 and Quickbase. The appointments follow the recent recruitment of Sam King as Chief Executive Officer. King has expressed confidence in the expanded executive lineup, stating: "As Nasuni enters this next phase of growth, we are thrilled to welcome Alison, Dalan, and Elyse to our team. Each brings an impressive track record in their respective fields and will play a pivotal role in driving our strategy forward, from technological innovation and enterprise security to talent development at a global scale. These areas will be instrumental to enable our continued innovation and growth, delivering differentiated hybrid cloud storage and data management capabilities to our customers." Individual backgrounds Bayiates, as Chief People Officer, will oversee all aspects of talent and organisational development as the company expands globally. She has been credited for building inclusive workplace cultures that align with business strategy during her time at RSA and Veracode. Winbush, as Chief Information Officer, will supervise worldwide IT operations, enterprise systems, AI strategy, data analytics, and infrastructure. During his tenure at Quickbase, he integrated artificial intelligence and generative AI into core operations and established a unified data strategy. His experience at Comcast included responsibility for a USD $300 million portfolio, delivering infrastructure and analytics projects. Gunn, in her role as Chief Information Security Officer, brings expertise in security and regulatory frameworks for SaaS companies. She has led security governance and AI governance initiatives, securing certifications such as ISO 27001, NIST, SOC 1, SOC 2, and Tx-RAMP. She will now direct Nasuni's global security strategy, product security, and regulatory compliance programmes. Market context and focus Nasuni's expansion of its leadership team coincides with growth in demand for hybrid cloud data services among enterprise IT customers. The company is positioning itself to address challenges such as cost reduction, streamlined IT management, and increased resilience in data protection at a global scale. A company spokesperson highlighted the aim to optimise infrastructure and support data-driven operations for clients in sectors such as manufacturing, consumer brands, construction, energy, and media. Nasuni states that its unified file data platform is designed to combine storage and data services into a single solution, with a focus on reducing infrastructure expenses and offering data protection without requiring additional cybersecurity tools or backup systems. The company claims that its platform can cut infrastructure costs by as much as 67%. The leadership appointments are part of a broader growth strategy, as Nasuni continues to build its presence internationally, delivering services in more than 70 countries.


Scoop
10-06-2025
- Scoop
Commvault Boosts Quantum-Safe Encryption To Tackle Emerging Cyber Risks
Quantum computing will change everything we know about encryption and cyber defence, said Bill OConnell, Commvaults CSO. Our goal is to stay ahead of these shifts, giving customers the tools they need before threats materialize. Commvault has expanded its quantum-safe encryption toolkit, becoming one of the first major cyber resilience vendors to support the Hamming Quasi-Cyclic (HQC) algorithm—part of its broader strategy to protect against next-generation threats enabled by quantum computing. The company announced today that its Commvault Cloud platform now supports HQC, a NIST-recommended algorithm designed to address 'harvest now, decrypt later' risks. These involve adversaries capturing encrypted data today to decode it in the future, once quantum computing reaches sufficient maturity. 'Quantum computing will change everything we know about encryption and cyber defence,' said Bill O'Connell, Commvault's CSO. 'Our goal is to stay ahead of these shifts, giving customers the tools they need before threats materialize.' Commvault's commitment to post-quantum cryptography dates back to August 2024, when it introduced a crypto-agility framework and support for standards like CRYSTALS-Kyber and SPHINCS+. With today's additions, the company continues to set the pace in an increasingly urgent race. The update is especially relevant for sectors like healthcare and finance, where data must be protected for decades. Commvault's Risk Analysis tools help organizations pinpoint which data sets could benefit from quantum-safe encryption, making the transition easier through a simple checkbox interface. 'Quantum readiness has become a business imperative,' said IDC's Phil Goodwin. 'Commvault's leadership in this space positions it as a proactive player in data protection.' The PQC features are immediately available for all Commvault Cloud users on version CPR 2024 (11.36) and above.