Reviews from AWS customer

13 AWS reviews

External reviews

271 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Shrikant Patil

Centralized policy management has improved firewall audits and simplifies multi-vendor compliance

  • May 10, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for AlgoSec is firewall policy management, rules cleanup, and automated security change tracking across different network devices.

A specific example of how I use AlgoSec for firewall policy management and security change tracking in my day-to-day work is identifying unused or overly permissive firewall rules before audits, and it helps track who changed what rule and when across multiple firewalls.

One useful aspect of our setup with AlgoSec is how it centralizes policy visibility across different firewall vendors, which makes compliance reviews and change approvals much faster for the security team.

What is most valuable?

The best features AlgoSec offers in my experience are firewall rule analysis, automated change tracking, multiple vendor visibility, and the ability to quickly identify risky or unused tools before they become a security issue.

Out of those features, I find myself using the multiple vendor visibility feature the most because it helps tremendously since we manage different firewall brands in the same environment. AlgoSec gives us a single view of policies and traffic flows, so instead of checking each device individually, we use multiple vendor visibility.

The visibility and rule analysis are the standout features for us, but I would still like to see a more modern UI and faster reporting performance in very large environments.

AlgoSec has positively impacted my organization by reducing the time spent on firewall audits and rule reviews significantly, and it has helped improve overall policy consistency across the network.

What needs improvement?

AlgoSec could improve UI responsiveness and reporting speed, especially in large enterprise environments with substantial policy data and connected devices.

In terms of needed improvements, I wish AlgoSec could provide better third-party integration and more flexible customization in reports and dashboards, which would make it even more useful for day-to-day operations.

For how long have I used the solution?

I have been working in my current field for over one year and a total of two years. My experience with AlgoSec is about one year.

What do I think about the stability of the solution?

In my experience, AlgoSec has been very stable overall, especially for day-to-day policy management and compliance operations with very few major issues or outages.

What do I think about the scalability of the solution?

AlgoSec scales well for my needs, handling multiple vendor, hybrid, and multi-cloud networks effectively, although very large deployments can sometimes need additional tuning for optimal performance.

How are customer service and support?

Customer support for AlgoSec has been good overall; the support team is knowledgeable, responsible, and responsive, usually resolving issues quickly, especially for firewall integration and policy-related problems.

Which solution did I use previously and why did I switch?

Before switching to AlgoSec, we relied mostly on manual firewall management with native vendor tools, but we made the switch for better automation, centralized visibility, and compliance tracking across multiple platforms.

How was the initial setup?

AlgoSec was purchased directly through the vendor, not through the AWS Marketplace.

What was our ROI?

We have seen a noticeable ROI with AlgoSec, mainly through time-saving, as firewall review and compliance tasks that used to take multiple days are now usually completed within a few hours, which has reduced much manual effort for the network security team.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is that I found the pricing and licensing straightforward. However, I would like to see better scalability for large rule sets and more intuitive policy simulation during change planning. We would also like to see AlgoSec integrate with our firewall ticketing systems to streamline policy changes, audit tracking, and compliance workflows from a single platform.

Which other solutions did I evaluate?

Before choosing AlgoSec, we also evaluated Tufin and FireMon during the evaluation process.

What other advice do I have?

My advice for others looking into using AlgoSec is to properly map your firewall environments and workflows before deployment because AlgoSec delivers the most value when the policies, integrations, and approval processes are well-organized from the start.

Overall, AlgoSec has been a strong addition to our security operations, especially for improving visibility, reducing manual firewall work, and simplifying compliance management across different environments. I would rate this review as an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Ayushi Rathod

Automated firewall governance has reduced manual work and improves compliance across our hybrid network

  • May 09, 2026
  • Review from a verified AWS customer

What is our primary use case?

Our main use case for AlgoSec is automating firewall policy management and compliance auditing across multiple firewall vendors, which helps us reduce manual rule reviews and improve visibility into network security changes.

We use AlgoSec to automate firewall rule change requests, so when an application team needs new network access, the tool analyzes the path, checks compliance risk, and helps implement the rule much faster than our previous manual approval process.

Besides firewall policy automation, we also use AlgoSec for compliance reporting and network visibility, which helps us identify unused or risky firewall rules and prepare for security audits more efficiently.

How has it helped my organization?

AlgoSec has improved our network security operations by reducing manual firewall management work, speeding up rule change approvals, and helping us maintain better compliance visibility across different security devices.

After implementing AlgoSec, firewall change requests that previously took days of manual review were often completed within hours, and the automation significantly reduced configuration errors and time spent preparing compliance audit reports.

What is most valuable?

The best features of AlgoSec in my experience are automated firewall rule analysis, risk and compliance reporting, application connectivity mapping, and multi-vendor firewall support because they make security policy management much faster and reduce manual errors from the networking.

The automated firewall rule analysis in AlgoSec helps our team quickly identify risky, unused, or conflicting rules before changes are implemented, which reduces manual review time and helps avoid security or connectivity issues during firewall updates.

One feature I also find very useful in AlgoSec is the application connectivity mapping because it gives clear visibility into how applications communicate across the network, which makes troubleshooting and migration planning much easier.

What needs improvement?

One area where AlgoSec could improve is the UI and UX because navigating complex workflows in policy analysis and reporting can feel heavy at times, especially for new users. Better dashboards, simplification, and faster drill-down into rule-level insights would make day-to-day operations smoother.

Another improvement for AlgoSec would be more intuitive reporting customization and faster integration setup for newer cloud-native environments, since aligning hybrid cloud policies sometimes requires extra effort and configuration tuning. Improving real-time change simulation and recommendations would also help, as the impact analysis could be even more interactive and easier for non-specialist teams to understand before a firewall rule is pushed.

One additional improvement for AlgoSec would be deeper native support for modern cloud-native services and Kubernetes environments because policy visibility and rule mapping in highly dynamic cloud workloads can still feel limited compared to traditional firewall environments.

For how long have I used the solution?

I have been using AlgoSec for one year.

What was our ROI?

Overall, AlgoSec has been very effective for improving firewall governance, reducing manual effort in rule management, and strengthening compliance visibility across our hybrid network environment. It is especially valuable once the initial setup and network mapping are in place.

What other advice do I have?

My advice for anyone considering AlgoSec is to first map out your firewall and application dependencies clearly before implementation because the tool delivers the most value when your network inventory and policy structure are well-organized from the start. I would also recommend starting with a pilot on a small segment of your network and involving both security and network teams early, because AlgoSec works best when policies, firewalls, and application owners are aligned before scaling it across the full environment. I would rate this product a 9 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Khaleel Kaladagi

Automation has reduced firewall review time and improves compliance visibility across teams

  • May 09, 2026
  • Review provided by PeerSpot

What is our primary use case?

AlgoSec is used primarily for firewall policy management, security compliance monitoring, and automatic network security change workflow. AlgoSec is utilized for firewall policy management to review firewall rule changes before deployment and identify unused or risky rules during compliance audits. It helps our team reduce manual checks and improve visibility across network security policy.

What is most valuable?

The best features that AlgoSec offers are policy visibility, automated risk analysis, compliance reporting, and workflow automation for firewall change management.

The automated risk analysis helps our team by checking firewall changes against existing policy and risk before deployment, which helps us catch misconfiguration early and reduce manual review time. It also improves consistency during audits and approvals. Another useful feature is centralized visibility across different firewalls and network environments.

AlgoSec helps us track policy changes faster and make coordination between security and network teams much smoother. AlgoSec has positively impacted our organization by improving our visibility into firewall policy and reducing the time spent on manual tools review. It has also helped streamline compliance audits and made security change management move more efficiently across teams.

What needs improvement?

AlgoSec could improve the user interface to make navigation simpler for new users. Initial setup and integration with some environments can also take time, so a smoother onboarding process and more detailed documentation would help.

The dashboard experience could be improved as some sections feel cluttered when managing large environments. Better search filter options and clear documentation on integration and troubleshooting would also make day-to-day use easier.

For how long have I used the solution?

I have been working in my current field for over three years.

What do I think about the stability of the solution?

AlgoSec has been stable overall in our experience. We have reliable performance with very few major issues or downtime.

What do I think about the scalability of the solution?

AlgoSec scales well for large and growing environments. It handles additional firewall, cloud integration, and policy changes without major performance issues in our experience.

How are customer service and support?

Customer support has been good overall. The support team is responsive and helpful with technical issues, especially during deployments and troubleshooting, although response times can vary in lower priority cases.

Which solution did I use previously and why did I switch?

Before AlgoSec, we mainly relied on manual firewall management processes and a few basic monitoring tools. We switched because we needed better automation, centralized visibility, and easier compliance management across a growing network environment.

How was the initial setup?

After implementing AlgoSec, we reduced the time spent reviewing firewall changes by around forty to fifty percent. We also saw fewer policy-related errors because risky or unused rules were identified automatically before deployment. Compliance reporting became much faster during audits compared to the manual process.

What about the implementation team?

We have been using AlgoSec for around two to three years.

What was our ROI?

We have seen a clear return on investment with AlgoSec. Firewall changes review that used to take hours are now completed much faster, saving roughly forty to fifty percent of the team's time on manual checks and compliance tasks. Automation also reduced configuration errors, which helped avoid operational issues and improved overall efficiency without needing additional staff.

What's my experience with pricing, setup cost, and licensing?

The pricing for AlgoSec is on the higher side, but the automation and visibility features provide good value for larger environments. Setup and licensing were manageable overall, though the initial deployment required some planning and coordination.

Which other solutions did I evaluate?

We evaluated a few other network security management solutions, including Tufin and FireMon before choosing AlgoSec.

What other advice do I have?

I would recommend planning for the deployments carefully and involving both security and network teams early in the process. AlgoSec delivers the most value in larger environments where automation, compliance, and centralized policy visibility can significantly reduce manual efforts. This review has been rated a nine out of ten.


    Mamoon Ansari

Centralized policy analysis has transformed firewall audits and now streamlines compliance work

  • May 09, 2026
  • Review from a verified AWS customer

What is our primary use case?

I mainly use AlgoSec for firewall policy management, compliance auditing, and managing security policy changes across multiple firewall environments.

I use AlgoSec to identify unused or risky firewall rules before compliance audits, and it also helps streamline rule review and approval workflows across different firewall vendors.

Also, to improve visibility into network flows between environments, which helps significantly when reviewing segmentation policies and planning firewall changes and in a hybrid environment with mostly on-premises firewall infrastructure along with some cloud-connected security environments.

What is most valuable?

The best features for me from AlgoSec include firewall policy analysis, automated compliance auditing, multi-vendor firewall visibility, and security change tracking. The risk analysis and rule cleanup capabilities are especially useful because they help identify overly permissive or unused firewall rules before they become a security issue.

Policy analysis is probably the feature I rely on the most because it gives me a clear view of rule behavior, usage, risky configurations, and policy changes across multiple firewalls from one place.

The multi-vendor visibility was probably the most useful surprise because it simplified management across different firewall platforms much more than I initially expected.

AlgoSec has helped speed up alerting and management positively in my organization.

AlgoSec has definitely improved efficiency for my team because firewall reviews and compliance checks that used to take a lot of manual effort are now much faster and more streamlined. I have also reduced the risk of misconfigured or unused rules by having better visibility and automated analysis across the environment.

What needs improvement?

I wish the user interface could be more modern and responsive, and I hope reporting performance could be improved for large environments with very high rule volumes.

Reporting customization and deeper integrations with cloud-native security tools would definitely improve the overall experience.

For how long have I used the solution?

I have been using AlgoSec for one year.

What do I think about the stability of the solution?

AlgoSec is very stable. AlgoSec has been very stable in my experience, especially for day-to-day firewall policy management and compliance operations.

What do I think about the scalability of the solution?

Scalability has been good overall. AlgoSec handles growth across multiple firewall vendors and hybrid environments pretty well, although larger deployments may need some tuning for reporting and performance optimization as rule volume increases.

How are customer service and support?

I have interacted with customer support, and they are very supportive and excellent.

Which solution did I use previously and why did I switch?

Before AlgoSec, I mostly relied on native firewall management tools and manual review processes, but I switched to get better automation, centralized visibility, and easier compliance management across multiple firewall vendors.

How was the initial setup?

Setup required some planning and tuning in the beginning, especially for integrating multiple firewall vendors, but once deployed, it significantly reduced manual operational effort.

What about the implementation team?

I only use AlgoSec as a customer and do not have any partner, reseller, or other business relationship with the vendor.

What was our ROI?

I have definitely seen ROI through the savings on reduced manual firewall management work. For example, compliance reviews and firewall rule audits that previously took days of manual checking can now usually be completed within a few hours, and the centralized visibility has also reduced troubleshooting time during policy changes and audits.

What's my experience with pricing, setup cost, and licensing?

Pricing and the licensing for AlgoSec are definitely enterprise-focused and can become more expensive in large multi-firewall environments, but the automation, compliance reporting, and policy management features justify the investment for me.

Which other solutions did I evaluate?

I did evaluate Tufin and Skybox Security platforms along with AlgoSec before making my decision.

What other advice do I have?

I advise others looking into using AlgoSec to make sure firewall policies and change management processes are well-organized before deployment because AlgoSec delivers the most value when the environment and workflows are clearly structured from the start. I would rate this review an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Shubham Dwivedi

Centralized policy management has improved firewall reviews and accelerated compliance reporting

  • May 08, 2026
  • Review from a verified AWS customer

What is our primary use case?

AlgoSec is primarily used for firewall policy management, security policy optimization, compliance monitoring, and improving network security visibility across our environment.

AlgoSec is used to review firewall rule changes and identify unused or risk rules before implementation. It also helps during compliance audits by generating reports quickly, which saves time and improves visibility across the network security environment.

Another useful aspect of AlgoSec is the centralized visibility it provides across multiple firewalls and security devices. It helps simplify policy management, reduce manual efforts, and improve coordination between security and network teams.

What is most valuable?

The best features of AlgoSec are firewall policy management, risk analysis, automated compliance reporting, and centralized visibility across different security devices. I also appreciate its ability to identify risk or unused firewall rules, which helps improve security and reduce manual work.

AlgoSec has improved our firewall management process, reduced manual efforts, and increased visibility across the network security environments. It helps the team respond to policy changes faster, improve compliance readiness, and identify risk or unused rules more efficiently, which strengthens overall security operations.

A clear improvement in efficiency has been noticed after implementing AlgoSec. Tasks such as firewall rule review and compliance reporting that previously took several hours can often be completed much faster, reducing manual efforts by approximately 40 to 50 percent. AlgoSec has also helped reduce configuration errors and improve visibility across security policies, making audits and policy change management more efficient and reliable.

What needs improvement?

AlgoSec is very useful overall, but the user interface could be more modern and easier for a new user to navigate. Some reports and dashboards could also offer more customization and flexibility in complex environments. Certain workflows and policy analysis tasks can feel a bit slow, so performance optimization would help improve the overall experience.

Another improvement could be simplifying the onboarding process for new users because some advanced features require time to fully understand. Better integration with more third-party security and cloud platforms would also help streamline workflow in a hybrid environment. Overall, AlgoSec remains a strong and reliable solution for firewall and security policy management.

One additional improvement would be enhancing the speed and usability of larger scale policy analysis in complex environments. More intuitive reporting and dashboard customization options would also help teams get insights faster and improve the overall user experience.

For how long have I used the solution?

AlgoSec has been used for approximately two years.

What do I think about the stability of the solution?

AlgoSec has been stable in our experience. Major outages or performance issues are rarely faced, and the platform performs reliably for firewall policy management, compliance checks, and risk analysis tasks. It handles large environments well and receives regular updates and improvements, which help maintain stability and reliability.

What do I think about the scalability of the solution?

AlgoSec has shown good scalability in our environment, efficiently managing multiple firewall security devices and hybrid cloud environments without major performance issues. As our network environment and policy requirements grow, the platform continues to provide centralized visibility and reliable policy management, making it suitable for enterprise-scale deployments.

How are customer service and support?

The experience with AlgoSec customer support has been positive overall. The support team is knowledgeable, responsive, and helpful during troubleshooting on onboarding and configuration-related issues.

Which solution did I use previously and why did I switch?

Before AlgoSec, manual firewall management and native firewall tools were mainly relied upon. AlgoSec provides centralized visibility, automated compliance reporting, and better risk analysis, which significantly reduces manual work and improves efficiency.

How was the initial setup?

The experience with AlgoSec pricing and licensing was generally positive. The initial setup required some planning because of integration with multiple firewalls and security systems, but the deployment process itself was manageable. The licensing module was flexible for enterprise use, and the value mainly came from reduced manual effort, faster compliance reporting, and improved firewall policies. The pricing can feel a bit higher for smaller organizations or teams with limited security management requirements.

What was our ROI?

A positive return on investment has been seen, mainly through time savings and improved operational efficiency in firewall rule review, compliance checks, and policy analysis. Tasks that previously required several hours of manual work can now be completed much faster, reducing manual efforts by approximately 40 to 50 percent.

Which other solutions did I evaluate?

Several other security policy management solutions were evaluated, including Tufin and FireMon. AlgoSec stood out because of its centralized visibility, compliance automation, risk analysis features, and ease of managing policy across multiple firewall vendors.

What other advice do I have?

AlgoSec has been a valuable solution for improving firewall management, compliance monitoring, and security visibility. Its automation and risk analysis features help reduce manual efforts and improve operational efficiency. While there is still room for improvement in usability and customization, AlgoSec remains a strong and reliable platform for managing complex security environments. This review is rated 8 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Manik Singh

Centralized policy management has transformed firewall audits and now streamlines compliance

  • May 07, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for AlgoSec is firewall policy management, rule cleanup, and automated security change tracking across different network devices.

I use AlgoSec to identify unused or overly permissive firewall rules before audits, and it helps track who changed what rule and when across multiple firewalls.

AlgoSec automates the policy change process by validating requests, tracking approvals, and documenting every change before it gets pushed to the firewalls.

AlgoSec integrates with our firewalls, SIEM, and ticketing systems to streamline policy changes, audit tracking, and compliance workflows from a single platform.

AlgoSec helps visualize traffic flows between network segmentation and identifies overly permissive rules or risky access paths that could increase exposure across the environment.

What is most valuable?

The best features AlgoSec offers for me are the firewall rule analysis, automatic change tracking, multi-vendor visibility, and ability to quickly identify risky or unused rules before they become a security issue.

Multi-vendor visibility helps significantly because I manage different firewall brands in the same environment, and AlgoSec gives me a single view of policies and traffic flows instead of checking each device separately.

The visibility and rule analysis are the standout features for me, but I would like to see a more modern UI and faster reporting performance in very large environments.

AlgoSec has positively impacted my organization by reducing the time spent on firewall audits and rule review significantly, and it has helped improve overall policy consistency across the network.

What needs improvement?

AlgoSec could improve the UI responsiveness and reporting speed, especially in large enterprise environments with significant policy data and connected devices.

Better third-party integrations and more flexible customization in reports and dashboards with AlgoSec would make it even more useful in day-to-day operations.

I would like to see better scalability for large rule sets and more intuitive policy simulation during change planning with AlgoSec.

For enterprise environments, AlgoSec handles multiple vendor, hybrid, and multi-cloud networks effectively, though very large deployments can sometimes slow down and need additional tuning for optimal performance.

For how long have I used the solution?

I have been using AlgoSec for around one and a half years.

What do I think about the stability of the solution?

AlgoSec is stable.

What do I think about the scalability of the solution?

AlgoSec scales well overall, especially for multi-firewall environments, but performance can slow down slightly when managing very large rule bases and high volumes of policy changes.

How are customer service and support?

The customer support for AlgoSec is great.

Which solution did I use previously and why did I switch?

Previously I relied mostly on manual firewall management with the native vendor tools, but I switched to AlgoSec for better automation, centralized visibility, and compliance tracking across multiple platforms.

How was the initial setup?

The onboarding to AlgoSec is fairly straightforward since the dashboard is easy to navigate and most team members pick up the core policy management workflows quickly.

The documentation for AlgoSec is detailed and useful for setup and troubleshooting, and the training resources are sufficient for getting new admins comfortable with the platform.

What about the implementation team?

AlgoSec was purchased directly through the vendor.

What was our ROI?

I have seen noticeable ROI mainly through the time savings, with firewall review and compliance tasks that used to take multiple days now usually completed within a few hours, which reduced much manual effort for my network security team.

What's my experience with pricing, setup cost, and licensing?

The pricing for AlgoSec is on the higher side, but the automation and time savings during audits and policy management make it worthwhile for larger environments.

Which other solutions did I evaluate?

I also looked at Tufin and FireMon during the evaluation process before deciding on AlgoSec.

What other advice do I have?

My advice to others looking into using AlgoSec is to make sure you properly map your firewall environments and workflows before deployment because AlgoSec delivers the most value when the policies, integrations, and approval processes are well-organized from the start.

AlgoSec helps my organization meet compliance requirements by automatically defining risky or non-compliant firewall rules and generating audit-ready reports, which makes compliance reviews much faster and more consistent.

Before using AlgoSec, some firewall rule review and audit tasks used to take days of manual checking, but now most of those reviews are completed in a few hours with much better visibility and tracking.

Overall, AlgoSec has been a strong addition to my security operations, especially improving visibility, reducing manual workflow, and simplifying compliance management across different environments. I rate this product eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Suraj Varma

Centralized visibility has improved policy tuning and reduced firewall change errors

  • May 04, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for AlgoSec is to manage and fine-tune the firewall policies and network security policies across our on-premises multiple vendor firewalls such as Palo Alto, FortiGate, and Check Point. All these firewalls are integrated with this solution, and we fine-tune the firewall policies based on the recommendations provided by AlgoSec.

Since we have multiple different VM firewalls, we have integrated these firewalls with this solution. This solution provides great insight into the firewall policies, such as identifying which policies are not correctly configured. For example, policies defined as 'any any' in the destination, or 'any any' in the application or the services. We are obtaining these valuable insights with the solution, and accordingly, we are fine-tuning or reconfiguring the firewall policies. It also provides great visibility on rule shadowing, which helps in real-time to fine-tune the firewall policies.

What is most valuable?

According to my use cases, the best feature that AlgoSec provides is the full visibility of the firewall and network policies. We can check all the firewall rules, access paths, and everything from a single point of view. It also provides automated firewall change management, which reduces errors and speeds up changes. These are the best features I can highlight.

Regarding the reporting part, AlgoSec allows us to generate reports based on auditory requirements mandated by the organization such as PCI DSS and ISO. This reporting is very useful.

We have seen a strong positive response with the help of AlgoSec. We are seeing faster change management and strong security postures with great visibility and reduced errors. These are the positive impacts we are observing.

What needs improvement?

From my point of view, AlgoSec is a very powerful solution. I do not see any improvement needed at this time because it is working according to our needs and the organizational requirements. As far as the current needs are concerned, it is matching our requirements.

For how long have I used the solution?

I have been working in my current field for more than four years.

What do I think about the stability of the solution?

AlgoSec is stable.

What do I think about the scalability of the solution?

AlgoSec is a very scalable solution. Based on the organization's needs, we can integrate multiple firewalls.

How are customer service and support?

The customer support is technically sound and helpful twenty-four hours a day, seven days a week.

Which solution did I use previously and why did I switch?

We have been using the same solution since the beginning, and I think there is no other solution in the market competing with this solution. It is a very unique solution.

How was the initial setup?

I would rate AlgoSec ten out of ten.

What was our ROI?

We have seen a great ROI on implementing AlgoSec, with a sixty to eighty percent reduction in the change management time, a reduction in manual efforts, and a seventy to eighty percent reduction in errors. These are a few benefits that we are getting.

Which other solutions did I evaluate?

We did not evaluate other options before choosing AlgoSec.

What other advice do I have?

I think AlgoSec is a very good solution. If any company has multiple firewalls such as Check Point, FortiGate, SonicWall, or Sophos, they should consider it. This will really help them to fine-tune firewall policies, push central policies, and centrally manage policies with a great reduction in human errors.

My advice to others looking into using AlgoSec would be to conduct a proof of concept, apply all your use cases in real time, and check the final outcomes. Based on that, they should proceed with the solution. It is highly recommended and will be really helpful for simplifying firewall management, providing full visibility, automation, and risk analysis across a complex network environment. I have given this review a rating of ten out of ten.


    uneish

Centralized policy automation has improved daily firewall reviews and simplifies hybrid access control

  • April 28, 2026
  • Review from a verified AWS customer

What is our primary use case?

On a day-to-day basis, I primarily use AlgoSec to review and validate network security policy, ensuring that changes align with the organizational requirements, gaining visibility into application connectivity and analyzing firewall rules before implementation.

In our organization, AlgoSec is deployed in a hybrid cloud environment, supporting both on-premises infrastructure and cloud platforms, allowing us to maintain visibility and control access to traditional data centers as well as cloud-based resources, ensuring consistent policy management across the entire network.

How has it helped my organization?

AlgoSec has a positive impact on the organization, particularly in improving operational efficiency and visibility across the network security process, with noticeable outcomes including a reduction in time required to review and implement firewall changes.

The impact of AlgoSec has been measurable in day-to-day operations, showing approximately a thirty to forty percent reduction in time required to review and process firewall change requests, primarily due to automation and centralized visibility.

What is most valuable?

One of the strongest aspects of AlgoSec is the breadth and depth of its feature set, particularly around automation, visibility, and policy management, with firewall policy management standing out most to me.

The feature that I rely on the most in my daily work is the firewall policy management and analysis capability within AlgoSec, playing a central role in my day-to-day activity by allowing me to review, analyze, and validate firewall rules across the network from a single interface.

What needs improvement?

AlgoSec is a robust and effective platform, though one primary challenge is the initial setup and onboarding process, which can be complex and time-consuming, especially in large or highly customized environments.

In addition to the areas already mentioned, greater customization and flexibility in dashboards and reporting would improve the overall experience of AlgoSec.

For how long have I used the solution?

I have been using AlgoSec for approximately four point five years, during which I have gained hands-on experience working with its core functionalities, including policy analysis, rule lifecycle management, and network visibility.

What do I think about the stability of the solution?

In our experience, AlgoSec has demonstrated strong performance and reliability within our environment, remaining stable in day-to-day operations without experiencing significant downtime.

What do I think about the scalability of the solution?

I would rate the scalability of AlgoSec highly at around eight to nine out of ten, as in our experience it handles growth effectively as the network becomes more complex.

How are customer service and support?

In my experience, the customer support from AlgoSec has been reliable and professional, generally responsive with a good level of technical knowledge when addressing issues or queries.

How was the initial setup?

My advice for organizations considering AlgoSec is to first clearly understand their network environments and define key objectives, whether improving visibility, automating policy management, or strengthening overall security operations.

What other advice do I have?

AlgoSec offers strong integration capabilities with a wide range of security tools and platforms, which is one of its key strengths.

My experience with AlgoSec has been very positive, as it is a well-rounded platform effectively addressing key challenges in managing network security policies.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Abhay Pillai

Centralized firewall control has simplified rule management and improved compliance audits

  • April 27, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for AlgoSec is for the management of all the firewalls and policy rule sets, including everything.

In many locations, I work as a system integrator, so my clients use multiple products including Fortinet, Cisco ASA, and Check Point, facing issues in scenarios where they have 3,000 to 4,000 policies, many of which haven't been used in two to three years. They don't know which policies need to be removed or if a particular policy is working or not, so for that purpose, we suggest all clients implement AlgoSec on their premises to verify which policies are appropriate for their organization, and based on that, we modify the firewall policies accordingly.

I have worked with the BFSI sector, where they have multiple firewalls in data centers with varying architectures; for example, the perimeter firewalls could be Check Point or Palo Alto while the internal firewalls might be FortiGate or Cisco ASA. Managing both firewalls on different platforms is not easy for a technical person, but after implementing AlgoSec in their premises, we can handle multiple firewall policies in a single interface and push policies according to our requirements, even if we have 10 to 15 firewalls from different OEMs.

What is most valuable?

AlgoSec offers multiple options, including firewall management and API management; I have only worked with the firewall management part and found that we can manage not only some specific products but also multiple vendors including Cisco, FortiGate, Check Point, and others all in a single platform, which I consider to be its best feature.

Implementing AlgoSec has reduced time consumption significantly; for instance, if we need to remove policies from 14 to 15 firewalls and add new ones, it can typically be accomplished within one to two clicks. That's one of the best points I have seen, especially since we can also view the topology, which is another significant advantage in AlgoSec.

AlgoSec is really helpful for complying with regulatory requirements because during audits and compliance checks, we need to quickly delete unwanted policies. If any unwanted policies are enabled, they can pose security risks, as attackers could exploit them. Manually checking thousands of policies is not feasible, but AlgoSec helps us by showing which policies may cause impact and guiding our remediation efforts.

The integration with the ticketing system is excellent; AlgoSec has its own ticketing tool that tracks what policies have been deleted or added while we upload and change firewall data, which is very helpful.

What needs improvement?

Right now, pushing policies is restricted to some OEMs; we can delete unwanted policies for many OEMs, but while pushing new policies, I've noticed challenges with Fortinet and Sophos or SonicWall. If support for multiple OEM vendors is improved, it would be really helpful, and providing service addresses or profiles in AlgoSec would be beneficial for attracting multiple customers, allowing easier management.

I have seen that the documentation provided is a bit basic; having a professional or standard template would be really helpful.

For how long have I used the solution?

I have been using AlgoSec since 2023.

What do I think about the scalability of the solution?

AlgoSec's scalability is impressive; there are no limitations on the number of firewalls we can manage. Even as my organization grows, I can add multiple firewalls without restriction, making it highly convenient.

How are customer service and support?

Customer support for AlgoSec is really good; whenever an issue arises, they provide support as per the standard services or license base.

How was the initial setup?

AlgoSec is very easy to use and manage, though the installation process can be challenging due to the Linux or UNIX-based implementation, which may pose issues initially.

What was our ROI?

Implementing AlgoSec has saved a lot of time in management, and consequently reduced costs. For example, at 15 locations already equipped with three to four OEM firewalls, I would normally need to purchase separate management tools, but with AlgoSec, I can manage all the firewalls through a single GUI without needing third-party tools, which saves time and resources.

What's my experience with pricing, setup cost, and licensing?

Overall, my experience with pricing, setup cost, and licensing has been very good.

What other advice do I have?

In 2023 and 2024, I first encountered the product, and after the AlgoSec team approached us for implementation, it proved to be very helpful. When I implemented it for the first time, customers appreciated that they did not need to manage multiple interfaces for firewall or API purposes, as a single interface could manage everything, making it easier for engineers to manage their IT devices and reducing time consumption.

There have been instances of needing an expert in Linux or UNIX-based systems to address issues as it is a complete UNIX-based device.

My overall review rating for AlgoSec is 8 out of 10.


    Bijja Maheshwar

Centralized policy analysis has streamlined firewall changes and reduced troubleshooting time

  • April 27, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for AlgoSec is to control and streamline the firewall policy across multiple vendor security platforms and ensure that changes are implemented in a secure and standardized manner.

When a new connectivity requirement comes in as a technical request, we define the source, destination, and the service that needs to be allowed. AlgoSec evaluates the entire path flow and based on that, it highlights required changes across relevant firewalls. We review it and implement accordingly. This is really helpful to avoid manual device-by-device verification.

What is most valuable?

The most valuable feature of AlgoSec is traffic flow analysis, which is very useful to visualize the packet path across the devices. The second thing is multi-platform compatibility that supports different firewall vendors such as Palo Alto, Fortinet, and other OEM firewalls.

The traffic flow analysis feature of AlgoSec has helped me in my day-to-day work as it gives a complete end-to-end view of how traffic moves through the network. Instead of manually checking multiple firewalls, routing paths, and NAT rules, this analysis tells us if the traffic will pass or get blocked and which device is allowing or denying. This analysis is really useful in daily operations.

AlgoSec has positively impacted my organization by hastening the process of firewall requests, improving visibility across the layers, and reducing misconfiguration. Overall operations have become more controlled and efficient.

Troubleshooting effort has been reduced by 40 to 60%, cleaner firewall policies have been developed over time, and change execution time has also been reduced.

What needs improvement?

AlgoSec is a very useful tool and solution that is working well for us. If I could change or add anything, I would say the setup process could be more simplified.

For how long have I used the solution?

I have been using AlgoSec for more than four years.

What do I think about the stability of the solution?

AlgoSec is stable.

What do I think about the scalability of the solution?

AlgoSec's scalability is excellent as it can handle organization growth and multiple firewalls.

How are customer service and support?

My team deals with the customer support team, and they are providing positive feedback.

Which solution did I use previously and why did I switch?

We have not switched and are using this solution since the start.

How was the initial setup?

My experience with pricing, setup cost, and licensing has been straightforward and smooth. We have had a smoother experience with the sales team, and the pricing, setup cost, and licensing for the solution are all smooth.

I chose a rating of nine out of ten for AlgoSec because, in my view, nine is a good rating for this solution. I have kept one point out because the initial setup required some effort, which could be simplified in the future.

What was our ROI?

We have seen a great return on investment with this solution because our process has been simplified and is smoother than the previous one, and we are getting good visibility with a compliance-ready environment.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing has been straightforward and smooth. We have had a smoother experience with the sales team, and the pricing, setup cost, and licensing for the solution are all smooth.

Which other solutions did I evaluate?

Before choosing AlgoSec, we have not evaluated other options.

What other advice do I have?

My advice for others looking into using AlgoSec would be to start with a clear objective. Decide whether you want to speed up firewall changes, improve compliance audits, and clean up your existing rules. A clear direction will value you for faster deployment and build accurate topology faster. AlgoSec depends heavily on routing, NAT, and firewall paths, so spend time validating this data and go for the solution. I rate this solution a nine out of ten.