top of page

USE CASE

SECURITY COMPLIANCE & ORCHESTRATION

IT Security Orchestration

Situation: Manual Compliance & Firewall Orchestration

  • Without automated security policy compliance management in place all security policy change requests require manual human intervention.

  • A user request to update a security policy creates a ServiceNow (or similar ITSM) ticket, specifying the target security policy and the changes to be made.

  • A member of the SecOps team manually reviews and takes action on the requested changes. This involves checking the policy changes to ensure they have been defined correctly and are not in conflict with other policies.

  • The ITSM ticket is then updated and closed. Although this process is well-understood, it is inefficient and prone to human error that can result in disruption or downtime.

Manual Compliance & Firewall Orchestration

Automates Policy Management

Enables SecOps teams to automate management of the entire security policy life-cycle with dramatic reduction in change request response time.

Ensures Change Request Compliance

Minimizes manual intervention to ensure change request compliance while providing a clear audit trail for timely remediation when required.

Reduces Risk of Disruption/Downtime

SecOps teams reduce the risk of downtime or disruption due to conflicting or non-compliant changes.

Composer Benefits

Orchestral's Solution

Orchestral.ai provides a completely automated solution for this problem. Orchestral Composer automatically executes new or existing remediation workflows that IT operations teams have developed while leveraging existing infrastructure tooling and management platforms that have been deployed.

Automated Security Compliance & Firewall Orchestration

Composer Security Orchestration, Automation & Response (SOAR)

  • With the addition of Composer’s event-driven architecture, security policy change requests can be validated and implemented automatically.

  • For example, an operator can initiate a change request with Composer directly or they can do so with an ITSM ticket that triggers a Composer workflow.

  • And, once validated, Composer orchestrates a cascade or changes across the security infrastructure to ensure the end-to-end configuration is accurate and policy compliant.

  • Next, Composer will ensure that the validated and implemented changes are synchronized with the appropriate security policy management tool.

  • Composer will then reconcile the ITSM ticket corresponding to the change request and notify the SecOps team so they are aware that the change request has been successfully implemented.

  • With Composer, SecOps teams can automate management of the security policy change life-cycle, with a dramatic reduction in the response time for change requests while minimizing the risk of disruption due to conflicting or non-compliant changes.

Getting Started

Orchestral's solutions are available as free 30-day Proof of Value evaluations. To get started, just click the "FREE TRIAL" button at the top of this page and complete the Trial Request Form. If you'd like to see a demo first, just click the "Book a Demo" button below to book a date/time that works best for you. Otherwise, you can get started by emailing us at info@orchestral.ai.

Ready to see for yourself?

We'd love to show you how Orchestral.ai enables you to address a broad spectrum of orchestration & automation challenges.

bottom of page