Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:20 PM
Dark Reading
Dark Reading
Products and Releases

Corsa Security Automates Firewall as a Service

MSSPs and service providers can easily and quickly offer a virtualized firewall service to their customers.

Corsa Security has announced that it has expanded its turnkey network security virtualization platform to automate Firewall-as-a-Service (FWaaS). The new solution means that Managed Security Service Providers (MSSPs) and Service Providers (SPs) can offer a virtualized FWaaS that replaces customers’ physical firewalls. The platform provides simple, automated virtualization of hardware firewalls and zero-touch network security operations. Instead of complicated hardware deployments or DIY virtualization projects, MSSPs can quickly and easily offer an unlimited number of virtual firewalls. With a pay-as-you-grow model, it also reduces the MSSP’s network operations expense to deliver better ROI.

“Current firewall architectures are complicated, do not scale and lock you in,” said Eduardo Cervantes, CEO, Corsa Security. “That’s why enterprises no longer want to own and manage their own physical firewalls. MSSPs can address this need and expand their offering by enabling a Firewall as a Service which replaces physical firewalls with virtual firewalls. But they need a turnkey solution to automate firewall virtualization so their customer support team can quickly and easily spin up new services immediately. We’ve eliminated the need for scarce DevOps skills with this intuitive, integrated addition to our platform.”

Built on a Secure Access Secure Edge (SASE) framework, the Corsa Security platform offers push-button provisioning and seamlessly integrates with firewall license and policy management systems for ultimate simplicity in firewall configuration, deployment and migration from physical to virtual firewalls. All of this is managed through the intuitive, centralized Corsa Security Orchestrator.

“What’s been conspicuously missing when deploying virtualized firewalls, on-prem, for North-South traffic, is a sensible orchestration platform that lets non-engineers spin up and manage multiple firewalls in zero-touch fashion,” said Tony Burgard, Technical Account Manager at Trace3, an information technology company and Managed Service Provider. “Most companies today manage complex hybrid cloud environments. Deploying multiple virtual firewalls is relatively easy in the public cloud and needs to be just as easily deployed for on-prem environments as part of a digital transformation. Corsa Security understands this.”

Since the platform supports multi-tenancy, MSSPs can offer specific services and capacity to individual customers in minutes, quickly scale their service offerings and add innovative new virtualized services over time. Integration with security operations center (SoC) monitoring, billing, and inventory tools further increases ease of deployment, meaning the provider doesn’t need to change the way they work. With a low cost of entry and a pay-as-you-grow model, the platform reduces the MSSP’s network operations budget, resulting in a more profitable service that can be built upon to offer additional SASE-based services in the future.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.