Athena Releases PathFinder With Predictive Network Path Analysis

Athena Security, makers of the advanced network security analytics solution, Athena FirePAC, recently announced a new product that extends the core analysis from a device-centric view to a network-based view. The Athena PathFinder product is a comprehensive and powerful tool that maps the relationships between firewall configurations, critical assets and the network infrastructure. It shows what services are available across the network and what paths they will traverse across multiple devices. Using the PathFinder, network security engineers can perform predictive topology path analysis to conduct more effective firewall troubleshooting and to find the optimal places to make rule changes.

The PathFinder imports configurations from network security devices such as firewalls, routers and switches to create an offline model of access policy across the network. PathFinder automatically determines the connections between devices, and the resulting topology diagram allows users to initiate queries from any source to any destination. The model constructed by PathFinder predicts what is reachable and how configuration settings will control traffic.

"Firewall configurations cause extremely complex rule and device interactions that are not easy to troubleshoot by simply injecting data packets in the network,” said David Hurst, CTO of Athena Security. “The beauty of an offline model is that a single query can determine all possible paths and devices where data can travel. It will also identify precisely which firewalls and which rules should be changed to impact traffic behavior."

PathFinder is based on patented technology developed by Athena Security and was evolved to offer security operations groups a focused, clean and highly interactive user experience. It is a handy tool that can be downloaded and installed in minutes.

Additional new features include:

  • Quick creation of topology diagram by one-step connections to adjacent nodes in the diagram. This includes an ability to find adjacent nodes in the inventory that are not in the diagram and place and connect them in the diagram.
  • Ability to specify the source, destination and service parameters for a node to node query.
  • Ability to save topology diagram in different image formats like GIF, BMP, JPEG, JPG and SVG etc. This allows users to repurpose, print and share the diagrams with team members.
  • A new Packet Tracer option provides the ability to inject a virtual packet, specified as source, destination, and service, into a selected subnet in the topology. PathFinder analyzes the routes from the selected subnet to determine where the packet should end up and then identifies how ACLs and NATs along the path would affect the packet. The specific devices allowing or denying the packet along the path are identified and highlighted on the diagram. You can drill down into the device configurations to see precisely the effect of each rule acting on the packet.

Athena’s PathFinder is available immediately. Licensing is based on the number of devices selected for topology modeling. The product currently supports the following:

  • Cisco Security Appliances: PIX, ASA(up to version 8.3), FWSM.
  • Cisco IOS routers: Version 12.0 to 12.14, excluding X* Series.
  • Juniper firewalls: Netscreen, SSG, ISG.
  • Check Point products: SmartCenter NG/NGX, Security Management R70
  • Check Point platforms: SecurePlatform, Check Point IPSO (formerly Nokia), Crossbeam, Linux, Solaris.

Support for additional device types and vendor platforms are released on a frequently updated basis.

Featured

  • Achieving Clear Communications

    Achieving Clear Communications

    Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more. Read Now

  • Taking Flight

    Taking Flight

    Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring. Read Now

  • Live From ISC West 2023 Preview

    Live From ISC West 2023 Preview

    ISC West 2023 is right around the corner! This year’s trade show is scheduled from March 28–31 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Read Now

    • Industry Events
    • ISC West
  • A Break from Routine

    A Break from Routine

    It was three years ago right about now that COVID was bringing the world to its knees. In mid-March of 2020, the president put travel restrictions on all flights in and out of Europe, the NBA suspended its season, and Tom Hanks announced that he’d tested positive for the disease—all in the same night. It was officially a national emergency two days later. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

New Products

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • Kangaroo Home Security System

    Kangaroo Home Security System

    Kangaroo is the affordable, easy-to-install home security system designed for anyone who wants an added layer of peace of mind and protection. It has several products, ranging from the fan-favorite Doorbell Camera + Chime, to the more comprehensive Front Door Security Kit with Professional Monitoring. Regardless of the level of desired security, Kangaroo’s designed to move with consumers - wherever that next chapter may be. Motion sensors, keypads and additional features can be part of the package to any Kangaroo system in place, anytime. Additionally, Kangaroo offers scalable protection plans with a variety of benefits ranging from 24/7 professional monitoring to expanded cloud storage, coverage for damage and theft. 3

  • Dinkle DKU Barrier Terminal Blocks

    Dinkle DKU Barrier Terminal Blocks

    New DKU screw type terminal blocks use a spring-guided system where the screws are integrated and captive within the terminal enclosure. These screws can be backed out so that ring- or U-shaped cable lugs can be inserted, without the possibility of losing the screw. 3