GLBA compliance requirements

The Gramm-Leach-Bliley Act (GLBA) is a federal law that requires banks and other financial institutions to keep their customers' sensitive data safe and secure and explain their information-sharing practices. Financial institutions that must comply with the GLBA include banks, credit unions, and insurance companies based in the United States.

The GLBA consists of clear rules for transparent customer data processing. Firewall Analyzer is equipped with out-of-the-box support for GLBA reports. The software helps in managing your firewall policies and ensures they adhere to GLBA requirements.

GLBA requirements fulfilled by Firewall Analyzer

GLBA requirements fulfilled by Firewall Analyzer

Rules Description How Firewall Analyzer meets this requirement
Appendix.B.III.C.1.a Access controls on customer information systems to authenticate and permit authorized access to customer information. Firewall Analyzer lists the users of your firewall so you can analyze the user accounts and decide which accounts are to be retained or removed.
Appendix.B.III.C.1.c Encryption of electronic customer information in storage or transit. The encryption technique and level should be supported by the risk assessment. Firewall Analyzer has the capability to encrypt raw logs to prevent unauthorized access.
Appendix.B.III.C.1.d Procedures to ensure that customer information system modifications are consistent with the bank's information security program. Firewall Analyzer's HTTP Access Details, Telnet Access details, SSH Access Details, and User Access Details reports provide detailed information on inbound and outbound traffic, which helps you to block remote access with insecure services.
Appendix.B.III.C.1.h Measures to protect against destruction, loss, or damage of customer information due to potential environmental hazards or technological failures. Firewall Analyzer can retain the database and archive your raw logs for more than 90 days.
Appendix.B.III.C.3 Regularly test the key controls, systems, and procedures of the information security program. Firewall Analyzer has the capability to carry out vulnerability assessments and provides you with instant reports to help mitigate the vulnerabilities identified in the assessment.

 

Refer Firewall compliance management software page for more details about other firewall security standards compliance.

 

Featured links

Other features

Firewall Rule Management

Manage your firewall rules for optimum performance. Anomaly free, properly ordered rules make your firewall secured. Audit the firewall security and manage the rule/config changes to strengthen the security.  

Firewall Reports

Get a slew of security and traffic reports to asses the network security posture. Analyze the reports and take measures to prevent future security incidents. Monitor the Internet usage of enterprise users.

Firewall Log Management

Unlock the wealth of network security information hidden in the firewall logs. Analyze the logs to find the security threats faced by the network. Also, get the Internet traffic pattern for capacity planning. 

Real-time Bandwidth Monitoring

With live bandwidth monitoring, you can identify the abnormal sudden shhot up of bandwidth use. Take remedial measures to contain the sudden surge in bandwidth consumption.

Firewall Alerts

Take instant remedial actions, when you get notified in real-time for network security incidents. Check and restrict Internet usage if banwidth exceeds specified threshold.

Manage Firewall Service

MSSPs can host multiple tenants, with exclusive segmented and secured access to their respective data. Scalable to address their needs. Manages firewalls deployed around the globe.

 

A single platter for comprehensive Network Security Device Management