30/8/25

Gap Analysis Feature Demo

Most firewall rules allow more traffic than they need to. BranSeer's gap analysis tells you exactly how to tighten them.

0:00 The problem

0:04 What BranSeer does

0:13 Walking through a real example

0:27 The Any/Any domain controller rule

0:39 BranSeer's recommendation

0:49 What changes for security

0:57 Get in touch

This 70-second walkthrough shows BranSeer analysing a Palo Alto firewall's policies against the actual traffic flowing through them - and generating concrete hardened rule recommendations the engineer can review and deploy.

In the example, an Any/Any rule governing access to the enterprise's domain controllers is reduced to specific app-IDs on their default ports, with a separate rule for LDAPS. The result: a meaningful reduction in attack surface, generated in minutes from observation, not opinion.

Who BranSeer is for

Network security engineers and security architects running Palo Alto Networks firewalls, particularly in mid-market organisations where rule sets have grown beyond what manual review can keep up with.

How it works

BranSeer compares your existing firewall policies to the traffic actually flowing through them, identifies where access is broader than what's needed, and proposes hardened rules ready for engineer review. Built specifically for Palo Alto Networks, with native integration to Panorama and existing log infrastructure.

Get in touch

BranSeer is taking on a small number of paid pilots. If your firewall has rules from engineers who left years ago, we'd like to talk.

→ Book a demo: https://calendly.com/shane-branseer/30min → Visit our site: https://www.branseer.com

→ Follow on LinkedIn: https://linkedin.com/branseer-security