News

 

News

Fresh Business Thinking

10.21.14

Fresh Business Thinking

Don’t Let the UK Flexible Working Law Leave you Vulnerable to Attack

This summer’s announcement from the government that all UK employees now have the right to request flexible working hours, giving them the opportunity to work from home, was a privilege that was previously only applicable to care workers or those with children.

Back To Top


Cloud Pro

10.7.14

Cloud Pro

How To Automate Boring Tasks Using The Cloud

There are good things and bad things about being a business leader. How can cloud help you free up time for the fun stuff? Sometimes being a CIO is like being a dentist. Even though it’s for their benefit, extracting information from users is as exhausting and painful as pulling teeth.

Back To Top


Dark Reading

9.16.14

ChannelWorld.in

New CVE Naming Convention Could Break Vulnerability Management

It is absolutely worth verifying with your vendors that they will support the new format, from vulnerability scanners, managers, GRC systems, patch management, and security intelligence platforms that all use CVE-ID¹s in one way or another,” says Jody Brazil, CEO of Firemon. Additionally, organizations need to think about home-grown systems that could be dependent on CVE identifiers.

Back To Top


ChannelWorld.in

6.19.14

ChannelWorld.in

Untangling Complex Networks

Ruby Khaira, Sales Manager, FireMon, highlights how FireMon helps businesses to simplify, analyze, and manage their network security infrastructure.

Back To Top


Network World

6.17.14

Network World

FireMon brings policy automation to policy management

Policy Optimizer uses a workflow approach to compliance rule automation. It is another tool that is following the trend of getting more than security admins involved in security. Using the workflow allows line-of-business owners, developers and operations people insight and say into what rules are in place and why.

Back To Top


Network World

4.23.14

Network World

Fave Raves: 33 tech pros share their favorite IT products

FireMon quickly painted a picture of our network in a way we can understand. FireMon enables us to efficiently and effectively assess our network for complexity and risk by monitoring our devices in real time.

Back To Top


CRN

3.6.14

Computer World

FireMon Bolsters Channel Investment, Funds Head Count For Growth

FireMon is seeing strong momentum in its firewall policy management and network security analysis platform as businesses race to rip out legacy security appliances in favor of new gear with modern threat detection capabilities, the company’s Channel Chief, Todd DeBell, told CRN.

Back To Top


Computer World

3.5.14

Computer World

Network firewalls aren’t dead yet

Over the next few years, new generation firewall technologies are likely to be integrated even further into the enterprises. Even advances like software defined networking are unlikely to diminish the need for firewalls, argues Jody Brazil, founder and CTO of security vendor FireMon.

Back To Top


Retail Gazette

2.24.14

Retail Gazette

The Target data breach – What retailers can learn

In December 2013, Target, a large US retailer, was the victim of a severe data breach that left more than 110 million consumer credit card and personal data records exposed to hackers.

Back To Top


SC Magazine

2.21.14

SC Magazine

SC Awards Europe 2014: The first finalists announced

FireMon Security Manager is a Finalist for the “Best Risk/Policy Management” award at the SC Magazine Europe awards in London on April 29th.

Round Twelve: Best Risk/ Policy Management Solution

Most data breaches are not failures of technology, but of people, either because the correct policies were not in place, were not communicated or not followed. So what are the components of a policy that people will follow, that lets them do their job without compromising security at the least – and ideally, enhancing it? And what level of risk is acceptable for your business? Have you even calibrated your risk factors?

Back To Top



SC Magazine

2.21.14

SC Magazine

SC Awards Europe 2014: The first finalists announced

FireMon Security Manager is a Finalist for the “Best Risk/Policy Management” award at the SC Magazine Europe awards in London on April 29th.

Round Twelve: Best Risk/ Policy Management Solution

Most data breaches are not failures of technology, but of people, either because the correct policies were not in place, were not communicated or not followed. So what are the components of a policy that people will follow, that lets them do their job without compromising security at the least – and ideally, enhancing it? And what level of risk is acceptable for your business? Have you even calibrated your risk factors?

Back To Top

ITProPortal

2.3.14

ITProPortal

The great security spend: Why is cyber-defence such big business?

“You saw IT spending dip during the recession years, but you did not see security dip,” crackles the voice of Jody Brazil, CTO and Founder of FireMon from the boardroom phone. “it’s because security is seen as a must-have, and whilst IT is of course one too, it’s one that measured by ROI whilst security is measured more by ‘How scared are you?’”

Back To Top


Dark Reading

1.28.14

Dark Reading

Securing The Distributed Network Perimeter

Analysts and some security firms talked about the end of the perimeter, coining the abstruse term “deperimeterization.” Instead of going away, however, an organization’s security perimeter has simply become more distributed, says Jody Brazil, president and chief technology officer of FireMon, a configuration and policy management firm.

Back To Top


SearchSecurity

1.13.14
Continuous security monitoring: What enterprises can learn from CDM

So how do private enterprises follow the government’s lead to implement this sort of continuous security monitoring? While decision makers could opt to purchase any number of commercial monitoring products from vendors like Symantec Corp., Tenable, TripWire Inc., FireMon Inc. among many others, chances are most enterprise networks have some version of the necessary tools in place to get started. However, before tools are discussed, let’s take a look at an important piece of the CSM planning process: device classification.

Back To Top


Business Computing World

1.6.14

Top Network Security Issues 2014

Theorising what the most important IT security issues to address may be at any given time is always a highly subjective issue, particularly in this world of advocates, specialists and vendors fixated on their own particular piece of the puzzle.

However, inherent bias aside, based on the very nature of layered security and attack escalation there’s no question that network security sits at the very heart of it all. While a huge number of threats filter in through Port 80 and other avenues, if network security is properly aligned and continuously adjusted a lot of problems can be mitigated even if not altogether avoided.

Back To Top


CSO Online

1.3.14

CSO Online

Privacy suit against Facebook a warning for businesses

A lawsuit accusing Facebook of mining private messages for information it can pass on to advertisers stands as a reminder to businesses that privacy is a relative word on a social network, experts say.

Back To Top


Dark Reading

12.19.13

Dark Reading

Using NetFlow Data For More Robust Network Security

NetFlow analytic data is particularly great at detecting anomalous “hot-spots” of activity that could indicate existing issues or an active breach, says Jody Brazil, president and CTO of FireMon. “For example, NetFlow data can be leveraged to isolate compromised hosts by identifying those communicating with botnet command and control machines, or to highlight those hosts utilizing unusual ports,” Brazil says.

Back To Top


infosecurity

12.17.13

infosecurity

Industry Predictions for 2014; Part 2: Malware

Improving criminal sophistication is another recurring theme. Matt Hines, product manager at FireMon, points to the continuing evolution of botnets as an example.

Back To Top


TECHNOLOGY.INFO

12.12.13

2014: 5 Security threats to look out for

Theorising what the most important IT security issues to address may be at any given time is always a highly subjective issue, particularly in this world of advocates, specialists and vendors fixated on their own particular pieces of the puzzle… As such, here’s a rundown of the most pressing network security issues that remain heavily in play looking ahead into 2014, and for that matter, nearly all year round. Regardless of whatever area of security you’re focused on or the specific types of threats you seek to limit, if these specific areas are addressed more effectively, there’s much to gain and a lot less to lose.

Back To Top


GCN

12.11.13

GCN

Cyberthreats for 2014: Not just the usual suspects

January ushers in a new year, but the cybersecurity threats that come with it will for the most part look an awful lot like the ones agency IT managers already know. They will continue to morph, evolve and multiply to keep admins on their toes.

Back To Top


Computerworld

11.18.13

Computerworld

Security Manager’s Journal: Time to tweak the security policies

I recently conducted a cursory audit of our firewall rules using a tool called FireMon, uncovering several that aren’t utilized. I’m all for security and even more, redundant, security, but security measures that serve no real purpose don’t help.

Back To Top


The Register

11.08.13

The Register

New security standard for CHAPS who have your CREDIT CARD data

Bernard Zelmans, general manager of EMEA at FireMon, said: “There have been few subjects that have stirred more controversy in information security than PCI DSS. Some say it has done more to raise the level of security preparedness of millions of merchants than anything before, whereas others claim it is responsible for dumbing-down security to a checkbox standard.”

Back To Top


IT Security Guru

11.07.13

IT Security Guru

PCI version 3.0 released with greater focus on modern attacks and authentication

Bernard Zelmans, general manager EMEA at FireMon, welcomed the changes as a move from a security check box posture to a more holistic risk management approach. “This will hopefully entail a more security centric approach to PCI compliance rather than the least common denominator approach of earlier versions of PCI,” he said.

Back To Top


GSN Magazine

11.05.13

GSN Magazine

GSN announces finalists in 2013 awards competition

Government Security News has announced its 2013 Homeland Security Awards finalists, and in some cases preemptive winners, in three different broad awards categories: Vendors of IT security products and solutions; Vendors of physical security products and solutions; and noteworthy achievements of federal, state, county and municipal government agencies.

FireMon a finalist for Best Continuous Monitoring Solution.

Back To Top


ITProPortal

10.18.13

ITproportaluse

The security blame game: Who should be held accountable for a breach?

With the ever increasing threat of cybercrime knocking on one’s door, many large organisations are reliant on IT security teams to protect their vast network from attack. As many Chief Information Security Officers (CISOs) will attest, the larger the network, the more complicated the job. According to Gartner more than 95 per cent of firewall breaches will be caused by firewall misconfiguration, not firewall flaws.

Back To Top


Dark Reading

10.17.13

Dark Reading

10 Pitfalls Of IT Risk Assessment

As IT organizations seek to make better risk-based decisions about security practices, perhaps the number one component for success is the IT risk assessment. However, even when organizations actually conduct a risk assessment, they frequently fall prey to mistakes that can greatly devalue the exercise. Here are some of the most common blunders to avoid.

Back To Top


Fenainfo

10.16.13

Fenainfo

Cinco mitos de segurança que devem ser derrubados

Vivemos na era da violação dos dados. Todos os dias há uma nova história sobre a invasão de uma rede, que termina no roubo de informação confidencial ou sensível. Números de cartões de crédito, dados pessoais, enfim, há uma miríade de informações que podem ser extraídas de forma criminosa de algum site ou serviço online. E tanto a indústria quanto a sociedade em geral não deixam de buscar uma saída para esse problema, que pode causar prejuízos na casa dos milhões. Estima-se que, no Brasil, este número ultrapasse os R$ 20 bilhões anuais.

Back To Top


Computer Business Review

10.10.13

Computer Business Review

Q&A: Security Breaches – Who Should Be Held Responsible?

FireMon’s CTO and founder, Jody Brazil, talks to CBR about where the blame lies with security breaches.

Back To Top


Government Technology

10.9.13

Industry Perspective: The Five Myths of Data Breaches

FireMon’s CTO and founder, Jody Brazil, debunks common myths about the data breaches that plague both the private and public sectors.

Back To Top


VitAL Security Magazine

10.8.13

Exposing the five common data breach myths

To help you decipher fact from fiction, Jody Brazil, President and CTO of FireMon, reveals the biggest myths that exist about data breaches, and explains how and why they occur…

Back To Top


Global Security Mag

10.7.13

Philippe Lerer, FireMon : , les entreprises doivent déployer un outil de gestion pro-active des firewalls

FireMon était présent pour la première fois aux Assises de la Sécurité, afin de mieux se faire connaitre sur le marché français. Cet éditeur américain s’est installé en France, il y a moins d’un an afin de proposer ces solutions de management des firewalls. A l’occasion de sa participation FireMon présentait la version 7 de son produit. Pour Philippe Lerer, Regional Sales Manager, FireMon, les entreprises doivent déployer un outil de gestion pro-active des firewalls.

Back To Top


ProSecurityZone

10.1.13

Britain raises the stakes in cyber warfare

According to Ruby Khaira of FireMon, “The real issue, as I see it, is being able to find enough computer experts to build an effective force, with a distinct shortage of security personnel within the private sector, this could be a very real problem. The MoD therefore will likely need to have a robust training plan in place to train those they hire for the cyber defence force, and will then need to offer a good enough package to keep those security professionals from moving to the private sector.”

Back To Top


CSO Online

9.20.13

CSO Online

Experts praise Pentagon’s march to security standards

Consolidation of the Defense Department’s 15,000 networks expected to cut costs, as well as improve security against Edward Snowden-like leaks.

The Pentagon’s decision to move its thousands of networks under a single security architecture is the right strategy to bolster defenses against hackers and malicious insiders, experts say.

Back To Top


SC Magazine UK

8.30.13

Dark Reading

Sun, Sea and Network Vulnerabilities

As the Bring Your Own Device trend continues to grow we are seeing that many people using their smartphones at work are blurring the lines between professional and personal use, which is creating an ‘always-on’ trend. This change in culture means that now more than ever people find themselves logging on and checking emails and working from home, or even abroad.

Back To Top


Dark Reading

8.19.13

Dark Reading

Next-Gen Firewalls Change The Rules Of Firewall Management

Added layers of complexity create even more interdependencies and need for systematic change management approach.

Back To Top


Government Technology

8.15.13

Government Technology

Black Hat 2013: When Chief Security Officers Become Chief Risk Officers

Private sector IT security pros weigh in on the evolution of the chief security officer role.

Back To Top


ITBusiness

8.8.13

ITBusiness

Four myths about protecting your data

IT administrators may be the first line of defence against hackers eager to tap into companies’ networks. But even they may have some inaccurate beliefs about how hackers operate – and those can have frightening consequences for their businesses’ data.

Back To Top


The Data Chain

8.6.13

The Data Chain

Debunking the five myths of data breaches

We live in the age of the data breach. It seems that every day we hear about yet another breach of a computer network resulting in the theft of confidential or sensitive information.

Back To Top


Computer Business Review

7.30.13

Computer Business Review

IT security professionals agree with MPs that UK is ‘failing’ to counter cybercrime

Ruby Khaira, regional manager for UK, Northern Europe and India at FireMon said: “Today’s security landscape is fast changing and organisations are failing to address the challenges that are being posed by sophisticated criminal enterprises.”

Back To Top


SC Magazine

7.17.13

SC Magazine UK

Firewall management can prevent the HIPAA bite

For a long time the lament about HIPAA was that it was a dog with no bite. Well, the reality of HIPAA fines are changing that perception rather quickly.

Back To Top


ITProPortal

7.6.13

ITProPortal

Interview: Firemon’s Matt Hines on how to reduce that massive security skills shortage

ITProPortal probed Matt Hines, Product Manager at Security Management company FireMon, about the very real security threats induced by the skills shortage and what can be done to mitigate it before it is too late.

Back To Top


SC Magazine UK

6.25.13

SC Magazine UK

Automation of tools and tasks can benefit over-stretched teams

“The skills shortage is the same issue for everyone and with all budgets, as everyone has got the same problem with too much work and too few people. If you automate your employees you can move forward.”

Back To Top


Risk.net

6.17.13

Risk.net

Accountability for a data breach

In March 2013 the US Senate Select Committee on Intelligence named cyber risk as its top global threat. The committee said that the global system was dealing with uncertainty and doubt in the face of new and unpredictable cyber threats.

Back To Top


Bank Info Security

6.17.13

Bank Info Security

Next-Gen Firewall Security

“Ninety-five percent of firewall breaches are caused by misconfigurations, not because of problems with the firewalls themselves,” Skurla says. “They’re a very proven technology … frequently not managed as well as they need to be because of the tremendous volume of activity going on around them.”

Back To Top


Computer World

6.12.13

Computer World

NSA whistleblower likely had easy access to classified data

“This is not just ignorance or poor management” Brazil said. “Systems administrators are given the keys to the kingdom and entrusted not to do harm with it.”

Back To Top


FCW

5.30.13

FCW

Can the sequester make us smarter about security?

Agencies can achieve a much bigger bang for their precious bucks by investing in better management of existing security assets.

We are nearly three months into sequestration, and the world – or even the U.S. government – has not ground to a screeching halt.

Back To Top


SC Magazine UK

5.10.13

SC Magazine UK

You’ve been breached: Who should be held accountable?

With the ever increasing threat of cyber crime knocking on one’s door, many large organizations are reliant on IT security teams to protect their vast network from attack… But what happens when a breach has occurred? Can an individual be held accountable, or is it fair to put the responsibility entirely on your security team?

Back To Top


Wall Street Journal

5.2.13

Wall Street Journal

FireMon Named to Homeland Security Today’s Rising 10 of 2013

FireMon, the leading provider of security management and risk analysis solutions, today announced that it has been named to Homeland Security Today’s Rising 10 of 2013. Recognizing the “Innovators and Game Changers” who serve the federal sector, FireMon was selected to represent the “Continuous Monitoring” category based on the company’s industry-first capabilities in continuous assessment of security infrastructure policy and risk posture.

Back To Top


GCN

4.16.13

GCN

6 steps to secure systems for sequester

“We do not see any immediate impact” on cybersecurity, said Jody Brazil, president and CTO of FireMon, an enterprise security management company. “In [the Defense Department] we see no impact whatsoever; cybersecurity is still a priority. In the other agencies it is less certain.”

Back To Top


Out-Law.com

4.12.13

Out-Law.com

Businesses should make project managers accountable for the security of project technology, says US CTO

“For an outside attacker gaining access to protected resources, ultimately the board room is going to be held accountable,” Brazil said. “They will want to push responsibility down through [their] organizations to the people requesting change [to technologies or systems]. That person should be held accountable and responsible for the security failures of those systems in the same way that they would be held responsible for the financial failure of a project.”

Back To Top


Security Week

4.11.13

Security Week

Obama Budget Invests in Cybersecurity

“In the physical sphere the U.S. is proud to have the best trained and best equipped fighting force in the world,” Brazil said. “This must be our mission in the cyber sphere as well and backed with real resources immune to budget battles. Technology can be used to better optimize the process and procedure of an active cyber defense, and can focus resources to ensure the most effective use of that budget. But in the end, technology can assist in analysis, but can never replace trained analysts.

Back To Top


Dark Reading

3.8.13

Dark Reading

Five Ways To Better Hunt The Zebras In Your Network

“If the firewall is doing its job and dropping traffic, and you trust the technology that you have purchased, why are we focusing all of our attention on the traffic that is being dropped and not on the traffic that is getting through?” Brazil says.

Back To Top


Network World

3.6.13

Network World

Firewalls: The security tool we love to hate

Jody thinks that there are some common myths around firewall management that need to be debunked. In fact, look for more on that from FireMon soon. But among these Jody says FireMon’s own research shows that most attacks are not due to inadequate firewalls or the technology being obsolete. Most of the time it is due to misconfigurations that lead to successful breaches.

Back To Top


Network World

3.4.13

Network World

Products of the week 3.4.13

Product name: Security Manager Version 7.0 Key features: Enables security and operations teams to more effectively identify, understand and manage changes in security posture – in real-time. New capabilities include Continuous Assessment, Best Practice Modeling and Business Process Standardization. It is the first security and policy management platform to support the OMG’s BPMN 2.0 standard. More info.

Back To Top


IT Security Pro

3.1.13

IT Security Pro

FireMon VP discusses the latest firewall management – and audit ‘what-if’ – features

FireMon has taken the wraps off v7.0 of its Security Manager software, which is billed as allowing companies to improve their ability to identify, understand and manage changes in the security defenses.

With this in mind, ITSP caught up with Tim Woods, FireMon’s customer technical services VP, for a rundown on the current state of play on security management.

Back To Top


Dark Reading

2.27.13

Dark Reading

Segmentation Can Increase Risks If Firewalls Aren’t Managed Well

The multiplication of internal firewalls to comply with regulations like PCI and minimize risk to critical databases and applications has created a rats nest of firewall configuration issues.

Back To Top


Network World

2.21.13

Network World

The Curse of Compliance

Many organizations now recognize this regulatory compliance conundrum and are responding with their pocketbooks. New enterprise investment in cybersecurity is now driving innovation in required areas like Advanced Malware Detection/Prevention (AMD/P, Damballa, FireEye, Sourcefire, and Trend Micro), big data security analytics (IBM, LogRhythm, PacketLoop, RSA Security, Solera Networks), and continuous monitoring (FireMon, Red Seal, Symantec).

Back To Top


Help Net Security

2.21.13

Help Net Security

FireMon expands situational awareness with Security Manager 7.0

FireMon announced new capabilities in Security Manager 7.0 that improve organizational ability to identify, understand and manage changes in security posture – in real-time.

Back To Top


Security Week

2.20.13

Security Week

FireMon Adds Continuous Assessment to Security Management Solution

New features in the latest version are designed to help organizations quickly and efficiently manage changes, assess configurations and measure associated risks in real-time.


SC Magazine UK

2.20.13

SC Magazine UK

Technology analysis: How easy are infosec products to use?

Jody Brazil, president and CTO at FireMon, says: “We sweat bullets day in, day out to make sure our software is easy to use.”

Back To Top


Dark Reading

2.15.13

Dark Reading

More Intelligent Services Help Rein In Security Policies

Jody Brazil, president and CTO of network-device management firm FireMon, for example, likes to tell the story of one customer, a hosting provider, whose firewalls would seize up every week or so. The problem: Too many unnecessary and conflicting rules in their policies.

Back To Top


Professional Security

2.12.13

Professional Security

Cyber audit comment

Bernard Zelmans, General Manager EMEA at IT security management product firm FireMon said: “Any initiative that helps encourage business executives to take proactive measures to identify what assets are at risk on their network versus reacting and patching after a breach has occurred can only be a good thing.

Back To Top


USA Today

2.11.13

USA Today

Obama expected to issue cybersecurity executive order Wednesday

F. Ward Holloway, Vice President of Business Development at FireMon, says he will be supportive of Obama’s order if it amounts to a “concrete action plan to help reduce and eliminate breach events” that are occurring daily and receiving more public attention. “Specifically, there needs to be a commitment to moving to a proactive versus reactive network security posture,” says Holloway. “The technology already exists to do this.”

Back To Top


Dark Reading

2.5.13

Dark Reading

U.S. Energy Department Hack Exposes Employee, Contractor Information

A remediation plan would be a good step forward to Richard Towle, head of federal markets at FireMon. “If not for a troubling history preceding this incident, this report could be seen as an opportunity to improve,” Towle says. “If classified information was truly not compromised, the organization could use what was taken to inform themselves about risks in the “reach-ability” of critical assets and associated access vulnerabilities.”

Back To Top


Security Week

12.27.12

securityweek

‘Tis The Season For Security Resolutions, Not Predictions

IT Security Teams Should Focus on Security Resolutions Rather Than Security Predictions

Back To Top


Channelnomics

12.19.12

channelnomics

Is Firewall Management Set for Growth Spike?

The well-established and saturated firewall market has been a channel mainstay that has enabled partners to create entire practices and build out service revenues for decades.

But a lesser known derivative springing from the firewall market is the growing niche of firewall management. And while it remains relatively small and specialized, increasing network complexity coupled with a more sophisticated spate of threats, promise to give the market a swift upward boost.

Back To Top


Network World

12.10.12

network_world

Products of the week 12.10.12 – Security Manager Version 6.1

Key Features: Access Path Analysis allows Security Manager customers to proactively predict and forensically record network packet flow and obtain detailed path analysis for more effective risk analysis and better informed remediation activities. FireMon Insight combines a Web-based Dashboard with a new FireMon Query Language to enable an ability to visualize the current state of network and security configuration.

Back To Top


Kansas City Business Journal

12.7.12

bussinesjournal

FireMon finds security in others’ tech fears as revenue doubles in 2012

Belated, but widespread, adoption of cyber security software will help FireMon LLC more than double its revenue to about $20 million this year.

Back To Top


Channelnomics

12.7.12

channelnomics

FireMon Expands Risk Mitigation Capabilities

Access Path Analysis complements FireMon’s Risk Analyzer, which sniffs out potential risks in an organization’s network. Access Path enhances risk management by tracing the potential traffic routes, identifying the weakest links and providing guidance for redirecting to more secure avenues.

Back To Top


IT World

11.8.12

itworld

As Windows gets safer, old vulnerabilities still have bite

Putting sophisticated hackers aside, having systems on your network vulnerable to aged and well-worn exploits also makes your organization a target to the much larger population of opportunistic attackers, as well,” said Matt Dean, the chief operating officer at the security firm FireMon. “Many of the attacks we see are more about (attackers) finding things that can be exploited, and that they know how to exploit than they are about targeting a specific company,” he said.

Back To Top


LANline

11.6.12

lanline

IT-SA 2012 – Security-Management im Fokus

Firemon etwa bietet mit dem Security Manager 6.0 Risikoanalyse und -bewertung, Konfigurationsmanagement sowie Durchsetzung und Auditing von Netzwerkgeräten wie Firewalls, Routern, Switches und Loadbalancers. Das Tool nutzt verteilte Datenkollektoren und soll in Echtzeit die Auswirkung von Veränderungen beispielsweise an Policies identifizieren, einzuschätzen und korrigieren.

Back To Top


Channelnomics

10.30.12

channelnomics

FireMon Embeds Security in SDN

“The biggest challenge in network security today is matching the pace at which new threats are launched, morphed, and adapted. Existing network security controls are often an ineffective countermeasure, largely because manual configuration is time-consuming, and the management information necessary to correctly react is locked in disconnected systems,” said Jody Brazil, president and CTO of FireMon. “While SDN presents a great opportunity for rethinking connectivity it is also an opportunity to

Back To Top


Dark Reading

10.15.12

dark_reading_logo_small

BYOD: Filling The Holes In Your Security Policy

Companies need visibility in two ways: They need to know what devices employees have and how those devices affect their risk, says Matt Dean, chief operating officer at FireMon, a security management software company. “You want to manage and control the risk that you’re exposed to, so if a mobile device shows up on your wireless network, you understand what risk it poses to your network,” he says.

Back To Top


Dark Reading

10.9.12

dark_reading_logo_small

What An Executive Order On Cybersecurity May Mean For Enterprises

Threats are increasing and becoming more targeted and aggressive, says Matt Dean, COO of security vendor FireMon. “Certainly part of that response for most organizations are the people who prepare for, detect, and respond to threat activity,” he says. “Skills in network risk assessment, application security, and forensic analysis continue to be in very high demand. As organizations shift from a reactive mode to a proactive security stance, skills in assessing network posture and application v

Back To Top


Channel Pro

10.1.12

channelpro

Building trust through transparency

FireMon’s Bernard Zelmans says MSSPs can build trust by being transparent about their work

Back To Top


Network World

9.11.12

network_world

These companies help with everything from BYOD to MPLS backup, security…

FireMon’s tools are designed to help you more effectively manage network security gear by giving you visibility into what the tools are doing/how they are configured and how they interact with other systems in the security ecosystem.

Back To Top


CSO Online

8.13.12

cso

Consumer friendliness forces trade-offs in cloud security

Matt Dean, chief operations officer for FireMon, agreed, saying that he often sees corporations make security compromises in Internet-enabled business applications. ‘They are constantly balancing security with usability, the ability to access this data when and where people need to,’ Dean said.

Back To Top


IT Europa

8.8.12

it-europa

Azlan expands its offering in UK

Azlan, the enterprise networking business unit of Computer 2000, has added FireMon’s range of network security solutions to UK VARs. FireMon’s solutions enable enterprise and public sector customers to assess vulnerabilities and to defend networks from external threats.

The value-added resellers and managed services providers in the UK will be offered the company’s analysis and policy and configuration management solutions, as it says.

Back To Top


Channel Pro

8.8.12

channelpro

FireMon gets on board at Azlan

The agreement with Azlan is the US firm’s first UK distribution deal. Mark Corrigan, head of enterprise and Access Networking at Azlan says the new signing complements its existing vendor relationships “very well indeed”. He says: “For our customers addressing the enterprise and public sector markets, security and policy management is a growing opportunity.

Back To Top


CRN

8.8.12

crn

FireMon grabs onto Azlan’s mane for UK assault

US-based firewall management vendor FireMon has appointed its first UK distributor eight months after touching down on this side of the Atlantic.

FireMon has granted Azlan access to its full range of network security solutions, including its recently launched FireMon Security Manager 6.0.

Back To Top


SearchNetworkingChannel.com

8.6.12

search_networking

Selling next-generation firewalls: Overcoming resistance, challenges

Well-entrenched and decades old, the traditional firewall market is undergoing dynamic changes driven by demand for mobility, virtualization and cloud. Users need next-generation firewalls to handle these complexities, but they are resistant to change. Channel partners will find great sales opportunities if they can help their customers understand the need for next-gen appliances.

Back To Top


IT Security Pro

8.2.12

itsp

FireMon says Olympics creates a unique challenge for IT security professionals

The Olympics may be allowing a large number of people to work from home over the weeks of the Games, but Juan Lyall, EMEA channel manager with FireMon, says that it also creates a number of challenges for the IT security staff in their organisation, who may be inadvertently opening the corporate computer platform to an attack.

Back To Top


The Firewall

7.26.12

firewall.co.uk

Allowing staff to work from home during the Olympics leaves you vulnerable

Bernard Zelmans, General Manager EMEA for FireMon, has some cautionary words of warning about what to look out for if you are going to allow your staff to work from home during the Olympics.

Back To Top


Computing

7.26.12

computing.co.uk

Businesses warned not to underestimate remote working challenges during London 2012

Remote working during the Olympics raises a number of serious access management challenges, according to security management provider FireMon’s general manager EMEA, Bernard Zelmans.

Back To Top


eWeek

7.26.12

eweek

Security Products That Fend Off Network Attacks Demonstrated at Black Hat

Two new products that were demonstrated at the Black Hat 2012 security conference use different techniques to try to prevent cyber-attackers from penetrating enterprise networks.

Back To Top


SC Magazine UK

7.24.12

sc_magazine

Three days until the Olympics – last minute preparations

No business should be under-prepared for the effect of the Olympics, but the issue could be the delivery of applications and services to remote workers.

Back To Top


Channel Pro

7.24.12

channelpro

Breaking the channel mould with Firewall Management

Firewalls are a mature technology and yet their administration has evolved very little in two decades… …poor firewall management defeats the purpose of change by ineffectively controlling access and limiting visibility; poor management also increases the cost associated with security management. Changes in general, whether to a firewall, router, application or any other part of the IT infrastructure…

Back To Top


Network World

7.18.12

network_world

Are Firewalls Dead?

Is the linchpin of security a victim of its own success?

Back To Top


Security Week

7.18.12

securityweek

Niagara Vulnerabilities Put Office Buildings, Airports, Hospitals at Risk

The Department of Homeland Security, through its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), issued a warning last Friday about security vulnerabilities in the Tridium Niagara AX Framework, a popular software platform that integrates various control systems and devices and allows them to be managed over the Internet.

Back To Top


The VAR Guy

7.16.12

thevarguy

FireMon Security Manager Deemed ‘McAfee Compatible

Security management and risk analysis solutions specialist FireMon announced its flagship security policy and posture management solution, Security Manager, has been designated “McAfee Compatible” for its integration with McAfee Firewall Enterprise V8.

Back To Top


Dark Reading

7.16.12

dark_reading_logo_small

4 Reasons Why IT Security Needs Risk Management

If IT security departments want to truly meet the risks posed by today’s advanced threats, they need to get more scientific with how they develop their strategies. Because based on the breach statistics and malware infection rates, the old methods aren’t even close to adequate, security experts warn.

Back To Top


CSO Online

7.9.12

cso

The new perimeter

CSOs are mixing an assortment of technologies, approaches and policies to shore up defenses on the changing corporate boundary…

…FireMon key to Accor’s policy administration.

Back To Top


Computer Weekly

6.27.12

computerweekly

Network security: Is new technology bypassing traditional controls?

Back To Top


The Firewall

6.18.12

firewall.co.uk

FireMon launches first full integration of risk analysis and policy configuration management solution for network security

Back To Top


Security Park

6.13.12

securitypark

FireMon achieves 5-Star rating in SC Magazine review of policy and risk management solutions

Back To Top


Network World

6.11.12

network_world

Products of the week 6.11.12

Product name: Security Manager Version 6.0 Key features: The first security policy and posture management solution that fully integrates comprehensive risk analysis with configuration management, enforcement and auditing of network devices like firewalls, routers, switches and load balancers. Gives enterprises the visibility to understand the scope of business vulnerability and prioritize the proactive defense of critical assets. More info.

Back To Top


SC Magazine

6.1.12

sc_magazine

5 Stars from SC Magazine: FireMon Security Manager with Policy Planner and Risk Analyzer

The FireMon Security Manager with Policy Manager and Risk Analyzer is the ultimate policy and risk management tool.

Back To Top


Security Week

5.31.12

securityweek

FireMon Integrates Risk Analysis and Configuration Management

FireMon Security Manager 6.0 Delivers Integrated Risk Analysis and Policy and Configuration Management Solution for Network Security

Back To Top


IT Director

5.30.12

it-director

FireMon delivers Industry-first complete security posture management

FireMon Security Manager 6.0 Offers the Only Fully Integrated Risk Analysis

Back To Top


IT Analysis

5.30.12

it_analysis

FireMon delivers Industry-first complete security posture management

Back To Top


Help Net Security

5.30.12

helpnetsecurity

Security posture management from FireMon

Back To Top


CRN

5.29.12

crn

FireMon Updates its Security Posture Management Platform

FireMon has rolled out the next rev of its security management and risk analysis platform. FireMon Security Manager 6.0 provides extended capabilities around risk analysis, configuration management and policy enforcement, plus the auditing of firewalls, routers, switches, load balancers and other devices on the network. The net result is a high level of visibility into overall network security and the defense of critical assets.

Back To Top


Dark Reading

5.25.12

dark_reading_logo_small

Cutting The Lag Between Detection And Action

Detecting a threat does little good if the targeted company is not ready to respond. Security experts weigh in on ways to speed a business’ response to threats

Back To Top


PR Inside

4.17.12

pr-inside

FireMon at Check Point Experience 2012: Fact-Based Network Security and Posture Management

Presentation to Address Advanced Firewall Management and Risk Visibility Solutions

Back To Top


Channelnomics

2.2.12

channelnomics

Beyond Vendor Growth Reports

FireMon, the firewall management vendor spun-off from security integrator FishNet Security, reported 50 percent year-over-year sales growth in 2011 that propelled it to profitability. It also reported a “dramatic” growth in new customers.

Back To Top


CRN

1.5.12

channelweb.co.uk

FireMon puts first feet on UK street

Firewall management vendor FireMon is launching a European channel assault after hiring its first heads in the region.

Back To Top


Press Releases


September 17, 2014

FireMon to Participate at Palo Alto Networks Americas Partner Conference

Back To Top


June 11, 2014

FireMon’s Momentum Drives Majority Investment from Insight Venture Partners

Back To Top


March 19, 2014

FireMon Ignite Program Awarded CRN 5-Star Rating for Second Straight Year

Back To Top


February 26, 2014

FireMon Channel Chief Recognizes Top Partners at RSA Conference 2014

Back To Top


February 20, 2014

FireMon to Explore Cybersecurity Metrics at RSA Conference 2014

Back To Top


February 11, 2014

FireMon Accelerates Federal Market Revenue Growth

Back To Top


January 31, 2014

FireMon Revenues Soar 80% in Record-Setting 2013

Back To Top


December 17, 2013

FireMon Teams with Key Federal Partners to Deliver Cybersecurity Solutions Powering New Continuous Monitoring Programs at Federal Agencies

Back To Top


October 2, 2013

FireMon Announces Support for McAfee Vulnerability Manager

Back To Top


October 2, 2013

FireMon annonce aux Assises de la Sécurité une approche unique dans l’analytique du réseau de sécurité

Back To Top


July 31, 2013

FireMon Revenues More than Double with Record First Half of 2013

Back To Top


July 2, 2013

FireMon appoints Network Security Veteran as new UK, Northern Europe and India region leader

Back To Top


June 6, 2013

NIC to Present Firewall Management Case Study at Gartner Security & Risk Management Summit

Back To Top


May 15, 2013

FireMon Taps Cybersecurity Veteran to Lead Federal Business

Back To Top


May 2, 2013

FireMon Named to Homeland Security Today’s Rising 10 of 2013

Back To Top


April 22, 2013

Qualys and FireMon Enable Real-Time Network Risk Visibility and Remediation

Back To Top


March 26, 2013

FireMon Awarded 5-Star Partner Rating by CRN

Back To Top


February 26, 2013

FireMon Channel Chief Recognizes Top Partners at RSA Conference 2013

Back To Top


February 20, 2013

FireMon Expands Situational Awareness with Security Manager 7.0

Back To Top


January 31, 2013

FireMon Doubles Security Management Revenues in Record-Setting 2012

Back To Top


December 5, 2012

FireMon Delivers Expanded Visibility of Enterprise Network Behavior for Greater Proactive Security and Operational Effectiveness

Back To Top


October 29, 2012

FireMon Outlines Vision for OpenFlow Security Management

Back To Top


September 12, 2012

FireMon Security Manager Propels Partners’ Go-To-Market Strategies

Back To Top


July 10, 2012

FireMon’s Integration with McAfee Firewall Enterprise Achieves “McAfee Compatible” Status

Back To Top


June 7, 2012

FireMon Achieves 5-Star Rating in SC Magazine Review of Policy and Risk Management Solutions

Back To Top


May 30, 2012

FireMon Delivers Industry-First Complete Security Posture Management – From Risk Analysis through Remediation

Back To Top


April 17, 2012

FireMon at Check Point Experience 2012: Fact-Based Network Security and Posture Management

Back To Top


February 28, 2012

FireMon at RSA Conference 2012: The Today and Tomorrow of Security

Back To Top


February 23, 2012

FireMon Enters High Growth EMEA Risk Analysis and Firewall Management Markets

Back To Top


February 15, 2012

Rapid7 and FireMon Combine Security Risk Intelligence Solutions to Deliver Real-World Proactive Risk Analysis and Remediation

Back To Top


January 31, 2012

FireMon Grows Firewall Management Sales 50% and Doubles New Customers During Record 2011

Back To Top