FireMon Firewall Security Features

The FireMon product suite is the first in the industry to address both sides of the security equation: proactive security intelligence and real-time security event analysis. On the front end, Security Manager and the Policy Planner, Policy Optimizer and Risk Analyzer modules provide the information necessary to effectively manage the complexity and change associated with today’s network security infrastructure. With the addition of Immediate Insight, the platform can identify areas of risk and triage active compromises with automatic re-provisioning.

Firewall Policy Management


Firewall Policy Management


FireMon’s firewall policy analysis and reporting capabilities provides practitioners with detailed understanding of existing network defenses to eliminate necessary network access and improve overall performance.
Network Compliance & Audit


Network Compliance & Audit


With FireMon’s policy compliance assessment capabilities, practitioners can validate firewall configuration against compliance requirements with rules recertification and full documentation.
Firewall Change Management


Firewall Change Management


The FireMon platform integrates with policy management workflows to give practitioners visibility into the implications of each change prior to change implementation.
Network Security & Risk


Network Security & Risk


FireMon visualizes access controls so practitioners can see potential attack paths and prioritize vulnerability remediation. With the addition of Immediate Insight, users can also perform real-time security event analysis.

The FireMon Platform: Helping You Improve Network Security Operations

Automated workflows and documentation saves your team time and money in day-to-day security operations.
Continuous, real-time monitoring of network defenses gives your security team the intelligence they need to operate securely and effectively.
Identifying potential attack paths and the impact of compromise allows you to prioritize risk and stay a step ahead of attackers.

A Deeper Look at the Capabilities that Drive Our Solutions

Without comprehensive visibility into the current state of network defenses, any organization, regardless of proficiency, is challenged to keep its IT infrastructure under lock and key.
Security Analysis

Security Analysis

Gauge the efficacy of your existing firewall policies, including comparative scoring, to understand current access enforcement.

Access Path Analysis

Access Path Analysis

Map and analyze all access paths created by your existing firewall policies to ensure proper network defense and segmentation.

Traffic Flow Analysis

Traffic Flow Analysis

Trace the source and destination of every rule in each of your existing firewall policies (including NAT) to understand traffic flow.

Change is constant – especially in the realm of network access and protection, where emerging business requirements demand continual adjustment of defenses. FireMon allows organizations to analyze, map and carry out configuration changes with full visibility into resulting conditions.
Change Reporting

Change Reporting

Monitor, alert and document all ongoing changes made to your existing firewall policies to verify proper implementation.

Rule Recertification

Rule Recertification

Automate workflow and recertification of your existing firewall policies to validate ongoing standards compliance (PCI DSS).

Rule Review

Rule Review

Examine all rule sets applied within your existing firewall policies to continually assess and improve network enforcement.

Firewall policies almost always grow in size and complexity over time, as change takes its toll on the existing rule base and unseen exposures emerge with the loss of visibility and control. Even when organizations remain dedicated to staying abreast of change, unseen issues and minor oversights can result in perilous conditions.
Unused Rules

Unused Rules

Identify any unused rules in your existing firewall policies to prevent unseen gaps in defense and reduce unnecessary complexity.

Hidden Rules

Hidden Rules

Discover hidden rules that make your firewall policies less effective, increasing visibility and informing proper documentation.

Policy Search

Policy Search

Leverage FireMon’s proprietary Security Information Query Language (SiQL) to locate and examine any existing firewall policies.

Migrating to next-generation firewalls are often long, arduous projects during which gaps in protection may be created as systems are taken offline and replaced.Organizations can eliminate the potential for increased IT risk exposure during migration by employing FireMon Security Manager to continually look for emerging gaps in network protection and adjusting controls on the fly as conditions change and new defenses are brought into production.
Security Analysis

Security Analysis

Gauge the efficacy of your existing firewall policies, including comparative scoring, to understand current access enforcement.

Access Path Analysis

Access Path Analysis

Map and analyze all access paths created by your existing firewall policies to ensure proper network defense and segmentation.

Traffic Flow Analysis

Traffic Flow Analysis

Trace the source and destination of every rule in each of your existing firewall policies (including NAT) to understand traffic flow.

For years organizations have employed vulnerability scanners, pen testing and a litany of proactive measures aimed at identifying and fixing existing weaknesses before they could be exploited, but with FireMon Security Manager and knowledge of proven access, finally IT risks benefit from full context.
Vulnerability Prioritization

Vulnerability Prioritization

Leverage network-wide visibility into your existing firewall policies to prioritize mitigation based on current access levels.

Potential Attack Visualization

Potential Attack Visualization

Understand the specific risks introduced by your existing firewall policies by simulating potential network attack paths.

Attack Graph Analysis

Attack Graph
Analysis

Chart the specific attack paths open across your existing firewall policies to produce detailed threat route visualizations.

Nearly every organization faces significant IT security compliance demands regardless of industry, with the goal of ensuring that mandated controls are always in place and that assessments are being performed with proscribed regularity. Examples of industry-specific regulations include FISMA, HIPAA, NERC, NSA Router Configuration Guidelines, and SOX.
Rule Documentation

Rule Documentation

Identify and document every rule in your existing firewall policies to both achieve and report on compliance requirements.

Assessment & Controls

Assessment & Controls

Define and employ unique security controls for customized, repeatable analysis and reporting of your existing firewall policies.

Rule Definition Evaluation

Rule Definition Eval

Analyze and understand the effectiveness of rules incorporated in your existing firewall policies to ensure optimal compliance.

Why FireMon?

Our security intelligence platform allows you to monitor and assess your network security, giving you continuous visibility into and control over firewall infrastructure, network security policies and underlying IT risks.

SCHEDULE A FREE EVALUATION
DEMO Now

FireMon's Features Deliver Rapid Results

Each component of the Security Platform offers a deep set of feature-rich capabilities, unlike any other solution on the market!
DEMO Now