FireMon Blog

Maximize Your SOAR Investment
August 15, 2019 Subha Rama

Maximize Your SOAR Investment

SOAR platforms are designed with one thing in mind – to triangulate data from different security tools to create a faster incident response. However, the success of your SOAR deployment depends much on the sum...

Read More
The Climb: Securing the Hybrid Enterprise
June 3, 2019 Carmen Harris

The Climb: Securing the Hybrid Enterprise

Christian Fairfax was hanging from the rigging off San Jose City Hall. It was a sunny day, 80 degrees and getting hotter by the minute. Christian, dressed in a business blazer, spent two and a...

Read More
Support for Check Point R80.10 in Security Manager 8.15
May 24, 2017 Stuart Rosenfield

Support for Check Point R80.10 in Security Manager 8.15

FireMon customers who have Release 8.15 and have Check Point R80.10 will be able to take advantage of Check Point’s Inline Layer Policy Management. Inline Layers allow a security organization to give more engineers more...

Read More
Resources
April 4, 2017 Jody Brazil

Resources

To address the complexity of today’s policy analysis requirements, FireMon Security Intelligence solutions are empowered by the Security Intelligence Query Language (SiQL), allowing for conclusive, in-depth assessment of network security infrastructure. With the ability to...

Read More
Network Security Innovation
April 4, 2017 Jody Brazil

Network Security Innovation

To meet the ever-evolving requirements of today’s complex enterprise networks, FireMon Security Intelligence solutions are constantly being extended and adapted, driven by an unwavering commitment to industry leading innovation. Via strategic research and development efforts...

Read More
Network Device & Firewall Integrations
April 4, 2017 Jody Brazil

Network Device & Firewall Integrations

To provide centralized analysis of today’s diverse, multivendor environments, FireMon Security Manager offers direct integration with all of today’s leading firewall and vulnerability scanning solutions, allowing for definitive visibility into network security infrastructure. With out-of-the-box...

Read More