Firewall Management and Security News

FireMon Solutions

3 Ways to Streamline Network Security Automation That Will Transform Your Organization

Network security automation uses machines to programmatically execute security tasks. Typically, network security automation is used to manage the low-complexity, high-volume aspects of detection, investigation, and mitigation. For instance, automation can be used to separate false alerts from true threats among the 10,000 alerts every enterprise receives on an average day. But automation can (and …

3 Ways to Streamline Network Security Automation That Will Transform Your Organization Read More »

Network Security, Performance & Scalability

Network Security, Performance & Scalability | NSPM Success

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the fourth: scale & perform. “Agility” has been a buzzword for a lot of years, but only now – as IoT, …

Network Security, Performance & Scalability | NSPM Success Read More »

4 Steps to a Clean Firewall

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could only perform simple packet filtering. But even as the way we define network perimeter evolves and blurs, firewalls maintain a …

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You? Read More »

Adapt to Change: Network Policy Change Management 

Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the third: adapt to change.  Pillar #3 – Adapt to Change To err is human, and with many enterprises managing 100 …

Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM Read More »

COMPLIANCE & SECURITY MYTH #3: It’s Better To Block Than To Permit Access

This is part 3 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read myth #2 here. One of the oldest security practices is to “just say no.” Businesses engaged in digital transformation can’t take that path. They have internal and external …

COMPLIANCE & SECURITY MYTH #3: It’s Better To Block Than To Permit Access Read More »

Myth #2: Compliance Is Only Urgent When There’s an Audit

Myth #2: Compliance Is Only Urgent When There’s an Audit

This is part 2 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read part #1 here.  Many organizations have adopted a passive compliance playbook. Since they don’t know how to figure out what’s really on their hybrid networks, they do the …

Myth #2: Compliance Is Only Urgent When There’s an Audit Read More »

FireMon's agile network security policy management platform

We Heard You. An Agile Approach to Network Security Policy Management

Today we announced the industry’s first agile network security policy platform which marks both the delivery of core new features and a statement of our future direction. We believe these new features, along with a compelling roadmap, sets a new standard for NSPM and provides our customers with the capabilities they need to enable their businesses to move faster while staying secure. Enterprise security must manage complex and dynamic policies and processes on massively distributed hybrid networks all while keeping up with increasing demands for speed and innovation. And all this must happen while defending against an evolving threat landscape and an expanding attack surface.

Preventing Security Misconfigurations

Preventing Security Misconfigurations: Change Management and Compliance

It’s an enormous and unending daily challenge to make sure that changes to firewall policies are not just executed quickly and efficiently, but changes don’t decrease the security of your network. Changes – such as those made for an internal client requesting access – if not executed perfectly can lead to slowdowns, outages, or even …

Preventing Security Misconfigurations: Change Management and Compliance Read More »

Top 5 Network Security

Top 5 Network Security Challenges in 2021 and Beyond

There are a lot of theories about which network security challenge is the most important at any given time. The issue is highly subjective, particularly in this world of advocates, specialists, and vendors, who are each fixated on their particular piece of the puzzle. But in the end, what matters is that organizations properly align …

Top 5 Network Security Challenges in 2021 and Beyond Read More »

Network Vulnerability

Network Vulnerability: It May Not Mean What You Think It Means

Key Terms Network vulnerability A flaw in computing environment or associated processes that can potentially be exploited by malicious actors. Context The circumstances around a vulnerability that shed light on its true nature Network risk assessment A process to gain understanding of the risks to critical systems and sensitive data inside a network. Indicators of …

Network Vulnerability: It May Not Mean What You Think It Means Read More »