Stay Safe Online with the FireMon 5 Cybersecurity Safety Tips. Learn More

Firewall Policy Compliance

Scary Stories to tell in the Network

With Halloween around the corner, here’s a real-world firewall policy horror story. (For effect, feel free to imagine this in a scary, raspy cautionary voice… or Morgan Freeman if you prefer.) As a Sales Engineer, I spend a lot of days doing demos of our products, talking to Security Engineers, Compliance Folks, DevOps Managers, and …

Scary Stories to tell in the Network Read More »

One Simple Misconfiguration. 2.9 Billion Users Down.

A routine maintenance error severs Facebook’s data centers from the Internet for over 6 hours On October 4, Facebook users suffered a complete outage affecting all apps including WhatsApp, Instagram, and Messenger for over 6 hours. Nearly 2.9 billion users were not only inconvenienced, but many also lost a crucial means of communication in regions …

One Simple Misconfiguration. 2.9 Billion Users Down. Read More »

4 Steps to a Clean Firewall

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could only perform simple packet filtering. But even as the way we define network perimeter evolves and blurs, firewalls maintain a …

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You? Read More »

Adapt to Change: Network Policy Change Management 

Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the third: adapt to change.  Pillar #3 – Adapt to Change To err is human, and with many enterprises managing 100 …

Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM Read More »

COMPLIANCE & SECURITY MYTH #3: It’s Better To Block Than To Permit Access

This is part 3 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read myth #2 here. One of the oldest security practices is to “just say no.” Businesses engaged in digital transformation can’t take that path. They have internal and external …

COMPLIANCE & SECURITY MYTH #3: It’s Better To Block Than To Permit Access Read More »

Myth #2: Compliance Is Only Urgent When There’s an Audit

Myth #2: Compliance Is Only Urgent When There’s an Audit

This is part 2 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read part #1 here.  Many organizations have adopted a passive compliance playbook. Since they don’t know how to figure out what’s really on their hybrid networks, they do the …

Myth #2: Compliance Is Only Urgent When There’s an Audit Read More »