Guest Blogs

FireMon Releases Timely Cisco Firepower Fix

One of the most critical aspects of proper security hygiene is keeping critical security devices patched and up-to-date. Firewalls and network security devices running outdated OSes is a top source of unintended breach avenues waiting to be exploited. A current example of this came from Cisco Firepower devices: Cisco recently released a field notice alerting …

FireMon Releases Timely Cisco Firepower Fix Read More »

How continuous monitoring protects complex environments by finding vulnerabilities

How continuous monitoring protects complex environments by finding vulnerabilities

The Known Network How continuous monitoring protects complex environments by finding vulnerabilities as they occur Your network can be secure one minute and insecure the next. Firewall misconfigurations, policy conflicts, new intrusions, or other changes are always emerging – and often going unnoticed. Continuous monitoring provides a way for businesses to have their fingers constantly …

How continuous monitoring protects complex environments by finding vulnerabilities Read More »

FireMon Solutions

3 Ways to Streamline Network Security Automation That Will Transform Your Organization

Network security automation uses machines to programmatically execute security tasks. Typically, network security automation is used to manage the low-complexity, high-volume aspects of detection, investigation, and mitigation. For instance, automation can be used to separate false alerts from true threats among the 10,000 alerts every enterprise receives on an average day. But automation can (and …

3 Ways to Streamline Network Security Automation That Will Transform Your Organization Read More »

Network Security, Performance & Scalability

Network Security, Performance & Scalability | NSPM Success

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the fourth: scale & perform. “Agility” has been a buzzword for a lot of years, but only now – as IoT, …

Network Security, Performance & Scalability | NSPM Success Read More »

4 Steps to a Clean Firewall

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could only perform simple packet filtering. But even as the way we define network perimeter evolves and blurs, firewalls maintain a …

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You? Read More »

COMPLIANCE & SECURITY MYTH #3: It’s Better To Block Than To Permit Access

This is part 3 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read myth #2 here. One of the oldest security practices is to “just say no.” Businesses engaged in digital transformation can’t take that path. They have internal and external …

COMPLIANCE & SECURITY MYTH #3: It’s Better To Block Than To Permit Access Read More »