see more


Get to know us better! Gain valuable insights into how we think by visiting our blog, or take a look at the industry events we're frequenting on our events page. You can also geek out with us by attending one of our security management webinars, or dive head first into the products and solutions we provide in our Resource Library. There's lots to keep you busy! 



14. Apr 2017 Making security part of the company culture

My years of experience managing security programs, across a broad spectrum of industries, has given me a greater understanding of how technology and people both play a critical role in influencing the overall security posture of any organization.

Read more
07. Apr 2017 It’s Time for a New Approach to Network Security
You may have noticed things look a little different around here. Well, that’s because our industry is changing, and we’d be remiss not change along with it. With the pace that technology and threats are advancing, what’s worked in the past simply won’t work anymore. And FireMon is here to address that.
Read more
10. Dec 2015Combating Firewall Complexity - Four Things You Need

Firewalls continue to play an important role in network security; however, firewall infrastructure has grown more and more complex, adding significant costs and increasing risk. According to FireMon’s 2015 State of the Firewall Report, 95% of surveyed security professionals indicated that firewalls remain as critical if not more critical to security than ever. Over 50% of those respondents cited firewall complexity as their most problematic security management concern.

A recent report from the Aberdeen Group Firewall Sprawl: How Complexity Is Adding Cost & Increasing Risk reinforces these findings. Through their research, they found that nearly half of organization’s today have multi-site, multi-vendor environments.

Going a step further, they developed a complexity index to quantify the issue – (N^2 – N) / 2 where N equals the number of sites plus the number of vendors. For each additional site or vendor, complexity exponentially increases. And with it, so do operational costs, inconsistencies and errors, number of threats and vulnerabilities and finally, likelihood of risk.

With that being said, it appears that firewalls are here to stay, and complexity will only continue to grow as new network technologies and threats develop. The key to combating this is to understand the primary contributing factors and how one might address them.

With eight years under my belt at FireMon, I’ve seen a lot of firewall installations that fall prey to some of these challenges:

    • Lacking Capabilities within existing technologies that enable proper management. For example, trying to perform behavioral analysis of a large firewall policy without the aid of automation.

      • Time or moreover, efficient processes for managing the constant change in the security environment.

        • Inadequate Resources – I have yet to hear anyone tell me they have too many resources.

          • Cost – This tends to go hand-in-hand with skilled resources.

            • Heterogeneous Environments as opposed to homogeneous environments. I’ve seen very few single vendor deployments but rather a mixture of many different brands. Aberdeen Group’s research quantifies my anecdotal experience.

            So what can you as a security professional do about it? Look for solutions or processes that give you the following:

              • Visibility – It’s an unfortunate reality, but most of today’s organizations with complex networks do not have adequate visibility necessary to properly manage their security infrastructure. Nor do they have confidence that the technologies they have in place are doing what they’re supposed to. Couple that with reduced resources and an ever growing threat landscape and the result is a recipe for disaster. Having detailed visibility into firewall rules and policy effectiveness allows organizations to clean up outdated or redundant rules and close security gap, lowering overall firewall complexity and level of risk.

                • Intelligence – It takes a clear understanding of an organizations compensating controls coupled with a knowledge of vulnerabilities in the environment to properly protect well-known threat entry points. This is all a component of managing risk. With real-time monitoring and vulnerability mapping, your security team has the situational awareness it needs to identify and remediate problematic issues before they evolve into real-world risk.

                  • Integration – Exchange of information between disparate systems cannot be underestimated. The ability to share security information in real time without restricting it to a single application, system or device can empower stakeholders to make decisions specific to their responsibilities. Security posture is greatly improved by extending real-time, enterprise-wide security metrics to those who need it most. This lends itself to compliance initiatives, business enablement, risk avoidance, etc.

                    • Automation – Automation can be interpreted differently by different people – in this case we’re looking at automation of change workflow. It’s important to assess the impact of any new access being provided. Access should be restricted to just what is necessary to meet the needs of the business. New access should also be vetted against the corporate security policy to ensure it does not break compliance or introduce unacceptable risk. Being able to sandbox proposed changes to assess impact and then send them for review and implementation through an existing ticketing system can speed up the process and reduce the likelihood of incorrect or risky changes. Automation of this task the only way to accomplish this with high accuracy and repeatable success.

                    As VP of Customer Technology, Tim Woods has more than two decades of experience in information security and data technology. With a proven track record of leading sales teams to success and deep domain expertise in security and technology, he is a driving force of many thriving companies.



                    19. Apr 2017 Closing the Complexity Gap

                    How Effective Security Management Can Help Teams Cover the Exponentially Increasing Gap between Technology & the Resources Available to Manage It

                    Security teams today are under tremendous pressure due to the rising frequency and impact of breaches and a business that wants to move faster and faster. The answer to both of these challenges has always been to add more technology and staff resources.

                    However, each new technology added creates complexity. More rules are created and more data is generated. As networks continue to evolve, this complexity will only grow. And while staff resources may increase, they will never match the exponential growth of technology.

                    FireMon calls this phenomenon The Complexity Gap and has set out to help security teams close it.

                    Join us for this webinar with Frost & Sullivan where we’ll explore the causes of “The Gap” and how workforce multipliers such as intelligence and automation help staff manage their security more efficiently and more effectively.

                    30. Mar 2017 Data Orchestration for Incident Response
                    The biggest challenge security teams face when it comes to the alert triage process is preparing the data for analysis. Analysts can spend 80% of their time or more just to assemble the data to answer the question of whether an alert is a false positive or real incident.

                    Immediate orchestrates the data assembly process, freeing up critical time and resources to actually respond to identified events.

                    Join us for this webinar to learn how you can streamline the incident response process by orchestrating data assembly from a variety of disparate, external sources, including:
                    - FireMon Security Manager
                    - Palo Alto Networks AutoFocus
                    - VirusTotal
                    - Packet Capture
                    - Threat Intelligence Feeds
                    - And more!
                    07. Mar 2017 Prepare su red para cumplir con la Ley de Protección de Datos

                    En la actualidad, uno de los retos principales es preparar las redes de seguridad, no sólo para enfrentar las amenazas, sino también para enfrentar los cumplimientos. El día 26 de enero se publicó en el Diario Oficial la LEY GENERAL DE PROTECCIÓN DE DATOS PERSONALES EN POSESIÓN DE SUJETOS OBLIGADOS.

                    ¿Está tu red preparada?
                    ¿Cuentas con los procesos necesarios para el cumplimiento?

                    En esta era digital los datos personales de nuestros clientes y proveedores pasan por una red y se almacenan en una base de datos. Éstos, por ley, deben protegerse por medio de sistemas y procesos. Uno de los objetivos de esta ley es establecer las condiciones de tratamiento de datos personales y fomentar la cultura de protección.

                    La Ley de protección de datos es mucho más que un simple aviso de privacidad; esta ley describe derechos y obligaciones que de incumplirse pueden ser penalizados. Asiste a este Webinar para conocer más y prepararte. Te mostraremos:

                    • Cómo puedes preparar tu infraestructura y procesos para cumplir con la nueva ley
                    • Cómo puedes automatizar el seguimiento continuo
                    • Cómo puedes centralizar la documentación necesaria para una auditoria
                    02. Mar 2017 The Benefits of Firewall Management Tools on Productivity & Security

                    In the fall of 2016, we sought the answer to a very simple question: What benefits do users who have a firewall management tool deployed with their firewalls see over nonusers? To find out, we commissioned Forrester Consulting to survey 188 IT security decision makers.

                    In their study, “Automate Zero Trust Policy & Enforcement,” Forrester Consulting found that organizations with firewall auditing and configuration tools realize more benefits that those without, including:

                    • Increased IT staff productivity
                    • Fewer data breaches and attacks
                    • Improved visibility into network traffic

                    In this webinar, guest Speaker Josh Zelonis, Senior Analyst with Forrester, will review and discuss the results of the study with FireMon CTO Paul Calatayud who will bring his own experiences and best practices for deploying firewall management tools to improve productivity and reduce risk.



                    22. Dec 2016
                    Uber fights phishing with custom email IDS platform
                    SC Magazine
                    20. Dec 2016
                    Westcon-Comstor taps BeyondTrust software for distribution program
                    Tech Target
                    16. Dec 2016
                    Is your personal data ever really private?
                    CBS MoneyWatch
                    15. Dec 2016
                    Yahoo embarrassment: Federal agents had to tell the company it had been hacked. Again.
                    The Kansas City Star
                    12. Dec 2016
                    Firewall Sprawl: Four Security Gaps Exposed
                    09. Dec 2016
                    'We could not deliver your parcel' email could be scam
                    USA Today
                    07. Dec 2016
                    IT News
                    07. Dec 2016
                    Cybersecurity pros tell Trump to heed commission's recommendations
                    SC Magazine
                    07. Dec 2016
                    Holiday security matters to #hackers with Paul Calatayud @paulcalatayud of @firemon
                    The Charles Tendell Show
                    07. Dec 2016
                    Keeping up with evolving cyber security needs
                    Channel Pro
                    25. Nov 2016
                    Computing Security Excellence Awards 2016: and the winners are...
                    24. Nov 2016
                    Consumers and Retailers, Here is How You Should Prepare for Black Friday and Cyber Monday
                    IT Security Guru
                    21. Nov 2016
                    Public sector cybersecurity: under threat but fighting back
                    The Guardian
                    15. Nov 2016
                    Firewall DDoS Attack BlackNurse
                    Information Security Buzz
                    14. Nov 2016
                    Report illustrates value of intelligent security management
                    Digitalisation World
                    11. Nov 2016
                    Industry-first study quantifies security management impact on security-related risks and operational costs
                    IT Security Guru
                    08. Nov 2016
                    FireMon concludes third quarter of 2016 with largest bookings on record
                    IT Security Guru
                    05. Nov 2016
                    FireMon acquires Israel-based company
                    Big News Network
                    04. Nov 2016
                    Kansas City’s Entrepreneurial Community Honoring Some of its Best & Brightest
                    Thinking Bigger
                    04. Nov 2016
                    FireMon acquires FortyCloud for Multi-cloud Management Capabilities
                    IT Security Guru
                    03. Nov 2016
                    Experts question Microsoft's Windows zero-day response
                    Tech Target
                    02. Nov 2016
                    Phillip Hammond’s £1.9bn cyber defence strategy: security professionals deliver their verdict
                    IFSEC Global
                    01. Nov 2016
                    UK to increase national cyber-defence grid
                    Digital Forensics Magazine
                    29. Oct 2016
                    Enterprise Security Weekly #20
                    27. Oct 2016
                    Cloud Pact: FireMon Acquires FortyCloud
                    ISS Source
                    26. Oct 2016
                    Pushing Further Into The Cloud, FireMon Acquires Security Broker FortyCloud
                    26. Oct 2016
                    The Multi-Cloud Enterprise Is Becoming the Norm
                    IT Business Edge
                    26. Oct 2016
                    The Relationship Between IoT, Cloud Security, and DDoS
                    IT Business Edge
                    26. Oct 2016
                    US Treasury tells banks to provide more cyber attack information
                    Computer Weekly
                    25. Oct 2016
                    FireMon acquires FortyCloud to go beyond cramming workloads into the cloud
                    451 Research
                    25. Oct 2016
                    FireMon buys FortyCloud
                    The Register
                    24. Oct 2016
                    Huge DDoS Attack Brings Down Twitter, Spotify And AirBnB
                    Information Security Buzz
                    21. Oct 2016
                    Firemon to be 'laser focused' on fewer partners
                    21. Oct 2016
                    DNS devastation: Top websites whacked offline as Dyn dies again
                    The Register
                    21. Oct 2016
                    Dyn DDoS part 2: The hackers strike back
                    18. Oct 2016
                    The Computing Security Excellence Awards shortlist revealed!
                    13. Oct 2016
                    FireMon appoints Paul Calatayud as CTO
                    SC Magazine
                    12. Oct 2016
                    Seasoned CISO joins FireMon as Chief Technology Officer
                    IT Security Guru
                    06. Oct 2016
                    On Entrepreneurship: For new FireMon CEO, it’s growth over profitability
                    Kansas City Business Journal
                    06. Oct 2016
                    What If You could Visualize Every Change On Your Network? with @FireMon
                    The Charles Tendell Show
                    05. Oct 2016
                    3 questions with FireMon's new CEO
                    Kansas City Business Journal
                    30. Sep 2016
                    As September draws to a close, MicroScope checks in on this week's executive appointments in and around the channel
                    Computer Weekly
                    29. Sep 2016
                    FireMon boss looks to streamline channel for enterprise push
                    27. Sep 2016
                    High-growth security management vendor forges ahead with new CEO at the helm
                    IT Security Guru
                    07. Sep 2016
                    FireMon grabs Blue Coat man to head global channels
                    07. Sep 2016
                    Automation isn’t one-size fits all
                    Help Net Security
                    02. Sep 2016
                    FireMon announces new standard in change automation
                    30. Aug 2016
                    Why are organizations in APAC less secure?
                    IDG Connect
                    22. Aug 2016
                    65% Of IT leaders Expect A Serious Data Breach To Hit Their Business In The Next Year
                    Information Security Buzz
                    19. Aug 2016
                    Company security measures often 'knee jerk' reactions
                    IT Pro Portal
                    22. Jul 2016
                    65% of IT pros would be grounded by Mum for their messy firewall rules
                    SC Magazine
                    21. Jul 2016
                    Messy firewall rules would leave IT pros grounded for life
                    IT Pro Portal
                    07. Jul 2016
                    IT security pros compromise ethics and mostly 'fire-fight', not do security work
                    SC Magazine
                    07. Jul 2016
                    Almost a third of cyber security pros surveyed admit to compromising ethics to pass audits
                    07. Jul 2016
                    IT Pros compromise ethics to pass audits, FireMon says
                    IT Pro Portal
                    02. Jul 2016
                    Thinking your way to safety
                    Computing Security
                    02. Jul 2016
                    LinkedIn secure after acquisition
                    Computing Security
                    01. Jul 2016
                    Over-stretched IT Security Pros Spend More Time Fire-fighting than Doing Meaningful Security Work
                    IT Security Guru
                    23. Jun 2016
                    FireMon: The Enterprise Security Management Vanguard
                    CIO Review
                    22. Jun 2016
                    Security Experts Insight on UK Parliament Report On Cyber Security
                    IT Security Guru
                    20. Jun 2016
                    Will MPs' TalkTalk Hack Recommendations Make the UK More Secure?
                    TechWeek Europe
                    03. Jun 2016
                    Are firewalls still important? Making sense of networking's greatest security layer
                    Computer World UK
                    10. May 2016
                    Firewall importance remains
                    30. Mar 2016
                    The changing role of firewalls in network security
                    30. Mar 2016
                    Firewalls still at the heart of network security infrastructure
                    IT Pro Portal
                    28. Mar 2016
                    Like It Or Not, Firewalls Still Front And Center
                    Dark Reading
                    29. Feb 2016
                    Wir sind gekommen, um zu bleiben
                    Manage IT
                    26. Feb 2016
                    FireMon fits new CFO’s entrepreneurial bent
                    Kansas City Business Journal
                      See all news from 2016

                    Resource Library

                    Audit Compliance


                    Policy Change

                    Solution Briefs

                    Policy Change

                    White Papers

                    Visibility Monitoring Management

                    Analyst Reports

                    Security Manager
                    Overview of FireMon’s Flagship Firewall Management Solution
                    Policy Planner
                    Overview of FireMon’s Change Automation Solution
                    Policy Optimizer
                    Overview of FireMon’s Rule Recertification Automation Solution
                    Risk Analyzer
                    Overview of FireMon’s Attack Simulation and Risk Measurement Solution
                    Immediate Insight
                    Overview of FireMon’s Immediate Insight Solution
                    Intelligent Security Management
                    Delivering next-generation security management that boosts productivity and accelerates the agility of business
                    Intelligent Policy Automation
                    Intelligent Policy Automation: Orchestrating Change Management with Speed and Security.
                    Hybrid Cloud Management
                    Visibility into and control over Cloud Services, including AWS and OpenStack Platforms
                    Accelerated Incident Response
                    Immediate Insight in action - Orchestration, automation and analytics for data assembly and discovery
                    Change Simulation & Risk Scoring
                    Proactively reduce risk based upon network exposure and host accessibility
                    Firewall Cleanup
                    The implications of firewall policy complexity, why it remains a problem today and how to resolve it.
                    Real-Time Risk Analysis
                    Risk analysis with real-time change configuration is key to managing security risks in your IT infrastructure.
                    Real-Time Data Triage
                    Our Immediate Insight platform from FireMon can help organizations overcome the limitations and gaps inherent to the current analytic market.
                    Bridging the SIEM Alert Triage Gap
                    Immediate Insight enables security teams to improve event triage and incident response, extending the value of your existing full-featured SIEM.
                    Intelligent Policy Automation
                    Automation Isn’t One-Size-Fits-All
                    Intelligent Security Management

                    Helping Enterprise Security Teams Improve Resource Efficiency & Reduce Overall Risk Exposure

                    2016 State of the Firewall
                    2nd Annual State of the Firewall Report based on survey of 600 IT security practitioners.
                    The Top 5 Myths of Data Breaches
                    Five of the biggest myths that exist about data breaches, and explain how and why they occur.
                    Firewall Sprawl: Top Four Security Gaps Exposed

                    Firewall technology has come a long way since its initial, most rudimentary forms. Next-Generation Firewalls (NGFW) are the latest development, and organizations are accelerating adoption to the new technology. But NGFWs aren’t a fix-all solution.

                    Firewall Sprawl: How Complexity Is Adding Cost & Increasing Risk
                    Quantifying the value of Intelligent Security Management
                    Security Analytics Brings Data-Driven Security Into the 21st Century
                    Automate Zero Trust Policy And Enforcement
                    What's changing and how to respond to PCI DSS V3.2
                    The Return on Security analysis for FireMon’s Security Manager