see more


Get to know us better! Gain valuable insights into how we think by visiting our blog, or take a look at the industry events we're frequenting on our events page. You can also geek out with us by attending one of our security management webinars, or dive head first into the products and solutions we provide in our Resource Library. There's lots to keep you busy! 



14. Apr 2017 Making security part of the company culture

My years of experience managing security programs, across a broad spectrum of industries, has given me a greater understanding of how technology and people both play a critical role in influencing the overall security posture of any organization.

Read more
07. Apr 2017 It’s Time for a New Approach to Network Security
You may have noticed things look a little different around here. Well, that’s because our industry is changing, and we’d be remiss not change along with it. With the pace that technology and threats are advancing, what’s worked in the past simply won’t work anymore. And FireMon is here to address that.
Read more
31. Oct 2015Immediate Insight - AppPerf Installation Guide

Note: AppPerf is currently in Beta release, if you encounter any issues or have feedback please email

AppPerf is a free standalone tool that does speed test between internal enterprise web servers and client hosts. AppPerf does not need to be ‘installed’ on the webserver, but some files need to be placed there. AppPerf files can be placed onto an Immediate Insight web server if desired, however another web server may be used if applicable. Results of AppPerf tests are then feed to an Immediate Insight instance for collection & reporting (this may or may not be on the same Immediate Insight as the AppPerf files are loaded). The following example instructions assume AppPerf files are loaded onto the same Immediate Insight instance as is collection the test results. Immediate Insight app-2015-10-05 or newer is required to collect the data.

Step 1: Obtain the AppPerf files and put them in place.

    • Send an email to creating a support ticket to receive the necessary file that will be used in later steps.
    • Use WinSCP or similar tool to sftp the received to the Immediate Insight home directory (which is home/insight).

    Step 2: Configure the Immediate Insight instance for the AppPerf capability.

      • Using Putty or another SSH tool connect to the CLI of the Immediate Insight client.
      • Go to the home directory by typing cd/home/insight
      • Once at the home directory type unzip
      • Type the following command to create a symbolic link to a persistent directory.

      rm –f /home/insight/app/search/AppPerf; ln –s /home/insight/AppPerf /home/insight/app/search/AppPerf

      • Edit the /etc/rc.local file to make the symbolic link persistent after reboot.
        • sudo nano /etc/rc.local
        • add the line in step D. above, to the second to last line of the file.
        • Save and exit the file by choosing “CTRL – X” and then “Yes” to save.

        (edit AppPerf.html for applicable Immediate Insight data collector)

        • Edit the AppPerf.html file with the following lines substituting applicable IP and test name, please note that the double quotes are required.
          • Browse to the directory where the file is located. cd /home/insight/app/search/AppPerf
          • Update the AppPerf.html file with the applicable IP Address and port of the webserver using the sudo nano AppPerf.html command. NOTE: (Quotes are required as shown in an example on the beginning of the next page.)

          var ii = “”

          var appsrv = “test-server-A”


          IF and only if your Immediate Insight servers is accessed via HTTPS change entry as follows: var ii = “”

          (NOTE: you will also need to create an HTTPS Listener using 3088 on Immediate Insight)

          (NOTE: optionally but recommended, to stop HTTPS certificate warning messages you can follow the procedure in Immediate Insight install guide)

          • After changes are complete the Immediate Insight server needs to be reloaded. You can complete this by typing reload server at the command prompt.
          • Open browser (Chrome is recommended) and browse to either of these as applicable. (Note: The IP and port in the link below will be whatever you designate as the webserver.)
            • Test result will displayed in the browser.


            Results are also searchable in the Immediate Insight specified in AppPerf.html

            Josh Mayfield leads platform sales for Immediate Insight, FireMon's security analytics solution.



            19. Apr 2017 Closing the Complexity Gap

            How Effective Security Management Can Help Teams Cover the Exponentially Increasing Gap between Technology & the Resources Available to Manage It

            Security teams today are under tremendous pressure due to the rising frequency and impact of breaches and a business that wants to move faster and faster. The answer to both of these challenges has always been to add more technology and staff resources.

            However, each new technology added creates complexity. More rules are created and more data is generated. As networks continue to evolve, this complexity will only grow. And while staff resources may increase, they will never match the exponential growth of technology.

            FireMon calls this phenomenon The Complexity Gap and has set out to help security teams close it.

            Join us for this webinar with Frost & Sullivan where we’ll explore the causes of “The Gap” and how workforce multipliers such as intelligence and automation help staff manage their security more efficiently and more effectively.

            30. Mar 2017 Data Orchestration for Incident Response
            The biggest challenge security teams face when it comes to the alert triage process is preparing the data for analysis. Analysts can spend 80% of their time or more just to assemble the data to answer the question of whether an alert is a false positive or real incident.

            Immediate orchestrates the data assembly process, freeing up critical time and resources to actually respond to identified events.

            Join us for this webinar to learn how you can streamline the incident response process by orchestrating data assembly from a variety of disparate, external sources, including:
            - FireMon Security Manager
            - Palo Alto Networks AutoFocus
            - VirusTotal
            - Packet Capture
            - Threat Intelligence Feeds
            - And more!
            07. Mar 2017 Prepare su red para cumplir con la Ley de Protección de Datos

            En la actualidad, uno de los retos principales es preparar las redes de seguridad, no sólo para enfrentar las amenazas, sino también para enfrentar los cumplimientos. El día 26 de enero se publicó en el Diario Oficial la LEY GENERAL DE PROTECCIÓN DE DATOS PERSONALES EN POSESIÓN DE SUJETOS OBLIGADOS.

            ¿Está tu red preparada?
            ¿Cuentas con los procesos necesarios para el cumplimiento?

            En esta era digital los datos personales de nuestros clientes y proveedores pasan por una red y se almacenan en una base de datos. Éstos, por ley, deben protegerse por medio de sistemas y procesos. Uno de los objetivos de esta ley es establecer las condiciones de tratamiento de datos personales y fomentar la cultura de protección.

            La Ley de protección de datos es mucho más que un simple aviso de privacidad; esta ley describe derechos y obligaciones que de incumplirse pueden ser penalizados. Asiste a este Webinar para conocer más y prepararte. Te mostraremos:

            • Cómo puedes preparar tu infraestructura y procesos para cumplir con la nueva ley
            • Cómo puedes automatizar el seguimiento continuo
            • Cómo puedes centralizar la documentación necesaria para una auditoria
            02. Mar 2017 The Benefits of Firewall Management Tools on Productivity & Security

            In the fall of 2016, we sought the answer to a very simple question: What benefits do users who have a firewall management tool deployed with their firewalls see over nonusers? To find out, we commissioned Forrester Consulting to survey 188 IT security decision makers.

            In their study, “Automate Zero Trust Policy & Enforcement,” Forrester Consulting found that organizations with firewall auditing and configuration tools realize more benefits that those without, including:

            • Increased IT staff productivity
            • Fewer data breaches and attacks
            • Improved visibility into network traffic

            In this webinar, guest Speaker Josh Zelonis, Senior Analyst with Forrester, will review and discuss the results of the study with FireMon CTO Paul Calatayud who will bring his own experiences and best practices for deploying firewall management tools to improve productivity and reduce risk.



            22. Dec 2016
            Uber fights phishing with custom email IDS platform
            SC Magazine
            20. Dec 2016
            Westcon-Comstor taps BeyondTrust software for distribution program
            Tech Target
            16. Dec 2016
            Is your personal data ever really private?
            CBS MoneyWatch
            15. Dec 2016
            Yahoo embarrassment: Federal agents had to tell the company it had been hacked. Again.
            The Kansas City Star
            12. Dec 2016
            Firewall Sprawl: Four Security Gaps Exposed
            09. Dec 2016
            'We could not deliver your parcel' email could be scam
            USA Today
            07. Dec 2016
            IT News
            07. Dec 2016
            Cybersecurity pros tell Trump to heed commission's recommendations
            SC Magazine
            07. Dec 2016
            Holiday security matters to #hackers with Paul Calatayud @paulcalatayud of @firemon
            The Charles Tendell Show
            07. Dec 2016
            Keeping up with evolving cyber security needs
            Channel Pro
            25. Nov 2016
            Computing Security Excellence Awards 2016: and the winners are...
            24. Nov 2016
            Consumers and Retailers, Here is How You Should Prepare for Black Friday and Cyber Monday
            IT Security Guru
            21. Nov 2016
            Public sector cybersecurity: under threat but fighting back
            The Guardian
            15. Nov 2016
            Firewall DDoS Attack BlackNurse
            Information Security Buzz
            14. Nov 2016
            Report illustrates value of intelligent security management
            Digitalisation World
            11. Nov 2016
            Industry-first study quantifies security management impact on security-related risks and operational costs
            IT Security Guru
            08. Nov 2016
            FireMon concludes third quarter of 2016 with largest bookings on record
            IT Security Guru
            05. Nov 2016
            FireMon acquires Israel-based company
            Big News Network
            04. Nov 2016
            Kansas City’s Entrepreneurial Community Honoring Some of its Best & Brightest
            Thinking Bigger
            04. Nov 2016
            FireMon acquires FortyCloud for Multi-cloud Management Capabilities
            IT Security Guru
            03. Nov 2016
            Experts question Microsoft's Windows zero-day response
            Tech Target
            02. Nov 2016
            Phillip Hammond’s £1.9bn cyber defence strategy: security professionals deliver their verdict
            IFSEC Global
            01. Nov 2016
            UK to increase national cyber-defence grid
            Digital Forensics Magazine
            29. Oct 2016
            Enterprise Security Weekly #20
            27. Oct 2016
            Cloud Pact: FireMon Acquires FortyCloud
            ISS Source
            26. Oct 2016
            Pushing Further Into The Cloud, FireMon Acquires Security Broker FortyCloud
            26. Oct 2016
            The Multi-Cloud Enterprise Is Becoming the Norm
            IT Business Edge
            26. Oct 2016
            The Relationship Between IoT, Cloud Security, and DDoS
            IT Business Edge
            26. Oct 2016
            US Treasury tells banks to provide more cyber attack information
            Computer Weekly
            25. Oct 2016
            FireMon acquires FortyCloud to go beyond cramming workloads into the cloud
            451 Research
            25. Oct 2016
            FireMon buys FortyCloud
            The Register
            24. Oct 2016
            Huge DDoS Attack Brings Down Twitter, Spotify And AirBnB
            Information Security Buzz
            21. Oct 2016
            Firemon to be 'laser focused' on fewer partners
            21. Oct 2016
            DNS devastation: Top websites whacked offline as Dyn dies again
            The Register
            21. Oct 2016
            Dyn DDoS part 2: The hackers strike back
            18. Oct 2016
            The Computing Security Excellence Awards shortlist revealed!
            13. Oct 2016
            FireMon appoints Paul Calatayud as CTO
            SC Magazine
            12. Oct 2016
            Seasoned CISO joins FireMon as Chief Technology Officer
            IT Security Guru
            06. Oct 2016
            On Entrepreneurship: For new FireMon CEO, it’s growth over profitability
            Kansas City Business Journal
            06. Oct 2016
            What If You could Visualize Every Change On Your Network? with @FireMon
            The Charles Tendell Show
            05. Oct 2016
            3 questions with FireMon's new CEO
            Kansas City Business Journal
            30. Sep 2016
            As September draws to a close, MicroScope checks in on this week's executive appointments in and around the channel
            Computer Weekly
            29. Sep 2016
            FireMon boss looks to streamline channel for enterprise push
            27. Sep 2016
            High-growth security management vendor forges ahead with new CEO at the helm
            IT Security Guru
            07. Sep 2016
            FireMon grabs Blue Coat man to head global channels
            07. Sep 2016
            Automation isn’t one-size fits all
            Help Net Security
            02. Sep 2016
            FireMon announces new standard in change automation
            30. Aug 2016
            Why are organizations in APAC less secure?
            IDG Connect
            22. Aug 2016
            65% Of IT leaders Expect A Serious Data Breach To Hit Their Business In The Next Year
            Information Security Buzz
            19. Aug 2016
            Company security measures often 'knee jerk' reactions
            IT Pro Portal
            22. Jul 2016
            65% of IT pros would be grounded by Mum for their messy firewall rules
            SC Magazine
            21. Jul 2016
            Messy firewall rules would leave IT pros grounded for life
            IT Pro Portal
            07. Jul 2016
            IT security pros compromise ethics and mostly 'fire-fight', not do security work
            SC Magazine
            07. Jul 2016
            Almost a third of cyber security pros surveyed admit to compromising ethics to pass audits
            07. Jul 2016
            IT Pros compromise ethics to pass audits, FireMon says
            IT Pro Portal
            02. Jul 2016
            Thinking your way to safety
            Computing Security
            02. Jul 2016
            LinkedIn secure after acquisition
            Computing Security
            01. Jul 2016
            Over-stretched IT Security Pros Spend More Time Fire-fighting than Doing Meaningful Security Work
            IT Security Guru
            23. Jun 2016
            FireMon: The Enterprise Security Management Vanguard
            CIO Review
            22. Jun 2016
            Security Experts Insight on UK Parliament Report On Cyber Security
            IT Security Guru
            20. Jun 2016
            Will MPs' TalkTalk Hack Recommendations Make the UK More Secure?
            TechWeek Europe
            03. Jun 2016
            Are firewalls still important? Making sense of networking's greatest security layer
            Computer World UK
            10. May 2016
            Firewall importance remains
            30. Mar 2016
            The changing role of firewalls in network security
            30. Mar 2016
            Firewalls still at the heart of network security infrastructure
            IT Pro Portal
            28. Mar 2016
            Like It Or Not, Firewalls Still Front And Center
            Dark Reading
            29. Feb 2016
            Wir sind gekommen, um zu bleiben
            Manage IT
            26. Feb 2016
            FireMon fits new CFO’s entrepreneurial bent
            Kansas City Business Journal
              See all news from 2016

            Resource Library

            Audit Compliance


            Policy Change

            Solution Briefs

            Policy Change

            White Papers

            Visibility Monitoring Management

            Analyst Reports

            Security Manager
            Overview of FireMon’s Flagship Firewall Management Solution
            Policy Planner
            Overview of FireMon’s Change Automation Solution
            Policy Optimizer
            Overview of FireMon’s Rule Recertification Automation Solution
            Risk Analyzer
            Overview of FireMon’s Attack Simulation and Risk Measurement Solution
            Immediate Insight
            Overview of FireMon’s Immediate Insight Solution
            Intelligent Security Management
            Delivering next-generation security management that boosts productivity and accelerates the agility of business
            Intelligent Policy Automation
            Intelligent Policy Automation: Orchestrating Change Management with Speed and Security.
            Hybrid Cloud Management
            Visibility into and control over Cloud Services, including AWS and OpenStack Platforms
            Accelerated Incident Response
            Immediate Insight in action - Orchestration, automation and analytics for data assembly and discovery
            Change Simulation & Risk Scoring
            Proactively reduce risk based upon network exposure and host accessibility
            Firewall Cleanup
            The implications of firewall policy complexity, why it remains a problem today and how to resolve it.
            Real-Time Risk Analysis
            Risk analysis with real-time change configuration is key to managing security risks in your IT infrastructure.
            Real-Time Data Triage
            Our Immediate Insight platform from FireMon can help organizations overcome the limitations and gaps inherent to the current analytic market.
            Bridging the SIEM Alert Triage Gap
            Immediate Insight enables security teams to improve event triage and incident response, extending the value of your existing full-featured SIEM.
            Intelligent Policy Automation
            Automation Isn’t One-Size-Fits-All
            Intelligent Security Management

            Helping Enterprise Security Teams Improve Resource Efficiency & Reduce Overall Risk Exposure

            2016 State of the Firewall
            2nd Annual State of the Firewall Report based on survey of 600 IT security practitioners.
            The Top 5 Myths of Data Breaches
            Five of the biggest myths that exist about data breaches, and explain how and why they occur.
            Firewall Sprawl: Top Four Security Gaps Exposed

            Firewall technology has come a long way since its initial, most rudimentary forms. Next-Generation Firewalls (NGFW) are the latest development, and organizations are accelerating adoption to the new technology. But NGFWs aren’t a fix-all solution.

            Firewall Sprawl: How Complexity Is Adding Cost & Increasing Risk
            Quantifying the value of Intelligent Security Management
            Security Analytics Brings Data-Driven Security Into the 21st Century
            Automate Zero Trust Policy And Enforcement
            What's changing and how to respond to PCI DSS V3.2
            The Return on Security analysis for FireMon’s Security Manager