FireMon

Risk
Analyzer

Detect risk through real-time attack surface visibility, simulation, and risk scoring
FireMon collects and aggregates Zscaler Cloud Firewall policy information

Find Vulnerabilities Before They Find You.

As networks become more complex and the number of vulnerabilities to be discovered and patched continue to multiply, it’s increasingly difficult to get a true assessment of your security risk. Without 100% network visibility and the ability to run attack and change simulations across multi-vendor, hybrid environments, organizations struggle to accurately analyze and improve their overall network risk exposure.

Risk Analyzer for FireMon Security Manager

The Risk Analyzer module for Security Manager provides best-in-class vulnerability management by correlating third-party vulnerability data with network policy, evaluating network risk, and uncovering potential attack paths. Using real-time visibility into network risk posture, Risk Analyzer simulates potential attacks, calculates attack vectors, predicts potential damage, then displays the results in an easy-to-understand user dashboard. Extensive scenario testing helps prioritize vulnerability patching by allowing security teams to simulate patch deployments to determine the impacts to the overall network risk posture.

  • Consolidated policy risk assessment and reporting with custom and best practices reports
  • Risk and threat modeling including attack simulations, change risk simulations, and leak-path detection
  • Pre-flight risk checks by automatically scanning for risk prior to change deployment
  • Real-time risk detection and response through violation detection, alerts, and mitigation strategy
Risk Analyzer Calculate Network Reachability

“FireMon’s analytical tools give us a way to quickly evaluate rules against standardized controls and KPIs, and its automated PCI-DSS assessments help ensure we meet regulatory compliance."

Security Architect
Retail Company
10,000+ employees

“We are in a highly regulated industry, SOX, MICS (gaming), and PCI, to name a few. For security best practices, we need a tool to leverage integrated reports to help identify unused rules and objects."

Robert Bollinger
Lead Cyber Security Architect
MGM Resorts International

“Integration with security scanner output is very effective for possible breaches. You can even get the triage in case of possible breach scenarios. FireMon Risk Analyzer is always working to ensure compliance. "

IT Supervisor
Banking Company
10,000+ employees

“By using FireMon to identify the rules causing the biggest problems, I was able to reduce our rule count by 90%..."

IT Engineer
Financial Services Company
5,001 - 10,000 employees

“FireMon allows for the firewall team to manage and monitor our firewalls, including rules, paths, and issues in a single environment. In addition, the ability to test and troubleshoot route and path issues makes life much easier and makes fixing problem much quicker."

IT Manager
Retail Company
10,000+ employees

“FireMon has allowed us to find configuration errors and process these compliance problems to our network teams. It has been a great help throughout the entire organization and our IT teams."

IT Manager
Computer Software Company
1,001 - 5,000 employees

Attack and Change Simulations

Run attack and patch simulations to analyze overall network vulnerability and assist in rule design.

  • Analyze risk attack vectors and perform “what-if” scenarios to identify critical attack vectors
  • Visual attack paths and zero-day attack graphs trace the possible paths an attacker might use across the network layout
  • Uncover hidden paths that can be exploited
  • Simulate system patches to determine the impact of proposed changes prior to deployment
  • Assess and communicate risk associated with new access requests
Simulate Potential Attacks

“What if” Attack Assessments

Evaluate the impact of exploits and view recommended patches.

  • Risk attack reports are scored on penetration depth, ease of exploiting the vulnerability, and business impact of the hypothetical breach
  • Real-time risk dashboard displays prioritized remediation recommendations to help
  • Identify where you can stop an attack with the least amount of time and effort
Analyze “What If” Scenarios

Vulnerability Scanner Integrations

Add additional insights to vulnerabilities with support for the industry’s leading risk scanning services.

  • Integrate risks feeds from Qualys, Rapid7 and Tenable
  • Combines real-time network configuration with vulnerability scan data to measure risk and visualize potential attack penetration
  • Provides additional context for vulnerabilities including CVE, CVSS, effects, and services affected
Remediate Exposures

Use Cases

Risk Detection and Reports
Real-Time Threat Modeling
Data Sheet

FireMon Risk Analyzer Datasheet

Scans, whether passive or active, are not enough. You need to know which exposures are reachable, accessible and under what conditions. Security policy is the missing link.

DOWNLOAD PDF

Trusted by the Global 2000

Deemed critical to National Security

by the United States Treasury

Aetna Logo AirBnB Logo Bank of America Logo Daimler Logo Department of Defense DocuSign Logo General Dynamics Logo IBM Logo IRS Logo Lockheed Martin Logo London Stock Exchange Logo ministry of defence logo mondelez logo REI Logo salesforce logo Saudi Aramco Logo Sony Logo Verizon Logo Wel;s Fargo Logo Xcel Energy Logo

Learn More about Risk Analyzer

PRESS RELEASE

SC Award Winning Solution

FireMon Risk Analyzer wins Trust Award for Best Risk/Policy Management Solution at SC Awards.

LEARN MORE

FireMon Risk Analyzer Customer Review

“A Great Enterprise Tool!”
MGM Resorts

READ THE REVIEW
ON-DEMAND

3 Steps to Reduce Risk

As the cloud becomes foggier and even edge environments begin to resemble traditional cloud, it becomes increasingly difficult to maintain a posture that reduces an organization's risk. Learn how to ensure security in the cloud.

WATCH

Get 9X Better
See how to get:

90% Efficiency Gain by automating firewall support operations

90%+ Faster time to globally block malicious actors to a new line

90% Reduction in FTE hours to implement firewalls

Schedule A Demo

  • Aetna Logo
  • Xcel Energy Logo
  • IBM Logo
  • Salesforce Logo
  • Verizon Logo
  • Wells Fargo Logo