FireMon Resources

Resources (1041)

Filter Results By

Top 5 Network Security Challenges in 2020 and Beyond
May 5, 2020

Top 5 Network Security Challenges in 2020 and Beyond

There are a lot of theories about which network security challenge is the most important at any given time. The issue is highly subjective, particularly in this world of advocates, specialists, and vendors, who are each fixated on their particular piece of the puzzle. But in the end, what matters...
Read More
Network Vulnerability: It May Not Mean What You Think It Means
May 5, 2020

Network Vulnerability: It May Not Mean What You Think It Means

Key Terms Network vulnerability A flaw in computing environment or associated processes that can potentially be exploited by malicious actors. Context The circumstances around a vulnerability that shed light on its true nature Network risk assessment A process to gain understanding of the risks to critical systems and sensitive data...
Read More
Global SAAS Leader Chooses FireMon to Automate Network Security. Here’s Why.
May 5, 2020

Global SAAS Leader Chooses FireMon to Automate Network Security. Here’s Why.

In the age of clouds and hybrid clouds and multi clouds, effectively managing network and firewall policy and compliance isn’t a simple matter for any organization.
Read More
COVID-19 > Network Change > Misconfiguration > RISK
May 5, 2020

COVID-19 > Network Change > Misconfiguration > RISK

Misconfiguration is code for human error. COVID-19 has only magnified this. See the Impact of Misconfigurations in this infographic.
Read More
Avoid The Top 5 Roadblocks On Your Journey To The Cloud
May 5, 2020

Avoid The Top 5 Roadblocks On Your Journey To The Cloud

The need for agility and flexibility is accelerating the move to the cloud. This leaves many enterprises challenged with maintaining the integrity of their overall security posture.
Read More
Why Security Misconfiguration Are Higher During Covid-19
May 5, 2020

Why Security Misconfiguration Are Higher During Covid-19

There are good reasons your IT security team may be looking a bit sleep-deprived. In addition to the stress of the COVID-19 pandemic everyone is facing, they’re also facing heightened risks to network firewall security as new external assets (websites, web portals, mobile apps and more) are provisioned to enable...
Read More
Security Misconfigurations in the Pandemic – and What to Do About Them
April 4, 2020

Security Misconfigurations in the Pandemic – and What to Do About Them

Change has never been a friend of network security. Neither has complication. Right now, we have too much of both. The Covid-19 pandemic has resulted in an unprecedented shift to remote work, bringing an avalanche of new access requests, along with all the configuration complications they introduce. Threat actors have...
Read More
Infographic: 5 Ways to SOAR Higher
April 4, 2020

Infographic: 5 Ways to SOAR Higher

Whether you use Swimlane, Phantom, Demisto, Komand or another SOAR solution — for your SOAR solution to truly take off — you need the ability to gather data in real-time, analyze the data for patterns, trends and alerts, and respond instantly using automation.
Read More
Without automation, security gets harder during a business disruption 
April 4, 2020

Without automation, security gets harder during a business disruption 

FireMon’s 2020 State of Hybrid Cloud Security Survey found that 69.5 percent of respondents have a security team of just 10 people or fewer.  And  most manage both on-premise network security and cloud security.  These teams are already bogged down with manual tasks at the best of times, so when a crisis  hits, it magnifies the risks of manual processes. Not only is it difficult to maintain essential network operations, but...
Read More
Enabling Public, Private, Hybrid, and Multi-Cloud Adoption and Migration
April 4, 2020

Enabling Public, Private, Hybrid, and Multi-Cloud Adoption and Migration

FireMon goes live Wednesday, April 8th at 2:57PM ET. “The cloud” still means different things to different IT people. For some, cloud is just a way to change the IT cost model. For others, it’s a way to start new initiatives without friction. For others, it’s a target for backups...
Register