Lumeta is now Cyber Asset Manager. Learn More

Resources

Professional Services Implementation

File under:

Datasheets
With five service offerings of Professional Services implementation to choose from, you will find the right fit for your organization.

Customizable Compliance Brief

File under:

Solution Briefs
Regulatory and policy compliance is a fact of life for modern enterprises. From external standards like PCI-DSS, NIST, HIPAA, GDPR and others, to internal requirements and best practices, maintaining compliance requires more than simply checking a box.

FireMon Appliance Datasheet

File under:

Datasheets
Developed and tested by FireMon, FM appliances are purpose-built to run FireMon solutions in your enterprise or MSSP environment.

Lumeta Datasheet

File under:

Datasheets
Real-time infrastructure visibility, leak/path analysis and risk impacts, and ownership attribution across on-premises, virtual, software-defined, cloud and hybrid environments

Risk Analyzer Datasheet

File under:

Datasheets
Continuous data protection with attack surface visibility, simulation and risk scoring

Policy Optimizer Datasheet

File under:

Datasheets
As networks grow in size and complexity, policy maintenance and compliance becomes increasingly difficult. Manual review processes don’t scale to enterprise networks, leaving expired, unused, and overly-permissive rules to expand the threat surface.

Policy Planner Datasheet

File under:

Datasheets
Make the right changes the first time with intelligent, automated change management workflows.

Security Manager Datasheet

File under:

Datasheets
Real-time visibility and control, continuous compliance and unrivaled policy-based security for today’s hybrid enterprise

How to Prove Your Firewalls Actually Do What You Intend

File under:

Webinars
How to Prove Your Firewalls Actually Do What You Intend Cloud infrastructure brings the same risks and threats as an on-premises environment, but with a twist: the rate of expansion. Cloud services and applications spin up, deploy and provision faster than

101 Guide to Security Automation

File under:

Webinars
In this real training for free webinar, we will explore what it takes to test your firewalls and prove they actually do what you intend. We aren’t talking about a simple pentest or vulnerability scan from the Internet. And in

5 Ways to Make Your SOAR Initiatives Take Flight

File under:

Webinars
This is a must-attend webinar for anyone responsible for management of SOAR solutions in their organization. During the webinar you’ll hear from Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions, as he shares his presentation from Black Hat

HIPAA Compliance Guide

File under:

Guides
Regulatory compliance requirements are always being updated and are difficult to interpret. Our FireMon experts have identified the essential network security controls and how they map to HIPAA requirements.

NIST Compliance Guide

File under:

Guides
Regulatory compliance requirements are always being updated and are difficult to interpret. Our FireMon experts have identified the essential network security controls and how they map to NIST 800-53 requirements.

SOX Compliance Guide

File under:

Guides
Regulatory compliance requirements are always being updated and are difficult to interpret. Our FireMon experts have identified the essential network security controls and how they map to SOX requirements.

NERC CIP Compliance Guide

File under:

Guides
Regulatory compliance requirements are always being updated and are difficult to interpret. Our FireMon experts have identified the essential network security controls and how they map to NERC CIP requirements.

PCI-DSS Compliance Guide

File under:

Guides
Regulatory compliance requirements are always being updated and are difficult to interpret. Our FireMon experts have identified the essential network security controls and how they map to PCI DSS 3.2 requirements.

Privacy Regulations Compliance Guide

File under:

Guides
Regulatory compliance requirements are always being updated and are difficult to interpret. Our FireMon experts have identified the essential network security controls and how they map to GDPR, CCPA, and 23 NYCRR 500 requirements.

Gartner Zero Trust Best Practices

File under:

Analyst Reports
For this report, Gartner interviewed multiple early adopters of ZTNA technology to reveal 5 points that are crucial to a successful project.

The Future of Network Security Infographic: Retail Insights

File under:

Infographics
Retail IT security leaders share the most critical initiatives they’re launching to optimize their network security posture.

The Future of Network Security Infographic: Executive Insights

File under:

Infographics
Get a quick read on the trends that industry leaders foresee – plus additional insights into the technologies they’re adopting to drive agile security in their own networks.

The Future of Network Security Infographic: EMEA

File under:

Infographics
Get a quick read on the trends that industry leaders foresee – plus additional insights into the technologies they’re adopting to drive agile security in their own networks.

Debunking 4 Common Myths of Security Policy Compliance

File under:

E-books
These claims have been widely spread so it’s easy to believe they’re true. But the fact is they are wrong – and they can waste your valuable resources, time and budget.

Showing The Value Of Network Security Policy Management

File under:

Infographics
Manual management of network policies, rules, and configurations is time-consuming, and error-prone which adds operational cost and increases security-related risks. Based on primary research findings from Aberdeen Group, this infographic shows you the ROI NSPM can provide by helping

Compliance Audit Preparation Guide

File under:

White Papers
With compliance and regulatory standards such as SOX, PCI-DSS and HIPAA, your partners and customers expect a secure network when they work with your business. Firewall audits help to find weaknesses and vulnerabilities in your security controls.

3 Proven Ways to Boost Your Hybrid Cloud Security

File under:

E-books
No matter the initiative, it is your responsibility to protect your network. Compromise is never the answer when it comes to enabling your business with agility and ensuring robust security.

5 Steps to Keep Network Security Enforcement Points Secure and Up-To-Date

File under:

White Papers
How do you keep your network policy consistent and enforced in a hybrid cloud environment? There are many ways, but in this whitepaper by Randy Franklin Smith from Ultimate Windows Security, he shares the five most critical steps. This whitepaper

White Paper: Continuous Cyber Situational Awareness

File under:

White Papers
Do You Have Continuous Cyber Situational Awareness Across Your Entire Hybrid Network Infrastructure?

Compliance and Security for Utilities

File under:

Solution Briefs
Meet NERC requirements and prevent catastrophic infrastructure events.

Immediate Insight and Palo Alto Networks Application Framework

File under:

Solution Briefs

Moving to the Cloud

File under:

Solution Briefs
Central security control for expanding cloud intrastructures.

Risk Mitigation

File under:

Solution Briefs
Eliminate disruptions while removing security risks.

Reduce Security Costs

File under:

Solution Briefs
Continuous security that doesn’t break the bank.

Intent-based Network Security

File under:

Solution Briefs
Continuous security starts with intent.

Elasticsearch

File under:

Solution Briefs
FireMon and Elasticsearch: Warp speed security

Continuous Security for Industrial Enterprises

File under:

Solution Briefs
Command security for PCN and SCADA networks

Internet of Things

File under:

Solution Briefs
Taming the ever-expanding IoT attack surface.

Zero Trust

File under:

Solution Briefs
Continuous Security for Zero Trust Networks

Migrations Made Easy

File under:

Solution Briefs
Speed up adoption of NGFW with FireMon.

NSX Solution Brief

File under:

Solution Briefs
FireMon solutions for NSX

Juniper Solution Brief

File under:

Solution Briefs
FireMon solutions for Juniper

Fortinet Solution Brief

File under:

Solution Briefs
FireMon solutions help you accelerate adoption of FortiGate devices and maximize the value of your Fortinet investment. You can work smarter with the necessary tools to see through your network complexity and be more proactive and agile with your security.

Check Point Solution Brief

File under:

Solution Briefs
FireMon solutions and Check Point

Cisco Solution Brief

File under:

Solution Briefs
FireMon’s Intelligent Security Management platform enables users with Cisco Systems switches, routers and firewalls (Pix, ASA, FirePower) to work smarter, applying intelligence to the entire security program

Intelligent Security Management

File under:

Solution Briefs
Delivering next-generation security management that boosts productivity and accelerates the agility of business

Change Simulation & Risk Scoring

File under:

Solution Briefs
Proactively reduce risk based upon network exposure and host accessibility

Accelerating Incident Response. Immediate Insight in action – Orchestration, automation and analytics for data assembly and discovery

File under:

Solution Briefs
Immediate Insight in action – Orchestration, automation and analytics for data assembly and discovery

Hybrid Cloud Management

File under:

Solution Briefs
Visibility into and control over Cloud Services, including AWS and OpenStack Platforms