Get to know us better! Gain valuable insights into how we think by visiting our blog, or take a look at the industry events we're frequenting on our events page. You can also geek out with us by attending one of our security management webinars, or dive head first into the products and solutions we provide in our Resource Library. There's lots to keep you busy!
Many threat investigations begin with responders working to understand possible threat vectors on the network that could explain malicious activity. One powerful way to improve the efficiency of our responders is to help them understand the network attack surface as configured attack paths that represent potential exploit paths.On Sept 21st we’ll share how FireMon’s Risk Analyzer and Immediate Insight products bring together threat investigation and attack path analysis to accelerate incident response and threat detection.
Enhancements to FireMon’s industry-leading Intelligent Policy Automation framework reduce time and mistakes associated with firewall policy changes OVERLAND PARK, KS and DALLAS, TX – January 31, 2017 – FireMon, the global leader in Network Security Policy Management (NSPM), today announced an extension of its Intelligent Policy Automation framework to now include automated policy implementation for Palo Alto Networks® devices. FireMon introduced its Intelligent Policy Automation framework last year. The framework is designed to reduce the manual effort and unnecessary security risk associated with complex network implementations by ensuring processes are in place to make the correct change as quickly as possible. By focusing on the correctness of the change, the IPA framework has reduced the time it takes customers to complete a change by more than 90% while also maintaining their security posture, and often lowering the overall level of risk. Unlike other automation solutions in the space, the integration of FireMon’s Immediate Insight security analytics solution enables customers to actively monitor for new threats and modify policies accordingly using the IPA framework. In this update, now available to FireMon customers, Palo Alto Networks users can automatically push firewall rule changes to the Panorama™ centralized security management system. Previously, users made these changes manually. This new extension results in further time savings and accuracy when implementing new policy access. Customers with Panorama will gain the ability to centrally manage their multi-device environments within FireMon Security Manager to:
"FireMon is proud to continue to develop its products to work with the widest range of security products in order to reduce complexity and manual tasks undertaken by enterprise IT security teams," said Jeremy Martin Vice President of Product Development, FireMon. "This latest product extension means that Palo Alto customers will benefit from increased efficiency; and by using App-ID and User-ID in policy management, it is possible to see the device impact and do a proper risk validation assessment of rule changes – a crucial component to effective management of enterprise security."
FireMon solutions deliver continuous visibility into and control over network security infrastructure, policies, and risk. Using Intelligent Security Management from FireMon, today’s enterprise organizations, government agencies, and managed services providers dramatically improve effectiveness of network defenses, optimizing investments and speeding response to changing business demands. For more information, visit http://www.firemon.com.
FireMon’s Intelligent Security Management platform enables users with Cisco Systems switches, routers and firewalls (Pix, ASA, FirePower) to work smarter, applying intelligence to the entire security program
Helping Enterprise Security Teams Improve Resource Efficiency & Reduce Overall Risk Exposure
Firewall technology has come a long way since its initial, most rudimentary forms. Next-Generation Firewalls (NGFW) are the latest development, and organizations are accelerating adoption to the new technology. But NGFWs aren’t a fix-all solution.