Get to know us better! Gain valuable insights into how we think by visiting our blog, or take a look at the industry events we're frequenting on our events page. You can also geek out with us by attending one of our security management webinars, or dive head first into the products and solutions we provide in our Resource Library. There's lots to keep you busy!
In this webinar, we’ll show you the principles needed for GDPR success:
Enhancements to FireMon’s industry-leading Intelligent Policy Automation framework reduce time and mistakes associated with firewall policy changes OVERLAND PARK, KS and DALLAS, TX – January 31, 2017 – FireMon, the global leader in Network Security Policy Management (NSPM), today announced an extension of its Intelligent Policy Automation framework to now include automated policy implementation for Palo Alto Networks® devices. FireMon introduced its Intelligent Policy Automation framework last year. The framework is designed to reduce the manual effort and unnecessary security risk associated with complex network implementations by ensuring processes are in place to make the correct change as quickly as possible. By focusing on the correctness of the change, the IPA framework has reduced the time it takes customers to complete a change by more than 90% while also maintaining their security posture, and often lowering the overall level of risk. Unlike other automation solutions in the space, the integration of FireMon’s Immediate Insight security analytics solution enables customers to actively monitor for new threats and modify policies accordingly using the IPA framework. In this update, now available to FireMon customers, Palo Alto Networks users can automatically push firewall rule changes to the Panorama™ centralized security management system. Previously, users made these changes manually. This new extension results in further time savings and accuracy when implementing new policy access. Customers with Panorama will gain the ability to centrally manage their multi-device environments within FireMon Security Manager to:
"FireMon is proud to continue to develop its products to work with the widest range of security products in order to reduce complexity and manual tasks undertaken by enterprise IT security teams," said Jeremy Martin Vice President of Product Development, FireMon. "This latest product extension means that Palo Alto customers will benefit from increased efficiency; and by using App-ID and User-ID in policy management, it is possible to see the device impact and do a proper risk validation assessment of rule changes – a crucial component to effective management of enterprise security."
FireMon solutions deliver continuous visibility into and control over network security infrastructure, policies, and risk. Using Intelligent Security Management from FireMon, today’s enterprise organizations, government agencies, and managed services providers dramatically improve effectiveness of network defenses, optimizing investments and speeding response to changing business demands. For more information, visit https://www.firemon.com/.
Your environment is unique. No matter how many devices you have or where they are located, we have an FM appliance and a deployment option to meet your needs.
FireMon’s Intelligent Security Management platform enables users with Cisco Systems switches, routers and firewalls (Pix, ASA, FirePower) to work smarter, applying intelligence to the entire security program
Cloud technology gives enterprises faster application deployment, instant storage, workload versatility and pricing models that decrease initial capital investment. It is no wonder enterprises are making the move to the cloud.
FireMon helps organizations move towards Zero Trust by providing:
Reduce your attack surface with a Security Policy Orchestration and Automation solution like FireMon.
Larger attack surface means more opportunities for cybercriminals to do harm. Learn how FireMon can help you remove exposures before they become exploited.
Migrations run the risk of cost overrun, delays and disruption of network service - often due to a lack of personnel and process to efficiently and effectively manage. To ensure a successful migration, consider these four key factors: 1) identifying and removing technical mistakes, 2) removing unused access, 3) refining and organizing what remains and 4) continuous, real-time monitoring.
Helping Enterprise Security Teams Improve Resource Efficiency & Reduce Overall Risk Exposure
Firewall technology has come a long way since its initial, most rudimentary forms. Next-Generation Firewalls (NGFW) are the latest development, and organizations are accelerating adoption to the new technology. But NGFWs aren’t a fix-all solution.
Forrester’s Zero Trust Model of information security helps teams develop robust prevention, detection and incident response capabilities to protect their company's vital digital business ecosystem. This report will help security pros understand the technologies best suited to empowering and extending their Zero Trust initiatives and will detail how Forrester sees this model and framework growing and evolving.