Get to know us better! Gain valuable insights into how we think by visiting our blog, or take a look at the industry events we're frequenting on our events page. You can also geek out with us by attending one of our security management webinars, or dive head first into the products and solutions we provide in our Resource Library. There's lots to keep you busy!
In Part 1, we built the case that SIEMs are ineffective for threat hunting, based on the following reasons:
To date, SIEM vendors have not provided the market with the functions needed for producing world-class threat hunting. Again, threat hunting is a method. In order to follow this method, we have to have tools that accelerate and amplify our human work, rather than using technologies that brush aside our method in favor of operating within their paradigm. Too many threat hunting programs are sputtering because we continue to believe that the method should conform to the technology, but that gets things backwards.
Threat hunting remains an undeveloped competency for far too many organizations. When surveyed, security professionals confess an overall lack of competency to detect and respond to advanced attacks that slip through their defenses. In my experience, many organizations still rely on alerts from a SIEM (among other prevention systems). Most security teams will painstakingly build models for indicators of compromise, receive alerts from their SIEM, and “do the best they can” to eliminate the intrusion. What are the results?
How do you know if your security posture is where it needs to be? Most organizations look at standards, be it national standards, industry standards or their own corporate standards. They may also look at their industry’s best practices. But if you aren’t looking at your risk vulnerability, you are likely not looking at the entire spectrum of your network’s security posture.
El nuevo paradigma de la automatización es la “Administración del Ciclo de Vida”
Te mostraremos cómo FireMon Intelligent Policy Automation utiliza la tecnología de automatización e inteligencia para reducir el esfuerzo e incrementar la eficacia en cada etapa del proceso de cambios.
OVERLAND PARK, KANSAS & DALLAS, TEXAS – April 18, 2017 – FireMon, the leader in Intelligent Security Management, today announced results from a survey conducted at the RSA Conference that assessed the views of 350 IT security professionals on the importance of firewalls in the battle to prevent data breaches. The poll found that 72% of respondents agreed that no matter how much money is spent on IT security, it is wasted if the firewalls are not configured properly. A further 52% had experienced a firewall configuration change that opened a potential security breach that caused business downtime.
“We often hear that ‘the firewall is dead’ and an array of security ‘solutions’ have cropped up in this wake, but it is clear from this study that is most definitely not the case,” said Michael Callahan, CMO, FireMon. ”In fact, no matter what security solutions an organization has in place, it means nothing if the firewalls aren’t managed correctly. The problem is compounded when you think about how many organizations have tens or even hundreds of firewalls as part of their security defences – all of which need to be configured. This creates a gap between the security environment complexity and the resources to manage it where mistakes are likely to occur and risk increases.”
FireMon believes the key to closing this gap is more effective management of security solutions, in a world where the consequences of having an insecure security system can be catastrophic, leaving enterprises vulnerable to an array of cyber threats, such as hackers, data breaches and Trojans, among others. In addition, business downtime or interruption costs can significantly impact trade and income, but the greatest cost can sometimes be reputational. Customers don’t want to be associated with a brand that puts their data at risk, which is why it is so important for security systems to be fully functioning and free from exploits.
“Incorporating robust, intelligent security management can greatly reduce all the complexity that surrounds the IT security infrastructure,” continued Callahan. “It can help identify specific weak points within the firewall and avert any potential breach within a system.”
“Importantly, for the majority of organizations that said they had experienced downtime due to a faulty firewall rule change, FireMon’s state of the art technology allows security managers to “preview” any changes made to the firewall, making it easier to preserve security. Enterprise defenses are only as good as the security systems behind them, and so integrating firewall tools should be an important part of any large enterprise’s security arsenal,” he concluded.
FireMon is the No.1 provider of Intelligent Security Management solutions worldwide, combining advanced benchmarking, simulation, and analysis to deliver next generation security intelligence. Since creating the first-ever network security management solution 15 years ago, FireMon solutions have continued to deliver visibility into and control over complex network security infrastructure, policies, and risk to over 1,500 customers around the world.
Using the FireMon Intelligent Security Management platform, today’s leading enterprise organizations, government agencies, and managed security providers have dramatically improved effectiveness of network defenses, accelerating business agility optimizing return on investment. For more information or a free 30-day trial, visit www.firemon.com.
UK: Beth Smith, firstname.lastname@example.org
US: Paula Brici, email@example.com
Helping Enterprise Security Teams Improve Resource Efficiency & Reduce Overall Risk Exposure
Firewall technology has come a long way since its initial, most rudimentary forms. Next-Generation Firewalls (NGFW) are the latest development, and organizations are accelerating adoption to the new technology. But NGFWs aren’t a fix-all solution.