Get to know us better! Gain valuable insights into how we think by visiting our blog, or take a look at the industry events we're frequenting on our events page. You can also geek out with us by attending one of our security management webinars, or dive head first into the products and solutions we provide in our Resource Library. There's lots to keep you busy!
When it comes to cloud security, consistency is everything – your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.
Cloud security breaches have not been the result of brilliant criminal masterminds. Rather, they have been the result of self-inflicted errors that are often caused by faulty migration and deployment practices – particularly when the right security personnel are excluded from the process.
New framework outlines specific steps and technologies enterprises should adopt to achieve a Zero Trust strategy.
OVERLAND PARK, KS and DALLAS, TX – (JAN 30, 2018) – FireMon announced today that Forrester Research, recognized FireMon in a snapshot of notable vendors for Zero Trust Platforms in The Zero Trust eXtended (ZTX) Ecosystem, published January 19, 2018.
Zero Trust is an architectural conceptual model developed by Forrester Research that recommends how companies should redesign networks into “secure microperimeters.” In addition, they recommend that security teams “adopt a least privilege strategy and strictly enforce access control.”*
“Zero Trust has become one of the key strategies for many CISOs who face increasing insider threats and the continued erosion of the perimeter,” said Jeremy Martin, SVP of Engineering at FireMon. “We’ve seen that the operational management of the security infrastructure becomes even more critical in a network implementing Zero Trust, and we are proud to see that Forrester has recognized us in this report, and we believe it is attributable to the work we’ve done in preparing our technology to fit at the highest platform level.”
The author of the ZTX report, Dr. Chase Cunningham, outlines the technologies best suited to “empowering and extending” Zero Trust initiatives. In a blog announcing the report, Cunningham explains the goal of ZTX, “Eventually a user will be able to reference this architecture and framework to specifically and succinctly determine which technical solutions from which vendors will enable their Zero Trust strategic goals…”
As Zero Trust architectures are more widely adopted, enterprises must maintain control of more finely grained networks. FireMon’s centralized management console gives security teams one place to manage the policies and rules that govern Zero Trust across the global network. It is the only configuration auditing solution** to also be listed as a Zero Trust platform in the eXtended Ecosystem report.
According to Forrester, to be a Zero Trust platform, vendors must:
In addition to being named a Zero Trust platform vendor, FireMon was also included in the lists of security automation and orchestration, security visibility and analytics and network segmentation vendors.
“We are excited to see Forrester’s recognition of our unique platform for Zero Trust,” said Satin H. Mirchandani, Chief Executive Officer at FireMon. “As enterprises move toward Zero Trust, they require a platform that brings together vulnerability management, continuous compliance and security orchestration. We are delighted to be the only vendor able to deliver on all three essentials.”
Cunningham states in the report that the most capable players have “well-documented APIs that are readily available for development and integration.” Adding, “APIs must enable control and management of systems that don’t necessarily live in your organization’s infrastructure. These tools and systems enable real-time command and control of a wide variety of assets.”
Extensive APIs and far-reaching technology integrations provide enterprises with a single console to enforce security across splintering networks. In 2017, one FireMon customer was making 120k API calls per day, resulting in deeper integration and adoption of firewall analysis and reporting across IT teams and systems.
“Managing a Zero Trust environment becomes a challenge as rulebases expand and thousands of segments become the norm,” said Matt Dean, Vice President of Product Management at FireMon. “That’s why enterprises choose FireMon’s platform which delivers the necessary scalability and real-time visibility to support Zero Trust – all driven by robust APIs and airtight integrations.”
As Cunningham writes in the Forrester report, “any vendor or technology worth their salt will have advanced API integration…If your selected technology doesn’t have solid APIs to use, find a vendor that does.”
*No More Chewy Centers: The Zero Trust Model Of Information Security, March 2016
**TechRadar™: Zero Trust Network Threat Mitigation Technologies, Q4 2016
FireMon delivers continuous security through a fusion of vulnerability management, continuous compliance and security orchestration, helping to improve security operations and reduce the attack surface for 1,500+ global, hybrid enterprises. Learn more at www.firemon.com.
Whether you’re monitoring 100 devices or 15,000, on one continent or around the world, we offer a FM appliance with the power and storage capacity to deliver FireMon’s high-performance, highly scalable firewall management and risk analysis solutions.
FireMon’s Intelligent Security Management platform enables users with Cisco Systems switches, routers and firewalls (Pix, ASA, FirePower) to work smarter, applying intelligence to the entire security program
FireMon helps organizations move towards Zero Trust by providing:
Reduce your attack surface with a Security Policy Orchestration and Automation solution like FireMon.
Larger attack surface means more opportunities for cybercriminals to do harm. Learn how FireMon can help you remove exposures before they become exploited.
Migrations run the risk of cost overrun, delays and disruption of network service - often due to a lack of personnel and process to efficiently and effectively manage. To ensure a successful migration, consider these four key factors: 1) identifying and removing technical mistakes, 2) removing unused access, 3) refining and organizing what remains and 4) continuous, real-time monitoring.
Helping Enterprise Security Teams Improve Resource Efficiency & Reduce Overall Risk Exposure
Firewall technology has come a long way since its initial, most rudimentary forms. Next-Generation Firewalls (NGFW) are the latest development, and organizations are accelerating adoption to the new technology. But NGFWs aren’t a fix-all solution.
Forrester’s Zero Trust Model of information security helps teams develop robust prevention, detection and incident response capabilities to protect their company's vital digital business ecosystem. This report will help security pros understand the technologies best suited to empowering and extending their Zero Trust initiatives and will detail how Forrester sees this model and framework growing and evolving.