Get to know us better! Gain valuable insights into how we think by visiting our blog, or take a look at the industry events we're frequenting on our events page. You can also geek out with us by attending one of our security management webinars, or dive head first into the products and solutions we provide in our Resource Library. There's lots to keep you busy!
Gartner has recently released its Magic Quadrant for Enterprise Network Firewalls. Many enterprises will be looking to this piece of research to inform their decisions with which technology to go with to meet their security requirements.
The MQ, on first glance, seems easy to decipher. It’s tempting for organizations to look at it and pick the vendor who is most “up and to the right,” namely in 2017 Check Point, Palo Alto Networks and Fortinet with Cisco close to crossing into the leader quadrant. But each has capabilities and drawbacks that earned them their placement. Though it’s not our intention to recommend one vendor over the other, it is important to get the right technology that is appropriate for your organization.
This week, a credit service in India called Creditseva suffered a data breach which exposed details of some 48,000 citizens – including driver’s licenses, home addresses and credit reports. The company was notified by Kromtech security researchers of the breach when they noticed the information on an insecure Amazon S3 bucket.
Vulnerability scanning has its place but I’ve often found that it produces a mountain of data with little guidance for prioritizing updates other than a relative high/medium/low risk rating of the exploit itself and of the device’s value.
El nuevo paradigma de la automatización es la “Administración del Ciclo de Vida”
Te mostraremos cómo FireMon Intelligent Policy Automation utiliza la tecnología de automatización e inteligencia para reducir el esfuerzo e incrementar la eficacia en cada etapa del proceso de cambios.
Allows Organizations to Easily Evolve Policies to Address Rapidly Changing Conditions
OVERLAND PARK, Kan., June 10, 2014
FireMon, the leading provider of proactive security intelligence solutions, today announced its new Policy Optimizer module to help organizations rapidly improve network security device rules and policies in response to changing threats, emerging management challenges and evolving compliance requirements.
The Policy Optimizer module, used in concert with FireMon Security Manager, bridges a critical gap existing between today’s network security teams and other involved officials – including enterprise security management, line-of-business, audit/compliance and IT risk management – enabling organizations to strengthen their overall security posture by quickly and effectively adapting network security device policies.
Leveraging Policy Optimizer, FireMon customers gain a centralized workflow approach for improving and reducing the complexity of device rules and policies by isolating and modifying any potentially problematic network access. By allowing network security teams to identify any problematic rules or policies, then partner directly with internal stakeholders to alter or eliminate risky access, significant benefits are appreciated, enterprise-wide.
Using traditional methods, initial business requirements for long-standing network access policies and associated rules are often infrequently reviewed and left in place for years, creating latent security gaps, vulnerability exposure and unseen risks. In addition to improving protection to prevent potential network compromise, many of today’s enterprise organizations must maintain continuous compliance with industry standards including PCI DSS, requiring frequent and detailed recertification of all access management policies.
“Effective network perimeter and zoning architectures are often dependent on a complex set of access control rules enforced by a heterogeneous mix of network and network security devices,” reports analyst firm Gartner in “How to Assess Risk and Monitor Compliance of Network Security Policies” by Phil Schacter on June 26, 2013. “Tools that enable network security controls to be managed to reduce overall risk, improve compliance and operate more efficiently should be considered as an essential capability for both network security operations and security and risk management groups.”
In a recent report conducted by the Ponemon Institute, and commissioned by FireMon, 60 percent of organizations surveyed indicated that they perform infrequent manual auditing of such access policies, or none at all. Policy Optimizer specifically addresses the issue of out-of-date or overly permissive rules. Using the module, network security teams identify problematic rules and validate their necessity with any relevant officials, including those teams that first requested the access in question – greatly reducing overall policy complexity while ensuring that necessary defenses remain in place.
The FireMon Security Intelligence Platform provides comprehensive security intelligence to improve enforcement of network security infrastructure and drive strategic decisions based on current requirements. Policy Optimizer adds the ability to rapidly gather data and validate rule requests, as well as eliminate unneeded rules and make implemented rules more targeted, productive and effective – maintaining the highest levels of security control.
Building on top of FireMon’s existing, standards-based policy workflow engine, Policy Optimizer offers:
Integrated business workflow that optimizes rules for access requirements, and aligns rules with security policies and controls with the ability to deploy multiple Business Process Model and Notation (BPMN) 2.0-compliant workflows.
“Disconnect between network security operations, IT management and audit/compliance professionals remains a huge gap in overall enterprise IT risk management,” said Jody Brazil, president and CTO of FireMon. “Policy Optimizer is the first solution that actively addresses and automates what is today a very manual and fragmented process that ultimately leads to a large number of today’s most severe data breaches. This highly strategic solutions module was developed with direct input from our largest and most sophisticated customers, and delivers pragmatic benefits and total ROI within mere months.”
FireMon Policy Optimizer module is immediately available.
FireMon is the industry leader in proactive security intelligence solutions that deliver continuous control of infrastructure, policy and IT risk for federal agencies. The FireMon Security Intelligence Platform is a massively scalable, high-performance foundation for network risk analytics, change workflow automation, firewall rule base clean-up, compliance audit assessment and security operations for cost reduction. For more information, visit http://www.firemon.com.
FireMon’s Intelligent Security Management platform enables users with Cisco Systems switches, routers and firewalls (Pix, ASA, FirePower) to work smarter, applying intelligence to the entire security program
Helping Enterprise Security Teams Improve Resource Efficiency & Reduce Overall Risk Exposure
Firewall technology has come a long way since its initial, most rudimentary forms. Next-Generation Firewalls (NGFW) are the latest development, and organizations are accelerating adoption to the new technology. But NGFWs aren’t a fix-all solution.