Get to know us better! Gain valuable insights into how we think by visiting our blog, or take a look at the industry events we're frequenting on our events page. You can also geek out with us by attending one of our security management webinars, or dive head first into the products and solutions we provide in our Resource Library. There's lots to keep you busy!
Join David Monahan, managing research director at leading IT analyst firm Enterprise Management Associates (EMA), and discover the difference between organizations using an SPOA solution to manage their firewall environments versus those not using one of these solutions.
Allows Organizations to Easily Evolve Policies to Address Rapidly Changing Conditions
OVERLAND PARK, Kan., June 10, 2014
FireMon, the leading provider of proactive security intelligence solutions, today announced its new Policy Optimizer module to help organizations rapidly improve network security device rules and policies in response to changing threats, emerging management challenges and evolving compliance requirements.
The Policy Optimizer module, used in concert with FireMon Security Manager, bridges a critical gap existing between today’s network security teams and other involved officials – including enterprise security management, line-of-business, audit/compliance and IT risk management – enabling organizations to strengthen their overall security posture by quickly and effectively adapting network security device policies.
Leveraging Policy Optimizer, FireMon customers gain a centralized workflow approach for improving and reducing the complexity of device rules and policies by isolating and modifying any potentially problematic network access. By allowing network security teams to identify any problematic rules or policies, then partner directly with internal stakeholders to alter or eliminate risky access, significant benefits are appreciated, enterprise-wide.
Using traditional methods, initial business requirements for long-standing network access policies and associated rules are often infrequently reviewed and left in place for years, creating latent security gaps, vulnerability exposure and unseen risks. In addition to improving protection to prevent potential network compromise, many of today’s enterprise organizations must maintain continuous compliance with industry standards including PCI DSS, requiring frequent and detailed recertification of all access management policies.
“Effective network perimeter and zoning architectures are often dependent on a complex set of access control rules enforced by a heterogeneous mix of network and network security devices,” reports analyst firm Gartner in “How to Assess Risk and Monitor Compliance of Network Security Policies” by Phil Schacter on June 26, 2013. “Tools that enable network security controls to be managed to reduce overall risk, improve compliance and operate more efficiently should be considered as an essential capability for both network security operations and security and risk management groups.”
In a recent report conducted by the Ponemon Institute, and commissioned by FireMon, 60 percent of organizations surveyed indicated that they perform infrequent manual auditing of such access policies, or none at all. Policy Optimizer specifically addresses the issue of out-of-date or overly permissive rules. Using the module, network security teams identify problematic rules and validate their necessity with any relevant officials, including those teams that first requested the access in question – greatly reducing overall policy complexity while ensuring that necessary defenses remain in place.
The FireMon Security Intelligence Platform provides comprehensive security intelligence to improve enforcement of network security infrastructure and drive strategic decisions based on current requirements. Policy Optimizer adds the ability to rapidly gather data and validate rule requests, as well as eliminate unneeded rules and make implemented rules more targeted, productive and effective – maintaining the highest levels of security control.
Building on top of FireMon’s existing, standards-based policy workflow engine, Policy Optimizer offers:
Integrated business workflow that optimizes rules for access requirements, and aligns rules with security policies and controls with the ability to deploy multiple Business Process Model and Notation (BPMN) 2.0-compliant workflows.
“Disconnect between network security operations, IT management and audit/compliance professionals remains a huge gap in overall enterprise IT risk management,” said Jody Brazil, president and CTO of FireMon. “Policy Optimizer is the first solution that actively addresses and automates what is today a very manual and fragmented process that ultimately leads to a large number of today’s most severe data breaches. This highly strategic solutions module was developed with direct input from our largest and most sophisticated customers, and delivers pragmatic benefits and total ROI within mere months.”
FireMon Policy Optimizer module is immediately available.
FireMon is the industry leader in proactive security intelligence solutions that deliver continuous control of infrastructure, policy and IT risk for federal agencies. The FireMon Security Intelligence Platform is a massively scalable, high-performance foundation for network risk analytics, change workflow automation, firewall rule base clean-up, compliance audit assessment and security operations for cost reduction. For more information, visit https://www.firemon.com.
FireMon’s Intelligent Security Management platform enables users with Cisco Systems switches, routers and firewalls (Pix, ASA, FirePower) to work smarter, applying intelligence to the entire security program
Cloud technology gives enterprises faster application deployment, instant storage, workload versatility and pricing models that decrease initial capital investment. It is no wonder enterprises are making the move to the cloud.
FireMon helps organizations move towards Zero Trust by providing:
Reduce your attack surface with a Security Policy Orchestration and Automation solution like FireMon.
Larger attack surface means more opportunities for cybercriminals to do harm. Learn how FireMon can help you remove exposures before they become exploited.
Migrations run the risk of cost overrun, delays and disruption of network service - often due to a lack of personnel and process to efficiently and effectively manage. To ensure a successful migration, consider these four key factors: 1) identifying and removing technical mistakes, 2) removing unused access, 3) refining and organizing what remains and 4) continuous, real-time monitoring.
Helping Enterprise Security Teams Improve Resource Efficiency & Reduce Overall Risk Exposure
Firewall technology has come a long way since its initial, most rudimentary forms. Next-Generation Firewalls (NGFW) are the latest development, and organizations are accelerating adoption to the new technology. But NGFWs aren’t a fix-all solution.
Forrester’s Zero Trust Model of information security helps teams develop robust prevention, detection and incident response capabilities to protect their company's vital digital business ecosystem. This report will help security pros understand the technologies best suited to empowering and extending their Zero Trust initiatives and will detail how Forrester sees this model and framework growing and evolving.