Get to know us better! Gain valuable insights into how we think by visiting our blog, or take a look at the industry events we're frequenting on our events page. You can also geek out with us by attending one of our security management webinars, or dive head first into the products and solutions we provide in our Resource Library. There's lots to keep you busy!
Many threat investigations begin with responders working to understand possible threat vectors on the network that could explain malicious activity. One powerful way to improve the efficiency of our responders is to help them understand the network attack surface as configured attack paths that represent potential exploit paths.On Sept 21st we’ll share how FireMon’s Risk Analyzer and Immediate Insight products bring together threat investigation and attack path analysis to accelerate incident response and threat detection.
Vulnerability scanning has its place but I’ve often found that it produces a mountain of data with little guidance for prioritizing updates other than a relative high/medium/low risk rating of the exploit itself and of the device’s value.
Allows Organizations to Easily Evolve Policies to Address Rapidly Changing Conditions
OVERLAND PARK, Kan., June 10, 2014
FireMon, the leading provider of proactive security intelligence solutions, today announced its new Policy Optimizer module to help organizations rapidly improve network security device rules and policies in response to changing threats, emerging management challenges and evolving compliance requirements.
The Policy Optimizer module, used in concert with FireMon Security Manager, bridges a critical gap existing between today’s network security teams and other involved officials – including enterprise security management, line-of-business, audit/compliance and IT risk management – enabling organizations to strengthen their overall security posture by quickly and effectively adapting network security device policies.
Leveraging Policy Optimizer, FireMon customers gain a centralized workflow approach for improving and reducing the complexity of device rules and policies by isolating and modifying any potentially problematic network access. By allowing network security teams to identify any problematic rules or policies, then partner directly with internal stakeholders to alter or eliminate risky access, significant benefits are appreciated, enterprise-wide.
Using traditional methods, initial business requirements for long-standing network access policies and associated rules are often infrequently reviewed and left in place for years, creating latent security gaps, vulnerability exposure and unseen risks. In addition to improving protection to prevent potential network compromise, many of today’s enterprise organizations must maintain continuous compliance with industry standards including PCI DSS, requiring frequent and detailed recertification of all access management policies.
“Effective network perimeter and zoning architectures are often dependent on a complex set of access control rules enforced by a heterogeneous mix of network and network security devices,” reports analyst firm Gartner in “How to Assess Risk and Monitor Compliance of Network Security Policies” by Phil Schacter on June 26, 2013. “Tools that enable network security controls to be managed to reduce overall risk, improve compliance and operate more efficiently should be considered as an essential capability for both network security operations and security and risk management groups.”
In a recent report conducted by the Ponemon Institute, and commissioned by FireMon, 60 percent of organizations surveyed indicated that they perform infrequent manual auditing of such access policies, or none at all. Policy Optimizer specifically addresses the issue of out-of-date or overly permissive rules. Using the module, network security teams identify problematic rules and validate their necessity with any relevant officials, including those teams that first requested the access in question – greatly reducing overall policy complexity while ensuring that necessary defenses remain in place.
The FireMon Security Intelligence Platform provides comprehensive security intelligence to improve enforcement of network security infrastructure and drive strategic decisions based on current requirements. Policy Optimizer adds the ability to rapidly gather data and validate rule requests, as well as eliminate unneeded rules and make implemented rules more targeted, productive and effective – maintaining the highest levels of security control.
Building on top of FireMon’s existing, standards-based policy workflow engine, Policy Optimizer offers:
Integrated business workflow that optimizes rules for access requirements, and aligns rules with security policies and controls with the ability to deploy multiple Business Process Model and Notation (BPMN) 2.0-compliant workflows.
“Disconnect between network security operations, IT management and audit/compliance professionals remains a huge gap in overall enterprise IT risk management,” said Jody Brazil, president and CTO of FireMon. “Policy Optimizer is the first solution that actively addresses and automates what is today a very manual and fragmented process that ultimately leads to a large number of today’s most severe data breaches. This highly strategic solutions module was developed with direct input from our largest and most sophisticated customers, and delivers pragmatic benefits and total ROI within mere months.”
FireMon Policy Optimizer module is immediately available.
FireMon is the industry leader in proactive security intelligence solutions that deliver continuous control of infrastructure, policy and IT risk for federal agencies. The FireMon Security Intelligence Platform is a massively scalable, high-performance foundation for network risk analytics, change workflow automation, firewall rule base clean-up, compliance audit assessment and security operations for cost reduction. For more information, visit http://www.firemon.com.
FireMon’s Intelligent Security Management platform enables users with Cisco Systems switches, routers and firewalls (Pix, ASA, FirePower) to work smarter, applying intelligence to the entire security program
Helping Enterprise Security Teams Improve Resource Efficiency & Reduce Overall Risk Exposure
Firewall technology has come a long way since its initial, most rudimentary forms. Next-Generation Firewalls (NGFW) are the latest development, and organizations are accelerating adoption to the new technology. But NGFWs aren’t a fix-all solution.