Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



FireMon has been at the forefront of the security management category, delivering first-ever functionality such as firewall behavior testing, workflow integration, traffic flow analysis and rule recertification. Our solutions have helped more than 1,700 organizations around the world gain visibility into and control over their complex network security infrastructures.

Our Website:

Latest Content From FireMon

E-Book: Security Automation 101: Change Management and the Complexity Gap

by FireMonOct 16, 2019

Today's threat landscape is constantly evolving. Sophisticated cyber threats are becoming smarter and faster, leading to an increase in security breaches and unprecedented fines for noncompliance. Simultaneously, organizations are rushing to embrace digital transformation, driven by emerging technologies like mobility, cloud computing, large-scale virtualization, software defined networking, and the hyper connected Internet of Things. Yet, organizations worldwide face an inability to hire and retain skilled security professionals, putting additional strain on lean security teams and increasing their security risk.

The result is a complexity gap where emerging network and cloud technologies outpace security teams' ability to secure and manage their expanding enterprise perimeters. Organizations find themselves at a crossroads &emdash; they must ensure that security doesn't slow down innovation and that innovation doesn't compromise security. Closing the complexity gap at scale requires automation of network security functions to replace manual, error-prone processes, maintain regulatory and internal compliance, and reduce overall security risk. This will increase the efficiency and efficacy of security teams, drive business innovation, and improve the bottom line.

This eBook describes how the complexity gap is impacting organizations and the pivotal role network security policy automation plays in helping organizations reduce risk and enhance their overall security posture.

Whitepaper: 5 Steps to Keep Network Security Enforcement Points Secure and Up-To-Date

by FireMonOct 16, 2019

A basic truth in network security is that it's never static. Changes in the network, applications, business strategy, cyberattack vectors and methods, and even the security technologies used all impact your network security configuration. The goal is always to reduce the potential threat surface to as close to zero as is possible, which means you must constantly update firewall rues as you deploy, move, or retire workloads, allowing necessary access but nothing more.

In principal, your network security should aim to limit the number of ways workloads can communicate while still allowing them to properly function. Security models such as Least Privilege or Zero Trust take the default stance of reducing access down to bare bones -- opening access based only on business need -- and reflect this in firewall rules. Technologies like microsegmentation can assist with this restricted form of access, but you want to have the same limitations in play for both virtual and physical network devices.

Ensuring policy consistency requires having detailed context around who needs to talk to who, where they are coming from, what they need access to, over what ports, etc. These details help to create enforceable points necessary to keep the organization both secure and productive.

So, where should you start?

In this whitepaper, we'll discuss five steps you can take to understand the current state of your network connections and ensure that the enforcement points designed to protect the environment remain up-to-date and carried out.