3 Ways to Streamline Network Security Automation That Will Transform Your Organization

Network security automation uses machines to programmatically execute security tasks. Typically, network security automation is used to manage the low-complexity, high-volume aspects of detection, investigation, and mitigation. For instance, automation… Continue reading 3 Ways to Streamline Network Security Automation That Will Transform Your Organization

Network Security, Performance & Scalability | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the fourth: scale & perform. “Agil… Continue reading Network Security, Performance & Scalability | The 5 Critical Success Factors to Agile NSPM

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could only perform simple packet filtering. But ev… Continue reading Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the third: adapt to change.  Pillar #3… Continue reading Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM

Myth #2: Compliance Is Only Urgent When There’s an Audit

This is part 2 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read part #1 here.  Many organizations have adopted a passive compliance playbook. Since they don’t k… Continue reading Myth #2: Compliance Is Only Urgent When There’s an Audit

We Heard You. An Agile Approach to Managing Network Security Policy

Today we announced the industry’s first agile network security policy platform which marks both the delivery of core new features and a statement of our future direction. We believe these new features, along with a compelling roadmap, sets a new standa… Continue reading We Heard You. An Agile Approach to Managing Network Security Policy

Preventing Security Misconfigurations: Change Management and Compliance

It’s an enormous and unending daily challenge to make sure that changes to firewall policies are not just executed quickly and efficiently, but changes don’t decrease the security of your network. Changes – such as those made for an i… Continue reading Preventing Security Misconfigurations: Change Management and Compliance

Automating to Prevent Security Misconfigurations During and After a Crisis

Security Misconfigurations in the Pandemic – and What to Do About Them Change has never been a friend of network security. Neither has complication. Right now, we have too much of both. The Covid-19 pandemic has resulted in an unprecedented shift… Continue reading Automating to Prevent Security Misconfigurations During and After a Crisis

Automation and integration thwarts misconfiguration, staff burnout

Keeping pace with the rapid growth of the hybrid cloud growth is difficult for security professionals when everything’s done manually.   FireMon’s State of Hybrid Cloud Security Survey&… Continue reading Automation and integration thwarts misconfiguration, staff burnout

Partners power FireMon growth while guiding customers through security complexity

As a company fully focused on the channel to grow our customer base, FireMon’s partners, integrators, and distributors are an essential part of the security ecosystem — they help enterprises navigate … Continue reading Partners power FireMon growth while guiding customers through security complexity