How continuous monitoring protects complex environments by finding vulnerabilities

The Known Network How continuous monitoring protects complex environments by finding vulnerabilities as they occur Your network can be secure one minute and insecure the next. Firewall misconfigurations, policy conflicts, new intrusions, or other chang… Continue reading How continuous monitoring protects complex environments by finding vulnerabilities

3 Ways to Streamline Network Security Automation That Will Transform Your Organization

Network security automation uses machines to programmatically execute security tasks. Typically, network security automation is used to manage the low-complexity, high-volume aspects of detection, investigation, and mitigation. For instance, automation… Continue reading 3 Ways to Streamline Network Security Automation That Will Transform Your Organization

Network Security, Performance & Scalability | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the fourth: scale & perform. “Agil… Continue reading Network Security, Performance & Scalability | The 5 Critical Success Factors to Agile NSPM

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could only perform simple packet filtering. But ev… Continue reading Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Guide to Cloud Network Security Basics

What is cloud network security? Cloud network security is comprised by the policies, controls, products, and procedures that protect a cloud infrastructure, its data, and its systems. How to gain flexibility, scalability, and velocity in the cloud  Wha… Continue reading Guide to Cloud Network Security Basics

We Heard You. An Agile Approach to Managing Network Security Policy

Today we announced the industry’s first agile network security policy platform which marks both the delivery of core new features and a statement of our future direction. We believe these new features, along with a compelling roadmap, sets a new standa… Continue reading We Heard You. An Agile Approach to Managing Network Security Policy

Visibility and Control In the Public Cloud Is Possible – and it Must be Unified and Contextual

Anyone who works in enterprise technology has heard the joke that the cloud is just someone else’s computer. But if we’re being serious, there’s some logic to letting security professionals see cloud instances as just another com… Continue reading Visibility and Control In the Public Cloud Is Possible – and it Must be Unified and Contextual