Who is Firemon?

FireMon is the #1 security automation solution for hybrid cloud enterprises. FireMon delivers persistent network security for multi-cloud environments through a powerful fusion of real-time asset visibility, compliance and automation. Since creating the first-ever network security policy management solution, FireMon has delivered command and control over complex network security infrastructures for more than 1,700 customers located in nearly 70 countries around the world.

 

Customer Challanges

Network Security Automation

 

 

The path to digital transformation is paved with a sophisticated threat landscape, a security staffing shortage, emerging technologies, and the inability to keep up with business demands. See how automation can streamline your security workflows and boost your operational efficiency to drive innovation at the speed of business without sacrificing security.

FireMon Automation delivers a comprehensive blueprint for security process automation that accelerates and streamlines policy management through trusted accuracy, gold standards, and proactive continuous compliance.

 

Cloud Migration: Field-Tested, Cloud-Secured

 

 

 

 

 

Firewall Optimization & Security

 

 

 

Security Policy Change Management

 

 

Microsegmentation for Zero Trust Networks

 

Optimize Vulnerability Management


Patching vulnerabilities across a microsegmented network can be challenging. With FireMon, you can track behavior across your microsegmented network and trace the attack path from exposure to exploit to find and stop critical threats. Our attack path simulation shows you the compromise, so you can take action to shut down east-west traffic and quarantine network segments with automated policy change.

 

Achieve Continuous Compliance

Continuous compliance involves real-time audits and automated policy checks, but a microsegmentation approach can increase your security controls by 10,000%. How do you maintain compliance in a microsegmented network at all times? With our library of 350+ custom controls and automatic compliance checks, we cover every stitch of your microsegmented fabric so you’re always audit-ready.


Automate Security Orchestration

As the number of your security controls grows with a microsegmented network, you can command security policy into all of your microsegmented machines with FireMon. You’ll be able to automate your security policies from intent and design to implementation and decommissioning by orchestrating change management from a single FireMon console. All of your new segments will automatically be under control and secure.

Continuous Compliance

 

Firewall Cleanup

 

Eliminate Redundant Rules

Redundant or shadowed security rules can never match network traffic because a prior rule or a combination of earlier rules prevents traffic from ever hitting them. FireMon can help you eliminate duplicate or shadowed rules that adversely impact the performance of your devices and introduce unnecessary complexity into your network.

 

Remove Unused Rules and Objects

Unused rules have not matched any packet during a specified time and are typically caused by applications that have been decommissioned or relocated. Many unused rules that are active on your devices can significantly degrade their performance and can potentially introduce risk into your environment. FireMon can perform real-time analysis and provide an unlimited history for rule and object usage in a policy to help you easily identify unused rules to optimize your network devices for peak performance and reduce risk.


Minimize Excessive Access

Overly permissive rules typically contain large network ranges or ANY’s in the rule statements. Primary causes for excessive access include ineffective change management, lack of business requirements definition and lack of a rule “aging” strategy. Through our Traffic Flow Analysis feature, we can show unique traffic patterns that exist in a rule and report on what data is flowing across a broadly defined address range. We can replace the broadly defined access with a more correct and narrowly defined rule that will greatly enhance your hybrid network security posture.

 

Automate Rule Recertification

Analyzing and recertifying rules can be a time-intensive effort as you attempt to maintain compliance. Through automated, event-driven review and verification, FireMon can help you keep and recertify the rules that are still needed and those that need to be decommissioned. We also enhance your compliance audit efforts by keeping full documentation of every rule recertification and justification.


Optimize Security Policies

Your security controls can become outdated over time, potentially compromising compliance and increasing risk. FireMon can help you achieve significant performance improvements through rule consolidation and restructuring those that are top talkers. With a streamlined clean-up process, you can improve your security posture and achieve continuous compliance.

 

Network Compliance Reporting & Audit: A Life Hack for Audits


Tough as it may be, compliance is necessary to protect data and applications and to keep services running. The process of preparing for audits, however, can be a grind, time-intensive and painful to pull it all together. It usually takes weeks (or months), which means by the time you’re ready, everything has changed. The digital ink is barely dry before the details become obsolete.

 

The FireMon Difference

 

  • Real-Time Monitoring: Sub-second compliance checks, never push a non-compliant rule again
  • Full Data Retention: Your complete compliance and change history, at your fingertips
  • Customizable Search & Reporting: Get specific for your audit, you’re ready for anything
  • Automation & Orchestration: Automate checks and rule validation, never see compliance drift

 

Vulnerability Management

Attackers aren’t the only thing that can exploit vulnerabilities. Analyze and quantify your compliance risk in the light of your current vulnerabilities. Only FireMon shows you the patch priorities to ensure continuous compliance. By pairing compliance reporting with vulnerability checks, security teams can take the view of an auditor and take action when compliance drifts.

 

Continuous Compliance


It is tough to report compliance in real-time or satisfy auditors when networks turn on a dime. Avoid the headache with continuous compliance. FireMon’s compliance reporting consists of 350+ controls that can be applied to an unlimited number of assessments, saving you time to prepare for each audit. Real-time compliance checks make sure you’re always audit-ready.

 

Orchestration


Command security in the compliance mandates, giving you confidence that your rules are valid. Intelligent orchestration means every change request is tested against compliance and scored for risk to the network – both compliance and security risk. Automation ensures the right change happens in minutes instead of weeks.

Risk Mitigation

 

Attack Surface Reduction

 

The attack surface is the total space for exploit within the infrastructure. Enterprise infrastructures have a habit of moving and changing with little notice or control, making it nearly impossible to see what’s what. You can’t defend what you can’t see.

Those looking to snatch and grab your data hunt for your weaknesses. The only way to get ahead of a cybercriminal is to reduce the battlefield – the attack surface – vulnerable to exploit.

How does that happen?


The five major steps are:

  1. Visualize vulnerabilities
  2. Control the endpoints
  3. Segment, segment, segment
  4. Use analytics
  5. Prioritize threats according to accessibility


That’s a lot to manage. Staff and time come at a premium. With FireMon, you change the game.

FireMon is ready to reduce your attack surface, because only FireMon combines the powerful fusion of vulnerability management, continuous compliance and orchestration.

 

The FireMon Solution


Vulnerability Management

Patching at random is one “strategy,” but this accomplishes little. Quantify your risks with simulation and collapse your attack surface.

Attack simulation shows you the priorities based on accessibility. See the specific exposures in your network and simulate just how the attackers can exploit your weaknesses. Now that’s much more than random patching.


Continuous Compliance

The sprawling attack surface is a nightmare to prove compliance. While external threats are very real, so too is non-compliance.

Prevent a compliance failure by seeing the implications of rules and their potential shortfalls. Use 350+ security controls tailored to your environment and apply the right security policy for the right context.


Orchestration

Enterprises adopt Zero Trust and segmented networks to improve security. Manage security for 50,000 segments with ease and simplicity.

Once attack path simulation reveals the network’s exposures, orchestration changes network policy to regain control and prevent lateral movement. You’re in control; quarantine any portion of the network with security policies and stop any compromise from spreading.

 

The FireMon Difference

 

  • Real-Time Monitoring: Sub-second vulnerability and risk analysis, instant visibility of the attack surface
  • Full Data Retention: Comprehensive network history, revealing forgotten attack paths
  • Customizable Search & Reporting: Find exposures, quantify your risk, automate remediation
  • Automation & Orchestration: Context-aware priorities, change management that removes risk and potential threats

 

Risk Modelling

 

Calculate Network Reachability

Risk Analyzer allows you to see and manage your network’s risk posture in real-time. Risk Analyzer’s enterprise-ready architecture handles large, complex hybrid networks with tens of thousands of hosts and security results and can easily calculate an attacker’s potential accessibility to your network and assess the potential damage.

 

 

 

Simulate Potential Attacks

Risk Analyzer can trace possible paths attackers might use to gain access to your critical assets. With Risk Analyzer, you can determine where multiple exploits could be used in combination to penetrate your network. Using visual attack paths and zero-day attack graphs, you can assess an attack’s impact and prioritize patching accordingly or adapt device rules to reroute access to address the risk immediately.

 

Score Attack Simulations

Risk Analyzer can score all attack simulations for risk and impact and then re-score once you’ve made improvements to determine the impact changes. You can get a complete score of your network risk with a user dashboard that gives you real-time visibility of your risk posture by policy rule and asset.

 

Analyze “What If” Scenarios

Risk Analyzer enables you to virtually patch systems and repeat risk analysis to compare various patch scenarios to ensure the biggest impact on efforts. You can also determine where multiple exploits can be used in combination to reach an asset as well as assess any potential impact to other parts of your network.

 


Remediate Exposures

Risk Analyzer integrates with your vulnerability management solutions (Qualys, Rapid7 and Tenable) to measure risk and identify potential attack penetration in your network. By collecting and reporting on the real-time configurations of network access controls deployed on your network security devices, Risk Analyzer delivers accurate remediation recommendations so that you can prioritize and optimize your patch management strategy.

 

Network Visibility Monitoring

Lumeta is a real-time visibility, vulnerability, and risk management solution that enables cloud, network, and security teams to find and secure unknown, rogue and shadow clouds, network infrastructure, and endpoints.

 

Real-Time Situational Awareness

Gain real-time visibility into your dynamic infrastructure including cloud, virtual, physical, software-defined network infrastructure, endpoints, and operational technology (OT)/Internet of Things (IoT). With Lumeta, you can eliminate 100% of your blind spots and monitor changes or unusual behaviors to eliminate any gaps in coverage that may leave you exposed.


100% Hybrid Cloud Visibility

Lumeta discovers, maps and alerts on topology changes across the entire hybrid enterprise, including multi-cloud environments. Delivering a holistic view across all of your physical and virtual/cloud infrastructures, Lumeta CloudVisibility provides an authoritative perspective for your enterprise security operations center (SOC) to prioritize issues for remediation and ensure network protection.

 

Real-Time Breach Detection

Lumeta monitors the hybrid infrastructure for telltale signs of nefarious activity and prioritizes findings for investigation and remediation. With Lumeta, your threat intelligence feeds are made actionable to correlate a comprehensive understanding of your enterprise’s active IP address space against known threats as new threat data becomes available, and as new endpoints connect to the network.

 

Identify Leak Paths

Lumeta discovers and monitors every cloud account, network, path and endpoint for changes in real-time to identify new leak paths that are often due to misconfigurations or malicious activity. Lumeta finds inbound and outbound leak paths to the Internet, virtual private cloud, in between network-segmented, firewalled enclaves, or across IoT/OT environments.

 

Recursive Network Indexing


Lumeta uses a unique patent-pending technology to produce a comprehensive network summary that includes a recursively crawling cycle of targeting, indexing, tracing, monitoring, profiling, and displaying a network’s state. Through passive and active methods, you get a view of your entire infrastructure, including cloud instances and assets, as well as all IPv4/IPv6 connections and devices.

 

Threat & Vulnerability Management

 

Risk Vulnerability Management


Outside threats have the potential to scale the wall through any access point on the network. However, not all threats are created equal. If the asset is of high value, customer credit card info for example, its compromise would have a bigger impact than that of a lesser-value asset.


FireMon allows network and security teams to map the potential paths an attacker could take based on real-time configuration data and vulnerability scanner feeds. Then it helps prioritize the gaps for remediation, so the most impactful get taken care of first.

How It Is Done

  • Reachability analysis calculates how easy it would be for an attacker to reach assets through and assess the potential damage
  • Graphical attack paths trace the possible path an attacker might use and identifies where an attack can be stopped with the least amount of time and effort
  • Risk scoring measures attack simulations for risk and impact. Re-score once you make improvements to determine the impact of the change.
  • Patch simulation patches systems virtually so you can compare various patch scenarios to prioritize efforts to those with the biggest impact
  • Access path analysis traces all potential traffic paths, identifies problematic routes and then recommends adjustments to redirect access

Contacts

  +36 1 769 6371

contact@prianto.hu

Top