|By Marketwired .||
|June 10, 2014 01:30 PM EDT||
OVERLAND PARK, KS -- (Marketwired) -- 06/10/14 -- FireMon, the leading provider of proactive security intelligence solutions, today announced its new Policy Optimizer module to help organizations rapidly improve network security device rules and policies in response to changing threats, emerging management challenges and evolving compliance requirements.
The Policy Optimizer module, used in concert with FireMon Security Manager, bridges a critical gap existing between today's network security teams and other involved officials -- including enterprise security management, line-of-business, audit/compliance and IT risk management -- enabling organizations to strengthen their overall security posture by quickly and effectively adapting network security device policies.
Leveraging Policy Optimizer, FireMon customers gain a centralized workflow approach for improving and reducing the complexity of device rules and policies by isolating and modifying any potentially problematic network access. By allowing network security teams to identify any problematic rules or policies, then partner directly with internal stakeholders to alter or eliminate risky access, significant benefits are appreciated, enterprise-wide.
Using traditional methods, initial business requirements for long-standing network access policies and associated rules are often infrequently reviewed and left in place for years, creating latent security gaps, vulnerability exposure and unseen risks. In addition to improving protection to prevent potential network compromise, many of today's enterprise organizations must maintain continuous compliance with industry standards including PCI DSS, requiring frequent and detailed recertification of all access management policies.
In a recent report conducted by the Ponemon Institute, and commissioned by FireMon, 60 percent of organizations surveyed indicated that they perform infrequent manual auditing of such access policies, or none at all. Policy Optimizer specifically addresses the issue of out-of-date or overly permissive rules. Using the module, network security teams identify problematic rules and validate their necessity with any relevant officials, including those teams that first requested the access in question -- greatly reducing overall policy complexity while ensuring that necessary defenses remain in place.
The FireMon Security Manager solutions platform provides comprehensive security intelligence to improve enforcement of network security infrastructure and drive strategic decisions based on current requirements. Policy Optimizer adds the ability to rapidly gather data and validate rule requests, as well as eliminate unneeded rules and make implemented rules more targeted, productive and effective -- maintaining the highest levels of security control.
Building on top of FireMon's existing, standards-based policy workflow engine, Policy Optimizer offers:
- Integrated business workflow that optimizes rules for access requirements, and aligns rules with security policies and controls with the ability to deploy multiple Business Process Model and Notation (BPMN) 2.0-compliant workflows.
- Automated rule recertification that monitors and maintains ongoing and/or audit event-driven justification reviews, as well as impact assessments for rule adjustment or retirement.
- Proactive guidance and enforceable accountability with the ability to automatically -- via direct integration with the FireMon Policy Planner module -- create change tickets for removable rules and invoke application-level recommendations, adding lists of relevant applications, and configuring workflow based on application and owner-based rule properties (i.e. destination, service).
- New workflow process and UI providing a business-driven rule/device management interface to better engage business stakeholders, improve performance and document processes for best-practices development.
"Disconnect between network security operations, IT management and audit/compliance professionals remains a huge gap in overall enterprise IT risk management," said Jody Brazil, president and CTO of FireMon. "Policy Optimizer is the first solution that actively addresses and automates what is today a very manual and fragmented process that ultimately leads to a large number of today's most severe data breaches. This highly strategic solutions module was developed with direct input from our largest and most sophisticated customers, and delivers pragmatic benefits and total ROI within mere months."
FireMon Policy Optimizer module is immediately available.
FireMon is the industry leader in proactive security intelligence solutions that deliver continuous control of infrastructure, policy and IT risk for federal agencies. The FireMon Security Intelligence Platform is a massively scalable, high-performance foundation for network risk analytics, change workflow automation, firewall rule base clean-up, compliance audit assessment and security operations for cost reduction. For more information, visit http://www.firemon.com.
For more information, please contact:
Jul. 7, 2015 12:30 PM EDT Reads: 1,915
Jul. 7, 2015 12:30 PM EDT Reads: 2,175
Jul. 7, 2015 12:15 PM EDT Reads: 1,946
Jul. 7, 2015 12:15 PM EDT Reads: 2,397
Jul. 7, 2015 12:15 PM EDT Reads: 1,352
Jul. 7, 2015 12:00 PM EDT Reads: 1,611
Jul. 7, 2015 12:00 PM EDT Reads: 1,963
Jul. 7, 2015 12:00 PM EDT Reads: 2,213
Jul. 7, 2015 12:00 PM EDT Reads: 1,648
Jul. 7, 2015 11:45 AM EDT Reads: 2,762
Jul. 7, 2015 11:30 AM EDT Reads: 1,913
Jul. 7, 2015 11:15 AM EDT Reads: 1,835
Jul. 7, 2015 11:15 AM EDT Reads: 1,745
Jul. 7, 2015 11:15 AM EDT Reads: 451
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
Jul. 7, 2015 11:00 AM EDT Reads: 2,468