|By Marketwired .||
|June 10, 2014 01:30 PM EDT||
OVERLAND PARK, KS -- (Marketwired) -- 06/10/14 -- FireMon, the leading provider of proactive security intelligence solutions, today announced its new Policy Optimizer module to help organizations rapidly improve network security device rules and policies in response to changing threats, emerging management challenges and evolving compliance requirements.
The Policy Optimizer module, used in concert with FireMon Security Manager, bridges a critical gap existing between today's network security teams and other involved officials -- including enterprise security management, line-of-business, audit/compliance and IT risk management -- enabling organizations to strengthen their overall security posture by quickly and effectively adapting network security device policies.
Leveraging Policy Optimizer, FireMon customers gain a centralized workflow approach for improving and reducing the complexity of device rules and policies by isolating and modifying any potentially problematic network access. By allowing network security teams to identify any problematic rules or policies, then partner directly with internal stakeholders to alter or eliminate risky access, significant benefits are appreciated, enterprise-wide.
Using traditional methods, initial business requirements for long-standing network access policies and associated rules are often infrequently reviewed and left in place for years, creating latent security gaps, vulnerability exposure and unseen risks. In addition to improving protection to prevent potential network compromise, many of today's enterprise organizations must maintain continuous compliance with industry standards including PCI DSS, requiring frequent and detailed recertification of all access management policies.
In a recent report conducted by the Ponemon Institute, and commissioned by FireMon, 60 percent of organizations surveyed indicated that they perform infrequent manual auditing of such access policies, or none at all. Policy Optimizer specifically addresses the issue of out-of-date or overly permissive rules. Using the module, network security teams identify problematic rules and validate their necessity with any relevant officials, including those teams that first requested the access in question -- greatly reducing overall policy complexity while ensuring that necessary defenses remain in place.
The FireMon Security Manager solutions platform provides comprehensive security intelligence to improve enforcement of network security infrastructure and drive strategic decisions based on current requirements. Policy Optimizer adds the ability to rapidly gather data and validate rule requests, as well as eliminate unneeded rules and make implemented rules more targeted, productive and effective -- maintaining the highest levels of security control.
Building on top of FireMon's existing, standards-based policy workflow engine, Policy Optimizer offers:
- Integrated business workflow that optimizes rules for access requirements, and aligns rules with security policies and controls with the ability to deploy multiple Business Process Model and Notation (BPMN) 2.0-compliant workflows.
- Automated rule recertification that monitors and maintains ongoing and/or audit event-driven justification reviews, as well as impact assessments for rule adjustment or retirement.
- Proactive guidance and enforceable accountability with the ability to automatically -- via direct integration with the FireMon Policy Planner module -- create change tickets for removable rules and invoke application-level recommendations, adding lists of relevant applications, and configuring workflow based on application and owner-based rule properties (i.e. destination, service).
- New workflow process and UI providing a business-driven rule/device management interface to better engage business stakeholders, improve performance and document processes for best-practices development.
"Disconnect between network security operations, IT management and audit/compliance professionals remains a huge gap in overall enterprise IT risk management," said Jody Brazil, president and CTO of FireMon. "Policy Optimizer is the first solution that actively addresses and automates what is today a very manual and fragmented process that ultimately leads to a large number of today's most severe data breaches. This highly strategic solutions module was developed with direct input from our largest and most sophisticated customers, and delivers pragmatic benefits and total ROI within mere months."
FireMon Policy Optimizer module is immediately available.
FireMon is the industry leader in proactive security intelligence solutions that deliver continuous control of infrastructure, policy and IT risk for federal agencies. The FireMon Security Intelligence Platform is a massively scalable, high-performance foundation for network risk analytics, change workflow automation, firewall rule base clean-up, compliance audit assessment and security operations for cost reduction. For more information, visit http://www.firemon.com.
For more information, please contact:
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 6, 2016 01:00 AM EST Reads: 1,842
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 6, 2016 12:45 AM EST Reads: 838
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Dec. 6, 2016 12:30 AM EST Reads: 3,884
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Dec. 6, 2016 12:30 AM EST Reads: 1,194
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Dec. 6, 2016 12:30 AM EST Reads: 4,580
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dec. 6, 2016 12:00 AM EST Reads: 879
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
Dec. 5, 2016 11:45 PM EST Reads: 4,299
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Dec. 5, 2016 10:45 PM EST Reads: 2,075
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 10:30 PM EST Reads: 1,056
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 10:30 PM EST Reads: 982
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
Dec. 5, 2016 09:00 PM EST Reads: 4,960
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
Dec. 5, 2016 08:45 PM EST Reads: 508
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Dec. 5, 2016 07:45 PM EST Reads: 2,229
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Dec. 5, 2016 07:45 PM EST Reads: 2,092
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Dec. 5, 2016 07:15 PM EST Reads: 403