Welcome!

News Feed Item

New FireMon Policy Optimizer Closes Costly "Access Gap" for Enterprises, Federal Agencies and MSSPs

Allows Organizations to Easily Evolve Policies to Address Rapidly Changing Conditions

OVERLAND PARK, KS -- (Marketwired) -- 06/10/14 -- FireMon, the leading provider of proactive security intelligence solutions, today announced its new Policy Optimizer module to help organizations rapidly improve network security device rules and policies in response to changing threats, emerging management challenges and evolving compliance requirements.

The Policy Optimizer module, used in concert with FireMon Security Manager, bridges a critical gap existing between today's network security teams and other involved officials -- including enterprise security management, line-of-business, audit/compliance and IT risk management -- enabling organizations to strengthen their overall security posture by quickly and effectively adapting network security device policies.

Leveraging Policy Optimizer, FireMon customers gain a centralized workflow approach for improving and reducing the complexity of device rules and policies by isolating and modifying any potentially problematic network access. By allowing network security teams to identify any problematic rules or policies, then partner directly with internal stakeholders to alter or eliminate risky access, significant benefits are appreciated, enterprise-wide.

Using traditional methods, initial business requirements for long-standing network access policies and associated rules are often infrequently reviewed and left in place for years, creating latent security gaps, vulnerability exposure and unseen risks. In addition to improving protection to prevent potential network compromise, many of today's enterprise organizations must maintain continuous compliance with industry standards including PCI DSS, requiring frequent and detailed recertification of all access management policies.

In a recent report conducted by the Ponemon Institute, and commissioned by FireMon, 60 percent of organizations surveyed indicated that they perform infrequent manual auditing of such access policies, or none at all. Policy Optimizer specifically addresses the issue of out-of-date or overly permissive rules. Using the module, network security teams identify problematic rules and validate their necessity with any relevant officials, including those teams that first requested the access in question -- greatly reducing overall policy complexity while ensuring that necessary defenses remain in place.

The FireMon Security Manager solutions platform provides comprehensive security intelligence to improve enforcement of network security infrastructure and drive strategic decisions based on current requirements. Policy Optimizer adds the ability to rapidly gather data and validate rule requests, as well as eliminate unneeded rules and make implemented rules more targeted, productive and effective -- maintaining the highest levels of security control.

Building on top of FireMon's existing, standards-based policy workflow engine, Policy Optimizer offers:

  • Integrated business workflow that optimizes rules for access requirements, and aligns rules with security policies and controls with the ability to deploy multiple Business Process Model and Notation (BPMN) 2.0-compliant workflows.
  • Automated rule recertification that monitors and maintains ongoing and/or audit event-driven justification reviews, as well as impact assessments for rule adjustment or retirement.
  • Proactive guidance and enforceable accountability with the ability to automatically -- via direct integration with the FireMon Policy Planner module -- create change tickets for removable rules and invoke application-level recommendations, adding lists of relevant applications, and configuring workflow based on application and owner-based rule properties (i.e. destination, service).
  • New workflow process and UI providing a business-driven rule/device management interface to better engage business stakeholders, improve performance and document processes for best-practices development.

"Disconnect between network security operations, IT management and audit/compliance professionals remains a huge gap in overall enterprise IT risk management," said Jody Brazil, president and CTO of FireMon. "Policy Optimizer is the first solution that actively addresses and automates what is today a very manual and fragmented process that ultimately leads to a large number of today's most severe data breaches. This highly strategic solutions module was developed with direct input from our largest and most sophisticated customers, and delivers pragmatic benefits and total ROI within mere months."

FireMon Policy Optimizer module is immediately available.

About FireMon
FireMon is the industry leader in proactive security intelligence solutions that deliver continuous control of infrastructure, policy and IT risk for federal agencies. The FireMon Security Intelligence Platform is a massively scalable, high-performance foundation for network risk analytics, change workflow automation, firewall rule base clean-up, compliance audit assessment and security operations for cost reduction. For more information, visit http://www.firemon.com.

For more information, please contact:
Nick Rossetti
CHEN PR
781-672-3141
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors!
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...