SYS-CON MEDIA Authors: Pat Romanski, Elizabeth White, Glenn Rossman, Cynthia Dunlop, Peter Silva

News Feed Item

New FireMon Policy Optimizer Closes Costly "Access Gap" for Enterprises, Federal Agencies and MSSPs

Allows Organizations to Easily Evolve Policies to Address Rapidly Changing Conditions

OVERLAND PARK, KS -- (Marketwired) -- 06/10/14 -- FireMon, the leading provider of proactive security intelligence solutions, today announced its new Policy Optimizer module to help organizations rapidly improve network security device rules and policies in response to changing threats, emerging management challenges and evolving compliance requirements.

The Policy Optimizer module, used in concert with FireMon Security Manager, bridges a critical gap existing between today's network security teams and other involved officials -- including enterprise security management, line-of-business, audit/compliance and IT risk management -- enabling organizations to strengthen their overall security posture by quickly and effectively adapting network security device policies.

Leveraging Policy Optimizer, FireMon customers gain a centralized workflow approach for improving and reducing the complexity of device rules and policies by isolating and modifying any potentially problematic network access. By allowing network security teams to identify any problematic rules or policies, then partner directly with internal stakeholders to alter or eliminate risky access, significant benefits are appreciated, enterprise-wide.

Using traditional methods, initial business requirements for long-standing network access policies and associated rules are often infrequently reviewed and left in place for years, creating latent security gaps, vulnerability exposure and unseen risks. In addition to improving protection to prevent potential network compromise, many of today's enterprise organizations must maintain continuous compliance with industry standards including PCI DSS, requiring frequent and detailed recertification of all access management policies.

In a recent report conducted by the Ponemon Institute, and commissioned by FireMon, 60 percent of organizations surveyed indicated that they perform infrequent manual auditing of such access policies, or none at all. Policy Optimizer specifically addresses the issue of out-of-date or overly permissive rules. Using the module, network security teams identify problematic rules and validate their necessity with any relevant officials, including those teams that first requested the access in question -- greatly reducing overall policy complexity while ensuring that necessary defenses remain in place.

The FireMon Security Manager solutions platform provides comprehensive security intelligence to improve enforcement of network security infrastructure and drive strategic decisions based on current requirements. Policy Optimizer adds the ability to rapidly gather data and validate rule requests, as well as eliminate unneeded rules and make implemented rules more targeted, productive and effective -- maintaining the highest levels of security control.

Building on top of FireMon's existing, standards-based policy workflow engine, Policy Optimizer offers:

  • Integrated business workflow that optimizes rules for access requirements, and aligns rules with security policies and controls with the ability to deploy multiple Business Process Model and Notation (BPMN) 2.0-compliant workflows.
  • Automated rule recertification that monitors and maintains ongoing and/or audit event-driven justification reviews, as well as impact assessments for rule adjustment or retirement.
  • Proactive guidance and enforceable accountability with the ability to automatically -- via direct integration with the FireMon Policy Planner module -- create change tickets for removable rules and invoke application-level recommendations, adding lists of relevant applications, and configuring workflow based on application and owner-based rule properties (i.e. destination, service).
  • New workflow process and UI providing a business-driven rule/device management interface to better engage business stakeholders, improve performance and document processes for best-practices development.

"Disconnect between network security operations, IT management and audit/compliance professionals remains a huge gap in overall enterprise IT risk management," said Jody Brazil, president and CTO of FireMon. "Policy Optimizer is the first solution that actively addresses and automates what is today a very manual and fragmented process that ultimately leads to a large number of today's most severe data breaches. This highly strategic solutions module was developed with direct input from our largest and most sophisticated customers, and delivers pragmatic benefits and total ROI within mere months."

FireMon Policy Optimizer module is immediately available.

About FireMon
FireMon is the industry leader in proactive security intelligence solutions that deliver continuous control of infrastructure, policy and IT risk for federal agencies. The FireMon Security Intelligence Platform is a massively scalable, high-performance foundation for network risk analytics, change workflow automation, firewall rule base clean-up, compliance audit assessment and security operations for cost reduction. For more information, visit http://www.firemon.com.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Samsung VP Jacopo Lenzi, who headed the company's recent SmartThings acquisition under the auspices of Samsung's Open Innovaction Center (OIC), answered a few questions we had about the deal. This interview was in conjunction with our interview with SmartThings CEO Alex Hawkinson. IoT Journal: SmartThings was developed in an open, standards-agnostic platform, and will now be part of Samsung's Ope...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an In...
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud...
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, will focus on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19...
StackIQ offers a comprehensive software suite that automates the deployment, provisioning, and management of Big Infrastructure. With StackIQ’s software, you can spin up fully configured big data clusters, quickly and consistently — from bare-metal up to the applications layer — and manage them efficiently. Our software’s modular architecture allows customers to integrate nearly any application wi...
As Platform as a Service (PaaS) matures as a category, developers should have the ability to use the programming language of their choice to build applications and have access to a wide array of services. Bluemix is IBM's open cloud development platform that enables users to easily build cloud-based, creative mobile and web applications without having to spend large amounts of time and resources o...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at Internet of @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, will discuss how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will nee...
When you set off to build an app that will change the world, designing your system architecture to be reliable and scalable is important but the stark reality is that, for your MVP, you probably had a “need for speed” (of development). You didn’t know what all the axes were to scale your application, where your stress points would be, and what weird and wonderful ways your customers would use it d...
Compute virtualization has been transformational, yet security policy implementation and enforcement has lagged behind in agility and automation. There are a number of key considerations when implementing policy in private and hybrid clouds. In his session at 15th Cloud Expo, Holland Barry, VP of Technology at Catbird, will discuss the impact of this new paradigm and what organizations can do to...
SYS-CON Events announced today that Red Hat, the world's leading provider of open source solutions, will exhibit at Internet of @ThingsExpo, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Red Hat is the world's leading provider of open source software solutions, using a community-powered approach to reliable and high-performing cloud, Linux, ...