Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

New standard in firewall change automation released by FireMon

by The Gurus
September 1, 2016
in Editor's News
Share on FacebookShare on Twitter

Security management vendor, FireMon, today announced  a new standard in firewall change automation that takes into account the impact on compliance and security to reduce the manual effort and unnecessary security risk associated with today’s complex implementations. To date, customers leveraging the IPA framework have reduced the time to complete a change by more than 90%, while maintaining their security posture or even lowering the level of risk.
FireMon Intelligent Policy Automation (IPA) is a lifecycle policy management framework that provides context around access requests to help system administrators and network engineers determine and implement the change that best enables the business without introducing new risk.
“Today, security and operations teams are inundated with change requests – many of which are still handled manually – and meeting SLAs often comes at the expense of security,” said Matt Dean, Vice President of Product Management for FireMon. “Current automation solutions can help, but without awareness of the impact to compliance and security, they’re only speeding up implementation of incorrect changes, which negates the effort and introduces risk.”
FireMon’s Intelligent Policy Automation, through its standards-based workflow engine, injects automation and analysis at every stage of the change process, ensuring that engineers are able to design and approve the correct change quickly. The framework is devised so that simple, low-risk access requests get through the process swiftly while providing engineers with the time and analysis required to properly assess the impact of the more complex ones.
Key functionality includes:

  • Pre-impact change analysis – based on fully customizable control assessments
  • Workflow customization – workflows built to meet the unique needs of the enterprise
  • Lifecycle management – including integrated policy review workflows

“A key piece to raising an organisation’s security posture is proper management of its network components and security technology,” said Michael Callahan, CMO, FireMon. “Intelligent Policy Automation provides context and brain power to implementing policy changes, so it not only helps in shortening the time it takes to make them, but engineers can also be confident that the changes are accurate the first time around and don’t open up any security holes.”
FireMon will showcase its Intelligent Policy Automation vision at the Gartner Risk & Security Management Summit in London on the 12-13 September at the O2 InterContinental.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Vulnerabilities found in cars connected to smartphones

Next Post

Hackers use BMW, Amazon and Chanel brands to launch social media attacks

Recent News

Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023
Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023
UK Organisations lack clear path to achieve threat intelligence

UK Organisations lack clear path to achieve threat intelligence

June 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information