Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 22 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

FireMon Makes Automated Change Management Even Easier for Palo Alto Networks Customers

by The Gurus
February 2, 2017
in Editor's News
Share on FacebookShare on Twitter

FireMon, the global leader in Network Security Policy Management (NSPM), today announced an extension of its Intelligent Policy Automation framework to now include automated policy implementation for Palo Alto Networks® devices.
FireMon introduced its Intelligent Policy Automation framework last year. The framework is designed to reduce the manual effort and unnecessary security risk associated with complex network implementations by ensuring processes are in place to make the correct change as quickly as possible. By focusing on the correctness of the change, the IPA framework has reduced the time it takes customers to complete a change by more than 90% while also maintaining their security posture, and often lowering the overall level of risk.
Unlike other automation solutions in the space, the integration of FireMon’s Immediate Insight security analytics solution enables customers to actively monitor for new threats and modify policies accordingly using the IPA framework.
In this update, now available to FireMon customers, Palo Alto Networks users can automatically push firewall rule changes to the Panorama™ centralised security management system. Previously, users made these changes manually. This new extension results in further time savings and accuracy when implementing new policy access.
Customers with Panorama will gain the ability to centrally manage their multi-device environments within FireMon Security Manager to:

  • Save time and reduce technical and administrative mistakes when implementing a change request
  • Take a planned rule from Policy Planner and automatically push it to Panorama (7.x and higher)
  • Improve accuracy when creating rules and managing firewalls
  • Increase visibility of the device impact of a rule change by looking at the App-ID™
  • Reduce risk of rule change by assessing risk with the context of the User-ID™

“FireMon is proud to continue to develop its products to work with the widest range of security products in order to reduce complexity and manual tasks undertaken by enterprise IT security teams,” said Jeremy Martin Vice President of Product Development, FireMon. “This latest product extension means that Palo Alto customers will benefit from increased efficiency; and by using App-ID and User-ID in policy management, it is possible to see the device impact and do a proper risk validation assessment of rule changes – a crucial component to effective management of enterprise security.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Security flaws in Pentagon systems "easily" exploited by hackers

Next Post

Cybersecurity professionals can now search the market's leading Whois and DNS data sets in one integrated SaaS product

Recent News

security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023
TikTok to be banned from UK Government Phones

TikTok to be banned from UK Government Phones

March 17, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information