Eskenzi PR Eskenzi PR
  • About Us
Sunday, 7 March, 2021
IT Security Guru
Eskenzi PR
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

FireMon Announces Industry’s First Intelligent Cloud Security Management Solution

by The Gurus
December 7, 2018
in Cloud Security
Share on FacebookShare on Twitter

FireMon today announced that its market leading Intelligent Security Management, which helps organizations worldwide centrally manage their on-premises firewalls, is available for cloud and native cloud firewalls. From traditional, on-premises or cloud firewalls such as Juniper Networks®, Palo Alto Networks® or Cisco®, to native cloud security controls like Amazon Web Services, regardless of what an enterprise’s security environment looks like, FireMon can manage it.
In its recent State of the Firewall Report, a global benchmarking study of over 400 organizations’ security infrastructures, FireMon found that cloud adoption is now the norm, but some questions still remain about who manages the cloud. For example, 90 percent said they had adopted a cloud solution, but for more than one third of respondents, responsibility for cloud security falls outside of security operations, which adds an extra layer of complexity to security management.
“Cloud environments face many of the same threats as traditional enterprise networks, but due to the vast amount of data stored on cloud servers, cloud services become an even more attractive target for a breach or attack,” said Jody Brazil, co-founder and Chief Product Strategist for FireMon. “What many organizations don’t realize is that while cloud providers typically deploy security controls to protect their own environments, ultimately it is the organization’s responsibility to protect their own data.
“In the process of deploying public and private cloud services, businesses are discovering new challenges in visibility, scalability and control of their hybrid cloud environments that impact their ability to mitigate risk and keep up with business agility and demands.”
FireMon’s Intelligent Security Management platform can help due to its flexibility to allow the same infrastructure-independent, single-pane monitoring and analysis that enables organizations to manage their on-premises security policies to be easily extended to support any hybrid cloud implementation. The platform is built to scale to meet the needs of the environment, no matter how simple or sophisticated. Furthermore, with FireMon’s acquisition of 40Cloud, a Cloud Infrastructure Security Broker, last year, organizations with multiple cloud environments can securely connect them to each other and apply a single security policy across them, rather than reset individual policies for each.
FireMon partners with the industry’s leading firewall vendors including Check Point® Software, Palo Alto Networks, Cisco, Fortinet® and Juniper Networks, and it can manage native, embedded security infrastructure in public and private clouds such as AWS Security Groups and VMWare NSX™ Distributed Firewalls.

0 0 vote
Article Rating
FacebookTweetLinkedIn
Tags: Cyber SecuritycybersecurityFiremonFirewallfirewall managementinfosec
ShareTweetShare
Previous Post

People at Risk of Data Heartache, and They Have Themselves to Blame

Next Post

One Identity Customer Nestlé Wins Prestigious 2017 KuppingerCole European Identity and Cloud Award

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Recent News

Malaysia Airlines

Malaysia and Singapore Airlines Breached in Third Party Hacks

March 5, 2021
Fraud attempts skyrocketed in 2020 according to latest Financial Crime Report from Feedzai

Fraud attempts skyrocketed in 2020 according to latest Financial Crime Report from Feedzai

March 4, 2021

Top 10 awards to enter for cybersecurity 

March 3, 2021
Medal

Identity theft: US Congressional Medal of Honor

March 3, 2021

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

More information
wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept