You are on page 1of 18

FireMon Overview

FireMon at a Glance
Founded in 2003 Headquarters
Overland Park, KS and Dallas, TX
Domestically produced and supported software

Global Presence Growth


Operations in USA, Germany, UK, Averaging 40% YoY growth
Australia, and Singapore Aggressive Roadmap, Strategic Partners,
Profitable Business

1,700+ Customers in 70 Countries Proven Solutions


100+ Fortune 500, six of the Top 10 MSPs
Scalable and high performance with ~95%
Active Govt Programs with DOD, US Intel,
renewal rates
USDA, DOI, GSA

2019 Industry Innovator 2019 Cutting Edge for Network 2018 Industry Innovator 5-Star GRC, Risk & Policy North American IoT Cybersecurity Technology Enterprise Security Solution Best Security Solution
Security Manager Security and Management Global Policy Controller Management Solution Innovation Award of the Year

2
Why Customers Leverage FireMon

Manage Multi-vendor Clean Up & Audit Assess & Report On


Network Environments Firewall Policies Regulatory & Policy Compliance

Automate Policy Network Migrate To The Upgrade Firewalls And Other


Changes Segmentation Cloud Network Equipment

Manage Vulnerability Triage Security Proactively Search


& Risk Alerts for Threats

3
A Sampling of Our Customers
Federal Enterprise

4
Customer Challenges

Increasing Hybrid Constant Tradeoff between Endless Shortage of


Network Complexity Speed and Security Skilled Resources

Lack of Visibility Unknown Risk and


and Actionable Insights Expanding Attack Surface

5
Increasing Hybrid Network Complexity

66% 79%
of organizations are actively of respondents said it was
consolidating the number of somewhat or very challenging
cybersecurity vendors in to orchestrate alerts from
their environment1 multiple vendor products2

1 Oltsik, Jon. “The cybersecurity technology consolidation conundrum.” CSO Online. March 26, 2019.
2 Cisco Systems, Inc. “Cisco Cybersecurity Series 2019: CISO Benchmark Study.” March 2019
6
Keeping Up with the Speed of the Business

Of respondents use tools that work across multiple


28% environments to manage network security in their
hybrid environments1

Agree or strongly agree that deployment of their business


60% services in the cloud has accelerated past their ability
to adequately secure them in a timely manner2

Misconfiguration and inadequate change


#2 control ranked as the second-most significant
threat to cloud security3

1 FireMon, LLC. “State of Hybrid Cloud Security: 2019.” February 2019. 3 Cloud Security Alliance. “Top Threats to Cloud Computing – The Egregious 11.” August 6, 2019.
2 FireMon, LLC. “State of Hybrid Cloud Security: 2019.” February 2019.
7
Costliest Threat to IT and Business Continuity?
…Approved Change

83% 70% 3x 45%

of all unplanned network of those are causd by Outages from breaches have experienced service
outages are caused by mistakes made average 3x the cost of a disruptions at least three
mistakes made during an on firewalls1 non-breach based outage, times a year during
approved change1 however a change-based approved network
outage is 97% more likely1 configuration changes2

Change freezes are mandatory to eliminate manual and unnecessary


changes that can contribute to network outages

1 Real-world FireMon customer example


2 FireMon, LLC. “2019 State of the Firewall.” November 2019.
8
An Expanding Attack Surface
• Rapid Cloud Adoption:
Lack of coordination between
security teams and the business Don’t Be The Next Capital One
BY SEAN O’BRIEN | Sep. 16, 2019
leads to unknown risk and potential
for data breach
The Capital One cyber attack of 2019 occurred
due to a misconfigured firewall1
• Need for the Right Network
Lack of integration and automation left
Segmentation Approach: Lack of security analysts unable to prioritize alerts from
or too much network segmentation multiple tools
increases the attack surface
Misconfiguration is code for human error

• Risk Prioritization:
Too many alerts and uncertainty on 1 O’Brien, Sean. “Don’t be the next Capital One.” GCN. September 16, 2019.

what to remediate first

9
Compliance Challenges
Google is Fined $57M Under Europe’s Data Privacy Law
• Most large organizations have Google has been $57M USD in violation of GDPR for not properly disclosing
to users how data is collected across its services, including its search engine,
multiple locations, IT environments, Google Maps and YouTube, to present personalized advertisements.

and security vendors, and are


dealing with constant change British Airways Faces $230M GDPR fine for 2018 breach
British Airways has been fined $230M USD over a 2018 data breach, one
of the biggest fines since the General Data Protection Regulation came

• Regulatory environment is complex into effect. The breach is believed to have impacted 500,000 people.

(Industry, National, State, etc.)


Futures Brokerage: $1.5M Fine for Weak Security
A Chicago-based futures brokerage has been fined $1.5 million for failing to
• Cost of compliance (headcount, safeguard its email systems from attacks by cyber criminals, allowing hackers
to access sensitive customer information and pilfer $1 million in customer funds.
tools, audits)
NERC Seeks $10M Fine for Duke Energy Security Lapses
• Failed audits/breaches → Fines NERC recommended a $10 million fine on Duke Energy for repeated
violations of critical infrastructure protection (CIP) reliability standards over
more than three years.

10
Lack of Visibility and Actionable Insights
• Lack of Visibility: 34.2% of
respondents have ≤50% percent of Lack of Knowledge, Visibility
real-time visibility into network Contributed to Equifax Breach
security risks and compliance1 BY CHRIS BROCK | Dec. 13, 2018

• Alert Fatigue: High volume of alerts The Equifax breach of 2017 was due to a lack of
do not provide context needed to visibility into its complex legacy IT environments3
prioritize remediation Manual processes and no formal data security
strategy made it difficult to scan, patch, and
• Device Discovery: Enterprises modify effectively
underestimate the number of
devices on their networks by
over 30%2 3Digital Guardian. https://digitalguardian.com/blog/lack-knowledge-visibility-
contributed-equifax-breach

1 FireMon, LLC. “2019 State of the Firewall.” November 2019.


2 Cisco Systems, Inc. “Cisco 2018 Annual Cybersecurity Report.” February 2018
11
Cybersecurity Skills Shortage Impact

67% 47% 41% 40%

say the skills shortage has report an inability to fully say that their organization claim that cybersecurity staff
increased the workload on learn or utilize some of their has had to recruit and train has limited time to work with
existing staff security technologies to junior personnel rather than business managers
their full potential hire more experienced
infosec pros

12
FireMon Solutions
FIREMON AUTOMATION
delivers intelligent, configurable network security
policy automation that monitors and adapts to
changes in your environment and business
requirements.

FIREMON RISK MITIGATION


identifies key risks and vulnerabilities and provides
actionable insights with a clear path to remediation
across your ever-changing attack surface.

FIREMON COMPLIANCE
provides 100% trusted compliance and risk
management no matter what you discover and
change in your environment.

13
FireMon Continuous Network Security

14
FireMon Integration Ecosystem

• Extend FireMon Compliance, Automation and Risk


Mitigation into third party architectures
• Flexible integrations for multi-vendor security stack
ACI
• Support two-way data sharing between major
security devices, platforms and applications
• Strong technology partnerships to continuously
build FireMon APIs
• RESTful APIs with Swagger
• Monetize enterprise digital assets; maximize
security investments

15
Firewall and Cloud Alliances

Firewall Cloud

16
Customer Use Cases
Continuous Compliance

Automated Change Management

Hybrid Cloud / Cloud Migrations

Central Point of Control

Network Segmentation / Microsegmentation

Integrated Threat and Vulnerability Management

17
FireMon Offerings
SECURITY MANAGER
Network Device and Policy Management
provides real-time visibility, control, and management
FIREMON AUTOMATION for network security devices across hybrid cloud GLOBAL POLICY CONTROLLER
Continuous Adaptive Enforcement™ environments from a single pane of glass to reduce Intent-Based Security and Orchestration
network complexity and improve security posture.
delivers a comprehensive blueprint for security process delivers continuous intent-based security and
automation that accelerates and streamlines policy orchestration that gives both security and business
management through trusted accuracy, gold standards, stakeholders a single, consistent operating model that
and proactive continuous compliance. improves security, increases agility and reduces cost.

POLICY PLANNER POLICY OPTIMIZER


Automated Workflow and Provisioning Rule Recertification and Lifecycle Management
delivers intelligent, automated workflow and provisioning automates the change review process and streamlines
that enables network security and operations teams to rule justification and clean-up efforts to optimize
implement the right changes with absolute precision performance and ensure continuous compliance with
across the entire rule lifecycle. internal and external standards.

LUMETA RISK ANALYZER


Real-Time Awareness/Discovery Risk Analysis and Threat Modeling
Delivers real-time visibility, vulnerability, and provides best-in-class vulnerability
risk management to detect and secure management through real-time risk analysis
unknown, rogue and shadow clouds, network and threat modeling to uncover exposures,
infrastructure, and endpoints. score network risk, and prioritize remediation.
NETWORK
SECURITY
POLICY
MANAGEMENT

18

You might also like