Professional Documents
Culture Documents
FireMon at a Glance
Founded in 2003 Headquarters
Overland Park, KS and Dallas, TX
Domestically produced and supported software
2019 Industry Innovator 2019 Cutting Edge for Network 2018 Industry Innovator 5-Star GRC, Risk & Policy North American IoT Cybersecurity Technology Enterprise Security Solution Best Security Solution
Security Manager Security and Management Global Policy Controller Management Solution Innovation Award of the Year
2
Why Customers Leverage FireMon
3
A Sampling of Our Customers
Federal Enterprise
4
Customer Challenges
5
Increasing Hybrid Network Complexity
66% 79%
of organizations are actively of respondents said it was
consolidating the number of somewhat or very challenging
cybersecurity vendors in to orchestrate alerts from
their environment1 multiple vendor products2
1 Oltsik, Jon. “The cybersecurity technology consolidation conundrum.” CSO Online. March 26, 2019.
2 Cisco Systems, Inc. “Cisco Cybersecurity Series 2019: CISO Benchmark Study.” March 2019
6
Keeping Up with the Speed of the Business
1 FireMon, LLC. “State of Hybrid Cloud Security: 2019.” February 2019. 3 Cloud Security Alliance. “Top Threats to Cloud Computing – The Egregious 11.” August 6, 2019.
2 FireMon, LLC. “State of Hybrid Cloud Security: 2019.” February 2019.
7
Costliest Threat to IT and Business Continuity?
…Approved Change
of all unplanned network of those are causd by Outages from breaches have experienced service
outages are caused by mistakes made average 3x the cost of a disruptions at least three
mistakes made during an on firewalls1 non-breach based outage, times a year during
approved change1 however a change-based approved network
outage is 97% more likely1 configuration changes2
• Risk Prioritization:
Too many alerts and uncertainty on 1 O’Brien, Sean. “Don’t be the next Capital One.” GCN. September 16, 2019.
9
Compliance Challenges
Google is Fined $57M Under Europe’s Data Privacy Law
• Most large organizations have Google has been $57M USD in violation of GDPR for not properly disclosing
to users how data is collected across its services, including its search engine,
multiple locations, IT environments, Google Maps and YouTube, to present personalized advertisements.
• Regulatory environment is complex into effect. The breach is believed to have impacted 500,000 people.
10
Lack of Visibility and Actionable Insights
• Lack of Visibility: 34.2% of
respondents have ≤50% percent of Lack of Knowledge, Visibility
real-time visibility into network Contributed to Equifax Breach
security risks and compliance1 BY CHRIS BROCK | Dec. 13, 2018
• Alert Fatigue: High volume of alerts The Equifax breach of 2017 was due to a lack of
do not provide context needed to visibility into its complex legacy IT environments3
prioritize remediation Manual processes and no formal data security
strategy made it difficult to scan, patch, and
• Device Discovery: Enterprises modify effectively
underestimate the number of
devices on their networks by
over 30%2 3Digital Guardian. https://digitalguardian.com/blog/lack-knowledge-visibility-
contributed-equifax-breach
say the skills shortage has report an inability to fully say that their organization claim that cybersecurity staff
increased the workload on learn or utilize some of their has had to recruit and train has limited time to work with
existing staff security technologies to junior personnel rather than business managers
their full potential hire more experienced
infosec pros
12
FireMon Solutions
FIREMON AUTOMATION
delivers intelligent, configurable network security
policy automation that monitors and adapts to
changes in your environment and business
requirements.
FIREMON COMPLIANCE
provides 100% trusted compliance and risk
management no matter what you discover and
change in your environment.
13
FireMon Continuous Network Security
14
FireMon Integration Ecosystem
15
Firewall and Cloud Alliances
Firewall Cloud
16
Customer Use Cases
Continuous Compliance
17
FireMon Offerings
SECURITY MANAGER
Network Device and Policy Management
provides real-time visibility, control, and management
FIREMON AUTOMATION for network security devices across hybrid cloud GLOBAL POLICY CONTROLLER
Continuous Adaptive Enforcement™ environments from a single pane of glass to reduce Intent-Based Security and Orchestration
network complexity and improve security posture.
delivers a comprehensive blueprint for security process delivers continuous intent-based security and
automation that accelerates and streamlines policy orchestration that gives both security and business
management through trusted accuracy, gold standards, stakeholders a single, consistent operating model that
and proactive continuous compliance. improves security, increases agility and reduces cost.
18