Hi [[ session.user.profile.firstName ]]

FireMon

  • Date
  • Rating
  • Views
  • 5 Steps to Keep Network Security Enforcement Points Secure and Up-To-Date
    5 Steps to Keep Network Security Enforcement Points Secure and Up-To-Date
    Randy Franklin Smith, Publisher, UltimateWindowsSecurity.com, Tim Woods, Vice President Technology Alliances, FireMon Recorded: Jul 11 2019 86 mins
    The only constant is change. Product deployments come and go and get moved as a result of data center reorganizations, mergers & acquisitions and migration to the cloud – and even retromigrations from cloud to on-prem.

    Every time this happens it’s very easy for new risk to be created in your network.

    If you want to avoid the fate of companies like Equifax, Target and many others, one of the crucial steps is proper network segmentation on the inside of your network – let alone connection to public clouds and virtual networks in the cloud.

    But a properly segmented, global network security policy is difficult. And keeping that policy up-to-date is even more difficult. In this webinar, we’ll explore how to address this risky burden.

    Whenever you deploy or move a technology, product or workload here’s what you need to do:

    1. Identify new network connections required
    2. Understand the actual traffic requirements – especially in terms of protocols
    3. Determine who needs to communicate with the workload and in which directions. By who, we mean sets of users, regions, datacenters, segments, application servers, etc.
    4. What are the security differentials between the communicating entities?
    5. Are additional enforcement points required?


    We will drill down into each of these steps and then Tim Woods and Josh Williams from FireMon will show you how the Global Policy Controller gives you a birds-eye view of your entire hybrid network by bringing every enforcement point and its arcane configuration onto a single pane of glass, driven by your actual intent.
  • How To Gain Comprehensive Visibility and Security for Your Hybrid Environment
    How To Gain Comprehensive Visibility and Security for Your Hybrid Environment
    Reggie Best, President of Lumeta Solutions, FireMon | Ed Young, Product Manager of Lumeta Solutions, FireMon Recorded: May 22 2019 48 mins
    Maintaining continuous security and compliance requires comprehensive visibility across your hybrid environment. You need to adapt and scale your security measures as your environment grows, as your hybrid environment shifts, or as new threats are detected. But without a true understanding of the scope of your assets and where all of your workloads reside, your efforts will be futile.

    Learn how FireMon’s Lumeta CloudVisibility can extend comprehensive network and endpoint discovery with real-time infrastructure visibility, change monitoring, and leak-path detection for your migration to the hybrid cloud across your on-premises, virtual, software-defined, cloud and hybrid environments.
  • Achieve Real-time Visibility and Control of Your Hybrid Cloud
    Achieve Real-time Visibility and Control of Your Hybrid Cloud
    Tim Woods, VP Technology Alliances, FireMon Recorded: May 8 2019 47 mins
    Cloud infrastructure brings the same risks and threats as an on-premises environment, but with a twist: the rate of expansion. Cloud services and applications spin up, deploy and provision faster than you can say “IaaS” and it’s inevitable that you’ll miss critical security controls.

    Join us for this webinar to learn the steps you need to take to confidently embrace the cloud without compromising security.

    We will discuss how you can:

    •Reduce the visibility gap into your hybrid environment
    •Spin up, deploy and provision faster while maintaining a strong security posture
    •Automate risk analysis and change management
    •Assess your risk in real-time
    •Validate configuration requirements
  • How to Prove Your Firewalls Actually Do What You Intend
    How to Prove Your Firewalls Actually Do What You Intend
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon Recorded: May 2 2019 90 mins
    In this real training for free webinar, we will explore what it takes to test your firewalls and prove they actually do what you intend. We aren’t talking about a simple pentest or vulnerability scan from the Internet. And in this session, I’ll explain why that is insufficient.

    Here’s some of what we’ll cover:

    Identifying the various zones on your network that put boundaries on traffic.

    Choosing the target zones to test and the vantage points to test from. With firewalls testing, the vantage point is just as important as the target. But with a network of any size you can’t really hope to test every combination of test and vantage point – it’s not a so-called NP-Complete problem but the impact is the same – you have to be satisfied with results from a finite amount of effort, so prioritization is important.

    Tools to speed up firewall testing.

    How to test firewall policy without touching the actual hosts behind the firewall.

    Understanding and avoiding false test results caused by dependencies on host configuration external to the firewall policy.
  • Close the Door on Endpoint Security Threats with Detection & Response
    Close the Door on Endpoint Security Threats with Detection & Response
    Ed Young, Product Manager - Lumeta, FireMon | Pedro Haworth, Head of Technology, Security Innovation Alliance, McAfee Recorded: Apr 30 2019 39 mins
    Today's security teams struggle with the challenges created by continuously evolving networks and threats. We'll demonstrate how using McAfee® ePolicy Orchestrator® (McAfee ePO™) software and Lumeta Spectre together gives IT organizations the real-time visibility they need to proactively identify, manage, and respond to endpoint security issues and threats across dynamic cloud, virtual, mobile, and physical networks.
  • Managing Security for the Multi-Cloud
    Managing Security for the Multi-Cloud
    Dave Klein (Guardicore), Tim Woods (FireMon), Tom McAndrew (Coalfire), Praveen Jain (Cavirin) Recorded: Mar 6 2019 46 mins
    "Enterprises today are leveraging multiple clouds and thousands of applications. What are the security and compliance risks associated with a multi-cloud strategy?

    Join cloud and security leaders in an interactive discussion to learn about:
    - The current state of cloud
    - Security risks and recommendations
    - Managing and automating security across multiple clouds and applications
    - What to expect in 2019
    - Recommendations for improving enterprise cloud security"
  • 5 Steps to Comprehensively Mapping Your Attack Surface
    5 Steps to Comprehensively Mapping Your Attack Surface
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com | Scott Custer, Senior Solutions Architect, FireMon Recorded: Feb 28 2019 88 mins
    You need to understand all the potential pathways malicious traffic could possibly take through your network – including obscure and indirect paths that don’t immediately look risky or valuable to an attacker. Moreover, you need to be able to juxtapose that network topology and path analysis with your host level security vulnerabilities.

    In this real training for free session, we will examine 5 steps for accomplishing this:

    Validate address space
    Quantify edges of network
    Perform path analysis
    Conduct host/device census
    Identify device/host level vulnerabilities
    Join us to explore all of these steps and then how to juxtapose and overlay all of this information into a comprehensive, multi-dimensional attack surface.

    FireMon is the perfect sponsor for this event and Scott Custer will show you how their unique technology, Lumeta, provides real-time visibility, vulnerability indicators, and risk identification enabling cloud, network, and security teams to find and secure unknown, rogue and shadow IT, network infrastructure, and endpoints.
  • Secure Your Journey to the Hybrid Cloud
    Secure Your Journey to the Hybrid Cloud
    Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product Marketing Recorded: Feb 22 2019 56 mins
    Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.

    Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:

    • Steps you need to take to gain full visibility and control to secure your hybrid environment
    • How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
    • How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
  • Consistency is Key with Cloud Security
    Consistency is Key with Cloud Security
    Elisa Lippincott, Director of Product Marketing Recorded: Jan 17 2019 38 mins
    When it comes to cloud security, consistency is everything – your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

    Cloud security breaches have not been the result of brilliant criminal masterminds. Rather, they have been the result of self-inflicted errors that are often caused by faulty migration and deployment practices – particularly when the right security personnel are excluded from the process.

    Attend this webinar to learn how to:
    •Avoid misconfiguring your own security controls
    •Ensure consistency in your cloud security implementation
    •Optimize your vulnerability management
  • Achieve NERC CIP Compliance with FireMon
    Achieve NERC CIP Compliance with FireMon
    Robert Rodriguez, Senior Sales Engineer | Brian Dixon, Sales Engineer | Elisa Lippincott, Director of Product Marketing Recorded: Dec 10 2018 12 mins
    Utilities need scalable solutions to help them adapt and comply with the constantly changing NERC CIP requirements. FireMon can partner with utilities to automate their security policy workflows, optimize their vulnerability management efforts, and get their networks under control with complete visibility, real-time monitoring and continuous compliance checks.

Embed in website or blog