Hi [[ session.user.profile.firstName ]]

How to Prove Your Firewalls Actually Do What You Intend

In this real training for free webinar, we will explore what it takes to test your firewalls and prove they actually do what you intend. We aren’t talking about a simple pentest or vulnerability scan from the Internet. And in this session, I’ll explain why that is insufficient.

Here’s some of what we’ll cover:

Identifying the various zones on your network that put boundaries on traffic.

Choosing the target zones to test and the vantage points to test from. With firewalls testing, the vantage point is just as important as the target. But with a network of any size you can’t really hope to test every combination of test and vantage point – it’s not a so-called NP-Complete problem but the impact is the same – you have to be satisfied with results from a finite amount of effort, so prioritization is important.

Tools to speed up firewall testing.

How to test firewall policy without touching the actual hosts behind the firewall.

Understanding and avoiding false test results caused by dependencies on host configuration external to the firewall policy.
Recorded May 2 2019 90 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon
Presentation preview: How to Prove Your Firewalls Actually Do What You Intend

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How To Gain Comprehensive Visibility and Security for Your Hybrid Environment Recorded: May 22 2019 48 mins
    Reggie Best, President of Lumeta Solutions, FireMon | Ed Young, Product Manager of Lumeta Solutions, FireMon
    Maintaining continuous security and compliance requires comprehensive visibility across your hybrid environment. You need to adapt and scale your security measures as your environment grows, as your hybrid environment shifts, or as new threats are detected. But without a true understanding of the scope of your assets and where all of your workloads reside, your efforts will be futile.

    Learn how FireMon’s Lumeta CloudVisibility can extend comprehensive network and endpoint discovery with real-time infrastructure visibility, change monitoring, and leak-path detection for your migration to the hybrid cloud across your on-premises, virtual, software-defined, cloud and hybrid environments.
  • How to Prove Your Firewalls Actually Do What You Intend Recorded: May 2 2019 90 mins
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon
    In this real training for free webinar, we will explore what it takes to test your firewalls and prove they actually do what you intend. We aren’t talking about a simple pentest or vulnerability scan from the Internet. And in this session, I’ll explain why that is insufficient.

    Here’s some of what we’ll cover:

    Identifying the various zones on your network that put boundaries on traffic.

    Choosing the target zones to test and the vantage points to test from. With firewalls testing, the vantage point is just as important as the target. But with a network of any size you can’t really hope to test every combination of test and vantage point – it’s not a so-called NP-Complete problem but the impact is the same – you have to be satisfied with results from a finite amount of effort, so prioritization is important.

    Tools to speed up firewall testing.

    How to test firewall policy without touching the actual hosts behind the firewall.

    Understanding and avoiding false test results caused by dependencies on host configuration external to the firewall policy.
  • Close the Door on Endpoint Security Threats with Detection & Response Recorded: Apr 30 2019 39 mins
    Ed Young, Product Manager - Lumeta, FireMon | Pedro Haworth, Head of Technology, Security Innovation Alliance, McAfee
    Today's security teams struggle with the challenges created by continuously evolving networks and threats. We'll demonstrate how using McAfee® ePolicy Orchestrator® (McAfee ePO™) software and Lumeta Spectre together gives IT organizations the real-time visibility they need to proactively identify, manage, and respond to endpoint security issues and threats across dynamic cloud, virtual, mobile, and physical networks.
  • Managing Security for the Multi-Cloud Recorded: Mar 6 2019 46 mins
    Dave Klein (Guardicore), Tim Woods (FireMon), Tom McAndrew (Coalfire), Praveen Jain (Cavirin)
    "Enterprises today are leveraging multiple clouds and thousands of applications. What are the security and compliance risks associated with a multi-cloud strategy?

    Join cloud and security leaders in an interactive discussion to learn about:
    - The current state of cloud
    - Security risks and recommendations
    - Managing and automating security across multiple clouds and applications
    - What to expect in 2019
    - Recommendations for improving enterprise cloud security"
  • 5 Steps to Comprehensively Mapping Your Attack Surface Recorded: Feb 28 2019 88 mins
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com | Scott Custer, Senior Solutions Architect, FireMon
    You need to understand all the potential pathways malicious traffic could possibly take through your network – including obscure and indirect paths that don’t immediately look risky or valuable to an attacker. Moreover, you need to be able to juxtapose that network topology and path analysis with your host level security vulnerabilities.

    In this real training for free session, we will examine 5 steps for accomplishing this:

    Validate address space
    Quantify edges of network
    Perform path analysis
    Conduct host/device census
    Identify device/host level vulnerabilities
    Join us to explore all of these steps and then how to juxtapose and overlay all of this information into a comprehensive, multi-dimensional attack surface.

    FireMon is the perfect sponsor for this event and Scott Custer will show you how their unique technology, Lumeta, provides real-time visibility, vulnerability indicators, and risk identification enabling cloud, network, and security teams to find and secure unknown, rogue and shadow IT, network infrastructure, and endpoints.
  • Secure Your Journey to the Hybrid Cloud Recorded: Feb 22 2019 56 mins
    Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product Marketing
    Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.

    Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:

    • Steps you need to take to gain full visibility and control to secure your hybrid environment
    • How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
    • How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
  • Consistency is Key with Cloud Security Recorded: Jan 17 2019 38 mins
    Elisa Lippincott, Director of Product Marketing
    When it comes to cloud security, consistency is everything – your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

    Cloud security breaches have not been the result of brilliant criminal masterminds. Rather, they have been the result of self-inflicted errors that are often caused by faulty migration and deployment practices – particularly when the right security personnel are excluded from the process.

    Attend this webinar to learn how to:
    •Avoid misconfiguring your own security controls
    •Ensure consistency in your cloud security implementation
    •Optimize your vulnerability management
  • Achieve NERC CIP Compliance with FireMon Recorded: Dec 10 2018 12 mins
    Robert Rodriguez, Senior Sales Engineer | Brian Dixon, Sales Engineer | Elisa Lippincott, Director of Product Marketing
    Utilities need scalable solutions to help them adapt and comply with the constantly changing NERC CIP requirements. FireMon can partner with utilities to automate their security policy workflows, optimize their vulnerability management efforts, and get their networks under control with complete visibility, real-time monitoring and continuous compliance checks.
  • AWS Network Security Deep Dive: Providing Network Protection for AWS Cloud Recorded: Nov 6 2018 97 mins
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com | Tim Woods, FireMon | Sanjay Raja, Lumeta
    Running workloads in the cloud makes provisioning and setup easier—just spin up a VM. But you might be surprised by how many firewalls you’ll end up with in the cloud if you follow best practices. Cloud providers are clear on this point. Amazon says, “Security and Compliance is a shared responsibility between AWS and the customer… The customer assumes responsibility and management of the guest operating system (including updates and security patches), other associated application software as well as the configuration of the AWS provided security group firewall.” In short, cloud security is in your court.
    In this deep dive into network security in the AWS cloud, some of the security features we’ll explore are:
    •Security groups — Act as a firewall for associated Amazon EC2 instances, controlling both inbound and outbound traffic at the instance level
    •Network access control lists — Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the subnet level
    •Flow logs — Capture information about the IP traffic going to and from network interfaces in your VPC
    •AWS WAF — Provides firewall protection for web applications (Web Application Firewall)
    •AWS Firewall Manager — Provides centralized management of AWS WAF
    •VPC Peering Connections — Enables networking connection between two VPCs so that you can route traffic between them
    •VPC Endpoints — Enables users to connect with AWS services that are outside the VPC through a private link
    •AWS VPN Connections — Allows you to connect your Amazon VPC to remote networks via VPN
    •AWS Direct Connect — Serves as a dedicated, private connection from a remote network to your VPC
    We will help you understand how networking security works within the Amazon cloud and with connections to the outside world. We will also discuss the need to keep all this straight, understood, consistent and configure to reflect your security intent accurately.
  • SCdemocast: Continuous Security for the Hybrid Enterprise Recorded: Oct 25 2018 30 mins
    Tim Woods - Vice President, Technology Alliances, FireMon
    The cloud is a notable business advantage, but it does bring numerous security concerns including: a lack of visibility across cloud or between on-premises and cloud environments, monitoring security controls and changes within cloud and multi-cloud environments, and maintaining compliance by monitoring cloud traffic for suspicious and non-compliant behavior. It becomes increasingly complex in hybrid environments because now you're managing security for on-premise, cloud, virtual, container environments, and more. The time commitment can feel staggering.

    It doesn't have to, however.

    Register for this webcast where we will show you the path to more effective cloud security in hybrid enterprises through a mix of:

    Vulnerability management: See how an attacker could exploit and prioritize your patches;
    Continuous compliance: Define your own cloud security controls and reduce the time spent on audit prep by making your cloud continuously audit-ready and adherent to the intentions and goals of the enterprise;
    Automation and orchestration: Ingest behavior details from your cloud, then command security controls to cloud systems from a single console. The idea is instant, worry-reducing cloud control.
  • Improve Visibility to Reduce Vulnerabilities and Protect Patient Data Recorded: Oct 11 2018 47 mins
    Sanjay Raja, CMO, Lumeta
    Cybercriminals target the data-rich healthcare industry disproportionately. Healthcare IT organizations, already burdened with budget constraints and the scarcity of technically proficient staff, must also contend with significant blind spots within their own networks. These blind spots occur everywhere, from endpoints into the cloud, and every blind spot increases the opportunity for attacks such as ransomware to be successful. Eliminating those blind spots requires healthcare organizations to identify all of their wired, wireless, mobile and medical devices in real-time. With comprehensive context available, organizations can help prevent breaches before, during and after an attack. Lumeta has been deployed at some of the largest enterprises and government agencies based on our ability to eliminate 100% of your IP network and connected device visibility gaps, improve your overall security posture, and reduce the risk of patient data theft.
  • Immediate Insight App Available on the Palo Alto Networks Application Framework Recorded: Oct 8 2018 18 mins
    Jeff Barker, Vice President, Product Management - Immediate Insight
    Optimized for the Palo Alto Networks Application Framework, Immediate Insight is an analytics-enabled app that enables security teams to seamlessly combine and analyze cloud-resident and private infrastructure data to accelerate discovery and response to security threats.
  • A Zero Trust Approach to Decoupling Intent from Implementation Recorded: Sep 20 2018 60 mins
    Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • 3 Steps to Gain Control of Cloud Security Recorded: Sep 19 2018 61 mins
    Tim Woods - Vice President, Technology Alliances, FireMon
    The cloud is a notable business advantage, but it does bring numerous security concerns. Among them:

    - Lack of visibility across cloud or between on-premises and cloud environments
    - Monitoring security controls and changes within cloud and multi-cloud environments
    - Maintaining compliance by monitoring cloud traffic for suspicious and non-compliant behavior

    It becomes increasingly complex in hybrid environments because now you’re managing security for on-premise, cloud, virtual, container environments, and more. The time commitment can feel staggering.

    It doesn’t have to, however.

    In this webinar we will show you the path to more effective cloud security in hybrid enterprises through a mix of:

    1. Vulnerability management: See how an attacker could exploit and prioritize your patches
    2. Continuous compliance: Define your own cloud security controls and reduce the time spent on audit prep by making your cloud continuously audit-ready
    3. Automation and orchestration: Ingest behavior details from your cloud, then command security controls to cloud systems from a single console. The idea is instant, worry-reducing cloud control.
  • Migrating to the Cloud? Don’t Forget Your Firewalls Recorded: Sep 12 2018 103 mins
    Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon
    When we start using the cloud, it’s up to us to address these risks:

    Direct attacks from the Internet on resources in the cloud
    Infiltration of on-prem network from compromised resources in the cloud
    Attacks on cloud-based workloads from compromised endpoints in the on-prem network


    Cloud and firewall providers have been quick to identify this as a market and there is a plethora of virtual network security gear you can deploy including:

    Built-in network security controls (e.g. Network Security Groups in Azure virtual networks)
    Cloud firewalls (e.g. Azure Firewall)
    Network virtual appliances from well-known Next-Gen Firewall vendors offered in cloud marketplaces. This lets you quickly spin-up a traditional NGFW product on a pre-configured VM and you can potentially use the same firewall vendor in the cloud and on-prem.
    Firewall Infrastructure-as-a-Service offerings like CheckPoint CloudGuard which are delivered and run as part of the cloud infrastructure rather than as a VM


    In this webinar, we explore the expanding requirements for network controls (i.e. firewalls) as more workloads are spun up in the cloud and your network infrastructure becomes more dispersed. Here’s a few questions answer:

    Is cloud network security just a matter of more firewalls or are there nuances specific to cloud workloads?
    How to spot potential and unintended - Pathways to vulnerable cloud resources, Cross-premise pathways, “worm-holes” into highly secure on-prem resources, Ways to by-pass perimeter boundaries
    When should you implement multiple tiers to security cloud workloads?
    When are built-in security features (like Azure Network Security Groups) enough and when do you need more?


    We will also discuss the need to keep all this straight, understood, consistent and the configuration accurately reflecting your security intent. Managing all your on-prem firewalls is challenging enough, let alone the cloud.
  • GDPR: 4 Key Principles for Success Recorded: Aug 22 2018 60 mins
    Keith Brennan Director, Field Engineering FireMon
    In this webinar replay, we'll discuss 4 key principles your organization needs to be successful with the EU's demand for tighter data protection, along with the penalties for the violation. GDPR provides an example of how countless security professionals can be led to anxiety and dread with a looming stack of regulations on fast approach. Put the fears to rest.

    In this webinar, we’ll show you the principles needed for GDPR success:

    -Risk-based data protection
    -Measuring security effectiveness
    -Monitoring data protection
    -Orchestrating persistent compliance

    GDPR is a special instance of government regulations; you’ve seen this for decades. There is nothing to fear. Nothing.
  • Migrations Made Easy Recorded: Feb 28 2018 60 mins
    Tim Woods - Vice President, Technology Alliances, FireMon
    Firewall migration projects are filled with risk: cost overruns, misconfigurations, connectivity failures, and security risk. Every year, security teams review, test, and procure new technologies to keep data protected.

    So, there is no shortage of opportunity for migration headaches.

    In this webinar, we’ll show you how to avoid these traps. It’s time to make sure your migration is fast, simple, and secure.

    You’ll learn how to:

    Analyze Policies and Rules
    Remove Technical Errors
    Refine and Organize New Rules
    Automate and Orchestrate Change in the New Environment
    Join us and see how migrations do not have to bring disruptions, ballooned costs, or security risks. You can realize the benefits of leading-edge technologies, next-gen firewalls, and security devices with simple, repeatable essentials in your upcoming migration.
Field-Tested | Cloud-Secured
FireMon delivers continuous security for hybrid enterprises through a powerful fusion of vulnerability management, continuous compliance and orchestration. Since creating the first-ever network security management solution, FireMon solutions have continued to deliver visibility into and control over complex network security infrastructure, policies and risk for more than 1,700 customers around the world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Prove Your Firewalls Actually Do What You Intend
  • Live at: May 2 2019 4:00 pm
  • Presented by: Randy Franklin Smith, Publisher, UltimatedWindowsSecurity.com & Tim Woods, Vice President Technology Alliances, FireMon
  • From:
Your email has been sent.
or close