3 Ways to Streamline Network Security Automation That Will Transform Your Organization

Network security automation uses machines to programmatically execute security tasks. Typically, network security automation is used to manage the low-complexity, high-volume aspects of detection, investigation, and mitigation. For instance, automation can be ...

Network Security, Performance & Scalability | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow ...

Network Security, Performance & Scalability | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow ...

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old ...

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old ...

Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM

In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow ...

MYTH #3: It’s Better To Block Than To Permit Access

This is part 3 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read Part I here. One of the ...

Myth #2: Compliance Is Only Urgent When There’s an Audit

This is part 2 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read part #1 here.  Many organizations ...
We Heard You. An Agile Approach to Managing Network Security Policy

We Heard You. An Agile Approach to Managing Network Security Policy

Today we announced the industry’s first agile network security policy platform which marks both the delivery of core new features and a statement of our future direction. We believe these new features, ...
We Heard You. An Agile Approach to Managing Network Security Policy

We Heard You. An Agile Approach to Managing Network Security Policy

An Agile Approach to Managing Network Security Policy Today we announced the industry’s first agile network security policy platform which marks both the delivery of core new features and a statement of ...