Firewall Policy Compliance

The Sweeter Side of PCI Compliance
I can’t tell you everything about security pros (be wary of those who claim they can), but I can tell you this: no one goes into security to write reports. They take ...
Scary Stories to tell in the Network
With Halloween around the corner, here’s a real-world firewall policy horror story. (For effect, feel free to imagine this in a scary, raspy cautionary voice… or Morgan Freeman if you prefer.) As ...
Scary Stories to tell in the Network
With Halloween around the corner, here’s a real-world firewall policy horror story. (For effect, feel free to imagine this in a scary, raspy cautionary voice… or Morgan Freeman if you prefer.) As ...

One Simple Misconfiguration. 2.9 Billion Users Down.
A routine maintenance error severs Facebook’s data centers from the Internet for over 6 hours On October 4, Facebook users suffered a complete outage affecting all apps including WhatsApp, Instagram, and Messenger ...
Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?
Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old ...
Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM
In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow ...
MYTH #3: It’s Better To Block Than To Permit Access
This is part 3 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read Part I here. One of the ...
Myth #2: Compliance Is Only Urgent When There’s an Audit
This is part 2 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read part #1 here. Many organizations ...
Risk Mitigation Requires Complete Visibility
You can’t fully mitigate risk without a complete picture of what you must manage. However, visibility is a moving target as new endpoints and devices are added to your infrastructure daily. To ...