Secure Passage's FireMon 5.1 Deepens Security Device Analysis, Making Administrators More Efficient

Latest Release of FireMon Evaluates Network Topology to Improve Traffic Modeling, and Facilitates Searching and Cleanup of Security Policies


OVERLAND PARK, KS and SAN FRANCISCO, CA--(Marketwire - March 4, 2010) -  RSA Conference 2010 -- Secure Passage, the leading provider of firewall policy, risk, and compliance management solutions, today announced the release of FireMon 5.1. This latest version in the FireMon eVolution line extends the already in-depth analysis and compliance capability of the FireMon platform, helping customers increase operational efficiency.

"The rapid growth of demand for products in this space is evidence that a critical need for security device management solutions exists. Secure Passage continues its tradition of innovation by bringing several industry firsts to the market and by bringing together key capabilities in a solution set not offered in any other product," said Alin Srivastava, Secure Passage vice president of worldwide sales. "Security operation teams are continually asked to do more with less, and we've responded to our customers and to the market in general with a new set of tools aimed at making administrators more efficient. With this improved operational efficiency and a FireMon feature set that helps administrators clean up overly complex security policies, security managers will be better able to protect the enterprise with their existing resources."

Built on an open analysis architecture, FireMon 5.1 analyzes firewall route and topology information to provide better insight into firewall behavior, examines router configurations to verify compliance with National Security Agency (NSA) guidelines, and supports F5 BIG-IP LTM and GTM appliances with change management and reporting features to ensure compliance and business continuity. Additionally, FireMon now helps detect errors in firewall configurations, enabling improved oversight and cleanup of firewall rules.

Features and Benefits of FireMon 5.1

Policy and Object Search
Finding configuration elements inside thousands of firewall rules and tens of thousands of network objects can be difficult. Multiply that effort by all of the firewalls in the enterprise, and the task is nearly impossible. With FireMon 5.1, all firewall configurations are compiled and ready for searching. Policy and object search allows users to instantly:

  • Search for the instance of an object in all rules in all firewalls
  • Find all object definitions for a particular host
  • Find all rules that affect a network segment

Topology-Aware Policy Analysis
Firewalls today contain many physical network connections, making the combination of interfaces, zones, and routing critical to the behavior of the firewall. FireMon 5.1 collects and evaluates routing information from monitored firewalls, and graphically presents their current state and changes to route, zone and interface information, to more effectively analyze policy behavior. For example, the FireMon Policy Test feature, which verifies connectivity through a firewall, uses routing data to determine which policies are actually hit by the testing scenario and then tests only those policies. The results are included in a report that identifies the detailed behavior of the firewall from the inbound interface, the routing and security policy applied, and the outbound interface. Administrators can also use this report to determine if traffic is routed to a firewall, enabling global searches that provide only relevant device results.

Redundant and Shadowed Rule Analysis
Firewall rule sets are complex and difficult to understand. Often, administrators are asked to satisfy firewall requirements without having the tools, information or time necessary to do so -- a situtaion that can result in configuration mistakes such as adding or creating redundant or shadowed rules. These mistakes complicate security policies and add to firewall administration overhead. FireMon 5.1 reports all redundant, fully shadowed, and partially shadowed rules in a policy with the first retrieval of the security policy, providing administrators with a zero-hour cleanup report as well as ongoing insight into erroneous modifications.

NSA Router Security Report
Because routers play a key role in the infrastructure of the enterprise and keeping them secure is a top priority, the NSA created a set of guidelines and recommendations to help IT professionals and security teams improve the security of their networks. These guidelines, available at www.nsa.gov, are included in the "Router Security Configuration Guide," which addresses principles for configuring secure routers and offers specific information on Cisco routers. Beginning with FireMon 5.1, administrators can evaluate configurations of Cisco routers for compliance with section 4.1 of the guidelines, Router Access Security. The NSA Router Security Report includes 24 FireMon extensions that can be run individually or as a single report. The report includes a pass/fail result for each guideline and offers remediation recommendations when a guideline is not met.

F5 Support
FireMon now offers device support for F5 BIG-IP LTM and GTM appliances. Support for F5 includes configuration change detection, retrieval of system configuration files as well as iRules and virtual servers, and change analysis such as configuration comparisons and change reports. Additionally, FireMon 5.1 introduces critical business continuity functionality for the F5 products. By providing insight into the consistency of critical object definions such as the nodes, application profiles, and iRules, FireMon helps managers ensure that local and site failovers do not interrupt business operations.

Other features

  • Advanced Change Monitoring: This robust backup retrieval mechanism ensures that network interruptions and outages don't cause FireMon to miss a configuration change.
  • New Reporting Framework: The new, extensible reporting framework allows FireMon customers to build custom reports from scratch.

Support
FireMon supports Check Point, Cisco, Juniper and McAfee firewalls. In addition to firewall management, it also provides policy management for F5 BIG-IP products and Cisco routers and switches. 

Availability
More information and a 30-day trial of FireMon 5.1 are available to prospective customers at www.securepassage.com. Customers with a current software subscription can access FireMon 5.1 through the User Center.

About Secure Passage
Secure Passage is a customer-focused company that brings innovative solutions to security management. The leading provider of firewall policy, risk, and compliance management solutions, Secure Passage's flagship product, FireMon, simplifies and automates the analysis of configuration and change management processes to enhance security, optimize performance, and speed compliance reporting. FireMon analyzes changes and performs audits in real time; simplifies policy management; and enforces configuration governance across firewalls, switches, routers, and other network devices. FireMon is the only solution on the market that can be customized to meet the unique audit and compliance reporting requirements for networks of all sizes while enabling IT organizations to do more with less effort. Enterprise-strength deployments of FireMon around the world support more than 35,000 security devices from vendors such as Cisco, Juniper, Check Point, McAfee, and F5. For more information, visit www.securepassage.com.

The Secure Passage logo, FireMon and the FireMon logo are registered trademarks of Secure Passage, LLC. All other products or company names mentioned herein are trademarks or registered trademarks of their respective owners.

Contact Information:

Contact:
Joe Franscella
Trainer Communications
Email Contact
925-271-8213