FireMon FireWall Management – ICS
info@ics.com.ph MANILA (+632) 8689-5000 | CEBU (32) 260 - 2071 | TOLL-FREE 1-800-10-1427273

SECURITY > FIREMON

FireMon Security Manager

Real-time visibility and control, continuous compliance,
and unrivaled policy-based security for today’s hybrid enterprise

Real-time visibility and control, continuous
compliance, and unrivaled policy-based
security for today’s hybrid enterprise

Talk to an ICS Expert today!

FireMon Security Manager addresses the inherent complexity and changing
requirements of today’s enterprise networks by providing continuous visibility into network
security devices and policies. A scalable architecture and intuitive user interface ensure that
security practitioners in any enterprise have the actionable data they need to quickly adapt
defenses to changing business needs and emerging threats.

FireMon Security Manager addresses the
inherent complexity and changing
requirements of today’s enterprise
networks by providing continuous visibility
into network security devices and policies.
A scalable architecture and intuitive user
interface ensure that security practitioners
in any enterprise have the actionable data
they need to quickly adapt defenses to
changing business needs and emerging threats.

1
2
3
4
5

How Security Manager Helps You

Achieve Continuous Compliance

Security Manager provides automated compliance assessment capabilities that help you validate
configuration requirements and alert you when violations occur. Whether you need audit reports
ready out-of-the-box or customizable reports tailored to your unique requirements, Security Manager
reduces the time you spend configuring policies and gives you the confidence that you’re ready to meet
your regulatory or internal compliance audit demands.

Optimize Vulnerability Management

Through real-time traffic flow analysis, Security Manager tracks behavior across your hybrid network
to identify which applications are being used in a rule and between sources and destinations. You can
also correlate your vulnerability scans with Security Manager’s access path analysis to trace every
available access path across the network to effectively reduce your network’s attack surface with a
defined path to remediation.

Automate Security and Orchestration

With Security Manager, you can easily create, maintain, and distribute security policies in highly
dynamic environments, as well as scope the impact of proposed policy changes on your compliance
and security posture. Real-time change analysis documents the who, what, when and why of every
change and establishes a baseline for normalized device rules. By automating and orchestrating
change management, Security Manager ensures your ability to operate at scale across your cloud,
virtual and hybrid environments.

Risk and Complexity

Security Manager helps you maintain policies on your network security devices to eliminate unnecessary
access and risk. With comprehensive rule analysis and automated workflows for rule review, you can
remove technical mistakes and misconfigurations, remove unused access, and review and refine access to
optimize the performance of your devices, reduce policy complexity and enhance your security profile.

Scale with Your Network Evolution

Security Manager’s unmatched scalability, in-depth analysis and third-party integration enables
real-time, centralized visibility and control as your hybrid network evolves. You can perform
simultaneous analysis and normalization across multiple platforms and vendors while splitting
out reporting functions on a dedicated appliance, and retain data indefinitely without any system
performance degradation. Our flexible and dynamic API lets you incorporate information you’re your
third-party solutions for comprehensive, centralized network security assessment and management.

How Security Manager Helps You

1

Achieve Continuous Compliance

Security Manager provides automated
compliance assessment capabilities that
help you validate configuration
requirements and alert you when
violations occur. Whether you need
audit reports ready out-of-the-box
or customizable reports tailored to
your unique requirements, Security
Manager reduces the time you spend
configuring policies and gives you
the confidence that you’re ready
to meet your regulatory or internal
compliance audit demands.

2

Optimize Vulnerability Management

Through real-time traffic flow analysis,
Security Manager tracks behavior
across your hybrid network to identify
which applications are being used in
a rule and between sources and
destinations. You can also correlate
your vulnerability scans with
Security Manager’s access path
analysis to trace every available
access path across the network to
effectively reduce your network’s
attack surface with a defined path to remediation.

3

Automate Security and Orchestration

With Security Manager, you can easily
create, maintain, and distribute security
policies in highly dynamic environments,
as well as scope the impact of proposed
policy changes on your compliance and
security posture. Real-time change
analysis documents the who, what, when
and why of every change and establishes
a baseline for normalized device rules.
By automating and orchestrating change
management, Security Manager ensures
your ability to operate at scale
across your cloud, virtual and hybrid environments.

4

Risk and Complexity

Security Manager helps you maintain
policies on your network security
devices to eliminate unnecessary
access and risk. With comprehensive
rule analysis and automated workflows
for rule review, you can remove
technical mistakes and misconfigurations,
remove unused access, and review and
refine access to optimize the performance
of your devices, reduce policy complexity
and enhance your security profile.

5

Scale with Your Network Evolution

Security Manager’s unmatched scalability,
in-depth analysis and third-party
integration enables real-time,
centralized visibility and control
as your hybrid network evolves. You
can perform simultaneous analysis and
normalization across multiple
platforms and vendors while splitting
out reporting functions on a dedicated
appliance, and retain data indefinitely
without any system performance
degradation. Our flexible and dynamic
API lets you incorporate information
you’re your third-party solutions for
comprehensive, centralized network
security assessment and management.

Let us know what you need.