We have a two-server system for web applications, and we utilize FireMon to manage our Palo Alto firewalls. We log in to FireMon for reporting and creating rules. Currently, I am working on a project that involves using FireMon to clean up some of our open rules. FireMon is deployed on-premises.
Security Engineer at a individual & family service with 10,001+ employees
Real User
Top 20
2023-07-24T20:41:00Z
Jul 24, 2023
We have a two-server system, application and web, and we're using FireMon for our Palo Alto firewalls and their logs, to help us create rules. We're working on cleaning up our rules using FireMon as well, because we have a lot of live, open rules.
Solution Architect at a transportation company with 51-200 employees
Real User
2022-09-04T19:37:00Z
Sep 4, 2022
We use it to capture logs and events from our enterprise firewalls, and we also collect configurations from those firewalls. Our main use case is for cleanup and hygiene of those firewalls, to make sure that all the rules that allow our systems to talk to each other are current and being used. And if they're not, then we clean those rules up. We use it more on the reporting and logging side, rather than for actually making changes to our firewalls.
Network Engineer at a financial services firm with 1,001-5,000 employees
Real User
2022-07-07T09:59:00Z
Jul 7, 2022
We use it to keep track of our firewall devices, as an inventory database and a collection of the configuration. It also draws out the map of our network, including non-firewall devices. We are using the latest version of the solution.
Security Analyst at a government with 501-1,000 employees
Real User
2021-10-28T00:08:00Z
Oct 28, 2021
We only have security management. It was deployed on-prem. It used to be on the hardware, and there used to be an appliance, but we have switched to a virtual server. We are now on a VM.
Network Engineer at a insurance company with 10,001+ employees
Real User
2021-08-26T11:40:00Z
Aug 26, 2021
I am a contractor and I work on security. At this company, we primarily use FireMon for firewall rule analysis and as part of our firewall rule certification process. Our environment is on-premises using VM hosts.
IT Security Admin at a tech vendor with 1,001-5,000 employees
Real User
2021-08-04T18:34:00Z
Aug 4, 2021
We use the Security Manager module. We use it to report and audit firewall changes. We also use it to track the hygiene of our firewalls in addition to the changes made to them. Since it normalizes the firewall config, we are able to do custom searches and make custom controls to build out those audits and reports, making sure that we are applying firewall rules correctly. There are a lot of built-in reports as well, which help us to identify rules and objects that are being used. We are an enterprise environment. We are definitely not the largest of FireMon's customers, deployment-wise.
Lead Network Specialist at a university with 5,001-10,000 employees
Real User
2021-06-30T18:02:00Z
Jun 30, 2021
We have a single server and we're a small group. We use FireMon to track all of our firewall rule changes. The security section lets you see where your unused rules are and it lets us go in there, optimize it, and make the firewall more secure.
Security Engineer at a transportation company with 10,001+ employees
Real User
2019-05-13T08:56:00Z
May 13, 2019
We use FireMon for compliance reporting. Also, because it provides a roadmap for us to start doing workflow automation - not to be confused with other forms of automation that occur in the firewall realm - we use it to see the processes and procedures that we can automate and enforce. These include approval processes, review processes, and pre- and post-implementation validation.
Information Security Analyst at a wholesaler/distributor with 5,001-10,000 employees
Real User
2019-05-09T13:13:00Z
May 9, 2019
We use it to go through unused rules, for cleaning up stuff. We have a bi-weekly meeting where we go through firewalls and look for any unused rules or any rules that are redundant and any high ports that are being used that we're not supposed to use.
Network Security Engineer- Senior at a financial services firm with 1,001-5,000 employees
Real User
2019-04-30T08:57:00Z
Apr 30, 2019
We use it for firewall cleanup, redundant rule removal, and unused rule removal. We are using the solution to identify anything that might have overly permissive rules or things outside of PCI compliance. We use it to proactively find those kinds of issues. There's more we could be doing with it for sure, we just haven't had the time yet. We currently have it covering every single firewall we have, which is a lot. There are potential plans to add routers and switches into it again, or even start adding in hybrid cloud solutions, things like that, that we won't be able to see. Honestly, we won't have a single pane of glass without FireMon, so we do have intentions of deploying it at a larger scale, and actually turning on some of those features which we don't use today.
The increasing complexity of networks, driven by the constant influx of new devices, applications, and cloud services, presents a daunting challenge for managing firewall policies and rules. A typical enterprise environment has millions of rules, and just one simple misconfiguration can lead to devastating consequences like compliance violations, outages, and data breaches.
FireMon’s Security Manager is a purpose-built network security policy management (NSPM) platform that...
We use Security Manager for firewall changes, monitoring, and audits.
We have a two-server system for web applications, and we utilize FireMon to manage our Palo Alto firewalls. We log in to FireMon for reporting and creating rules. Currently, I am working on a project that involves using FireMon to clean up some of our open rules. FireMon is deployed on-premises.
We have a two-server system, application and web, and we're using FireMon for our Palo Alto firewalls and their logs, to help us create rules. We're working on cleaning up our rules using FireMon as well, because we have a lot of live, open rules.
We use FireMon for monitoring, reporting, and logging purposes.
We use it to capture logs and events from our enterprise firewalls, and we also collect configurations from those firewalls. Our main use case is for cleanup and hygiene of those firewalls, to make sure that all the rules that allow our systems to talk to each other are current and being used. And if they're not, then we clean those rules up. We use it more on the reporting and logging side, rather than for actually making changes to our firewalls.
We use it to keep track of our firewall devices, as an inventory database and a collection of the configuration. It also draws out the map of our network, including non-firewall devices. We are using the latest version of the solution.
We only have security management. It was deployed on-prem. It used to be on the hardware, and there used to be an appliance, but we have switched to a virtual server. We are now on a VM.
I am a contractor and I work on security. At this company, we primarily use FireMon for firewall rule analysis and as part of our firewall rule certification process. Our environment is on-premises using VM hosts.
We use the Security Manager module. We use it to report and audit firewall changes. We also use it to track the hygiene of our firewalls in addition to the changes made to them. Since it normalizes the firewall config, we are able to do custom searches and make custom controls to build out those audits and reports, making sure that we are applying firewall rules correctly. There are a lot of built-in reports as well, which help us to identify rules and objects that are being used. We are an enterprise environment. We are definitely not the largest of FireMon's customers, deployment-wise.
We have a single server and we're a small group. We use FireMon to track all of our firewall rule changes. The security section lets you see where your unused rules are and it lets us go in there, optimize it, and make the firewall more secure.
We are resellers. All of our clients are enterprise companies.
We act as a business partner for our clients. We're implementors. Each client has a different use case.
The primary use case is for compliance and monitoring of firewall changes. This solution allows us to secure our firewalls.
The primary use case is optimizing firewall rules.
We use FireMon for compliance reporting. Also, because it provides a roadmap for us to start doing workflow automation - not to be confused with other forms of automation that occur in the firewall realm - we use it to see the processes and procedures that we can automate and enforce. These include approval processes, review processes, and pre- and post-implementation validation.
We use it to go through unused rules, for cleaning up stuff. We have a bi-weekly meeting where we go through firewalls and look for any unused rules or any rules that are redundant and any high ports that are being used that we're not supposed to use.
We use it for firewall cleanup, redundant rule removal, and unused rule removal. We are using the solution to identify anything that might have overly permissive rules or things outside of PCI compliance. We use it to proactively find those kinds of issues. There's more we could be doing with it for sure, we just haven't had the time yet. We currently have it covering every single firewall we have, which is a lot. There are potential plans to add routers and switches into it again, or even start adding in hybrid cloud solutions, things like that, that we won't be able to see. Honestly, we won't have a single pane of glass without FireMon, so we do have intentions of deploying it at a larger scale, and actually turning on some of those features which we don't use today.
Optimizing and cleaning firewall rules and objects to maintain the security of the firewall and other devices.