FireMon Reviews

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
56 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 7.8 out of 101

Do you work for this company?

Overall Rating

Reviewer's Company Size

Last Updated

By Topic

Industry

Department

Experience

Job Type

Role

Filtered By:

Reviews (1-25 of 33)

No photo available
October 18, 2019

I love FireMon

Score 10 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon is used to manage the firewalls in the organization. It allows us to view rules and configurations as well as allows us to audit it to see where we can improve the rule sets. It can also create helpful reports with great suggestions or display what you have in a nice organized fashion. Wonderful device!
Read this authenticated review
Howard Wall profile photo
Score 10 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

As the complexity of our environment has increased, we found it difficult to audit our firewalls and keep track of changes. Most importantly was the compliance aspect. Traditionally this has been done with a manual review, but as we have added firewalls and from different vendors, this had become a time-consuming process that was unsustainable. With FireMon we are able to continually audit our firewalls and flag any issues that would cause a problem with a security audit. The initial remediation was difficult, but we are now able to quickly identify any issues and get them remediated quickly. It also gives us the ability to supply reports to our auditors to address any questions they may have about the security of our network.
Read Howard Wall's full review
Robert Bollinger profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon is being leveraged across several IT Departments, including IT Security, Risk Management, Engineering, and Architecture teams. For us, it helps across many of our business models. We are in a highly regulated industry, SOX, MICS (gaming), and PCI, to name a few. For security best practices, we leverage integrated reports to help identify unused rules and objects. From an engineering and architectural approach, we leverage anything from policy creation and optimization, to ping path analysts to make sure the correct firewalls and policies are submitted the first time. With close to 100 firewalls, this helps streamline the process.
Read Robert Bollinger's full review
Johnson Ditching profile photo
January 23, 2019

A Life with FireMon.

Score 9 out of 10
Vetted Review
Reseller
Review Source

Use Cases and Deployment Scope

We are a product distributor of Firemon, we were able to sell Firemon to some of our customers, from telecoms, banks and call centers. I am the one providing the walkthrough and guide the customers on how to integrate the FireMon security manager to the Firewall devices. FireMon addresses a lot of difficulties that the firewall administrator faces, a lot of firewall devices are not optimized. FireMon can help a lot on this department. Though FireMon has other add on modules from the security manager. I did not see an aggressive positioning of the other modules.
Read Johnson Ditching's full review
Mohamad CHAABAN profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

Well, we are using FireMon in our IT department only. I would like to share my latest concern about it. Since the last major upgrade of FireMon, I am facing a major problem where all my devices are showing the Critical button. While some are having serious issues, others are not but it keeps showing up as Critical. In the last versions, we had three icons and we could directly identify and prioritize the criticality of each. This is my major concern with the update. FireMon also does not recognize Source Object group difference and thus makes my reports unreliable and I have to double check! Otherwise, I love working with FireMon.

Read Mohamad CHAABAN's full review
No photo available
Score 6 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon is used for tracking and reviewing firewall rules on a regular basis. It is used to save an old process of manually tracking all of the firewall rules.
Read this authenticated review
No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon is a global tool that has been purchased to get a centralized view of our firewalls. This enables us to review our security posture and implement a compliance strategy with our customers.
Read this authenticated review
No photo available
Score 10 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

We have used FireMon for our MSS clients, including managed firewalls from a different vendor. It's mainly used to manage firewalls, policy review and integrate into the CAB approval process, it went well and provided an easy solution for us and accurate report to clients. Friendly user interfaces are easy to use and system was stable all the time.
Read this authenticated review
No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

Both the networking and security departments utilize FireMon to do configuration and rule reporting across multiple firewall products and vendors. This includes utilizing FireMon to check for changes in firewall policy or troubleshooting if a connection should be allowed/denied through multiple firewalls.
Read this authenticated review
No photo available
Score 7 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

Currently, FireMon is used as an auditing tool to track all changes. Also, we use it for quarterly reviews to do rule cleanup on firewall rules. It is only being used by our IT Security Team for our firewall assets. This tool is required for record retention.
Read this authenticated review
No photo available
January 08, 2018

FireMon - Worth it.

Score 10 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon is used by firewall administrators and security analysts on a regular basis. Administrators analyze proposed changes and existing rules base. Security analysts use it to audit.
Read this authenticated review
No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

This is a great tool to keep an eye on our network engineers to make sure that all changes done are under our existing change control process.
Read this authenticated review
Daniel James profile photo
Score 10 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon is actively being used by our security team to enforce oversight and compliance standards for our firewall environment. Additional business units are also leveraging the solution to help with reporting. Change management will use the tool to identify rogue changes or changes that may have been implemented outside of our internal change management guidelines. Firewall admins will use the solution to improve the quality of the rules that they generate and to assist with the review and approval workflow. Compliance leverages the solution to help prioritize which devices may need more assistance or a greater amount of overhead needed to remediate.

The main benefit at this time is that it helps us help ourselves and reduce the amount of calories we burn each month or quarter in identifying what issues we need to address in our environment. Getting ready for audit, or quarterly reviews of devices is exponentially easier. Having the ability to automate many of our controls into our workflow on an ongoing basis also reduces the amount of time spent in each of those scheduled reviews/clean up efforts.

Read Daniel James's full review
Eric Garcia profile photo
January 20, 2017

FireMon Excellence!

Score 9 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon Security Manager is currently utilized for change management across all of our firewall systems. The reporting and assessment facilities also provide essential information to assist us with ensuring our firewall environment is at its most efficient. FireMon is utilized by the security and network management teams in our organization.
Read Eric Garcia's full review
Jackie Duarte profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon Security Manager is being used within my organization for several purposes. I specifically utilize FireMon 8 in order to gain long-term information about the traffic hitting the firewalls within the network. The reports that I'm able to run using FireMon 8 give allow me to better analyze the firewalls in order to remediate rules within the firewalls.
Read Jackie Duarte's full review
Jamie Hudson profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon Security Manager is used to monitor our internal firewall usage, daily firewall changes, and is also used for firewall report creation. It is currently used just by the information technology department, although it is used by various users including technicians, administrators, and analysts. FireMon Security Manager helps the business comply with payment card industry data security standard compliance.
Read Jamie Hudson's full review
Ryan Bast profile photo
January 13, 2017

FireMon Review

Score 9 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

It is used by our IT department to audit existing firewall configurations. It is helpful in finding redundant or unused rules in the configuration. We also find the traffic flow analysis tool extremely helpful. When creating new rules for new applications we find a lot of required ports are not properly documented and the flow analysis provides a great way to audit the rules traffic and narrow down the exact ports required for an application.
Read Ryan Bast's full review
Larissa Cui profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

We use FireMon to monitor any changes that are made to our network. We reference the changes against our change management to make sure that the change was authorized and nothing was added or subtracted without prior approval.
Read Larissa Cui's full review
David Yu profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon Security Manager is used for audit archival and compliance. The software allows us to log changes in firewall policies and track who and when. When configurations are audited, the software allows us to compare changes made over a specific time period.
Read David Yu's full review
Chris Goodrich profile photo
January 13, 2017

PCI review

Score 8 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

It's being used to monitor our firewalls for changes and keep track of the requests for new changes. It's primarily just for the IT security department. The primary problem it addresses is PCI compliance.
Read Chris Goodrich's full review
Bharath Cherukuri profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

We use Firemon security Manager to maintain all the Cisco based firewalls across our organization. It is used to check the daily reports updates and changes on each and every firewall.

Mainly we use FireMon to get the audit reports on the firewalls.
Read Bharath Cherukuri's full review
No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

We adopted the PP module as an alternative to very resource intensive, manual legacy procedures we used to check for rule compliance in the past. Even though implementation is being championed by our NetSec department, we have integrated it with an End-to-End overarching process which allows us to reconcile and match information from rules, their 'owners' or requestors, and their intended use. Primarily, it eases and streamlines our change management procedures while giving us instant visibility into 'who' requested 'what' and 'why' it has been configured that way.
Read this authenticated review
No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

FireMon is very useful for reporting any changes made to firewall policies in real-time. It sends an email of who, what, and when the change was made. Very using for alerting other network admins. Reports also show which firewall rules may be too open. Firewall rule cleanup is important to keep up with. FireMon makes it easier.

Another feature I like is the API. Checkpoint doesn't have an easy way to search for NATed IP addresses associated with host objects. In v7 we use a PHP script to compile the real IP address, NAT IP address, name, and comment data to be easily searchable to help find available NAT addresses to use. Unfortunately, v8 doesn't pull the NAT data from Checkpoint at this time. Support said they are working on it.
Read this authenticated review
No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source

Use Cases and Deployment Scope

We're utilizing this only within IT. We track changes to the firewall with it as well as using it to track access list usage and current openings. We're using the product to make the auditing of firewall openings much easier. Rather than having to track need for openings manually, we're able to identify whether an opening is being used and how much it is used.
Read this authenticated review

Feature Scorecard Summary

Policy planning and rule management (7)
8.7
Automated Policy Orchestration (3)
9.1
Device Discovery (6)
7.1
Policy Compliance Auditing (10)
8.5
Attack Path Simulation Testing (2)
7.7
Anomalous Event or Behavior Deviation (1)
9.1
Firewall Rule Cleanup (10)
8.2

About FireMon

FireMon's Network Security Policy Management (NSPM) platform gives security and operations teams automated visibility and analysis for network security devices. FireMon's web-based UI allows users to dissect their network security policies, locate compliance failures, and assess security vulnerabilities. The vendor says the platform proactively delivers intelligence around IT security and compliance so organizations can make better decisions about their network security.

The FireMon platform offers:

  • Real-time monitoring for security and network operations to see details in complex IT and security systems. With granular, sub-second views into the network infrastructure, FireMon provides automated analysis to improve security posture, maintain compliance and detect advanced threats.
  • Automated Security Configuration Assessments (SCA) for continuous compliance, automated rule and cleanup recommendations, and risk-based simulation for policy changes. Users can create "what if" scenarios for analysis and model the impact of potential changes. This reduces time and gives greater assurance that firewall changes provide appropriate security and accessibility to IT assets.
  • Continuous assessment of all security device configurations in real-time, complying to regulatory and internal standards. Audits are automated with sub-second analysis and documentation across the security infrastructure.

FireMon Features

Has featureKPI Dashboards: See your network at a glance with analysis, trending and key performance indicator widgets on a customizable dashboard.
Has featureTraffic Flow Analysis: Monitor network traffic behavior – down to the application level – to isolate overly permissive configurations.
Has featureAccess Path Analysis: Trace every available access path across the network and visualize relationships between network devices to identify risk access points.
Has featureNetwork Mapping: Visualize and interact with highly complex network security environments or segmentations.
Has featureChange Detection & Reporting: Isolate, document and alert on every ongoing change implemented throughout your existing firewall policies.
Has featureAssessments & Controls: Define and employ unique security controls for customized, repeatable analysis and reporting on your firewall policies.

FireMon Videos (2)

FireMon Downloadables

FireMon Integrations

Palo Alto Networks Next-Generation Firewalls - PA Series, Palo Alto Networks URL Filtering PAN-DB, Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series, VMware NSX, VMware ESXi, Check Point Next Generation Firewall, Check Point Security Management, AhnLab Trusguard, Check Point FireWall-1 / SmartCenter / VPN-1 Edge including VSX, Cisco ASA / PIX / FWSM / ASA Context, Dell SonicWall, F5 AFM, Fortinet Fortigate / VDOM, Huawei USG / Eduemon, Hillstone SG-6000 series, IBM Proventia MFS, Juniper Netscreen / SRX / ScreenOS / VSYS, Secui NXG / MF2, Stonesoft Management Center and detected firewalls, Topsec Firewall, WeGuardia FW

FireMon Competitors

Pricing

Has featureFree Trial Available?Yes
Does not have featureFree or Freemium Version Available?No
Has featurePremium Consulting/Integration Services Available?Yes
Entry-level set up fee?Optional

FireMon Customer Size Distribution

Consumers
0%
Small Businesses (1-50 employees)
8%
Mid-Size Companies (51-500 employees)
15%
Enterprises (> 500 employees)
77%

FireMon Support Options

 Free VersionPaid Version
Phone
Email
FAQ/Knowledgebase
Video Tutorials / Webinar

FireMon Technical Details

Deployment Types:On-premise, SaaS
Operating Systems: Web based browser UI
Mobile Application:No
Supported Countries:All countries except North Korea, Iran, Sudan, Syria and Cuba
Supported Languages: English