Blind to what changes are being made in your network? FireMon is the answer!
Updated March 06, 2023
Blind to what changes are being made in your network? FireMon is the answer!
Score 6 out of 10
Vetted Review
Verified User
Modules Used
- Security Manager
- Risk Analyzer
Overall Satisfaction with FireMon
FireMon is being used to provide detailed historical records of every change/revision made on every network appliance enterprise-wide. It provides instant visibility on what changed when issues arise. Considering outages and time to restoration are measured by duration, having a single pane of glass showing which firewall rule or ACL was updated is priceless. Without FireMon, we would go into every outage--both small and large--blind, trying to figure out where to start.
Pros
- Tracking firewall rule changes.
- Normalizing data so that it's easily understandable across different vendors and technologies.
- Providing detailed or summary reports for the data you actually want.
Cons
- It seems like their licensing model is constantly evolving.
- Often, support will have to escalate cases to engineering.
- Certifications are always geared to a particular version.
- Reduced complexity
- Reduction in inactive firewall rules
- Quicker times to restoration during outages knowing what changed
Do you think FireMon delivers good value for the price?
Yes
Are you happy with FireMon's feature set?
Yes
Did FireMon live up to sales and marketing promises?
Yes
Did implementation of FireMon go as expected?
Yes
Would you buy FireMon again?
Yes
Both perform admirably with regards to providing that single pane of glass and visibility in a normalized view. They both provide great insight into where your organization stands in terms of compliance controls. In terms of upgrading and scalability, I would have to give the edge to Tufin.
Using FireMon
20 - Al users of FireMon are either in IT Security or Network Services.
5 - All users that aid in the maintenance of our FireMon implementation are in the IT Security Engineering group.
- Standardized security policy rule sets
- Standardized configuration maintenance
- Standardized logging and reporting
- Visibility into our cloud environments
- Prevent misconfigurations
- Auditing
Comments
Please log in to join the conversation