SURVEY: 1 IN 2 BUYERS REQUIRE CSR IN PROCUREM... » Almost half of buyer documents (48 per cent) seen by electrotechnical businesses with turnover above... G4S Africa supports small business development thr... » The latest product in the G4S Deposita range is a smart safe system called mini-pay that holds up to... Commissioner's statement following incident in Man... » This is an utterly appalling attack. My thoughts are with the people of Manchester as they try to co... UPDATE: Policing events in the Capital » Following the horrific terrorist attack in Manchester last night, in which 22 people were killed and... Statement from Assistant Commissioner » Statement from Assistant Commissioner Mark Rowley, Head of National Counter Terrorism Policing: The... Met intensifies policing activities in London fol... » The Metropolitan Police Service (MPS) has increased police numbers and operations across the Capital... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTORA... » Please visit also: SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW A treat... Home Secretary’s statement on the Manchester attac... » I know that some people will only just be waking up to the news of the horrific attacks in Mancheste... Checkpoint Systems unveils Bug Tag 2 loss preventi... » Checkpoint Systems has announced the launch of Bug Tag 2 – an innovative loss prevention solution th... Edesix launches new head and torso mounted body wo... » Edesix has announced the launch of new head and torso mounted cameras. The X-100 is a side-mounta...


Advertise with Vigilance


Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.


Defence and Security Strategy

FireMon has announced FireMon Intelligent Policy Automation (IPA), its vision for a new standard in firewall change automation that takes into account the impact on compliance and security to reduce the manual effort and unnecessary security risk associated with today’s complex implementations. To date, customers leveraging the IPA framework have reduced the time to complete a change by more than 90%, while maintaining their security posture or even lowering the level of risk.

FireMon Intelligent Policy Automation (IPA) is a lifecycle policy management framework that helps customers make the right changes as fast as responsible, rather than as fast as possible. The framework provides context around access requests to help system administrators and network engineers determine and implement the change that best enables the business without introducing new risk.

“Today, security and operations teams are inundated with change requests – many of which are still handled manually – and meeting SLAs often comes at the expense of security,” said Matt Dean, Vice President of Product Management for FireMon. “Current automation solutions can help, but without awareness of the impact to compliance and security, they’re only speeding up implementation of incorrect changes, which negates the effort and introduces risk.”

Crucially, FireMon’s Intelligent Policy Automation, through its standards-based workflow engine, injects automation and analysis at every stage of the change process, ensuring that engineers are able to design and approve the correct change quickly. The framework is devised so that simple, low-risk access requests get through the process swiftly while providing engineers with the time and analysis required to properly assess the impact of the more complex ones.

“A key piece to raising an organisation’s security posture is proper management of its network components and security technology,” said Michael Callahan, CMO, FireMon. “Intelligent Policy Automation provides context and brain power to implementing policy changes, so it not only helps in shortening the time it takes to make them, but engineers can also be confident that the changes are accurate the first time around and don’t open up any security holes.”