sb-eu logo
Story image

New Azure and AWS integration announced amid increasing cyber threats

FireMon, a security automation solutions specialist, yesterday announced new integrations with Microsoft Azure and Amazon Web Services (AWS). 

The company says the integration of the two cloud giants will help match the pace needed to protect systems from ongoing and increasing cyber threats and data breaches.

The new integrations come amid the industry trend of emerging multi-cloud and hybrid environments. 

Some features of FireMon's new product:
  • Fast rule creation to manage cloud traffic targeting certain types of traffic, based on the protocol, ports, sources, and destinations.
  • Ability to create and modify firewall rules for specific instances in the cloud.
  • Capbility to configure security access rules to support migration between data centres and the cloud.
  • Ability to deploy context-aware policies which automatically adapt to protect systems as required by digital enterprises.

“With our latest Microsoft Azure and AWS cloud integrations, customers can now deploy a security policy orchestration across any type of infrastructure,” says FireMon vice president of technology alliances Tim Woods.

A move to cloud and hybrid infrastructure requires security automation

According to a recent report, 78% of organisations already use both AWS and Azure to host their infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) systems, with cloud-based threats increasing in tandem.

Whether using a cloud-first or hybrid model, all organisations eventually come across common security issues. 

These organisations must meet their customers' demands for agility in performance while tackling the need to simplify, avoid human-introduced risks, and maintain compliance.

Organisations must maintain a centralised view of threat management across their environments; be able to securely deploy new applications and workloads; manage access and control systems; securely transfer and migrate data; and accomplish all of this at the speed of the cloud.

“An average enterprise has 14 IaaS and PaaS public cloud misconfigurations running simultaneously, which results in more than 2,200 incidents per month and leads to data breaches and serious security issues,” says FireMon vice president of global field engineering Jeffrey Styles. 

“Enterprises need to use automated tools to help lift the burden of securing cloud initiatives from overworked security teams.”

Streamline security policies across environments

FireMon integrates with the native controls of multiple public cloud platforms to streamline security policies between cloud and data centre environments. 

Firewalls can be placed in a physical or virtual environment, and FireMon asserts its monitoring capabilities provide equal visibility into security policies as with physical firewalls. 

The company supports cloud and hybrid infrastructures through:
  • Cloud-native objects and associations in policy with VM support.
  • The ability to differentiate inbound/outbound firewall and access rules.
  •  Support for Application Security Groups.
  •  Automation support via FireMon’s Global Policy Controller for adaptive policy enforcement.
  •  Deployment with support in AWS and Azure cloud marketplaces.
Story image
Quantum extends Veeam partnership in a bid to protect against ransomware
“Quantum continues to expand its partnership with us and we are pleased to add ActiveScale object storage to a select group of S3 targets that can provide robust ransomware protection for our joint customers."More
Story image
ICS vulnerabilities on the rise as gaps in remote work expand attack surfaces
The number of ICS vulnerabilities disclosed in 2020 increased by more than 30% compared to 2018 and nearly 25% compared to 2019.More
Story image
ExtraHop reveals methods used by attackers in SUNBURST breach
The network detection and response company says between late March and early October 2020, detections of probable malicious activity increased by approximately 150%, including detections of lateral movement, privilege escalation and command and control beaconing.More
Story image
Cybersecurity trends to look out for: Extortion among the top threats in 2021
Cyber-crime is evolving, driven by emerging trends — 2021 may be the first year when data extortion officially becomes the main threat to businesses worldwide.More
Story image
High demand for hackers on the dark web
"Since March 2020, we have noticed a surge of interest in website hacking, which is seen by the increase in the number of ads on forums on the dark web."More
Story image
Latest Tenable launch provides holistic approach to vulnerability management
Tenable.ep is reportedly the industry’s first, all-in-one, risk-based vulnerability management platform designed to scale as dynamic compute requirements change.More