Intelligent automation is only one piece of a robust security policy.
See how our full solution suite completes the picture.
Equip yourself with the technical details to discuss with your team.
Go faster with resources and insights from our experts
FireFlow automates the security change policy process from planning through deployment to production. FireFlow integrates with your existing with IT Service Management (ITSM) solutions, such as ServiceNow, BMC Remedy and HP for quick, accurate changes.
Firewall policy rules determine what traffic your firewall allows and what is blocked. Firewall rules examine the control information in individual packets, and either block or allow them according to the criteria that you define. Firewall rules control how the firewalls protect your network from malicious programs and unauthorized access.
Using FireFlow you can manage all inbound firewall rules to protect the network against incoming traffic, such as disallowed connections, malware, and denial-of-service (DoS) attacks and outbound firewall rules to protect against outgoing traffic, originating inside a network.
When making changes to firewall rules, be aware of any potential security risks. Firewall rules should always be documented, with the creation and expiration date, the name of the person who added the rule and clarification of the rule’s purpose and what applications, services, devices, users and data it affects.
FireFlow enables firewall security policy management through automated changes to firewall policies. FireFlow zero-touch change management integrates strategy, planning and design, implementing proactive risk analysis, validation and auditing to prevent errors and save time.
FireFlow automatically discovers all applications, devices and rules which are impacted by a change request. It then intelligently designs or updates any necessary firewall rules, utilizing existing rules and objects whenever possible to reduce policy clutter and complexity. FireFlow instantly identifies and closes unnecessary (“already works”) change requests, which helps prevent up to 30% of unnecessary changes.
Firewall change requests are requests for a firewall configuration change which result in a change to the network security infrastructure. Firewall change requests must be monitored to prevent unintentional errors that violate compliance standards or increase vulnerabilities to the network.
FireFlow automatically analyzes every proposed change – before it is implemented – to identify risks and ensure compliance with regulatory and corporate standards.
FireFlow leverages the broadest risk knowledge base which includes industry best practices, regulations such as PCI DSS, GDPR, HIPAA, and SOX, as well as corporate-defined policies.