Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

SolarWinds Launches Firewall Management Solution

SolarWinds, an Austin, Texas-based software maker known for its cost effective IT management solutions, today launched SolarWinds Firewall Security Manager (FSM), a multi-vendor firewall management solution.

SolarWinds, an Austin, Texas-based software maker known for its cost effective IT management solutions, today launched SolarWinds Firewall Security Manager (FSM), a multi-vendor firewall management solution.

The company says its new firewall management offering provides easy-to-use, integrated firewall analytics and change management, with a functionality set that addresses the key issues in managing firewalls and router security and management, including:

SolarWinds Logo• Ensuring that existing rules are effective and do not overlap

• Alerting users to changes in rules that break security policy

• Enabling users to test rule changes offline prior to rolling them out

• Ensuring that changes to rules don’t break policies

• Generating security audit reports

SolarWinds FSM also integrates with SolarWinds Network Configuration Manager, enabling the import of firewalls and routers managed in SolarWinds NCM directly into SolarWinds FSM.

Advertisement. Scroll to continue reading.

Additional features of SolarWinds Firewall Security Manager include:

• Automation of security audits using over 120 customizable, out-of the-box checks based on standards from NSA, NIST, SANS and more

• Ability to analyze firewall and router configurations and logs to isolate redundant, covered and unused security rules and objects

• Model how a new rule, or change to an existing one, will impact your firewall policy or break end-to-end connectivity without touching production devices

• Simplifies firewall troubleshooting and change management for your multi-vendor, Layer 3 network devices

While firewalls are a critical component of any IT security infrastructure, the rules governing firewalls can be complex and difficult to manage.

According to a recent SolarWinds survey, of the 155 IT professionals who completed the survey, over 150 respondents listed the following problems as the primary drivers of anxiety around the security of their firewalls:

• 79 percent are concerned about firewall rules that are retained beyond their useful period

• 67 percent struggle with the lack of documentation of the rules and their business purpose (i.e. Why do we have this rule?)

• 54 percent say that conflict between rules causes significant issues, compounded by the fact that those conflicts are hard to find and fix

• 54 percent struggle with rules that nobody understands but are maintained out of worry or fear

Of those respondents who do not currently do firewall audits, the number one reason behind this decision was a lack of time or resources.

Available immediately, SolarWinds FSM starts at $1,295, with the first year of maintenance included.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...