FireMon Risk Analyzer

FireMon’s Risk Analyzer reduces risk by analyzing your network infrastructure both proactively and completely, then simulating how attackers might gain access to reachable assets with vulnerabilities. Its patented analysis engine analyzes large, complex networks in just minutes and gives you prioritized, actionable data for strengthening your defenses immediately.

Risk Analyzer functional provides:

• Topological attacks representation.
• Rapid7 Nexpose and Metasploit integration.
• Attacks simulation.
• Recommended scenarios to fix nodes.
• Dashboard for critical resources.
• Attacks reporting.
• Policy Planner integration.

An active community of adversaries is launching constant attacks on large, complex networks for financial gain, espionage, revenge or simple challenge. Granting access to the applications that run your business can create gaps that lead to security breaches. Trends like consumer devices in the office and voice networks moving to IP add entry points that an attacker can exploit. These developments create serious risks to your organization’s reputation, customer trust and the bottom line.

The best defense is a good offense — one that helps network security managers take a preemptive and strategic approach to analyzing areas of network vulnerability. You need a proactive way to see and assess threats because of the size and complexity of firewall configurations, and the huge burden and time-sink of patching tens of thousands of vulnerabilities. You need actionable intelligence that delivers real-time information on current security posture in the face of relentless attacks from inside and out.


Visualize real-time enterprise risks

To assess the impact of a potential attack, you have to understand how multiple exploits can be used in combination and how well current network countermeasures defeat attacks. You have to analyze multiple remediation strategies and select the most effective one.

FireMon’s Risk Analyzer reduces risk by analyzing your network infrastructure both proactively and completely, then simulating how attackers might gain access to reachable assets with vulnerabilities. Its patented analysis engine analyzes large, complex networks in just minutes and gives you prioritized, actionable data for strengthening your defenses immediately.


Create attack scenarios against assets to determine reachability


Supported Devices

Firewalls
• Cisco ASA, PIX, FWSM
• Check Point NG+
• Check Point SmartCenter
• Check Point Provider-1
• Palo Alto Networks PA Series
• Fortinet Fortigate
• Juniper Netscreen, SRX

Network infrastructure
• Cisco switches and routers

System penetration testing
• Rapid7 Metasploit

Vulnerability Scanning
• nCircle IP360
• Rapid7 Nexpose
• Nessus Vulnerability Scanner
• Qualys QualysGuard
• McAfee MVM