Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

9/10/2014
11:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

WatchGuard Technologies New Policy Map Provides X-Ray Vision Into Firewall Configurations and Network Traffic

Newest enhancement to award-winning visibility solution, WatchGuard Dimension(TM), allows admins to see policy misconfigurations and optimize traffic

SEATTLE – September 8, 2014 – WatchGuard® Technologies, a leader in integrated security platforms, today announced the industry’s first interactive, integrated policy mapping capability for Unified Threat Management (UTM) and Next-Generation Firewall (NGFW) appliances. Available in the latest version of the award-winning[i] real-time network security visibility solution, WatchGuard Dimension™, Policy Map provides a comprehensive view of traffic flow and policy impact across the entire network, with the ability to quickly filter or drill down for additional detail and analysis.

Security policies are central to firewall operation. According to a 2014 Verizon Report[ii], there’s a strong correlation between a badly configured firewall and the likelihood of a security breach. Dimension Policy Map aggregates disparate information about policies, interfaces, applications and related traffic flows, and presents it in a simple, intuitive and interactive visualization dashboard. It can be used for policy audits, to find active and misconfigured policies, to identify unusual/abnormal traffic patterns, to visually check if firewall policies or configuration changes have the intended impact on traffic patterns and much more.

"I’ve worked with other network vendors for years and they’ve never delivered this type of real-time analysis. Policy map is a powerful tool,” said César Schmitzhaus of Brazil-based Teltec Solutions, a Managed Security Services Provider (MSSP) that has been beta testing Policy Map. “The ability to see and analyze in real time the exact impact these policies are having on customers is incredibly powerful.  There’s no need for complicated reports, just an easy way for my entire team, even CIOs, to see what’s happening.”

“Security policies are the brains of a firewall and dictate the effectiveness of any firewall configuration and directly impact our customers’ network protection,” said Dave R. Taylor, vice president of corporate and product strategy at WatchGuard Technologies. “Given the tremendous customer uptake for Dimension on a global basis, we recognized an opportunity to improve their security management and help eliminate errors by giving network administrators a powerful tool for visualizing policy analysis. They can now see policies like never before and instantly evaluate the impact on the network or user.”

Beyond Policy Map, the newest update to Dimension brings a variety of additional insightful reporting and new dashboard features that includes information on zero-day malware, details about website visits and traffic disposition, enhanced navigation and consolidated CA certificate management. And, it comes free on any WatchGuard UTM or NGFW platform.

WatchGuard Dimension has been gaining rapid market adoption since it was first launched in late 2013. Customers have used the network security visibility tool to monitor and gain critical and timely insights about network security threats, bandwidth and Internet usage, as well as related traffic trends. For complete information on the latest upgrades to Dimension or to test-drive the tool, click here.

 

About WatchGuard Technologies, Inc.

WatchGuard® Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, best-of-breed security features, and policy-based management tools. WatchGuard provides easy-to-use, but enterprise-powerful protection to hundreds of thousands of businesses worldwide. WatchGuard products are backed by WatchGuard LiveSecurity® Service, an innovative support program. WatchGuard is headquartered in Seattle, Wash. with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

 

For additional information, promotions and updates, follow WatchGuard on Twitter @WatchGuardTech on Facebook, or on the LinkedIn Company page.

 

WatchGuard is a registered trademark of WatchGuard Technologies, Inc.  All other marks are property of their respective owners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Human Nature vs. AI: A False Dichotomy?
John McClurg, Sr. VP & CISO, BlackBerry,  11/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3350
PUBLISHED: 2019-11-19
masqmail 0.2.21 through 0.2.30 improperly calls seteuid() in src/log.c and src/masqmail.c that results in improper privilege dropping.
CVE-2011-3352
PUBLISHED: 2019-11-19
Zikula 1.3.0 build #3168 and probably prior has XSS flaw due to improper sanitization of the 'themename' parameter by setting default, modifying and deleting themes. A remote attacker with Zikula administrator privilege could use this flaw to execute arbitrary HTML or web script code in the context ...
CVE-2011-3349
PUBLISHED: 2019-11-19
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
CVE-2019-10080
PUBLISHED: 2019-11-19
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI ...
CVE-2019-10083
PUBLISHED: 2019-11-19
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.