Firewall Policy Mgt

Anymon FM (Firewall Policy Management Solution)

Anymon FM is an all-in-one diversified firewall policy integration management solution that analyzes collected logs and policies by integrating with various firewalls and APIs. It offers automated policy approval and application to firewalls through optimized recommendations.

By implementing zero-trust security with 2-factor authentication and access control based on reliability data, it ensures safe and secure operations

Key Features

icon

  1. 1. Patented Superior Policy Analysis Capabilities

    - Big Data Log Predictive Analysis System (Patent No. 10-1808642)

    - Anomaly Behavior Judgment System (Patent No. 10-1542534)

  2. 2. Support for 2-Factor Authentication (Enabling Remote/Telecommuting)

    - Robust and secure authentication combining security token HSM (FIPS/CC certified) and UNET Systems' PKI product, TrustNet (KCMVP certified by the National Intelligence Service of South Korea).

  3. 3. Policy Consistency Verification and Automatic Policy Transfer

    - Provides consistency verification and automatic transfer of policies through a self-developed verification and transfer module.

Key Features

Policy Approval and Automatic Application
  • - Approval system for newly requested policies and support for bulk policy requests.
  • - Automatic policy implementation and scheduled application support.
Comprehensive Policy Analysis
  • - Provides status of duplicate policies, policies nearing expiration, and active/inactive policies.
  • - Analyzes overly permissive policies and suggests/offers policy separation.
Integration with various types of Firewalls
  • - Comprehensive status overview of all integrated devices.
  • - Supports network configuration and policy analysis in virtualized environments.
Notifications for Policy Analysis Completion
  • - Notification/Alerts for policy approval and application.
  • - Automatic generation and distribution of comprehensive reports.
Support for Security Audits
  • - Compliance violation status by device.
  • - Real-time violation monitoring to actively support security audits.
Topology and Path Analysis
  • - Provides network topology maps through registration of firewalls and network devices.

Extensive Experience in Integrating with Firewalls from Various Manufacturers.

Key References