FireMon Asset Manager 5.0 Offers Next-Level Network Management

FireMon, the leading network security policy management (NSPM) company, is releasing FireMon Asset Manager 5.0, providing comprehensive real-time cyber situational awareness of an organization’s infrastructure. The update brings improved manageability, extends integration with other platforms, and further strengthens delivering complete visibility of organizational assets.

FireMon Asset Manager 5.0 finds every L2 and L3 device across the network, including on-premises and cloud environments. This gives teams an accurate inventory of all networks, connections, routes, and devices across the enterprise, according to the company.

Automatic profiling identifies devices, including endpoints, routers, switches, and OT/IoT, whether installed in the organization’s data center or hosted in the cloud. To achieve this, Asset Manager uses multiple discovery protocols to support active, passive, and targeted discovery methods, avoiding the use of agents to further reduce network impact.

According to the company, FireMon Asset Manager 5.0 delivers the most robust, flexible API to date for sharing asset knowledge with other systems. This ensures continuous compliance and helps protect the organizational environment. Companies can, therefore, enhance their existing security investments by feeding them complete, accurate, and fact-based network intelligence.

The new version delivers enhanced integration capabilities with the Axonius cyber asset management solution, VMWare’s Carbon Black Cloud endpoint and workload protection platform, and Cisco’s Meraki network management platform for improved discovery in those environments.

“FireMon Asset Manager provides a real-time cyber situational awareness for discovering and monitoring the entire network infrastructure. The newly introduced features in version 5.0 take asset discovery to a new level,” said Jody Brazil, CEO of FireMon. “FireMon uses advanced behavioral detection techniques to alert security teams when suspicious activities or compliance violations are detected. Fundamentally, it accurately reduces organizational risk by detecting and identifying assets and networks to secure the business environment.”

For more information about this news, visit