Badges

55 Points
7 Years

User Activity

Over 5 years ago
Almost 6 years ago
Answered a question: OpenIAM vs Ping identity
I’m not familiar with those two products, unfortunately. Quest TPAM became One Identity, and is still the best, as far as I know.
Almost 6 years ago
Answered a question: OpenIAM vs Ping identity
Check out OneIdentity as another option in your analysis. https://www.oneidentity.com/ I'm not a vendor, and the company I work with does not use the IAM part, but I like it. Quest TPAM for privileged access management has been integrated to the OneIdentity suite, and is a…
Over 6 years ago
Have you assessed TPAM/Safeguard? (was a Dell product, now One Identity)
Over 6 years ago
Be careful with the "clean-up" report recommendations. Firemon tends to recommend deleting the hidden or shadowed rules, but those are often the more restrictive (better) rules, shadowed by an overly permissive rule at the top. Consider removing the top rule, and keeping…
Over 6 years ago
Policy Test is extremely useful, as well--we use that constantly in request design phase to quickly identify zones and policy placement. Object search/Omni search is invaluable, as well, providing the ability to find all the rules that may need updating when a server…
Almost 7 years ago
I already rule out Palo Alto, after trying to configure one for FireMon syslog reporting. You have to enable a syslog repeater, then configure for every single rule. CheckPoints seem most secure, but more difficult to configure than zone-based Junipers. I've only dealt…
Over 7 years ago
Extremely valuable, being able to view all those detailed firewall configs in one place, and be able to see at a glance what was changed at a specific date.

About me

PMP, ITIL, FMSE. Veteran technology and operations executive with a strong hands-on technical program management background; former USAF combat flight Instructor EWO, STO Chief, and Cyber Crew Commander. Provides thought leadership and influences the direction of technical and business solutions across organizations to ensure secure, mission-effective, IT operations.