Listing Thumbnail

    FireMon Security Manager for AWS

     Info
    Sold by: FireMon 
    Deployed on AWS
    Real-time visibility, control, and management for network security devices across Amazon AWS cloud environments.
    4.3

    Overview

    Hyper Scale Security for your Hyper Scalable Clouds Whether your data and applications are stored on premises, in the data center, or public clouds (or a combination of all three), organizations still need to meet their requirements of security, control, compliance, and governance by themselves. The on-demand nature of public clouds such as AWS naturally means that workloads move and regroup, where maintaining continuous visibility and control over the rapid changes calls for expert intervention. Common security challenges include: Centralized visibility and threat management for your hybrid environment Deploy applications and workloads securely Manage access & control privileges to cloud and on-premises workloads Secure data transfer, data migrations Accomplish all of the security deployments at the pace and scale demanded by cloud architectures

    Highlights

    • FireMon can easily create, maintain, and distribute policies in highly dynamic networks, as well as scope the impact of proposed changes to your security. By automating & orchestrating, Security Manager ensures your ability to operate at scale across cloud, virtual and hybrid environments.
    • Through traffic flow analysis, FireMon tracks behavior across your network to identify which applications are being used. You can correlate vulnerability scans with access path analysis to trace every available path across the network to reduce your attack surface with a defined remediation.
    • Automated compliance assessments help you validate your configuration requirements and alert you to violations. Security Manager out-of-the-box audit ready and customizable reports saves time and gives you the confidence to meet your regulatory and internal security demands.

    Details

    Sold by

    Delivery method

    Delivery option
    FMOS AWS CloudFormation Template
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux 8.1

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    FireMon Security Manager for AWS

     Info
    Pricing and entitlements for this product are managed through an external billing relationship between you and the vendor. You activate the product by supplying a license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. AWS Subscriptions have no end date and may be canceled any time. However, the cancellation won't affect the status of the external license.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Vendor refund policy

    Please see seller website for refund details.

    How can we make this page better?

    Tell us how we can improve this page, or report an issue with this product.
    Tell us how we can improve this page, or report an issue with this product.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    Before launch, in the AMI configuration settings, you must add additional volume to prevent launch failure.

    Add Storage tab, click Add New Volume and in the Size field enter at least 600. Do not change the Root Volume Type.

    Complete FMOS Initial Setup after launch:

    1. Open a web browser.
    2. Navigate to https://<hostname>:55555/setup, replacing <hostname> of the SIP instance running in AWS with the IP or the hostname.
    3. In the Authentication dialog box-Username is fmosadmin- Password is the EC2 Instance ID- Click Submit
    4. After authenticating, complete the required fields in the FMOS Initial Setup form. The username is read-only and cannot be changed, but you can update the password.
    5. After submitting the FMOS Initial Setup form, FMOS will begin the deployment process.Log in to SIP after deployment:
    6. Open a web browser tab.
    7. Enter the IP address of your SIP/AWS instance.
    8. Enter your username and password.
    • Username is firemon (case-sensitive)
    • Password is the MAC address for the instance
    1. Click Log in. For details, see: https://www.firemon.com/wp-content/uploads/AWS-AMI-Launch-and-FMOS-Install.pdf 

    CF template Usage Instruction: 1.Go to AWS marketplace subscription and Launch cloud formation teamplate. 2.Choose Action 'Launch Cloud formation' and click on Launch 3.Enter Stack Name. 4.Enter all mandatory fields in Parameters. VPC ID Subnet ID Instance Type Key Pair Name IP address Volume Size FMOS username 5.Specify Ecosystem in "Machine Configuration". 6.Add Organization Name. 7.Click Next. 8.Review: Review all sections entered and click Next. 9.A new stack with above Stack Name is created with status "CREATE_COMPLETE". 10.Go to EC2 Dashboard, a new instance is created. 11.After the deployment process completes, you can log in to Security Intelligence Platform to continue setting up your network, such as adding users and devices. a. Open another browser tab. b. Enter the IP address of your AWS instance, For example, https://<hostname_or_IPaddress>;. c. Enter your username and password: Username is firemon (case-sensitive) Password is the MAC address for the instance with colons removed and lowercase letters instead of uppercase letters. For example, a MAC address of 00:05:95:A1:2B:CC would be 000595a12bcc. This is a one-time password to use at first installation and will need to be reset after initial login. Click Log In

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.3
    24 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    63%
    38%
    0%
    0%
    0%
    0 AWS reviews
    |
    24 external reviews
    External reviews are from G2  and PeerSpot .
    Information Technology and Services

    Real-Time Visibility and Compliance for Complex Multi-Cloud Firewalls

    Reviewed on Apr 13, 2026
    Review provided by G2
    What do you like best about the product?
    Is a solution designed to automate firewall rule management, enforce compliance, and reduce risk across hybrid and multi‑cloud environments. It provides real‑time visibility, continuous compliance monitoring, and policy optimization, making it especially valuable for enterprises managing complex, multi‑vendor firewalls.
    What do you dislike about the product?
    Improve more on Insight part such as assist create Assessment and control on FireMon
    What problems is the product solving and how is that benefiting you?
    FireMon Policy Manager benefits organizations by improving operational efficiency, reducing misconfigurations, and ensuring continuous compliance across hybrid and multi cloud environments.
    Computer & Network Security

    Makes Managing Multiple Firewall Devices Easy

    Reviewed on Apr 09, 2026
    Review provided by G2
    What do you like best about the product?
    It helps me manage multiple types of firewall devices.
    What do you dislike about the product?
    One of the biggest challenges I’ve had with Policy Manager is how complex it can be to visualize and manage large rule sets. The platform would also benefit from stronger automation and more AI-driven capabilities to cut down on manual work. Integration with external systems, along with more flexible reporting options, are additional areas where improvements would make a noticeable difference and significantly enhance operational efficiency.
    What problems is the product solving and how is that benefiting you?
    Policy Manager helps us tackle the complexity of managing large-scale, multi-vendor firewall policies by giving us centralized visibility and deeper analysis. It flags risky, redundant, and unused rules, which helps us reduce our attack surface and keep the policy base clean and well maintained. It also streamlines compliance and audit work through automated reporting, and supports better change management with impact analysis before updates are made. Overall, it improves our operational efficiency, lowers risk, and strengthens our security posture.
    Information Technology and Services

    Effortless Policy Management with Minor Reporting Hiccups

    Reviewed on Apr 08, 2026
    Review provided by G2
    What do you like best about the product?
    I really like the Policy Manager for its ease of use and how it keeps everything for unified network security policy management all in one place. I'm quite happy with how it operates currently.
    What do you dislike about the product?
    I have challenges with the report. The reporting UI could be more user-friendly.
    What problems is the product solving and how is that benefiting you?
    I use Policy Manager for unified network security policy management, with all details in one place, making it easy to use. However, I face challenges with the reporting UI not being user-friendly.
    Hardik P.

    Love the Reporting Features

    Reviewed on Apr 07, 2026
    Review provided by G2
    What do you like best about the product?
    Getting the customized report as required
    What do you dislike about the product?
    Not getting the exact report which is required
    What problems is the product solving and how is that benefiting you?
    It helps to clean up the unused firewall rules as well as objects. Also helps in optimizing the policies.
    Jose Alfonso M.

    Real-time visibility and powerful automation to keep everything under control

    Reviewed on Apr 06, 2026
    Review provided by G2
    What do you like best about the product?
    What I value most is the real-time visibility and centralized management, because it allows me to have everything under control from a single place. It also highlights the very powerful automation of changes and compliance, which reduces manual work and helps maintain order. Finally, the proactive risk analysis provides peace of mind by anticipating potential problems before they escalate.
    What do you dislike about the product?
    The learning curve is quite steep. Additionally, the interface can be overwhelming, especially at first. I have also noticed high resource consumption, which affects the user experience.
    What problems is the product solving and how is that benefiting you?
    1. Incorrect configurations and risky rules.
    2. Lack of centralized visibility.
    3. Manual change management: slow and error-prone.
    4. Audits and compliance that can take weeks.
    5. Accumulation of rules over time.
    6. Slow response to incidents.
    View all reviews