Perimeter
2/25/2014
09:16 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tufin Survey Reveals 91% Of Security Managers Are Under Pressure To Deliver Applications And Services Faster

More than three-quarters of respondents believe virtualization will have the biggest impact on security operations during next 12 to 18 months

Morristown, New Jersey, February 25, 2014: Tufin Technologies, the market-leading provider of Security Policy Orchestration solutions, today announced the results of a survey of169 security professionalson the current state of security operations. Conducted at Cisco Live! in Milan, Italy in January 2014, morethan 90% of the respondents reported that the on-demand nature of virtualization and the cloud has increased pressure on them to deliver applications and services faster. With more than three quartersof respondents believing virtualization will have the biggest impact on Security Operations over the next 12-18 months, the pace will only accelerate, underscoring the need for increased automation. In order to ensure security teamsremain agile and effective in light of the accelerated pace, Tufin, in separate releases also issued today,announcednew security,automation and orchestration capabilities and a partnership with IT automation software leader Puppet Labs.

Thesesurvey results complement the findings of a larger October 2013Tufin-commissioned survey in which 71% of more than 500 senior IT professionals found themselves having to adopt new processes, learn new technologies and interact with new people because of these same trends. TheCisco Live! attendeeresponses pointed toadditional problems being caused by the intense pace of change, highlighting several opportunities to improve Security Operations:

• Almost 90%felt that organizations rely too heavily on network security products and tools at the expense of good network architecture and design in order to deliver the optimum level of network security.

• Almost 40% reported that the biggest barrier to effective network security is network complexity while25% cited a lack of collaboration and another 20% cited the constant change occurring in today's networks as their biggest barriers.

• With this being the case, it comes as no surprise thatabout 89% of the respondents reported that between 20-60% of security policy changes in their organization need to be corrected after the fact.

• Another one-sixth reported that as much as60-80% of their organizations' security policy changes need to be redone.

"As previous surveys have confirmed, the role of security within Operations is expanding in order to deal with the network security challenges brought on by the cloud and virtualization," said Ruvi Kitov, Tufin CEO. "Thisleads to more and deeper collaboration with other IT groupsin order to integrate and automate security into areas such as network design, change processes and operational performance. Our customers tell us this is the best way to ensure next generation networks are efficient, agile and equipped to deal with next generation security concerns. We agree and believe intelligent change and process automation will become standardsas virtualization and the cloud become more pervasive."

Survey respondentsalso made it emphatically clear thatthe threat landscape itself is changingjust as quickly as corporate networks. When asked to name the three developments that will most greatly impact security operations over the next 12-18 months, advanced threats were the number one answer, nosing ahead of virtualization (number two) and the transition of mission critical enterprise apps to the cloud (number three).

However, the survey revealed that Security Operations teams are rising to the challenge. More than three-quarters believed their networks were more secure (55%) or just as secure (22%) than they were five years ago. Plus security teams identifiedthat automation would positively affect the accuracy of policy changes (33%), the lack of consistent processes across departments (25%), and the lack of network control(20%). This underscored the need for a complete automation suite designed to handle these issues with features such as topology mapping and one-click repair.

"It is clear that virtualization and the cloud deliver great benefits but also introduce greater complexity and unforeseen risks that must be addressed," said Kitov. "Our customers know that automation is necessary to properly safeguard today's networks and support the needs of the business. Tufin continues to add capabilities to our product suite to providethebest-of breed automation and orchestration solutions needed to deliver the efficiency, agility and collaboration required for their ongoing success."

About Tufin Technologies

Tufin® is the leader in Security Policy Orchestration, automating and accelerating network infrastructure changes while maintaining security and compliance. By improving network change processes, organizations using the Tufin Orchestration Suite&trade will have a positive impact on the business by reducing the time and cost spent implementing network changes by up to 80 %. Taking a holistic view of IT, the Tufin Orchestration Suite helps organizations automate security and efficiency into day-to-day operations, enabling them to be more agile and leverage technology to gain a competitive advantage. Founded in 2005, Tufin serves more than 1,300 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Tufin partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Stonesoft, Blue Coat, McAfee and BMC Software, and is known for technological innovation and dedicated customer service.

For more information visit www.tufin.com, or follow Tufin on:

• Twitter: http://twitter.com/TufinTech

• Facebook: http://www.facebook.com/Tufintech

• LinkedIn: http://www.linkedin.com/companies/tufin-technologies

• BrightTalk: https://www.brighttalk.com/community/it-security/channel/9591

• YouTube: http://www.youtube.com/user/Tufintech

• The Tufin Blog: http://www.tufin.com/blog

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5427
Published: 2015-03-29
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

CVE-2014-5428
Published: 2015-03-29
Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

CVE-2014-9205
Published: 2015-03-29
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

CVE-2015-0528
Published: 2015-03-29
The RPC daemon in EMC Isilon OneFS 6.5.x and 7.0.x before 7.0.2.13, 7.1.0 before 7.1.0.6, 7.1.1 before 7.1.1.2, and 7.2.0 before 7.2.0.1 allows local users to gain privileges by leveraging an ability to modify system files.

CVE-2015-0996
Published: 2015-03-29
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 rely on a hardcoded cleartext password to control read access to Project files and Project Configuration files, which makes it easier for local users to obtain sensitive info...

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.