Risk
2/28/2014
06:57 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Tufin Unveils Tufin Orchestration Suite Version R14-1

Company also announces integration with IT automation leader Puppet Labs

Morristown, New Jersey –February 25, 2014–Tufin Technologies, the market-leading provider of Security Policy Orchestration systems, today announced version R14-1 of the Tufin Orchestration Suite. Version R14-1 extends Tufin's analytic and orchestration capabilities deeper and wider across the network. In addition to ingraining more proactive security automation into network change processes, R14-1's enhanced network topology simulation ensures accurate change automation, and it also includes automation that reduces connectivity-related downtime and increases collaboration with other IT stakeholders.

Concurrently, Tufin is also announcing an integration with IT automation leader Puppet Labs that extends Tufin's orchestration capabilities to iptables firewalls as well as the results of a recent survey that underscores the need for automation to effectively manage change in today's highly complex, dynamic and distributed network environments.

Key Enhancements to the Tufin Orchestration Suite, R14-1 include:

Unified Security Policy: This innovative approach to centrally managing security policies allows Tufin customers to map out and manage their desired network security architecture. In-depth information about zone-to-zone traffic and policy restrictions improves change management. Centralized alerting on all policy violations by level of criticality with instant drill down analysis for rapid remediation provides more in-depth and actionable network monitoring.

Automated Connection Repair: SecureApp can already monitor application connectivity and tell you when, where and why a connection is broken. Now it provides"one click" repair of broken application connections which can dramatically reduce application connectivity-related downtime.

Application Release Automation: SecureApp can now maintain network connectivity requirements for applications in multiple environments and automatically deploy them across these environments - from development to testing, staging, and into production environments - this improves collaboration and speeds up the application release process.

New Device Support:Building on to its broad vendor support to date, Tufin is also extending its network provisioning capabilities to Cisco IOS routers and support for Cisco CSM.

"Our latest research reveals that the cloud and virtualization has placed an inordinate amount of pressure on internal IT teams to deliver applications and services faster. Today's new version of the Tufin Orchestration Suite enables enterprise professionals to not just meet those expectations but exceed them," said Reuven Harrison, CTO, Tufin. "R14-1 delivers the security and process automation required to support the accelerated pace of business, but also ensures security teams maintain full accountability and unified control over security policy changes as they continue to impact a wider set of stakeholders."

The award-winning Tufin Orchestration Suite&trade gives IT organizations the power and agility to enforce security policy across complex, multi-vendor enterprise networks and reduce the time and cost to implement network changes by up to 80%. The Suite consists of three products:

• SecureTrack (Unified Firewall Management) enables IT to centrally manage and track and analyze security policies for all network security devices including network, host-based and next-generation firewalls, routers, switches and load balancers.

• SecureChange (Network Change Automation) automates network security change processes and proactively analyze risks before changes are made which increases accuracy and enforces compliance policies across all network security devices.

• SecureApp (Application Connectivity Management) enables organizations to effectively manage the network connectivity and security requirements of their applications by orchestrating all application-related network changes from deployment through decommissioning.

Pricing and Availability:

Version R14-1 of the Tufin Orchestration Suite will be available in April. Pricing starts at $45,000 for the full suite.

About Tufin Technologies

Tufin® is the leader in Security Policy Orchestration, automating and accelerating network infrastructure changes while maintaining security and compliance. By improving network change processes, organizations using the Tufin Orchestration Suite&trade will have a positive impact on the business by reducing the time and cost spent implementing network changes by up to 80 %. Taking a holistic view of IT, the Tufin Orchestration Suite helps organizations automate security and efficiency into day-to-day operations, enabling them to be more agile and leverage technology to gain a competitive advantage. Founded in 2005, Tufin serves more than 1,300 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Tufin partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Stonesoft, Blue Coat, McAfee and BMC Software, and is known for technological innovation and dedicated customer service.

For more information visit www.tufin.com, or follow Tufin on:

• Twitter: http://twitter.com/TufinTech

• Facebook: http://www.facebook.com/Tufintech

• LinkedIn: http://www.linkedin.com/companies/tufin-technologies

• BrightTalk: https://www.brighttalk.com/community/it-security/channel/9591

• YouTube: http://www.youtube.com/user/Tufintech

• The Tufin Blog: http://www.tufin.com/blog

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5242
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

CVE-2012-5243
Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

CVE-2012-5702
Published: 2014-10-21
Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to i...

CVE-2013-7406
Published: 2014-10-21
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2531
Published: 2014-10-21
SQL injection vulnerability in xhr.php in InterWorx Web Control Panel (aka InterWorx Hosting Control Panel and InterWorx-CP) before 5.0.14 build 577 allows remote authenticated users to execute arbitrary SQL commands via the i parameter in a search action to the (1) NodeWorx , (2) SiteWorx, or (3) R...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.