Analytics
2/26/2013
12:55 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Tufin Survey Reveals No. 1 Use Case For Firewall Management

Announces results of annual Firewall Management Survey

Tufin Technologies, the market-leading provider of Security Policy Management solutions, today announced the results of its annual Firewall Management Survey. 200 network security professionals reported that 93.6 percent of all firewall change requests are application-related, validating that the function of firewalls has evolved to include secure application connectivity, in addition to their traditional role of perimeter security. Tufin has addressed this shift with the 2012 launch of SecureApp to the Tufin Security Suite (TSS), its award winning Security Policy Management solution. In a separate announcement, also issued today, Tufin announced a new release of TSS, version R13-1.

"Shortly after launching SecureApp, we were approached by IT leaders interested in learning how SecureApp could help improve application uptime and availability," said Ruvi Kitov , CEO of Tufin. "This year's survey results validate what our customers have been saying: that firewall management plays an increasingly significant role in maintaining availability and uptime, but the basics need to be in place. Regular audits and efficient change management processes are the cornerstone of effective firewall management. The fact that many organizations audit their firewalls only once a year and some never audit their firewalls needs to change."

According to the respondents (200 IT experts from around the globe), there is still plenty of room for improvement when it comes to firewall management fundamentals:

Almost half of respondents audit their firewalls only once a year and 15% never audit their firewalls; 50% spend up to a week or more per quarter on firewall audits.

Almost 1/5 reported they knew of someone who cheated on an audit because they either felt the audit was a waste of time (39.3%) or they did not have enough time/resources (35.6%).

Almost 1/5 of the sample has no idea how current their firewall policy is.

40% have no way to know when a rule needs to be expired or recertified.

30% never test configuration changes before they are implemented.

Half of the sample has to redo more than 25% of all network security changes because they do not meet design requirements.

While survey data indicates firewalls are becoming increasingly relevant outside of their established function in security operations, their role has expanded - not shifted. Clearly, firewall management processes can have a significant impact on an organization's risk posture:

62.4% either believe or are not sure if their change management processes puts them at risk to be breached.

54.7% state their application connectivity management processes could or might create unnecessary IT risk; about 1/3 make 100 or more application related firewall changes per month.

41.5% of those sampled track application connectivity changes via comments in the firewall rule base, almost 1/6 don't track these changes at all.

46.9% report they might have or did have a breach due to an application related rule change.

70% of respondents report application service disruptions up to 20 times per year due to configuration changes.

60% or respondents were asked to make a change against their better judgment.

1/3 of respondents report that much of their security budgets are spent on items that don't improve security; 1/3 had no idea how well their security budgets were spent.

"The role firewalls play in managing application connectivity is both a cause and effect of sweeping trends in enterprise IT; understanding this enabled us to automate the right set of organizational processes between the right set of stakeholders," said Mr. Kitov. "SecureApp customers, such as SIX Group, have already reported dramatic improvements in application connectivity-related change management processes. TSS R13-1 features additional automation that reduces the time spent by organizations on firewall audits to a few hours per quarter. We will continue to conduct this survey every year to ensure our roadmap is aligned with our customers' shifting business requirements."

A PDF version of the report can be found here.

About Tufin Technologies

Tufin&trade is the leading provider of Security Policy Management solutions that enable companies to cost-effectively manage their firewall, switch and router policies, reduce security and business continuity risks, and ensure Continuous Compliance with regulatory standards. The award-winning Tufin Security Suite provides security teams with powerful automation that slashes the time and costs spent managing change and successfully passing audits. Founded in 2005, Tufin serves more than 1,100 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Tufin partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Blue Coat, McAfee and BMC Software, and is known for technological innovation and dedicated customer service.

For more information visit http://www.tufin.com, or follow Tufin on:

Twitter: http://twitter.com/TufinTech

Facebook: http://www.facebook.com/Tufintech

Google+: https://plus.google.com/s/tufin

LinkedIn: http://www.linkedin.com/companies/tufin-technologies

YouTube: http://www.youtube.com/user/Tufintech

The Tufin Blog: http://www.tufin.com/blog

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3587
Published: 2014-08-22
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists bec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.