Analytics
2/26/2013
12:55 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Tufin Survey Reveals No. 1 Use Case For Firewall Management

Announces results of annual Firewall Management Survey

Tufin Technologies, the market-leading provider of Security Policy Management solutions, today announced the results of its annual Firewall Management Survey. 200 network security professionals reported that 93.6 percent of all firewall change requests are application-related, validating that the function of firewalls has evolved to include secure application connectivity, in addition to their traditional role of perimeter security. Tufin has addressed this shift with the 2012 launch of SecureApp to the Tufin Security Suite (TSS), its award winning Security Policy Management solution. In a separate announcement, also issued today, Tufin announced a new release of TSS, version R13-1.

"Shortly after launching SecureApp, we were approached by IT leaders interested in learning how SecureApp could help improve application uptime and availability," said Ruvi Kitov , CEO of Tufin. "This year's survey results validate what our customers have been saying: that firewall management plays an increasingly significant role in maintaining availability and uptime, but the basics need to be in place. Regular audits and efficient change management processes are the cornerstone of effective firewall management. The fact that many organizations audit their firewalls only once a year and some never audit their firewalls needs to change."

According to the respondents (200 IT experts from around the globe), there is still plenty of room for improvement when it comes to firewall management fundamentals:

Almost half of respondents audit their firewalls only once a year and 15% never audit their firewalls; 50% spend up to a week or more per quarter on firewall audits.

Almost 1/5 reported they knew of someone who cheated on an audit because they either felt the audit was a waste of time (39.3%) or they did not have enough time/resources (35.6%).

Almost 1/5 of the sample has no idea how current their firewall policy is.

40% have no way to know when a rule needs to be expired or recertified.

30% never test configuration changes before they are implemented.

Half of the sample has to redo more than 25% of all network security changes because they do not meet design requirements.

While survey data indicates firewalls are becoming increasingly relevant outside of their established function in security operations, their role has expanded - not shifted. Clearly, firewall management processes can have a significant impact on an organization's risk posture:

62.4% either believe or are not sure if their change management processes puts them at risk to be breached.

54.7% state their application connectivity management processes could or might create unnecessary IT risk; about 1/3 make 100 or more application related firewall changes per month.

41.5% of those sampled track application connectivity changes via comments in the firewall rule base, almost 1/6 don't track these changes at all.

46.9% report they might have or did have a breach due to an application related rule change.

70% of respondents report application service disruptions up to 20 times per year due to configuration changes.

60% or respondents were asked to make a change against their better judgment.

1/3 of respondents report that much of their security budgets are spent on items that don't improve security; 1/3 had no idea how well their security budgets were spent.

"The role firewalls play in managing application connectivity is both a cause and effect of sweeping trends in enterprise IT; understanding this enabled us to automate the right set of organizational processes between the right set of stakeholders," said Mr. Kitov. "SecureApp customers, such as SIX Group, have already reported dramatic improvements in application connectivity-related change management processes. TSS R13-1 features additional automation that reduces the time spent by organizations on firewall audits to a few hours per quarter. We will continue to conduct this survey every year to ensure our roadmap is aligned with our customers' shifting business requirements."

A PDF version of the report can be found here.

About Tufin Technologies

Tufin&trade is the leading provider of Security Policy Management solutions that enable companies to cost-effectively manage their firewall, switch and router policies, reduce security and business continuity risks, and ensure Continuous Compliance with regulatory standards. The award-winning Tufin Security Suite provides security teams with powerful automation that slashes the time and costs spent managing change and successfully passing audits. Founded in 2005, Tufin serves more than 1,100 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Tufin partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Blue Coat, McAfee and BMC Software, and is known for technological innovation and dedicated customer service.

For more information visit http://www.tufin.com, or follow Tufin on:

Twitter: http://twitter.com/TufinTech

Facebook: http://www.facebook.com/Tufintech

Google+: https://plus.google.com/s/tufin

LinkedIn: http://www.linkedin.com/companies/tufin-technologies

YouTube: http://www.youtube.com/user/Tufintech

The Tufin Blog: http://www.tufin.com/blog

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio