Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/27/2012
03:58 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tufin Adds Interactive Dashboards And Automated Change Provisioning To The Tufin Security Suite

TSS R12-1 features an Interactive Dashboard, Automated Change Provisioning, and a new Policy Analysis interface

Ramat Gan, Israel, February 21, 2012 – Tufin Technologies, the market-leading provider of Security Policy Management solutions, today announced release R12-1 of its award-winning Tufin Security Suite (TSS). TSS R12-1 features innovations such as an InteractiveDashboard, Automated Change Provisioning, and a new Policy Analysis interface that further enhances Tufin’s unique capability to analyzeboth network layer and Next GenerationFirewall policies.

“The market for firewall managementand compliance has matured, and customer expectations are high,” said Eric Ogren, principal analyst with the Ogren Group. “At this juncture, innovation and simplicity arekey. Something as simple as an automated access request process or the ability to intuitively research historical data can literally transform how network security teams work. Tufin’s knackfor bringing efficiency to network security management will keep the market expanding and customers happy.”

A key innovation of TSS R12-1 is a new InteractiveDashboard that provides instant visibility into an organization’s security and compliance posture. It displays risks, recent changes and access rules and objects that need to be cleaned up or optimized. Dashboard widgets provide key performance indicators, scores and trends, and include a variety of filters and views. TSS's new Risk, Change and Cleanup browsers deliver drill down capabilities,empowering administrators to view policy information in context of what they are trying to accomplish.

Other key features include: • Automated Provisioning of Security Policy Changes:TSS can now automatically execute planned configuration changes on Check Point firewall security policies, delivering end-to-end automation forfirewall change management. The system automatically recommends the most optimal policy changes on the relevant firewalls. After the security administrator reviews the recommendation, TSS can automatically provision the configuration change. This capability is separately licensed. • Enhanced Policy Analysis: a new and intuitive user interface that makes it much quicker and easier to perform sophisticated queries and what-if simulations by object, by time, by device(s), with multiple sources, destinations, services, users and applications. • Network Topology Enhancements –Network Topology Intelligence now supports Network Address Translation (NAT) to enable precise simulation of address translations • Support for Juniper Networks' Network and Security Manager (NSM): SecureTrack now supports Juniper Networks' NSM, and can monitor firewalls via NSM as well as monitor each firewall directly. • Access Request Forms:TSS R12-1 features a new Access Request form that makes it even faster and easier to request a network access change. Users can now define access requests using IP addresses, subnets, network objects and services as well as users and applications for Next Generation firewalls (currently supported for Palo Alto Networks).

TSS releaseR12-1 is the first major release of 2012. The next major release will be named R (for Revision) 12 (for 2012) -2 (the sequential number of the release during the calendaryear).

"Every conversation we have with a customer reinforces the reality that maintaining a secure and compliant network is a complex, resource-intensive and high risk operation,which is simply impossible to sustain without automation," said Reuven Harrison, CTO and co-founder, Tufin. "TSS cuts the time and cost of business critical functions such as firewall audits andchange management by as much as 70%, and the enhancements to TSS R12-1 extend that dramatic ROI by automating additional processes managed by network security teams."

Pricing and Availability TSS R12-1will be generally availableby February 29, 2012. Pricing starts at $20,000.

About Tufin Technologies Tufin™ is the leading provider of Security Policy Management solutions that enable companies to cost-effectively manage their firewall, switch and router policies, reduce security and business continuity risks, and ensure Continuous Compliance with regulatory standards. The award-winning Tufin Security Suite provides security teams with powerful automation that slashes the time and costs spent managing change and successfully passing audits. Founded in 2005, Tufin serves more than 900 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Tufin partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Blue Coat, McAfee and BMC Software, and is known for technological innovation and dedicated customer service. For more information visit www.tufin.com, or follow Tufin on: • Twitter: http://twitter.com/TufinTech • Facebook: http://www.facebook.com/Tufintech • Google+: https://plus.google.com/s/tufin • LinkedIn: http://www.linkedin.com/companies/tufin-technologies • YouTube: http://www.youtube.com/user/Tufintech • The Tufin Blog: http://www.tufin.com/blog

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...