Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/26/2013
12:55 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tufin Survey Reveals No. 1 Use Case For Firewall Management

Announces results of annual Firewall Management Survey

Tufin Technologies, the market-leading provider of Security Policy Management solutions, today announced the results of its annual Firewall Management Survey. 200 network security professionals reported that 93.6 percent of all firewall change requests are application-related, validating that the function of firewalls has evolved to include secure application connectivity, in addition to their traditional role of perimeter security. Tufin has addressed this shift with the 2012 launch of SecureApp to the Tufin Security Suite (TSS), its award winning Security Policy Management solution. In a separate announcement, also issued today, Tufin announced a new release of TSS, version R13-1.

"Shortly after launching SecureApp, we were approached by IT leaders interested in learning how SecureApp could help improve application uptime and availability," said Ruvi Kitov , CEO of Tufin. "This year's survey results validate what our customers have been saying: that firewall management plays an increasingly significant role in maintaining availability and uptime, but the basics need to be in place. Regular audits and efficient change management processes are the cornerstone of effective firewall management. The fact that many organizations audit their firewalls only once a year and some never audit their firewalls needs to change."

According to the respondents (200 IT experts from around the globe), there is still plenty of room for improvement when it comes to firewall management fundamentals:

Almost half of respondents audit their firewalls only once a year and 15% never audit their firewalls; 50% spend up to a week or more per quarter on firewall audits.

Almost 1/5 reported they knew of someone who cheated on an audit because they either felt the audit was a waste of time (39.3%) or they did not have enough time/resources (35.6%).

Almost 1/5 of the sample has no idea how current their firewall policy is.

40% have no way to know when a rule needs to be expired or recertified.

30% never test configuration changes before they are implemented.

Half of the sample has to redo more than 25% of all network security changes because they do not meet design requirements.

While survey data indicates firewalls are becoming increasingly relevant outside of their established function in security operations, their role has expanded - not shifted. Clearly, firewall management processes can have a significant impact on an organization's risk posture:

62.4% either believe or are not sure if their change management processes puts them at risk to be breached.

54.7% state their application connectivity management processes could or might create unnecessary IT risk; about 1/3 make 100 or more application related firewall changes per month.

41.5% of those sampled track application connectivity changes via comments in the firewall rule base, almost 1/6 don't track these changes at all.

46.9% report they might have or did have a breach due to an application related rule change.

70% of respondents report application service disruptions up to 20 times per year due to configuration changes.

60% or respondents were asked to make a change against their better judgment.

1/3 of respondents report that much of their security budgets are spent on items that don't improve security; 1/3 had no idea how well their security budgets were spent.

"The role firewalls play in managing application connectivity is both a cause and effect of sweeping trends in enterprise IT; understanding this enabled us to automate the right set of organizational processes between the right set of stakeholders," said Mr. Kitov. "SecureApp customers, such as SIX Group, have already reported dramatic improvements in application connectivity-related change management processes. TSS R13-1 features additional automation that reduces the time spent by organizations on firewall audits to a few hours per quarter. We will continue to conduct this survey every year to ensure our roadmap is aligned with our customers' shifting business requirements."

A PDF version of the report can be found here.

About Tufin Technologies

Tufin&trade is the leading provider of Security Policy Management solutions that enable companies to cost-effectively manage their firewall, switch and router policies, reduce security and business continuity risks, and ensure Continuous Compliance with regulatory standards. The award-winning Tufin Security Suite provides security teams with powerful automation that slashes the time and costs spent managing change and successfully passing audits. Founded in 2005, Tufin serves more than 1,100 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Tufin partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Blue Coat, McAfee and BMC Software, and is known for technological innovation and dedicated customer service.

For more information visit http://www.tufin.com, or follow Tufin on:

Twitter: http://twitter.com/TufinTech

Facebook: http://www.facebook.com/Tufintech

Google+: https://plus.google.com/s/tufin

LinkedIn: http://www.linkedin.com/companies/tufin-technologies

YouTube: http://www.youtube.com/user/Tufintech

The Tufin Blog: http://www.tufin.com/blog

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1448
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1447.
CVE-2020-1449
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Project software when the software fails to check the source markup of a file, aka 'Microsoft Project Remote Code Execution Vulnerability'.
CVE-2020-1450
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1451, CVE-2020-1456.
CVE-2020-1451
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1450, CVE-2020-1456.
CVE-2020-1454
PUBLISHED: 2020-07-14
This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Re...