Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:18 PM
Dark Reading
Dark Reading
Products and Releases

Tufin Technologies Announces General Availability Of SecureChange Workflow

Solution enables companies to automate the entire network security policy change management life cycle

Ramat Gan, Israel, February 24, 2009 - Tufin Technologies, the leading provider of Security Lifecycle Management solutions, today announced the general release of SecureChange Workflow as part of the Tufin Security Suite. First announced in May 2008, SecureChange Workflow is already improving security operations for several companies managing hundreds of network devices. Tufin's breakthrough new product enables companies to automate the entire network security policy change management lifecycle. With SecureChange Workflow, IT managers can proactively enforce security policies while increasing operational efficiency and ensuring compliance with regulations such as PCI DSS.

"I frequently see large enterprises using spreadsheets or home grown tools to track firewall rule changes," said Greg Young, Research Vice president for Gartner, Inc. "This is a highly error prone process and wasteful of highly trained resources who should instead be spending their time watching for attacks or tuning the firewall."

SecureChange Workflow, a companion product to SecureTrack, Tufin's leading firewall operations management product, is the first solution that actively manages the entire lifecycle of network security policy change requests. From a change request by a business user, through risk analysis, business continuity analysis, approval, implementation and auditing, SecureChange Workflow automates each step of the process, making it ideal for any organization managing multiple network devices such as firewalls, routers and switches.

SecureChange Workflow Key Features

Security change automation: Automatic processing of security change requests to simplify the user experience while making network administrators more effective.

Integration with SecureTrack: Complementary functionality of SecureChange Workflow and SecureTrack on single T-Series appliance or server.

Separation of duties: Support for multiple roles within the security change process to meet the most demanding business and regulatory standards.

E-mail notifications: Real-time e-mail notification on change request progress for every status change.

Pre-defined business process templates: Out-of-the box templates for the most frequently-requested changes.

Customizable change-templates: Templates and workflows can be customized easily to meet the specific requirements of every organization.

"The need for automated security policy change management, across disparate network security systems and processes, is a business imperative," said Reuven Harrison, CTO and Co-founder of Tufin Technologies. "Most security teams have to deal with hundreds of end-user business requirements and lack an effective tool to do so. SecureChange Workflow allows automated translation of unstructured business requirements into configuration changes. This solution is specifically designed for management of security change requests to provide proactive risk analysis while ensuring business continuity and compliance."

Pricing and Availability SecureChange Workflow 4.5 is available immediately. Pricing starts at $20,000.

About SecureChange Workflow Tufin SecureChange Workflow is a unique change management solution designed specifically for security policy change requests. SecureChange Workflow manages the entire lifecycle of a policy change request, from submission through design, risk analysis, approval, implementation and auditing.

About SecureTrack Tufin SecureTrack is the market-leading Security Operations Management solution. SecureTrack enables organizations to enhance security, reduce service interruptions and automate day-to-day tasks through powerful firewall management capabilities and reporting. SecureTrack helps security operations teams to control and manage policy changes, analyze risks, and ensure business continuity and allows managers to easily understand the big picture and align operations with corporate and government security standards.

About Tufin Technologies Tufin Technologies is the leading provider of Security Lifecycle Management solutions that enable large organizations to enhance security, ensure business continuity and increase operational efficiency. Tufin's products SecureTrack and SecureChange Workflow help security operations teams to manage change, minimize risks and dramatically reduce manual, repetitive tasks through automation. With a combination of accuracy and simplicity, Tufin empowers security officers to perform reliable audits and demonstrate compliance with corporate and government standards. Founded in 2003 by leading firewall and business systems experts, Tufin now serves 300 customers around the world, including leading financial institutions, telecom service providers, transportation, energy and pharmaceutical companies. For more information visit www.tufin.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-16
There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulnerabilities to further achieve the purpose of remot...
PUBLISHED: 2021-06-16
Matrix-appservice-bridge is the bridging service for the Matrix communication program's application services. In versions 2.6.0 and earlier, if a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombs...
PUBLISHED: 2021-06-16
An issue was discovered on Enphase Envoy R3.x and D4.x (and other current) devices. The upgrade_start function in /installer/upgrade_start allows remote authenticated users to execute arbitrary commands via the force parameter.
PUBLISHED: 2021-06-16
An issue was discovered on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that circumvents traditional user authentication. This module uses a password derived from the MD5 hash of the username and serial number. The serial number can be retrieved by an una...
PUBLISHED: 2021-06-16
An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml.