theDocumentId => 1130451 Tufin Technologies Announces General Availability ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/24/2009
03:18 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tufin Technologies Announces General Availability Of SecureChange Workflow

Solution enables companies to automate the entire network security policy change management life cycle

Ramat Gan, Israel, February 24, 2009 - Tufin Technologies, the leading provider of Security Lifecycle Management solutions, today announced the general release of SecureChange Workflow as part of the Tufin Security Suite. First announced in May 2008, SecureChange Workflow is already improving security operations for several companies managing hundreds of network devices. Tufin's breakthrough new product enables companies to automate the entire network security policy change management lifecycle. With SecureChange Workflow, IT managers can proactively enforce security policies while increasing operational efficiency and ensuring compliance with regulations such as PCI DSS.

"I frequently see large enterprises using spreadsheets or home grown tools to track firewall rule changes," said Greg Young, Research Vice president for Gartner, Inc. "This is a highly error prone process and wasteful of highly trained resources who should instead be spending their time watching for attacks or tuning the firewall."

SecureChange Workflow, a companion product to SecureTrack, Tufin's leading firewall operations management product, is the first solution that actively manages the entire lifecycle of network security policy change requests. From a change request by a business user, through risk analysis, business continuity analysis, approval, implementation and auditing, SecureChange Workflow automates each step of the process, making it ideal for any organization managing multiple network devices such as firewalls, routers and switches.

SecureChange Workflow Key Features

Security change automation: Automatic processing of security change requests to simplify the user experience while making network administrators more effective.

Integration with SecureTrack: Complementary functionality of SecureChange Workflow and SecureTrack on single T-Series appliance or server.

Separation of duties: Support for multiple roles within the security change process to meet the most demanding business and regulatory standards.

E-mail notifications: Real-time e-mail notification on change request progress for every status change.

Pre-defined business process templates: Out-of-the box templates for the most frequently-requested changes.

Customizable change-templates: Templates and workflows can be customized easily to meet the specific requirements of every organization.

"The need for automated security policy change management, across disparate network security systems and processes, is a business imperative," said Reuven Harrison, CTO and Co-founder of Tufin Technologies. "Most security teams have to deal with hundreds of end-user business requirements and lack an effective tool to do so. SecureChange Workflow allows automated translation of unstructured business requirements into configuration changes. This solution is specifically designed for management of security change requests to provide proactive risk analysis while ensuring business continuity and compliance."

Pricing and Availability SecureChange Workflow 4.5 is available immediately. Pricing starts at $20,000.

About SecureChange Workflow Tufin SecureChange Workflow is a unique change management solution designed specifically for security policy change requests. SecureChange Workflow manages the entire lifecycle of a policy change request, from submission through design, risk analysis, approval, implementation and auditing.

About SecureTrack Tufin SecureTrack is the market-leading Security Operations Management solution. SecureTrack enables organizations to enhance security, reduce service interruptions and automate day-to-day tasks through powerful firewall management capabilities and reporting. SecureTrack helps security operations teams to control and manage policy changes, analyze risks, and ensure business continuity and allows managers to easily understand the big picture and align operations with corporate and government security standards.

About Tufin Technologies Tufin Technologies is the leading provider of Security Lifecycle Management solutions that enable large organizations to enhance security, ensure business continuity and increase operational efficiency. Tufin's products SecureTrack and SecureChange Workflow help security operations teams to manage change, minimize risks and dramatically reduce manual, repetitive tasks through automation. With a combination of accuracy and simplicity, Tufin empowers security officers to perform reliable audits and demonstrate compliance with corporate and government standards. Founded in 2003 by leading firewall and business systems experts, Tufin now serves 300 customers around the world, including leading financial institutions, telecom service providers, transportation, energy and pharmaceutical companies. For more information visit www.tufin.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32686
PUBLISHED: 2021-07-23
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and ...
CVE-2021-32783
PUBLISHED: 2021-07-23
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy rem...
CVE-2021-3169
PUBLISHED: 2021-07-23
An issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.
CVE-2020-20741
PUBLISHED: 2021-07-23
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if t...
CVE-2021-25808
PUBLISHED: 2021-07-23
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.