theDocumentId => 1130451 Tufin Technologies Announces General Availability ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:18 PM
Dark Reading
Dark Reading
Products and Releases

Tufin Technologies Announces General Availability Of SecureChange Workflow

Solution enables companies to automate the entire network security policy change management life cycle

Ramat Gan, Israel, February 24, 2009 - Tufin Technologies, the leading provider of Security Lifecycle Management solutions, today announced the general release of SecureChange Workflow as part of the Tufin Security Suite. First announced in May 2008, SecureChange Workflow is already improving security operations for several companies managing hundreds of network devices. Tufin's breakthrough new product enables companies to automate the entire network security policy change management lifecycle. With SecureChange Workflow, IT managers can proactively enforce security policies while increasing operational efficiency and ensuring compliance with regulations such as PCI DSS.

"I frequently see large enterprises using spreadsheets or home grown tools to track firewall rule changes," said Greg Young, Research Vice president for Gartner, Inc. "This is a highly error prone process and wasteful of highly trained resources who should instead be spending their time watching for attacks or tuning the firewall."

SecureChange Workflow, a companion product to SecureTrack, Tufin's leading firewall operations management product, is the first solution that actively manages the entire lifecycle of network security policy change requests. From a change request by a business user, through risk analysis, business continuity analysis, approval, implementation and auditing, SecureChange Workflow automates each step of the process, making it ideal for any organization managing multiple network devices such as firewalls, routers and switches.

SecureChange Workflow Key Features

Security change automation: Automatic processing of security change requests to simplify the user experience while making network administrators more effective.

Integration with SecureTrack: Complementary functionality of SecureChange Workflow and SecureTrack on single T-Series appliance or server.

Separation of duties: Support for multiple roles within the security change process to meet the most demanding business and regulatory standards.

E-mail notifications: Real-time e-mail notification on change request progress for every status change.

Pre-defined business process templates: Out-of-the box templates for the most frequently-requested changes.

Customizable change-templates: Templates and workflows can be customized easily to meet the specific requirements of every organization.

"The need for automated security policy change management, across disparate network security systems and processes, is a business imperative," said Reuven Harrison, CTO and Co-founder of Tufin Technologies. "Most security teams have to deal with hundreds of end-user business requirements and lack an effective tool to do so. SecureChange Workflow allows automated translation of unstructured business requirements into configuration changes. This solution is specifically designed for management of security change requests to provide proactive risk analysis while ensuring business continuity and compliance."

Pricing and Availability SecureChange Workflow 4.5 is available immediately. Pricing starts at $20,000.

About SecureChange Workflow Tufin SecureChange Workflow is a unique change management solution designed specifically for security policy change requests. SecureChange Workflow manages the entire lifecycle of a policy change request, from submission through design, risk analysis, approval, implementation and auditing.

About SecureTrack Tufin SecureTrack is the market-leading Security Operations Management solution. SecureTrack enables organizations to enhance security, reduce service interruptions and automate day-to-day tasks through powerful firewall management capabilities and reporting. SecureTrack helps security operations teams to control and manage policy changes, analyze risks, and ensure business continuity and allows managers to easily understand the big picture and align operations with corporate and government security standards.

About Tufin Technologies Tufin Technologies is the leading provider of Security Lifecycle Management solutions that enable large organizations to enhance security, ensure business continuity and increase operational efficiency. Tufin's products SecureTrack and SecureChange Workflow help security operations teams to manage change, minimize risks and dramatically reduce manual, repetitive tasks through automation. With a combination of accuracy and simplicity, Tufin empowers security officers to perform reliable audits and demonstrate compliance with corporate and government standards. Founded in 2003 by leading firewall and business systems experts, Tufin now serves 300 customers around the world, including leading financial institutions, telecom service providers, transportation, energy and pharmaceutical companies. For more information visit

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-07-27
In Eclipse Mosquitto versions 2.07 and earlier, the server will crash if the client tries to send a PUBLISH packet with topic length = 0.
PUBLISHED: 2021-07-27
IBM Qradar SIEM 7.3.0 to 7.3.3 Patch 8 and 7.4.0 to 7.4.3 GA is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 196073.
PUBLISHED: 2021-07-27
IBM Sterling B2B Integrator Standard Edition through and through vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclos...
PUBLISHED: 2021-07-26
tinyexr commit 0.9.5 was discovered to contain an array index error in the tinyexr::SaveEXR component, which can lead to a denial of service (DOS).
PUBLISHED: 2021-07-26
tinyexr 0.9.5 was discovered to contain an array index error in the tinyexr::DecodeEXRImage component, which can lead to a denial of service (DOS).