Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/20/2009
03:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tufin Technologies Triples Revenue, Doubles Customer Base In 2008

To support the growing demand for firewall auditing and security change automation solutions Tufin is continuing its corporate expansion

Ramat Gan, Israel and Burlington, Massachusetts, January 20, 2009 - Tufin Technologies, the leading provider of Security Lifecycle Management solutions, today announced its sales for fiscal year 2008 tripled over the previous year, with a record sales growth of 3,200% since 2005. In 2008, Tufin had its fourth consecutive cash flow positive year and has experienced rapid customer-base growth, securing new contracts with many Fortune 1000 companies. To support the growing demand for firewall auditing and security change automation solutions Tufin is continuing its corporate expansion. Tufin has doubled its headcount this year, launching US east coast and west coast operations and opening new offices in The Netherlands and Italy. In 2008, Tufin also doubled its number of channel alliance partners from 52 to 110, signing key agreements with Dimension Data and Computerlinks in Europe, and AccessIT Group, Accuvant, Akibia, Cadre, CipherTechs and Nexum in the US.

2008 highlights Over the past 12 months, Tufin has achieved the following milestones: * Tripled its sales over 2007 o Sales growth in the past four years (since 2005) has reached 3,200% * Profitable in 2008, capping a fourth consecutive cash-flow positive year * More than doubled number of customers, from 120 to 280 * Shipped over 130 Tufin appliances, having launched the Tufin appliance program in late 2007 * Announced and launched new product - SecureChange Workflow, the industry's first Security Lifecycle Management solution * Doubled number of channel partners, from 52 to 110 * Successfully launched Tufin's North American operations, with 400% revenue growth in North America year over year * Strengthened the management team, with Steve Moscarelli as VP of Sales, Americas and Yoram Gronich as VP of Research and Development * Named a "Pioneer for Security Lifecycle Management" by analyst firm Frost & Sullivan * More than doubled headcount, from 20 to over 40 * Achieved 5/5 stars in SC Magazine product review

"Demand for security management solutions has increased exponentially worldwide. Tufin's solutions answer this need and improve business critical processes, making the daunting task of securing complex networks much easier," said Ruvi Kitov, CEO for Tufin Technologies. "We continuously strive to provide our customers with the best possible products and unparalleled customer service. Through the implementation of SecureTrack and SecureChange Workflow our customers realize immediate and significant ROI. The tangible benefit gained by our customers is one of the major components to which we attribute our continuous growth."

"Tufin's performance in 2008 clearly establishes it as the main player in the Security Lifecycle Management category and paves the way for additional growth in 2009," said Bruce Tucker, President of Patriot Technologies, Tufin's channel partner. "Even in the current financial climate and with serious IT budget cut backs, network security and regulatory compliance are both critical areas that large Enterprises cannot afford to cut back on."

About SecureTrack Tufin SecureTrack(tm) is the market-leading Security Operations Management solution. SecureTrack enables organizations to enhance security, reduce service interruptions and automate day-to-day tasks through powerful firewall management capabilities and reporting. SecureTrack helps security operations teams to control and manage policy changes, analyze risks, and ensure business continuity and allows managers to easily understand the big picture and align operations with corporate and government security standards.

About SecureChange Workflow Tufin SecureChange(tm) Workflow is a unique change management solution designed specifically for security policy change requests. SecureChange Workflow manages the entire lifecycle of a policy change request, from submission through design, risk analysis, approval, implementation and auditing.

About Tufin Technologies Tufin Technologies is the leading provider of Security Lifecycle Management solutions that enable large organizations to enhance security, ensure business continuity and increase operational efficiency. Tufin's products SecureTrack(tm) and SecureChange(tm) Workflow help security operations teams to manage change, minimize risks and dramatically reduce manual, repetitive tasks through automation. With a combination of accuracy and simplicity, Tufin empowers security officers to perform reliable audits and demonstrate compliance with corporate and government standards. Founded in 2003 by leading firewall and business systems experts, Tufin now serves over 280 customers around the world, including leading financial institutions, telecom service providers, transportation, energy and pharmaceutical companies. For more information visit www.tufin.com.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-33331
PUBLISHED: 2021-08-03
Open redirect vulnerability in the Notifications module in Liferay Portal 7.0.0 through 7.3.1, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19 and 7.2 before fix pack 8, allows remote attackers to redirect users to arbitrary external URLs via the 'redirect' parameter.
CVE-2021-33332
PUBLISHED: 2021-08-03
Cross-site scripting (XSS) vulnerability in the Portlet Configuration module in Liferay Portal 7.1.0 through 7.3.2, and Liferay DXP 7.1 before fix pack 19, and 7.2 before fix pack 7, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portlet_configuration_css_web_por...
CVE-2021-33333
PUBLISHED: 2021-08-03
The Portal Workflow module in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 93, 7.1 before fix pack 19 and 7.2 before fix pack 6, does not properly check user permission, which allows remote authenticated users to view and delete workflow submissions via crafted URLs.
CVE-2021-33334
PUBLISHED: 2021-08-03
The Dynamic Data Mapping module in Liferay Portal 7.0.0 through 7.3.2, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19, and 7.2 before fix pack 6, does not properly check user permissions, which allows remote attackers with the forms "Access in Site Administration" permissio...
CVE-2021-30578
PUBLISHED: 2021-08-03
Uninitialized use in Media in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.