Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 3 July, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Tufin Extends Its Leadership In Policy-Based Security Automation.

Advancing leadership in network security

by The Gurus
November 8, 2019
in Network Security
Tufin
Share on FacebookShare on Twitter

Tufin® (NYSE: TUFN), a company pioneering a policy-centric approach to security and IT operations, today announced the release of Tufin Orchestration Suite R19-1, advancing its leadership in network security automation with the industry’s first solution to feature policy-based automation for server policy cloning.

Enterprises today devote significant time and resources to processing access requests related to server policy cloning during application migration. With its new server policy cloning capabilities, the latest version of the award-winning Tufin Orchestration Suite enables enterprises to duplicate the right policy to set up new servers quickly and without errors. Organisations going through digital transformation can now migrate applications to new data centers or to the cloud without compromising the availability and security of mission-critical services. As a result, network security teams can now dramatically accelerate the pace of application migration, save time and resources and achieve continuous compliance with full documentation of the process.

“Our customers have some of the largest and most complex networks in the world, and it’s critical that any changes they make to security policies are executed quickly and accurately across the network,” said Ofer Or, Vice President of Products at Tufin. “The latest release of the Tufin Orchestration Suite is designed to help enterprises undergoing digital transformation improve the speed, accuracy and security of application migration across networks.”

Categorisation of Unassociated IP Addresses

The latest version of the Tufin Orchestration Suite builds on Tufin’s industry-leading network segmentation capabilities. With Tufin Orchestration Suite R19-1, all private IP addresses that are not associated with zones can still be protected by the Unified Security Policy (USP) matrix. By leveraging a pre-defined “private” zone for unassociated networks, Tufin enables enterprises to establish restrictions on traffic to and from a private network, tightening their network security posture. Security teams can extend their segmentation policy across the entire fragmented network. This allows security teams to ensure that all subnetworks across the enterprise are secured.

This capability is key for Zero Trust security initiatives, as it helps enforce a unified security policy across large, complex networks and eliminates any blind spots that the security team may inadvertently miss. It also provides critical support for enterprises who experience challenges in defining their network segmentation policy. With Tufin Orchestration Suite R19-1, it is easy to start segmenting by defining the basic restrictions of access between private networks and the internet, for which zones are pre-defined, and then refine the policy further by adding specific network zones for applications and systems containing sensitive data.

Tufin Orchestration Suite R19-1 also features vendor-specific enhancements, including:

Tightened security through enhanced support for next generation firewall policies by adding visibility into Palo Alto Networks URL categories
Support for Cisco Nexus VXLAN to ensure accurate topology analysis and automation
Automated server decommissioning for Check Point global objects and support for Check Point version R80.20

Tufin Orchestration Suite R19-1 is now generally available.

About Tufin

Tufin (NYSE: TUFN) simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the company’s Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. The Suite reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. With over 2000 customers since its inception, Tufin’s network security automation enables enterprises to implement changes in minutes instead of days, while improving their security posture and business agility.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Exclusive UK Drone Launches,

Next Post

comforte AG Launches New Payments Industry Data Security Solution

Recent News

A Vulnerability Management Program is Nothing Without Identity Risk Protection

A Vulnerability Management Program is Nothing Without Identity Risk Protection

July 1, 2022
SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

A Research of Threat Actor Activity & Myths Busted by Cato Networks

July 1, 2022
SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks

July 1, 2022
Over a Decade in Software Security: What Have We learned?

Over a Decade in Software Security: What Have We learned?

July 1, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information