Hi [[ session.user.profile.firstName ]]

Tufin

  • Date
  • Rating
  • Views
  • 3 Steps to Meeting Cloud Agility with Security Policy Automation
    3 Steps to Meeting Cloud Agility with Security Policy Automation
    Reuven Harrison Co-Founder and CTO, Tufin & Maya Malevich Director of Product Marketing, Tufin Recorded: Jul 18 2019 47 mins
    Migrating to the cloud means that your business becomes more agile, but what about your IT operations?

    Join this session on Thursday, July 18th with Tufin CTO and Co-Founder Reuven Harrison, to learn the three steps that can help you meet cloud agility:

    •Optimizing security policies
    •Automating the policy lifecycle
    •Incorporating security policy into the CI/CD pipeline

    Register now
  • Case Study Webinar: Moving Network Operations into the Future
    Case Study Webinar: Moving Network Operations into the Future
    Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE & Karen Crowley,Sr. Product Marketing Manager Recorded: Jul 16 2019 47 mins
    Join us for a lively discussion with Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE, the second largest utility provider in Germany.

    We will discuss RWE’s challenges and success in moving their network operations into the future without compromising security and compliance, including:
    • consolidating security and orchestrating connectivity across a hybrid network, including legacy firewalls and routers, next generation firewalls, and the AWS cloud platform
    • incorporating a cloud-first strategy and a heavy investment in DevOps to identify and address security violations in AWS, and allow application developers to spin up new applications without knowing IPs, protocols and ports
    • reclaiming visibility of their firewall configurations and moving from error-prone manual changes to automating the process
    • vastly improving workflows to improve audit preparation from a previously non-auditable change process

    Register now to gain amazing insight into how they have found success. We will wrap up with a live Q&A, so have your questions ready!
  • Preparing and Protecting Your Network from an Automated Zero-Day Attack
    Preparing and Protecting Your Network from an Automated Zero-Day Attack
    Joe Schreiber, Technical Director, Business Development, Tufin and Dan Rheault Sr. Product Marketing Manager, Tufin Recorded: Jul 15 2019 42 mins
    Attackers have embraced automation to launch attacks and expand their reach within your network. But ill-intentioned individuals aren’t alone in having automation in their toolkit. It’s time to fight automation with automation.

    How quickly you can respond to a zero-day attack largely depends on how proactively you secure your network. When attackers engineer malware to automatically detect vulnerabilities on your network, the way to prevent damage is to employ automation so you can react quickly and ensure its integrity.

    Join Tufin experts Dan Rheault and Joe Schreiber, also an established SOC professional, for an educational webinar that will discuss best practices to:

    •Secure the network through effective segmentation
    •Contain risk from zero-day attacks
    •Leverage automation to respond to security incidents
  • How to Define Network Zones
    How to Define Network Zones
    Dan Rheault Sr. Product Marketing Manager, Tufin Recorded: Jul 10 2019 41 mins
    Defining zones is a critical part of network segmentation and achieving Zero Trust, but it’s very rarely a simple process. Some struggle to identify where to start, others neglect the ongoing management of zones, while still more over-segment their network into a state of unmanageability. The good news is that you can avoid the mistakes of others.
    In this session, Tufin network security expert Dan Rheault will share lessons learned from implementing segmentation for some of the largest and most complex networks in the world, on how to:
    •Successfully establish and maintain network zones
    •Avoid common pitfalls that compromise network manageability
    •Utilize proven strategies for network segmentation

    Whether you’re starting your zone creation for network segmentation or delving into microsegmentation, this webinar is designed to be helpful for all.
  • How to Define Network Zones
    How to Define Network Zones
    Dan Rheault Sr. Product Marketing Manager, Tufin Recorded: Jun 26 2019 42 mins
    Defining zones is a critical part of network segmentation and achieving Zero Trust, but it’s very rarely a simple process. Some struggle to identify where to start, others neglect the ongoing management of zones, while still more over-segment their network into a state of unmanageability. The good news is that you can avoid the mistakes of others.
    In this session, Tufin network security expert Dan Rheault will share lessons learned from implementing segmentation for some of the largest and most complex networks in the world, on how to:
    •Successfully establish and maintain network zones
    •Avoid common pitfalls that compromise network manageability
    •Utilize proven strategies for network segmentation

    Whether you’re starting your zone creation for network segmentation or delving into microsegmentation, this webinar is designed to be helpful for all.
  • 5 Clear Signs You Need to Automate Network Security Operations
    5 Clear Signs You Need to Automate Network Security Operations
    Hadas Lahav, Senior Product Manager,Automation, Tufin and Karen Crowley, Sr. Product Marketing Manager, Tufin Recorded: Jun 26 2019 35 mins
    Why automate? Why now? Automation is critical to digital transformation, essential for reducing the attack surface and mandatory to ensure continuous compliance.

    Watch the pre-recorded webinar “5 Clear Signs You Need to Automate Network Security Operations” to learn:

    * How to securely speed up the network change process
    * Best practices to getting started with automation
    * Guidelines to meet the goal of Zero-Touch Automation

    We will review the use cases to begin automating network security operations and explain why it’s mandatory to focus on policy-based change automation. Watch now!
  • Seminario web: 5 señales claras que necesitas automatización
    Seminario web: 5 señales claras que necesitas automatización
    Alberto Maestre, Pre-Sales Engineer SEEMEA Recorded: Jun 25 2019 48 mins
    ¿Por qué automatizar? ¿Porqué ahora? La automatización es crítica para la transformación digital, esencial para reducir la superficie de ataque y obligatoria para garantizar el cumplimiento continuo.

    Únase a nosotros para nuestro webcast el 25 de junio a las 10:30 “5 señales claras que necesita para automatizar las operaciones de seguridad de red” para aprender:

    Cómo acelerar de forma segura el proceso de cambio de red
    Mejores prácticas para comenzar con la automatización
    Pautas para cumplir con el objetivo de Zero-Touch Automation

    Conviértalo en una de sus resoluciones 2019 para adoptar la automatización y reducir el tiempo y el esfuerzo que dedica a las tareas manuales relacionadas con las operaciones de firewall. Los cinco signos claros pueden ayudarlo a desarrollar el caso de negocios y obtener una participación de la administración para maximizar la agilidad y la seguridad con la automatización y la orquestación de políticas de seguridad de Tufin.
  • Webinar: An Actionable Plan for Segmenting Your Network
    Webinar: An Actionable Plan for Segmenting Your Network
    Erez Tadmor,Sr. Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Recorded: Jun 24 2019 49 mins
    A segmented network operationalizes your network security policy, enables a demonstrable state of continuous compliance, and provides mitigation options for cyberattacks.

    Our advice: organizations must go back to the basics to accomplish this crucial project.

    This webinar will cover actionable tips for network segmentation based on the experience of over 2,000 organizations. We will share:
    •Common pitfalls to avoid
    •How to start segmenting your network today
    •Tips for applicable enforcement
    •Q&A from the attendees
  • Applying Zero Trust Principles to Your Network (Featuring Guest Analyst)
    Applying Zero Trust Principles to Your Network (Featuring Guest Analyst)
    Chase Cunningham, Forrester Principal Analyst Serving Security & Risk Professionals & Erez Tadmor, Product Manager, Tufin Recorded: Jun 19 2019 53 mins
    Networks and network security tooling has continued to proliferate at light speed as organizations infrastructures and systems have moved to the cloud. This massive sprawl of the control surface has created a nightmare scenario for businesses to control and maintain. This webinar will delve into the truths around how large this problem is and detail the facts related to the necessity for automation and orchestration within today's cloud-enabled businesses. Our session will provide guidance and thoughts on the impossibility of achieving Zero Trust without the use of a central security policy and automated control technologies.

    Join guest speaker Chase Cunningham, Forrester’s Principal Analyst for Security and Risk Professionals and Erez Tadmor, Director Product Management, together with Dan Rheault, Tufin Senior Product Marketing Manager to gain an in-depth understanding of the Zero Trust framework, and how it can successfully be implemented in your network and maintained through security policy management.
  • Applying Zero Trust Principles to Your Network (Featuring Guest Analyst)
    Applying Zero Trust Principles to Your Network (Featuring Guest Analyst)
    Chase Cunningham, Forrester Principal Analyst Serving Security & Risk Professionals & Erez Tadmor, Product Manager, Tufin Recorded: Jun 5 2019 54 mins
    Networks and network security tooling has continued to proliferate at light speed as organizations infrastructures and systems have moved to the cloud. This massive sprawl of the control surface has created a nightmare scenario for businesses to control and maintain. This webinar will delve into the truths around how large this problem is and detail the facts related to the necessity for automation and orchestration within today's cloud-enabled businesses. Our session will provide guidance and thoughts on the impossibility of achieving Zero Trust without the use of a central security policy and automated control technologies.

    Join guest speaker Chase Cunningham, Forrester’s Principal Analyst for Security and Risk Professionals and Erez Tadmor, Director Product Management, together with Dan Rheault, Tufin Senior Product Marketing Manager to gain an in-depth understanding of the Zero Trust framework, and how it can successfully be implemented in your network and maintained through security policy management.

Embed in website or blog