Hi [[ session.user.profile.firstName ]]

Tufin

  • Date
  • Rating
  • Views
  • Final Countdown for Compliance with NERC CIP V5 – Are You Ready? Final Countdown for Compliance with NERC CIP V5 – Are You Ready? Ellen Fischl Bodner, Product Marketing Manager, Tufin Recorded: May 18 2016 34 mins
    It’s the final countdown for compliance with NERC CIP Version 5 Cyber Security Standards. Even with the “stay of execution” deadline extension for mandatory compliance, energy utilities are still mobilizing. In this webinar we will examine the impact of recent events, threats and trends such as the Internet of Things (IoT) on power-grid security. We’ll then look ahead at tools and strategies for managing cyber security policy and containing attackers, while maintaining compliance and audit readiness for regulatory standards and organizational policy.
  • Como compatibilizar Segurança e Agilidade usando Tufin Como compatibilizar Segurança e Agilidade usando Tufin Rafael Sampaio – Diretor, América Latina | Rafael Sampaio – Director, Latin America Recorded: May 10 2016 36 mins
    Inscreva-se no webinar regional “Como compatibilizar segurança e processos ágeis usando o Orquestrador de Políticas de Segurança da Tufin”. Neste programa vamos analisar os principais desafios das redes corporativas (modelo 5 C’s) e demonstrar como Tufin oferece uma solução para estes desafios para mais de 1.700 clientes em todo mundo através de 3 benefícios:
    •Visibilidade e controle de toda rede heterogênea
    •Redução da superfície de ataque e conformidade continua
    •Implementação de mudanças em minutos ao invés de dias

    Join us for our special regional webinar “How to Gain Cybersecurity and Agility with Tufin’s Network Security Policy Orchestration”. In this session we will review the primary challenges of enterprise networks (the 5 C's) and highlight how Tufin provides the best solution for these challenges to more than 1,700 customers worldwide, with 3 key benefits:
    •Visibility & control across heterogeneous networks
    •Reduced attack surface and continuous compliance
    •Security changes implemented in minutes instead of days
  • Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Jon Oltsik, senior principal analyst, ESG & Maya Malevich, Director of Product Marketing, Tufin Recorded: May 3 2016 54 mins
    Between constraints of IT security skills and the rise of cloud adoption it is increasingly difficult to control security policies across the heterogeneous network. Network security and operations teams are expected to ensure and initiate connectivity while protecting the attack surface from the next cyber threat and complying with internal policies and industry regulations. Join us for a Webinar session with ESG senior principal analyst Jon Oltsik, as he reviews the latest findings of a recent survey on how cloud adoption is transforming network security operations. In this session we will also examine how security policy orchestration can help address some of the key challenges of managing security and connectivity in the cloud, and across hybrid cloud and physical networks.
  • The Balancing Act – Boost Agility While Ensuring Security & Compliance The Balancing Act – Boost Agility While Ensuring Security & Compliance Maya Malevich, Director of Product Marketing, Tufin Recorded: Apr 13 2016 37 mins
    For many enterprises security and risk management are considered inhibitors, a necessary evil that is slowing down the ability of IT to align with business needs. Especially with the adoption of cloud and proliferation of network platforms and technologies, it is no longer scalable to examine the impact of every connectivity requirement on the network security posture. But with automation and orchestration of network security policies, agility and security can be maximized at the same time, working together to:

    · Improve prevention of cyberattacks and their impact

    · Accelerate remediation of cyber threats

    · Ensure continuous compliance and audit readiness

    Join us for this session to understand how network security change automation with baked-in security and connectivity controls can help you stop the balancing act between agility and security and maximize both for your business.
  • Securing the Next Generation network with Fortinet and Tufin Securing the Next Generation network with Fortinet and Tufin Neil Prasad | Director of Product Marketing, Fortinet & Maya Malevich | Product Marketing Director, Tufin Recorded: Mar 22 2016 42 mins
    Enterprises today are challenged with securing complex networks that span between on-premise and public cloud platforms from different vendors. These hybrid networks provide new opportunities for cyber attacks and make it even more difficult to effectively manage security policy changes.
    Together, Tufin Orchestration Suite™ with Fortinet® Firewalls and FortiManager™ Network Security Management enable IT security teams to manage complex heterogeneous networks through a single pane of glass.
    In this session, join Neil Prasad, Director of Product Marketing - Fortinet and myself to discuss the benefits of the Fortinet-Tufin integration, and demonstrate how the joint solution delivers:
    •Visibility and control across hybrid networks
    •Stronger security posture and continuous compliance
    •Automated network security change process with baked-in security
  • Security Policy Orchestration for Next-Generation Firewalls & Cloud Security Policy Orchestration for Next-Generation Firewalls & Cloud Joerg Sieber, Sr. Product Marketing Manager - Palo Alto Networks & Maya Malevich, Product Marketing Director Recorded: Feb 23 2016 57 mins
    Enterprise IT and security experts are under increasing pressure to respond to complex network changes to keep up with growing business demands. Lack of network visibility hinders the ability to deliver services and applications with the security, speed and accuracy required for today’s heterogeneous IT environments. Add to this, the demand to mitigate cyber threats by reducing attack surface and improving overall security posture.

    Together, the Tufin Orchestration Suite and Palo Alto Networks Next-Generation Firewall provide enterprises with a Security Policy Orchestration solution to maximize agility and cybersecurity. The integration provides joint customers with visibility and control across legacy and next generation Firewalls, and private and public cloud platforms from a single pane of glass. This central console enables enforcing a security and compliance baseline, that strengthens the network security posture.
    In this session, experts from Palo Alto Networks and Tufin will show how security and network teams of joint customers are already working together to achieve:
    •End-to-end network security change automation with automated design and provisioning based on App-ID
    •Defining and enforcing a central security and compliance baseline across heterogeneous environments
    •Continuous regulatory compliance and auditability with industry standards
    •Policy optimization for Palo Alto Networks next-generation rules and objects, including uses and Apps
    •Visibility and control of hybrid networks—across on-premise infrastructure and hybrid cloud environments
  • How Security Policy Orchestration Adds to Your Network Defenses How Security Policy Orchestration Adds to Your Network Defenses John Kindervag Vice President & Principal Analyst Serving Security, Forrester Research, Inc. and Reuven Harrison CTO, Tufin Recorded: Jan 13 2016 44 mins
    Networks designed in the 1990s are not equipped to block the modern cyber attacker. In addition to that, the adoption of Cloud, virtualization technologies, software-defined networking (SDN), and bring-your-own-device (BYOD) have led to distributed networks with a perimeter that is unenforceable. Zero Trust architecture, developed by Forrester Research, reduces the attack surface by controlling trust in the internal network.
    Network Orchestration solutions are one of three innovations that fuel Zero Trust adoption. In many large enterprise IT environments, it’s not unusual to find dozens and dozens of point security products with their own management interface and little integration across all platforms. A central console that controls segmentation gateways across virtual and physical network infrastructure is not only key to network security, but also to agile network operations.
    Join John Kindervag, Vice President & Principal Analyst Serving Security and Risk Professionals, Forrester Research, Inc. and Reuven Harrison, CTO, Tufin to learn about how Security Policy Orchestration can help build a Zero Trust network model for a smart defense.
  • ‘Tis the Season for NERC CIP V5 Transition ‘Tis the Season for NERC CIP V5 Transition Chris Beyer, Co-Founder and CTO, Synacktek, & Ellen Fischl Bodner, Product Marketing, Tufin Recorded: Dec 15 2015 43 mins
    Tis the season! Compliance with North American Electric Reliability Corp (NERC) Critical Infrastructure Protection (CIP) Standard Version 5 is only a few months away - April 1, 2016. In this webinar on transitioning to NERC CIP V5 we will share insights on cyber security for bulk power grid networks including:
    •Overview of NERC CIP V5 Standards
    •Strategies and tools for meeting the new Cyber Security Standards
    •Industry trends on transitioning to compliance including polling results
    Join utility-industry network security expert Chris Beyer, Co-Founder and CTO, Synacktek, and Tufin to learn how your colleagues in the power companies and network security professionals are ramping up for this important transition to the new standards.
  • Optimization that Surpasses: Security Policy Orchestration for Hybrid Networks Optimization that Surpasses: Security Policy Orchestration for Hybrid Networks Maya Malevich, Director of Product Marketing, Tufin Recorded: Dec 10 2015 33 mins
    Enterprises adopting virtualization will find themselves managing thousands of network security changes per week.
    Handling these changes effectively and securely requires visibility and control across virtual and physical infrastructure.
    A security policy orchestration solution can address the security and agility challenges with a single console that monitors and manages security policies across hybrid IT.


    In this session we will discuss real life examples of the challenges in network virtualization and how they can be addressed through orchestration.
  • Securing Complex Networks with Fortinet & Tufin Securing Complex Networks with Fortinet & Tufin Neil Prasad, Director, Product Marketing - Fortinet & Rick Rutledge, Sr. Sales Engineer - Tufin Recorded: Nov 17 2015 55 mins
    Enterprise IT and security experts are under increasing pressure to respond to complex network changes to keep up with growing business demands. Lack of network visibility hinders the ability to deliver services and applications with the security, speed and accuracy required for today’s heterogeneous IT environments. Add to this, the demand to mitigate cyber threats by reducing attack surface and improving overall security posture.
    Together, Tufin Orchestration Suite™ with Fortinet® Firewalls and FortiManager Network Security Management enable IT security teams to manage complex heterogeneous networks through a single pane of glass.
    In this session, experts from Fortinet and Tufin will show how security and network teams can achieve:
    •Visibility for the security posture and control of complex networks—from on-premise networks across hybrid cloud environments
    •Optimization of firewall policies
    •Continuous regulatory compliance and auditability with industry standards
    •Automated change design and verification

Embed in website or blog