Tufin

Channel profile:

Security Policy Orchestration solutions

The leader in Security Policy Orchestration, automating and accelerating network infrastructure changes while maintaining security and compliance. By improving network change processes, organizations using the Tufin Security Policy Orchestration Suite will have a positive impact on business by reducing time and cost spent implementing network changes by up to 80 percent. Taking a holistic view of IT, Tufin’s Security Policy Orchestration Suite helps organizations automate security and efficiency into day-to-day operations, enabling them to be more agile and leverage technology to gain a competitive advantage. Founded in 2005, Tufin serves more than 1,200 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Tufin partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Blue Coat, McAfee and BMC Software, and is known for technological innovation and dedicated customer service.

Subscribers (4,003)
Does Your Network Have the Essentials for NERC CIP V5 Compliance? Ellen Fischl Bodner, Product Marketing Manager, Tufin Deadlines are approaching fast for compliance with milestones for North American Electric Reliability Corp (NERC) Critical Infrastructure Protection (CIP) Standard Version 5. Is your network ready for this challenging transition? CIP V5 standards are significantly more stringent and require more extensive policies and evidence for coverage of Cyber Assets. In this webinar you will learn how to help your enterprise network transition to CIP V5 compliance across hybrid cloud, virtualized and physical networks including:
•Critical infrastructure Cyber Assets, applications and data centers (including network security changes and data center migration)
•Cleanup of old firewall policies
•Management of enterprise and regulatory compliance policies from a single console with a Unified Security Policy
•How to easily build a comprehensive plan for your network’s Cyber Assets as required
•Tools for maintaining proactive continuous compliance with CIP V5
oAudit-ready evidence of workflows for all devices and security groups / Cyber Assets
oAlerts for violations
oReporting capabilities
oRisk-assessment
Read more >
Jul 15 2015 4:30 pm
UTC
30 mins
Attend
  • Live and recorded (21)
  • Upcoming (2)
  • Date
  • Rating
  • Views

Embed in website or blog