Channel profile:

Security Policy Orchestration solutions

The leader in Security Policy Orchestration, automating and accelerating network infrastructure changes while maintaining security and compliance. By improving network change processes, organizations using the Tufin Security Policy Orchestration Suite will have a positive impact on business by reducing time and cost spent implementing network changes by up to 80 percent. Taking a holistic view of IT, Tufin’s Security Policy Orchestration Suite helps organizations automate security and efficiency into day-to-day operations, enabling them to be more agile and leverage technology to gain a competitive advantage. Founded in 2005, Tufin serves more than 1,200 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Tufin partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Blue Coat, McAfee and BMC Software, and is known for technological innovation and dedicated customer service.

Subscribers (4,835)
Controlling Network Security Complexity - SANS & Tufin Joint Webinar John Pescatore, Director of Emerging Security Trends, SANS & Reuven Harrison, CTO, Tufin Today’s IT infrastructure is more complex and heterogeneous than ever. This situation creates endless opportunities for cyber-offenders and an ever-growing challenge to security managers.
To address these challenges, Critical Security Controls focuses first on prioritizing security functions that are effective against the latest Advanced Targeted Threats, with a strong emphasis on "What Works" – security controls where products, processes, architectures and services are in use that have demonstrated real world effectiveness. Standardization and automation is another top priority – to gain operational efficiencies while also improving effectiveness.

Join John Pescatore, Director of Emerging Security Trends, SANS Institute and Reuven Harrison, CTO, Tufin to learn about effective security controls, standardization and automation in a world of growing complexity.
Read more >
Oct 21 2015 3:00 pm
60 mins
Save your seat
  • Date
  • Rating
  • Views
  • Enterprise IT and security experts are under increasing pressure to respond to complex network changes to keep up with growing business demands. Lack of network visibility hinders the ability to deliver services and applications with the security, speed and accuracy required for today’s heterogeneous IT environments. Add to this, the demand to mitigate cyber threats by reducing attack surface and improving overall security posture.
    Together, the Tufin Orchestration Suite and Palo Alto Networks Next-Generation Firewall provide enterprises with a comprehensive application-aware Security Policy Orchestration solution. This change management and automation platform enables secure and compliant environments—from on-premise networks across hybrid cloud.
    In this session, experts from Palo Alto Networks and Tufin will show how security and network teams are already working together to achieve:
    •Automated change design and verification based on App-ID
    •Optimization of next-generation firewall policies
    •Visibility and control of complex networks—from on-premise networks across hybrid cloud environments
    •Proactive risk analysis and impact simulation
    •Unified security policy across heterogeneous platforms
    •Continuous regulatory compliance and auditability with industry standards
  • Deadlines are approaching fast for compliance with milestones for North American Electric Reliability Corp (NERC) Critical Infrastructure Protection (CIP) Standard Version 5. Is your network ready for this challenging transition? CIP V5 standards are significantly more stringent and require more extensive policies and evidence for coverage of Cyber Assets. In this webinar you will learn how to help your enterprise network transition to CIP V5 compliance across hybrid cloud, virtualized and physical networks including:
    •Critical infrastructure Cyber Assets, applications and data centers (including network security changes and data center migration)
    •Cleanup of old firewall policies
    •Management of enterprise and regulatory compliance policies from a single console with a Unified Security Policy
    •How to easily build a comprehensive plan for your network’s Cyber Assets as required
    •Tools for maintaining proactive continuous compliance with CIP V5
    - Audit-ready evidence of workflows for all devices and security groups / Cyber Assets
    - Alerts for violations
    - Reporting capabilities
    - Risk-assessment
  • New IT initiatives (like cloud computing) are making network security operations increasingly difficult. In spite of heroic efforts by the security team, network security operations issues are fast approaching a breaking point with teams struggling to keep up as organizations increase their use of hybrid (public & private) cloud.

    In this 45 minute webinar, you'll learn about the current network security operations transition, the challenges accompanying it and how to overcome these challenges.
  • Today’s IT environment has seen an accelerated pace of change and complexity—all increasing demands on IT. Tens, hundreds and even thousands of changes per day should not be done manually.

    Join us for a discussion of effective solutions for automating changes in the network, modifying security controls, resolving routing dilemmas and compliance rule conflicts. This session will provide insights gained through years of experience in the network security arena, and share with you how network changes can done securely, accurately and quickly.
  • Regardless of whether it’s in the cloud or on premise, consolidating or deploying a new data center is a daunting task. It becomes even harder when moving workload from the existing data center to a new one.

    Successful migrations require clear visibility of application connectivity and an understanding of how your applications’ data is inter-connected. You also need to consider how to segment the network in order to meet compliance and data protection needs. One false move can take down business-critical applications. So unless the process is properly managed, it can be a security trap waiting to happen.

    Join Javvad Malik, Senior Analyst, Enterprise Security Practice at 451 Research Group, and Reuven Harrison, Tufin's CTO & Co-Founder, for an insightful discussion around the challenges and market trends in data center migration and learn how you can mitigate risk through real life examples.
  • From January 1st, PCI DSS 2.0 will no longer be valid and PCI DSS 3.0 will be the required compliance version for companies holding credit card data. As compliance for network security is both challenging and time consuming, proven best practices should be adopted to ensure quick and easy onboarding and upgrading.

    Join us for a 30 minute webinar where we will look at best practices for planning your network security and ongoing network management, within the requirements of PCI DSS 3.0. We will also share lessons learned from leading retail and finance companies.
  • Accelerating enterprise transition to the Software Defined Data Center (SDDC) means that organizations must be able to centralize and automate the management of dispersed environments with multiple, segmented networks through software and with minimal manual intervention.

    With perimeter-centric network security proving insufficient, software-based micro-segmentation has emerged as the only scalable and operationally viable alternative for stopping server-to-server attacks within the data center.
    In this session, experts from VMware and Tufin will show how security-, network- and virtualization teams are already working together to achieve:
    • Simple & consistent alignment of network security policies across the software defined data center
    • Improved workload-level security control for the network
    • Continuous compliance with organizational as well as industry guidelines
  • Enterprise transition to Software-Defined Data Centers (SDDCs) has begun and organizations must be able to manage a dispersed environment (multiple, segmented networks) centrally, through software – with the minimal amount of manual intervention.

    For the most effective SDDC, organizations must ensure that every piece in their solution architecture is aligned and automated.

    In this 45 minute session, experts from Tufin will share how security, network, operation, and virtualization teams are working together to build a robust SDDC environment, covering topics such as:

    • Virtualized networks
    • Micro-segmentation for physical and virtual networks
    • Simple alignment of network security policies across the
    software-defined data center
    • Visibility and governance over network security in the
    software-defined data center
  • Recent high profile breaches have shown that perimeter firewalls need to be augmented by internal firewalls that implement security zones on internal networks. Efforts such as the Critical Security Controls (Control 19 - Secure Network Engineering) have demonstrated that such internal segmentation has been key to avoiding or minimizing business impact due to advanced targeted attacks.

    Internal network segmentation is now an accepted best-practice for network security as it:
    • Secures sensitive data
    • Contains attacks
    • Generates richer data for security event management.

    However, many organizations struggle to enforce network segmentation because of its complexity.
    Join John Pescatore, Director of Emerging Security Trends, SANS Institute, and Reuven Harrison, Tufin’s CTO to learn how to strike a peaceful balance by enforcing tight network segmentation without compromising business efficiency and agility.
  • Enterprise IT and security experts are under increasing pressure to respond to growing business expectations. Traditional infrastructures lack the ability to deliver services and applications with the speed and accuracy required.

    As a result, organizations are moving to the cloud and cloud-like technologies such as the Software Defined Data Center (SDDC). This enables fully automated control of the data center (including deployment, provisioning, configurations and operations) whereby virtualization of the data center infrastructure is available as a service.

    However, all too often, security within the SDDC is only considered as an after-thought. Gartner’s ‘The Impact of Software-Defined Data Centers on Information Security’ states “…Any shift to software-defined infrastructure is incomplete without the enforcement of security policy compliance in terms of connectivity.”

    In this 45 minute webinar, you will learn more about

    · The challenges for network security both in and around the SDDC

    · The solutions and technologies needed to address these challenges

Embed in website or blog