Hi [[ session.user.profile.firstName ]]

Securing Complex Networks with Fortinet & Tufin

Enterprise IT and security experts are under increasing pressure to respond to complex network changes to keep up with growing business demands. Lack of network visibility hinders the ability to deliver services and applications with the security, speed and accuracy required for today’s heterogeneous IT environments. Add to this, the demand to mitigate cyber threats by reducing attack surface and improving overall security posture.
Together, Tufin Orchestration Suite™ with Fortinet® Firewalls and FortiManager Network Security Management enable IT security teams to manage complex heterogeneous networks through a single pane of glass.
In this session, experts from Fortinet and Tufin will show how security and network teams can achieve:
•Visibility for the security posture and control of complex networks—from on-premise networks across hybrid cloud environments
•Optimization of firewall policies
•Continuous regulatory compliance and auditability with industry standards
•Automated change design and verification
Recorded Nov 17 2015 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Neil Prasad, Director, Product Marketing - Fortinet & Rick Rutledge, Sr. Sales Engineer - Tufin
Presentation preview: Securing Complex Networks with Fortinet & Tufin
  • Channel
  • Channel profile
  • TechTalk: Decommissioning Access And Rule Cleanup May 27 2021 5:00 am UTC 30 mins
    David Alon, Sales Engineer
    In this TechTalk, "Decommissioning Access And Rule Cleanup", we will explain how to leverage Access Decommissioning Workflow for a controlled and documented removal of network access, and what is required to achieve it.

    Join us on May 27 at 1pm SGT to learn how to gain the four layers of visibility and automation:
    1. Decommissioning access that is obsolete or unauthorized
    2. Visibility of all the rules implementing the access
    3. Control which rules not to remove access from
    4. Which devices, programs and workloads are running
  • TechTalk: Decommissioning Access And Rule Cleanup May 26 2021 3:00 pm UTC 45 mins
    David Alon, Sales Engineer
    In this TechTalk, "Decommissioning Access And Rule Cleanup", we will explain how to leverage Access Decommissioning Workflow for a controlled and documented removal of network access, and what is required to achieve it.

    Join us on May 26 at 11am ET/4pm BST to learn how to gain the four layers of visibility and automation:
    1. Decommissioning access that is obsolete or unauthorized
    2. Visibility of all the rules implementing the access
    3. Control which rules not to remove access from
    4. Which devices, programs and workloads are running
  • Automating Zero Trust Principles into Your Network Security Model May 26 2021 5:00 am UTC 60 mins
    Thorsten Geissel, Senior Director, Sales Engineering, and Sigalit Kaidar, Director of Product Marketing
    This webinar addresses the main use cases customers currently focus on as they move towards a Zero Trust model. Thorsten Geissel, Senior Director, Sales Engineering, and Sigalit Kaidar, Director of Product Marketing, will demonstrate how organizations use automation to effectively design and manage Zero Trust network security policies across the hybrid cloud.

    Join us on May 26 at 1pm SGT as we discuss how to:
    • Dynamically set and manage micro-segmentation policies
    • Ensure current policies are compliant with ZT policies
    • Gain accurate, end-to-end visibility from the perimeter to the micro-perimeter

    Save your seat. Register today.
  • Automating Zero Trust Principles into Your Network Security Model May 25 2021 3:00 pm UTC 60 mins
    Thorsten Geissel, Senior Director, Sales Engineering, and Sigalit Kaidar, Director of Product Marketing
    This webinar addresses the main use cases customers currently focus on as they move towards a Zero Trust model. Thorsten Geissel, Senior Director, Sales Engineering, and Sigalit Kaidar, Director of Product Marketing, will demonstrate how organizations use automation to effectively design and manage Zero Trust network security policies across the hybrid cloud.

    Join us on May 25 at 11 am EDT/4 pm BST as we discuss how to:
    • Dynamically set and manage micro-segmentation policies
    • Ensure current policies are compliant with ZT policies
    • Gain accurate, end-to end visibility from the perimeter to the micro-perimeter

    Save your seat. Register today.
  • TechTalk: Security Policy Automation for Hybrid-Tying Cloud and On-prem Together Recorded: May 6 2021 28 mins
    Ricky Egge, Pre-Sales Engineer
    Cloud teams are marching forward with automation tools to quickly and effectively automate changes in both on-premises and cloud infrastructure. With the agility promised by the cloud, balancing the requirements of security and speed can get tricky. Understanding how security policy management can be automated to achieve both is key.

    Join Tufin on May 6 at 1pm SGT/ 3pm AEST to discuss how to:
    • Integrate SecureChange ticket API's into the DevOps process
    • Automate risk evaluation for DevOps requests
    • Drive secure, agile development with automated security policy management
  • TechTalk: Hybrid Security Policy Automation - Tying Cloud and On-prem Together Recorded: May 4 2021 25 mins
    Ricky Egge, Sales Engineer
    Cloud teams are marching forward with automation tools to quickly and effectively automate changes in both on-premises and cloud infrastructure. With the agility promised by the cloud, balancing the requirements of security and speed can get tricky. Understanding how security policy management can be automated to achieve both is key.

    Join us as we discuss how to:
    • Integrate SecureChange ticket API's into the DevOps process
    • Automate risk evaluation for DevOps requests
    • Drive secure, agile development with automated security policy management
  • Cisco and Tufin team up to discuss ACI security automation with Ansible & Tufin Recorded: Mar 26 2021 46 mins
    Steve Sharman Technical Solutions Architect, Cisco & Roi Alon, Senior Product Manager, Tufin
    As an industry-leading secure, open, and comprehensive Software-Defined Networking (SDN) solution, Cisco® Application Centric Infrastructure (Cisco ACI™) simplifies, optimizes, and accelerates infrastructure deployment and governance, and expedites the application deployment lifecycle.

    In this webinar, Steve Sharman, Technical Solutions Architect at Cisco, and Roi Alon, Senior Product Manager at Tufin, will discuss how ACI users can accelerate business application deployments, and simplify security policy management for the ACI Fabric, and across their hybrid environment.

    Based on an integration between Tufin and Ansible, the latest app from the Tufin Marketplace is the Policy Change Automation app for Cisco ACI. This new app enables users to deploy Tufin to automate changes to ACI contracts and corresponding firewall rules, providing the right access for accelerated deployment of business applications in the ACI Fabric, and across the hybrid network.

    Join us on March 26 at 1pm SGT to learn how you can:
    * Accelerate business application deployment in the ACI Fabric by eliminating the risk of configuration errors
    * Centrally and automatically manage changes to multiple EPGs, contracts, and firewall rules in the ACI Fabric and across the hybrid network
    * Run proactive risk assessments against your organization’s security policy, to ensure changes are not violating policies or introducing additional risks
    *Use the Ansible playbook directly from the Tufin Policy Change Automation app, for simple, automated, and secure access changes within the ACI Fabric
    Register now
  • Cisco and Tufin team up to discuss ACI security automation with Ansible & Tufin Recorded: Mar 25 2021 46 mins
    Steve Sharman Technical Solutions Architect, Cisco & Roi Alon, Senior Product Manager, Tufin
    As an industry-leading secure, open, and comprehensive Software-Defined Networking (SDN) solution, Cisco® Application Centric Infrastructure (Cisco ACI™) simplifies, optimizes, and accelerates infrastructure deployment and governance, and expedites the application deployment lifecycle.

    In this webinar, Steve Sharman, Technical Solutions Architect at Cisco, and Roi Alon, Senior Product Manager at Tufin, will discuss how ACI users can accelerate business application deployments, and simplify security policy management for the ACI Fabric, and across their hybrid environment.

    Based on an integration between Tufin and Ansible, the latest app from the Tufin Marketplace is the Policy Change Automation app for Cisco ACI. This new app enables users to deploy Tufin to automate changes to ACI contracts and corresponding firewall rules, providing the right access for accelerated deployment of business applications in the ACI Fabric, and across the hybrid network.

    Join us on March 25 at 11am ET/3pm GMT to learn how you can:
    * Accelerate business application deployment in the ACI Fabric by eliminating the risk of configuration errors
    * Centrally and automatically manage changes to multiple EPGs, contracts, and firewall rules in the ACI Fabric and across the hybrid network
    * Run proactive risk assessments against your organization’s security policy, to ensure changes are not violating policies or introducing additional risks
    *Use the Ansible playbook directly from the Tufin Policy Change Automation app, for simple, automated, and secure access changes within the ACI Fabric
    Register now
  • Accenture Insights – Avoid Security Misconfigurations in the Cloud Recorded: Mar 3 2021 53 mins
    Sattwik Gavli, Director Cloud Security Product at Tufin and Shaan Mulchandani, Global AWS Security Lead at Accenture
    Working with the world’s largest enterprises, Accenture sees the most common pitfalls in cloud security - from misconfigurations to ever-changing technology. Learn from Accenture’s Senior Cloud Security Manager, Shaan Mulchandani, how their clients combat the burning problem of misconfigurations in their large, heterogeneous environments.

    In this webinar you will hear:
    - Real client scenarios describing what caused misconfigurations in their network
    - The key reasons for misconfigurations in multi-cloud and hybrid cloud environments
    - Best practices to avoid misconfigurations

    Register now and gain a strategy to secure your cloud environment without misconfigurations.

    Unable to attend? Sign up here and we’ll send you the recording.
  • Accenture Insights – Avoid Security Misconfigurations in the Cloud Recorded: Mar 2 2021 53 mins
    Sattwik Gavli, Director Cloud Security Product at Tufin and Shaan Mulchandani, Global AWS Security Lead at Accenture
    Working with the world’s largest enterprises, Accenture sees the most common pitfalls in cloud security - from misconfigurations to ever-changing technology. Learn from Accenture’s Senior Cloud Security Manager, Shaan Mulchandani, how their clients combat the burning problem of misconfigurations in their large, heterogeneous environments.

    In this webinar you will hear:
    - Real client scenarios describing what caused misconfigurations in their network
    - The key reasons for misconfigurations in multi-cloud and hybrid cloud environments
    - Best practices to avoid misconfigurations

    Register now and gain a strategy to secure your cloud environment without misconfigurations.

    Unable to attend? Sign up here and we’ll send you the recording.
  • TechTalk: Utilizing Topology to Troubleshoot Connectivity Across the Enterprise Recorded: Feb 25 2021 26 mins
    Bill Coglianese, Pre-Sales Engineer
    If you can’t see it, you can’t measure, monitor, or control it. For network and security management, a lack of visibility leads to blind spots, non-compliance, and inefficiency.

    In this TechTalk, "Utilizing Tufin Topology to Effectively Troubleshoot Connectivity Across the Enterprise", we will explain what full network visibility should entail, and what is required to achieve it, across your hybrid, multi-vendor, multi-platform environment.

    Join us on February 25th, 2021 at 2pm SGT to learn how to gain the five layers of visibility:
    • Which devices, programs and workloads are running
    • Which existing security rules are in force between these devices
    • What security policy should be allowed
    • Which access rules are in (or out of) compliance
    • Least privilege Access – how security policies can be narrowed to establish least privilege acces
  • TechTalk: Utilizing Topology to Troubleshoot Connectivity Across the Enterprise Recorded: Feb 24 2021 26 mins
    Bill Coglianese, Pre-Sales Engineer
    If you can’t see it, you can’t measure, monitor, or control it. For network and security management, a lack of visibility leads to blind spots, non-compliance, and inefficiency.

    In this TechTalk, "Utilizing Tufin Topology to Effectively Troubleshoot Connectivity Across the Enterprise", we will explain what full network visibility should entail, and what is required to achieve it, across your hybrid, multi-vendor, multi-platform environment.

    Join us on February 24th, 2021 at 11:00am ET to learn how to gain the five layers of visibility:
    • Which devices, programs and workloads are running
    • Which existing security rules are in force between these devices
    • What security policy should be allowed
    • Which access rules are in (or out of) compliance
    • Least privilege Access – how security policies can be narrowed to establish least privilege access
  • Optimize Secure Network Operations with IPAM and Segmentation Recorded: Feb 24 2021 39 mins
    Dan Rheault, Product Manager, Security Solutions & Delme Herbert, Senior Technical Product Manager at BlueCat
    To effectively protect sensitive assets and achieve a Zero Trust architecture, organizations increasingly turn to segmentation. Segmentation, or micro-segmentation, can reduce the risk of attacks by making it difficult to traverse the network. But segmentation is complex to manage and its maintenance can potentially impact business continuity.

    Join us as BlueCat Sr. Technical Product Manager, Delme Herbert, and Tufin Product Manager, Dan Rheault share how to establish and maintain an effective segmentation policy including:

    The common challenges of maintaining an accurate segmentation policy
    How Tufin and IPAM solutions, such as BlueCat Networks, enable consistent security policy management across your hybrid environment
    How network and security teams can collaborate through enhanced visibility, proactive risk assessments, and more
    Take the next step with a segmentation strategy that helps further secure your environment
  • Optimize Secure Network Operations with IPAM and Segmentation Recorded: Feb 23 2021 39 mins
    Dan Rheault, Product Manager, Security Solutions & Delme Herbert, Senior Technical Product Manager at BlueCat
    To effectively protect sensitive assets and achieve a Zero Trust architecture, organizations increasingly turn to segmentation. Segmentation, or micro-segmentation, can reduce the risk of attacks by making it difficult to traverse the network. But segmentation is complex to manage and its maintenance can potentially impact business continuity.

    Join us on Tuesday, February 23 at 11am ET/ 4pm GMT, as BlueCat Sr. Technical Product Manager, Delme Herbert, and Tufin Product Manager, Dan Rheault share how to establish and maintain an effective segmentation policy.

    This interactive session highlights:
    - The common challenges of maintaining an accurate segmentation policy
    - How Tufin and IPAM solutions, such as BlueCat Networks, enable consistent security policy management across your hybrid environment
    - How network and security teams can collaborate through enhanced visibility, proactive risk assessments, and more
  • New Tufin Releases – Vulnerability-based Change Automation App + 21-1 Recorded: Feb 18 2021 52 mins
    Roi Alon, Senior Product Manager & Alon Buteliano, Associate Product Manager, Tufin
    Tufin’s new release, R21-1, includes enhanced support for Azure and AWS environments and Check Point CloudGuard, as well as new NGFW capabilities to help you extend your visibility and control across your hybrid environment (cloud and on-premise).

    In addition, the new Vulnerability-based Change Automation (VCA) App allows you to ensure consistent risk assessments during access change workflows. Embed into your process an automated confirmation from your vulnerability scanners that new sources or destinations have no known vulnerabilities. With the VCA, you can make accurate risk decisions based on both policy and security data.

    Join us on Thursday, February 18 at 2 pm SGT to learn how you can use Tufin’s newest security automation features to:
    - Enhance the risk analysis step of your provisioning workflows through automatically incorporating vulnerability scanner output
    - Manage policy changes within and across the Azure environment.
    - Manage changes for environments that are not natively supported by Tufin
    - Gain enhanced visibility into AWS VPC Peering and Transit GW Traffic
    - Achieve complete visibility into LDAP objects and multi-vendor User-ID NGFW policies
    - View and track changes for Check Point CloudGuard policies with AWS, NSX, and Cisco-ACI (in addition to Azure) objects

    Save your seat. Register today!
  • New Tufin Releases – Vulnerability-based Change Automation App + 21-1 Recorded: Feb 17 2021 60 mins
    Roi Alon, Senior Product Manager & Alon Buteliano, Associate Product Manager, Tufin
    Tufin’s new release, R21-1, includes enhanced support for Azure and AWS environments and Check Point CloudGuard, as well as new NGFW capabilities to help you extend your visibility and control across your hybrid environment (cloud and on-premise).

    In addition, the new Vulnerability-based Change Automation (VCA) App allows you to ensure consistent risk assessments during access change workflows. Embed into your process an automated confirmation from your vulnerability scanners that new sources or destinations have no known vulnerabilities. With the VCA, you can make accurate risk decisions based on both policy and security data.

    Join us on Wednesday, February 17 at 11 am EST/ 4pm GMT to learn how you can use Tufin’s newest security automation features to:
    - Enhance the risk analysis step of your provisioning workflows through automatically incorporating vulnerability scanner output
    - Manage policy changes within and across the Azure environment
    - Manage changes for environments that are not natively supported by Tufin
    - Gain enhanced visibility into AWS VPC Peering and Transit GW Traffic
    - Achieve complete visibility into LDAP objects and multi-vendor User-ID NGFW policies
    - View and track changes for Check Point CloudGuard policies with AWS, NSX, and Cisco-ACI (in addition to Azure) objects

    Save your seat. Register today!
  • How to Automate Security Policies to Further Accelerate CI/CD Recorded: Feb 4 2021 30 mins
    Jonathan Campbell, Sales Engineer, Cloud; Alex Apt, Solutions Architect
    Agility and speed are key drivers behind most DevOps, sometimes at the expense of secure development or timely security reviews. CI/CD often creates a challenge for organizations to maintain compliance as security policies are typically introduced much later in the development cycle, potentially increasing risks. The manual processes of checking dynamic security policies across the entire organizations as they adopt CI/CD at a scale is simply asking for a catastrophe to happen.

    How does security policy automation drive agility in DevOps?
    - Helps organizations adopt ‘shift-left’ strategy with a rock-solid plan
    - Eliminates manual security checks late in the build cycle
    - Alerts developers to course-correct earlier in the build cycle
    - Assures security teams that their most updated security policies are incorporated in the CI/CD pipeline
    - Meets security and compliance requirements without impacting the agility of application development

    This webinar will highlight how one customer uses Tufin to introduce security policies much earlier in the build cycle. Automated updates to the security policies in the code repository allow developers to access the latest security team-defined policies while effectively accelerating CI/CD.
  • How to Automate Security Policies to Further Accelerate CI/CD Recorded: Feb 3 2021 28 mins
    Jonathan Campbell, Sales Engineer, Cloud
    Agility and speed are key drivers behind most DevOps, sometimes at the expense of secure development or timely security reviews. CI/CD often creates a challenge for organizations to maintain compliance as security policies are typically introduced much later in the development cycle, potentially increasing risks. The manual processes of checking dynamic security policies across the entire organizations as they adopt CI/CD at a scale is simply asking for a catastrophe to happen.

    How does security policy automation drive agility in DevOps?
    - Helps organizations adopt ‘shift-left’ strategy with a rock-solid plan
    - Eliminates manual security checks late in the build cycle
    - Alerts developers to course-correct earlier in the build cycle
    - Assures security teams that their most updated security policies are incorporated in the CI/CD pipeline
    - Meets security and compliance requirements without impacting the agility of application development

    This webinar will highlight how one customer uses Tufin to introduce security policies much earlier in the build cycle. Automated updates to the security policies in the code repository allow developers to access the latest security team-defined policies while effectively accelerating CI/CD.
  • Tech Talk: Attaining Least Access and Zero Trust Recorded: Jan 29 2021 38 mins
    Blake Hutchins, Sales Engineer
    Join us on Friday, January 29 at 2 pm SGT for a tech-driven session packed with valuable security policy info and tips, as Blake Hutchins, Tufin’s senior security engineer reviews the practical steps Tufin’s customers are taking to achieve Zero Trust network access across the hybrid cloud (on-premise & cloud).

    In this webinar, "Attaining Least Access and Zero Trust", you’ll learn how to:
    * Effectively define and maintain policies using automation to ensure they’re sufficiently restrictive
    * Reduce the size and scope of existing security rule sets to help you meet regulatory compliance requirement
    * Gain visibility into cloud network configurations and ensure consistent Zero Trust access approach

    Register now.
  • TechTalk: Attaining Least Access and Zero Trust Recorded: Jan 28 2021 38 mins
    Blake Hutchins, Sales Engineer
    Join us for a tech-driven session packed with valuable security policy info and tips, as Blake Hutchins, Tufin’s senior security engineer reviews the practical steps Tufin’s customers are taking to achieve Zero Trust network access across the hybrid cloud (on-premise & cloud).

    In this webinar, you’ll learn how to:
    • Effectively define and maintain policies using automation to ensure they’re sufficiently restrictive
    • Reduce the size and scope of existing security rule sets to help you meet regulatory compliance requirements
    • Gain visibility into cloud network configurations and ensure consistent Zero Trust access approach
Security Policy Orchestration Solutions
Tufin® is the leader in Network Security Policy Orchestration, serving more than half of the top 50 companies in the Forbes Global 2000. Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. Tufin reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries.

Find out more at www.tufin.com
Tufin blog SuiteTalk™ http://www.tufin.com/blog/
Twitter: http://twitter.com/TufinTech
Webinars http://www.tufin.com/resources/webinars/
YouTube https://www.youtube.com/user/Tufintech

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Complex Networks with Fortinet & Tufin
  • Live at: Nov 17 2015 7:00 pm
  • Presented by: Neil Prasad, Director, Product Marketing - Fortinet & Rick Rutledge, Sr. Sales Engineer - Tufin
  • From:
Your email has been sent.
or close