Hi [[ session.user.profile.firstName ]]

Webinar: Security Policy Automation – Do More with Less

Why automate? Why now?

Today, more than ever, organizations have to manage resource shortage, a rapidly changing environment and high levels of uncertainty.

In such unique circumstances it becomes critical to have clear, well documented and repeatable processes, with as minimal manual intervention as possible.

Join our product experts on April 21st at 2pm EDT as they review the impact of COVID-19 on network security management and learn how security policy automation is critical to:

• Streamline and accelerate processes
• Reduce the attack surface
• Ensure continuous compliance
• Enable end-to-end change management through integration with ticketing systems

Register to gain insight into why you should automate network and firewall changes and how others are doing it.
Recorded Apr 21 2020 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hadas Lahav, Director of Automation Products, Tufin & Alon Buteliano, Associate Product Manager, Tufin
Presentation preview: Webinar: Security Policy Automation – Do More with Less
  • Channel
  • Channel profile
  • TechTalk: Blueprint for Zero-Trust Networks Nov 12 2020 4:00 pm UTC 45 mins
    Sagi Bar-Zvi, Strategic Pre-Sales Manager
    As organizations accelerate ‘work from home’ programs, more and more businesses are turning to the zero-trust model – “trust nothing, verify everything” to reinforce their security posture.

    Join us to learn what zero-trust really looks like in practice, how to leverage Tufin's capabilities to create an effective blueprint for implementing zero-trust networks, make policy dynamic, and the immediate security benefits achieved across the enterprise network, regardless of the vendor or platform.

    In this webinar, we’ll review:
    • Key elements and tips of how to build a zero-trust model
    • The components of the violation dashboard and how to configure alerts
    • How to provision and manage segmentation/micro-segmentation policies
    • The range of documentation and audit capabilities to establish full accountability
  • The Future of Vulnerability Management is Contextual, Integrated, and Automated Nov 10 2020 4:00 pm UTC 60 mins
    Brian Kime, Security and Risk Senior Analyst at Forrester
    Brian Kime, Security and Risk Senior Analyst at Forrester, will share advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.
    Please join us on November 10th to learn how vulnerability management programs are expanding beyond vulnerability scanning, are being integrated into a firm’s security fabric, and are being defined as a comprehensive vulnerability mitigation and management strategy. Brian will impart his view on:
    • Top 5 components of a vulnerability management strategy
    • How to mature a vulnerability risk management program by leveraging the combination of network context and vulnerability data
    • Use cases for the evolution of vulnerability management
    • Opportunities to reduce risk without disabling the business through immediate and automated mitigation with planned remediation
  • Webinar: Are You Paying Ransom to Your Own Cloud Security Vendor? Nov 10 2020 6:00 am UTC 60 mins
    Colby, Dyess Director, Cloud Product management
    Many organizations attempting to secure their cloud-native deployments end up paying a hidden tax due to the additional agents, cloud-native firewalls, and other security control planes required to run in public cloud environments. This hidden tax can increase your ongoing cloud compute costs by 25% or more and lock you into a single vendor solution.

    Join our SecureCloud expert, Colby Dyess on Tuesday, November 10 at 2pm SGT to learn how you can avoid these hidden costs when moving workloads to the cloud securely. Topics will include defining, automatically generating, and managing cloud-native security policies across multi and hybrid-cloud applications and workloads by leveraging native controls of your cloud.

    Register now to take full advantage of the cloud-native security controls and avoid the hidden tax imposed by other cloud security solutions.
    If you're unable to attend the live webinar, sign up here and we’ll send you the recording.
  • Tufin R20-2 - Enhanced NGFW Support, Azure Visibility, and Doubled Risk Analysis Nov 5 2020 6:00 am UTC 60 mins
    Roi Alon, Senior Product Manager - Tufin; Hadas Lahav, Director, Automation Products - Tufin
    Looking for an easier way to know whether an access request is risky? Do you want to effectively manage rules with FQDNs or gain visibility and control of Azure north-south or VNets traffic?

    Join us on November 5 to learn how you can use Tufin’s latest security automation features and functionality to:
    • Integrate your vulnerability scan outputs into a new access request workflow by running additional security checks on source/destination
    • Automatically manage rules containing FQDNs (Fortinet/Panaroma) and tags (Panorama)
    • View and control traffic between your on-premises and Azure environments, and between VNets
  • Webinar: Are You Paying Ransom to Your Own Cloud Security Vendor? Nov 3 2020 4:00 pm UTC 60 mins
    Colby, Dyess Director, Cloud Product management
    Many organizations attempting to secure their cloud-native deployments end up paying a hidden tax due to the additional agents, cloud-native firewalls, and other security control planes required to run in public cloud environments. This hidden tax can increase your ongoing cloud compute costs by 25% or more and lock you into a single vendor solution.

    Join our SecureCloud expert, Colby Dyess on Tuesday, November 3 rd at 11am EDT to learn how you can avoid these hidden costs when moving workloads to the cloud securely. Topics will include defining, automatically generating, and managing cloud-native security policies across multi and hybrid-cloud applications and workloads by leveraging native controls of your cloud.

    Register now to take full advantage of the cloud-native security controls and avoid the hidden tax imposed by other cloud security solutions.
    If you're unable to attend the live webinar, sign up here and we’ll send you the recording.
  • Tufin R20-2 - Enhanced NGFW Support, Azure Visibility, and Doubled Risk Analysis Recorded: Oct 27 2020 54 mins
    Roi Alon, Senior Product Manager - Tufin; Hadas Lahav, Director, Automation Products - Tufin
    Looking for an easier way to know whether an access request is risky? Do you want to effectively manage rules with FQDNs or gain visibility and control of Azure north-south or VNets traffic?

    Join us on October 27th to learn how you can use Tufin’s latest security automation features and functionality to:
    • Integrate your vulnerability scan outputs into a new access request workflow by running additional security checks on source/destination
    • Automatically manage rules containing FQDNs (Fortinet/Panaroma) and tags (Panorama)
    • View and control traffic between your on-premises and Azure environments, and between VNets
  • TechTalk: How to Automate Compliance Controls Across the Hybrid Environment Recorded: Oct 22 2020 50 mins
    Dan Roberts, Sales Engineer Team Lead
    Are you looking to automate compliance controls across your hybrid network? Join us for an informative webinar and learn from real-life business scenarios how you can use segmentation policies to effectively automate compliance controls, and prevent security and compliance violations when making network access changes.

    In this webinar, we’ll review real use cases, discuss best practices, and demonstrate how to:
    • Define, set, and manage compliance policy to be applied across the hybrid network
    • Use topology insights, path analysis, and risk assessment in the network change process to help prevent new risks or additional violations
    • Generate audit trail and full accountability for all security policy changes
  • Case Study: Automating Security Operations to Increase Productivity & Compliance Recorded: Oct 20 2020 38 mins
    Anthony Rodgers, Director of Enterprise Services, State of Michigan, Hillary Madge, VP Marketing, Tufin
    Hear from Anthony Rodgers, from the Office of the CIO for the State of Michigan – responsible for enabling productivity of 48,000 employees, to learn how they increased their efficiency, reduced their SLA’s, and achieved secure segmentation at scale across their multi-vendor, hybrid network.

    Please join us on Tuesday October 20th to hear how, with automation, the Office of the CIO was able to:
    - Transform spreadsheet-driven policy management into a secure automated policy management model across the different cloud and on-prem “firewalls” in the organization
    - Implement best practices when faced with increased network complexity, compliance requirements and cross-functional coordination
    - Gain centralized visibility of policies across their on-prem, SDNs and public cloud environment
    - Establish security guardrails while aligning with business needs
  • Make Zero Trust a Strategic Priority – Tips and Advice from Forrester Recorded: Oct 1 2020 60 mins
    David Holmes, Senior Security & Risk Analyst, Forrester; Ruvi Kitov, CEO & Co-Founder, Tufin; Alex Apt, Solutions Architect
    Join David Holmes, Senior Security & Risk Analyst at Forrester, as he shares advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.

    Please join us on October 1st to learn about the importance of defining a Zero Trust network access strategy and roadmap, how this will help align many other security initiatives, and the major challenges likely to be encountered. David will impart his view on:
    • Why Zero Trust should be a strategic priority that drives technology adoption
    • The importance of network segmentation, visibility, and continuous inspection to enable Zero Trust
    • How vulnerability management is integral to the success of Zero Trust initiatives and how they can work hand in hand
    • The cost, productivity, compliance and security benefits of consolidating multiple security functions into a single platform
    • Ways to leverage Zero Trust to foster close relationships with other technology teams and break down silos
  • Make Zero Trust a Strategic Priority – Tips and Advice from Forrester Recorded: Sep 30 2020 58 mins
    David Holmes, Senior Security & Risk Analyst, Forrester; Ruvi Kitov, CEO and Co-Founder, Tufin
    Join David Holmes, Senior Security & Risk Analyst at Forrester, as he shares advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.

    Please join us on September 30th to learn about the importance of defining a Zero Trust network access strategy and roadmap, how this will help align many other security initiatives, and the major challenges likely to be encountered. David will impart his view on:
    • Why Zero Trust should be a strategic priority that drives technology adoption
    • The importance of network segmentation, visibility, and continuous inspection to enable Zero Trust
    • How vulnerability management is integral to the success of Zero Trust initiatives and how they can work hand in hand
    • The cost, productivity, compliance and security benefits of consolidating multiple security functions into a single platform
    • Ways to leverage Zero Trust to foster close relationships with other technology teams and break down silos
  • SecureCloud Webinar: Cloud-Native Security without Compromise Recorded: Sep 30 2020 49 mins
    Ben Grissinger, Cloud SME and Henry Pea Sales Engineering Director, APAC - Tufin
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.

    In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and move to the cloud by giving security, devops, and cloud operations teams a cloud-native automation solution for security policy. Topics covered:
    • Why traditional IT security processes and approaches don’t work for cloud-native
    • Align devops, security, and cloud-ops to create a security-first approach to cloud security
    • Automate security in a CI/CD process
    • Best practices for getting started
  • SecureCloud Webinar: Cloud-Native Security without Compromise Recorded: Sep 29 2020 45 mins
    Ben Grissinger, Cloud SME
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.

    In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and move to the cloud by giving security, devops, and cloud operations teams a cloud-native automation solution for security policy. Topics covered:
    • Why traditional IT security processes and approaches don’t work for cloud-native
    • Align devops, security, and cloud-ops to create a security-first approach to cloud security
    • Automate security in a CI/CD process
    • Best practices for getting started
  • How a leading utility company secures network infrastructure continuity Recorded: Sep 25 2020 63 mins
    Pam Cyr - SVP Business and Corporate Development, Tufin and Henry Pea Sales Engineering Director, APAC - Tufin
    Watch this panel discussion led by industry leaders, Dr. Juergen Tusch, Head of Telecommunications at Innogy Westenergie GmbH, Reuven Harrison CTO at Tufin, and John Jacobs, VP Global Solutions Architecture at Fortinet.

    This expert panel will discuss how the German utility services company, Innogy Westenergie GmbH, protects and simplifies network operations while maintaining mission-critical infrastructure via automation and zero trust architecture.

    Panelists will discuss lessons learned on:
    • How to enable secure infrastructure changes, and in parallel, reduce Germany’s global energy footprint
    • Simplifying network operation via automation to enhance productivity, speed, and accuracy
    • Best practices of how to s
  • TechTalk: Solutions for Creating & Enforcing Policies for Kubernetes Flows Recorded: Sep 24 2020 24 mins
    Chintan Patnaik, Pre-Sales Engineer and Ricky Egge, Sales Engineer
    Are you looking for an effective and automated way to secure Kubernetes deployments and automate security across your hybrid network? Watch this webinar to learn how you can use Tufin solutions to establish your firewalls as a second layer of defense around your Kuberenets clusters. This can help enable network level and app level segmentation, risk analysis, and compliance assessment of your IT environment, irrespective of the underlying platform or network security devices.

    In this webinar we’ll review use cases and best practices, as well as demonstrate:
    • How to gain visibility to avoid blind spots of Kubernetes N-S traffic
    • How to easily audit if policies differ from corporate standards
    • How to maintain the benefits of your existing admin processes and workflows to yield consistent, efficient, and comprehensive hybrid management
  • How a leading utility company secures network infrastructure continuity Recorded: Sep 22 2020 62 mins
    Pam Cyr - SVP Business and Corporate Development, Tufin
    Watch this panel discussion led by industry leaders, Dr. Juergen Tusch, Head of Telecommunications at Innogy Westenergie GmbH, Reuven Harrison CTO at Tufin, and John Jacobs, VP Global Solutions Architecture at Fortinet.

    This expert panel will discuss how the German utility services company, Innogy Westenergie GmbH, protects and simplifies network operations while maintaining mission-critical infrastructure via automation and zero trust architecture.

    Panelists will discuss lessons learned on:
    • How to enable secure infrastructure changes, and in parallel, reduce Germany’s global energy footprint
    • Simplifying network operation via automation to enhance productivity, speed, and accuracy
    • Best practices of how to secure diverse multi-vendor networks through visibility and segmentation
  • TechTalk: Solutions for Creating & Enforcing Policies for Kubernetes Flows Recorded: Sep 22 2020 20 mins
    Ricky Egge, Sales Engineer
    Are you looking for an effective and automated way to secure Kubernetes deployments and automate security across your hybrid network? Watch this webinar to learn how you can use Tufin solutions to establish your firewalls as a second layer of defense around your Kuberenets clusters. This can help enable network level and app level segmentation, risk analysis, and compliance assessment of your IT environment, irrespective of the underlying platform or network security devices.

    In this webinar we’ll review use cases and best practices, as well as demonstrate:
    • How to gain visibility to avoid blind spots of Kubernetes N-S traffic
    • How to easily audit if policies differ from corporate standards
    • How to maintain the benefits of your existing admin processes and workflows to yield consistent, efficient, and comprehensive hybrid management
  • SecureCloud Webinar: Avoiding Cloud Policy Misconfigurations Recorded: Sep 4 2020 53 mins
    Colby Dyess, Director, Product Management, Cloud and Henry Pea, Sales Engineering Director, APAC - Tufin
    According to Gartner, 99% of the security breaches in the cloud will occur from policy misconfigurations made by the customer – not the cloud platform vendor.

    This webinar will provide an overview of these misconfiguration issues and how you can use Tufin SecureCloud to automate the creation and ongoing management of security policy configurations.

    Topics covered:
    • Why misconfigurations are so easy to create
    • Create policies using automation
    • Manage and monitor policy configuration throughout the SDLC lifecycle
  • SecureCloud Webinar: Avoiding Cloud Policy Misconfigurations Recorded: Sep 3 2020 52 mins
    Colby Dyess, Director, Product Management, Cloud
    According to Gartner, 99% of the security breaches in the cloud will occur from policy misconfigurations made by the customer – not the cloud platform vendor.

    This webinar will provide an overview of these misconfiguration issues and how you can use Tufin SecureCloud to automate the creation and ongoing management of security policy configurations.

    Topics covered:
    • Why misconfigurations are so easy to create
    • Create policies using automation
    • Manage and monitor policy configuration throughout the SDLC lifecycle
  • TechTalk: Gain Vendor-Agnostic Visibility to Secure your Hybrid Network Recorded: Sep 3 2020 46 mins
    Alex Apt, Solutions Architect, APAC Sales - Tufin
    Maintaining and controlling a healthy compliance posture across the fragmented network is complex and challenging. This is due to the lack of visibility of what talks to what across your hybrid network. When visibility is afforded, combined with a centralized multi-vendor control plane, you can achieve enforcement of consistent security and compliance across different types of apps and workloads, environments (public, private, multi-cloud) as well as network platforms and infrastructure devices.

    Join us for a TechTalk webinar where you will learn from real world scenarios on how to gain visibility and achieve continuous compliance of your security policy management.

    We will demonstrate how to:
    • Gain visibility of your security policies both on-premises and across the multi-cloud vendors
    • Identify and mitigate highly permissive rules
    • Define security policy guiderails and automatically compare rules against them
    • Automate compliance controls
  • TechTalk: Gain Vendor-Agnostic Visibility to Secure your Hybrid Network Recorded: Sep 2 2020 46 mins
    Jojo Aricat, Sales Engineer
    Maintaining and controlling a healthy compliance posture across the fragmented network is complex and challenging. This is due to the lack of visibility of what talks to what across your hybrid network. When visibility is afforded, combined with a centralized multi-vendor control plane, you can achieve enforcement of consistent security and compliance across different types of apps and workloads, environments (public, private, multi-cloud) as well as network platforms and infrastructure devices.

    Join us for a TechTalk webinar where you will learn from real world scenarios on how to gain visibility and achieve continuous compliance of your security policy management.

    We will demonstrate how to:
    • Gain visibility of your security policies both on-premises and across the multi-cloud vendors
    • Identify and mitigate highly permissive rules
    • Define security policy guiderails and automatically compare rules against them
    • Automate compliance controls
Security Policy Orchestration Solutions
Tufin® is the leader in Network Security Policy Orchestration, serving more than half of the top 50 companies in the Forbes Global 2000. Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. Tufin reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries.

Find out more at www.tufin.com
Tufin blog SuiteTalk™ http://www.tufin.com/blog/
Twitter: http://twitter.com/TufinTech
Webinars http://www.tufin.com/resources/webinars/
YouTube https://www.youtube.com/user/Tufintech

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Webinar: Security Policy Automation – Do More with Less
  • Live at: Apr 21 2020 6:00 pm
  • Presented by: Hadas Lahav, Director of Automation Products, Tufin & Alon Buteliano, Associate Product Manager, Tufin
  • From:
Your email has been sent.
or close