Hi [[ session.user.profile.firstName ]]

Webinar: Was ist neu in der Tufin Orchestration Suite R20-1

Suchen Sie nach dem schnellsten und einfachsten Weg, verdächtigen Verkehr auf Ihren Firewalls zu blockieren? Möchten Sie einen bestimmten Dienst in der gesamten Regelbasis ändern, oder vielleicht Regeländerungen mit IPv6-Adressen implementieren? Alle diese Änderungen (und mehr!) können jetzt mit den neuen Funktionen in der Tufin Orchestration Suite (TOS) R20-1 vorgenommen werden.

Nehmen Sie am 20. Mai um 11 Uhr (CEST) an einem kurzen und informativen Webinar teil.

Erfahren Sie, wie Sie die neuesten Sicherheitsautomatisierungsfunktionen von Tufin verwenden können um:

Schnell auf verdächtige Netzwerkaktivitäten zu reagieren, indem Sie einen Dienst mit hohem Risiko blockieren (denken Sie zum Beispiel an WannaCry TCP 445).
auch Änderungen, die IPv6- Adressen enthalten, automatisiert und schnell zu implementieren
 Änderungen in NGFWs (Palo Alto Networks Panorama und Cisco Firepower) basierend auf einer genauen Verkehrs- und Nutzungsanalyse zu steuern und zu automatisieren.


Sichern Sie sich Ihren Platz. Registrieren Sie sich noch heute!

Wenn Sie nicht am Live-Webinar teilnehmen können, melden Sie sich hier an und wir senden Ihnen die Aufzeichnung nach erfolgtem Webinar zu.
Recorded May 20 2020 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Manuel Haehr Pre Sales Engineer, Germany
Presentation preview: Webinar: Was ist neu in der Tufin Orchestration Suite R20-1
  • Channel
  • Channel profile
  • Forrester Interview: The Zero Trust Metrics That Matter Aug 18 2021 5:00 am UTC 60 mins
    Jess Burn, Senior Security & Risk Analyst at Forrester & Eitan Satmary, CISO at Tufin
    Join Jess Burn, Senior Security & Risk Analyst at Forrester, as she shares advice and insights regarding crafting meaningful Zero Trust metrics, garnered from conversations with hundreds of CISO’s. She will be accompanied by our own CISO, Eitan Satmary, who will also share his insights regarding how to tailor these Zero Trust metrics for your risk profile.

    Please join us on Wednesday, August 18 at 1pm SGT to learn which Zero Trust metrics could best reflect your organization’s security stance. Jess and Eitan will impart their views and experience on:
    * Developing Zero Trust metrics non-security personnel can understand
    * Developing strategic and tactical metrics that foster decision making
    * How to tailor Zero Trust metrics for your organization’s risk profile
    * Methods to leverage security metrics to measure business success

    Register now to reserve your spot.
  • Forrester Interview: The Zero Trust Metrics That Matter Aug 17 2021 3:00 pm UTC 60 mins
    Jess Burn, Senior Security & Risk Analyst at Forrester & Eitan Satmary, CISO at Tufin
    Join Jess Burn, Senior Security & Risk Analyst at Forrester, as she shares advice and insights regarding crafting meaningful Zero Trust metrics, garnered from conversations with hundreds of CISO’s. She will be accompanied by our own CISO, Eitan Satmary, who will also share his insights regarding how to tailor these Zero Trust metrics for your risk profile.

    Please join us on Tuesday, August 17 at 11am EST to learn which Zero Trust metrics could best reflect your organization’s security stance. Jess and Eitan will impart their views and experience on:
    * Developing Zero Trust metrics non-security personnel can understand
    * Developing strategic and tactical metrics that foster decision making
    * How to tailor Zero Trust metrics for your organization’s risk profile
    * Methods to leverage security metrics to measure business success

    Register now to reserve your spot.
  • Using Policy to Secure Kubernetes Workloads & Clusters Aug 6 2021 5:00 am UTC 60 mins
    Ricky Egge, Pre-Sales Engineer, Tufin
    Securing Kubernetes without impacting dev & deploy velocity has become business-critical. During this deep-dive session we will discuss how you can:
    • Easily analyze all connectivity & traffic to/from & within your clusters
    • Identify CVEs rapidly and at scale
    • Automatically deploy policies based upon approved traffic, to accelerate promotion
    • Enforce policies & establish policy guidelines via automated YAML/Network Policy generation
    This will be an informative technical session for anyone interested in building security into their K8s development processes, in order to speed up delivery and streamline operations.
  • 3 Essentials for Automating Security Across Hybrid Cloud Aug 5 2021 5:00 am UTC 60 mins
    Sattwik Gavli, Director of Cloud Products
    Today’s networks are expanding beyond on-prem to include cloud and hybrid deployments. While enterprises seek to balance agility and security, they are also faced with skills shortages and the need to work with the technology of multiple vendors. Automation is key to addressing these challenges while offering cloud, network, and security teams the ability to drive efficiencies and reduce risk across their heterogeneous environment.

    Join us on August 5 at 1 pm SGT/ 3 pm AEST to understand the essentials for automating security without compromise.

    In this webcast, attendees will learn:
    * how to gain visibility and control of security policies across hybrid clouds;
    * the role of automation in meeting business and compliance requirements; and
    * strategies for bridging skills gaps while balancing security and agility.
  • Using Policy to Secure Kubernetes Workloads & Clusters Aug 4 2021 3:00 pm UTC 60 mins
    Ricky Egge, Pre-Sales Engineer, Tufin
    Securing Kubernetes without impacting dev & deploy velocity has become business-critical. During this deep-dive session we will discuss how you can:

    • Easily analyze all connectivity & traffic to/from & within your clusters
    • Identify CVEs rapidly and at scale
    • Automatically deploy policies based upon approved traffic, to accelerate promotion
    • Enforce policies & establish policy guidelines via automated YAML/Network Policy generation

    This will be an informative technical session for anyone interested in building security into their K8s development processes, in order to speed up delivery and streamline operations.
  • Securing the Path to Cloud Migration and Development Recorded: Jul 2 2021 52 mins
    Jonathan Campbell, Technical Product Manager, Cloud, UK; Ben Grissinger, Cloud Security Expert, Tufin
    Whether you are migrating workloads to the cloud or developing new applications, securing multiple assets follows much the same path. You must consider management of access and connectivity as well as demonstrate an adherence to multiple directives – whether compliance or business mandates. Without full visibility of all possible controls, it is difficult to completely understand connectivity and access risks both at the perimeter and “inside” the cloud. As Cloud and Security teams seek to balance agility with security, the value of security policy management has proven critical to timely and successful deployment:
    • Understand current and future security risks
    • Build repeatable (and automated) processes
    • Articulate guidance for deployment
    • Ensure end-to-end visibility across the migration/development lifecycle

    These considerations will drive alignment across the organization as you seek to programmatically control risk with comprehensive security policies - and get to production quickly. Join us for a live walkthrough of the insights and technology that supports this path.
  • Securing the Path to Cloud Migration and Development Recorded: Jun 30 2021 51 mins
    Jonathan Campbell, Technical Product Manager, Cloud, UK; Ben Grissinger, Cloud Security Expert, Tufin
    Whether you are migrating workloads to the cloud or developing new applications, securing multiple assets follows much the same path. You must consider management of access and connectivity as well as demonstrate an adherence to multiple directives – whether compliance or business mandates. Without full visibility of all possible controls, it is difficult to completely understand connectivity and access risks both at the perimeter and “inside” the cloud. As Cloud and Security teams seek to balance agility with security, the value of security policy management has proven critical to timely and successful deployment:
    • Understand current and future security risks
    • Build repeatable (and automated) processes
    • Articulate guidance for deployment
    • Ensure end-to-end visibility across the migration/development lifecycle

    These considerations will drive alignment across the organization as you seek to programmatically control risk with comprehensive security policies - and get to production quickly. Join us for a live walkthrough of the insights and technology that supports this path.
  • Employing Vulnerability-based Change Automation Recorded: Jun 17 2021 29 mins
    Ron Kehoe, Strategic Solution Engineer, West, Tufin
    In this TechTalk, "Vulnerability Management", we will explain how to employ vulnerability-based change automation to enable customers to expand their risk-based access request workflows to reflect the results of vulnerability scan results. This allows customers to automatically check source and destination assets for known vulnerabilities prior to granting access or connectivity.

    Join us on June 17 to learn how to enhance risk base decisions as part of the network security policy orchestration and automation by:
    - Make accurate risk decisions based on policy and security data
    - Enable the business by reducing reliance on security teams to manually review each access request
    - Maintain a consistent and documented security policy-based change management process

    Unable to attend? Sign up and we’ll send you the recording.
  • Employing Vulnerability-based Change Automation Recorded: Jun 16 2021 28 mins
    Ron Kehoe, Strategic Solution Engineer, West, Tufin
    In this TechTalk, "Vulnerability Management", we will explain how to employ vulnerability-based change automation to enable customers to expand their risk-based access request workflows to reflect the results of vulnerability scan results. This allows customers to automatically check source and destination assets for known vulnerabilities prior to granting access or connectivity.

    Join us on June 16 to learn how to enhance risk base decisions as part of the network security policy orchestration and automation by:
    - Make accurate risk decisions based on policy and security data
    - Enable the business by reducing reliance on security teams to manually review each access request
    - Maintain a consistent and documented security policy-based change management process

    Unable to attend? Sign up and we’ll send you the recording.
  • Security Policy Management in a Multi-Cloud, Hybrid World Recorded: Jun 9 2021 37 mins
    Larry Alston, GM, Cloud, Tufin
    The move to the cloud has forced traditional Network Admins to work with the (often) newly formed CloudOps team – and all of the changing technology must be secured by the Security Team. The priorities require a balance of secure access and connectivity, agile development and business requirements. A mix of vendors can add complexity to a heterogenous mix of on-prem, cloud and hybrid assets. While new technologies can be the enabler of speed and flexibility, they often stretch the skill set of existing teams and put further strain on existing resources.

    There is another way to meet the requirements of disparate teams without compromise. When you decouple the management of security policies from the underlying technology, you gain incredible benefit:
    • Centralized visibility – see access and connectivity across all security controls
    • Cost management – take advantage of native controls while closing the skills gap
    • Vendor freedom – avoid lock-in and ensure flexibility with separate security policies
    • Reduce risk – decrease exposure with policies that can be applied across all assets

    Join this interactive webinar and understand how to future-proof your multi-cloud, hybrid world.
  • Security Policy Management in a Multi-Cloud, Hybrid World Recorded: Jun 8 2021 34 mins
    Larry Alston, GM, Cloud, Tufin
    The move to the cloud has forced traditional Network Admins to work with the (often) newly formed CloudOps team – and all of the changing technology must be secured by the Security Team. The priorities require a balance of secure access and connectivity, agile development and business requirements. A mix of vendors can add complexity to a heterogenous mix of on-prem, cloud and hybrid assets. While new technologies can be the enabler of speed and flexibility, they often stretch the skill set of existing teams and put further strain on existing resources.

    There is another way to meet the requirements of disparate teams without compromise. When you decouple the management of security policies from the underlying technology, you gain incredible benefit:
    • Centralized visibility – see access and connectivity across all security controls
    • Cost management – take advantage of native controls while closing the skills gap
    • Vendor freedom – avoid lock-in and ensure flexibility with separate security policies
    • Reduce risk – decrease exposure with policies that can be applied across all assets

    Join this interactive webinar and understand how to future-proof your multi-cloud, hybrid world.
  • TechTalk: Decommissioning Access And Rule Cleanup Recorded: May 27 2021 29 mins
    David Alon, Sales Engineer
    In this TechTalk, "Decommissioning Access And Rule Cleanup", we will explain how to leverage Access Decommissioning Workflow for a controlled and documented removal of network access, and what is required to achieve it.

    Join us on May 27 at 1pm SGT to learn how to gain the four layers of visibility and automation:
    1. Decommissioning access that is obsolete or unauthorized
    2. Visibility of all the rules implementing the access
    3. Control which rules not to remove access from
    4. Which devices, programs and workloads are running
  • TechTalk: Decommissioning Access And Rule Cleanup Recorded: May 26 2021 30 mins
    David Alon, Sales Engineer
    In this TechTalk, "Decommissioning Access And Rule Cleanup", we will explain how to leverage Access Decommissioning Workflow for a controlled and documented removal of network access, and what is required to achieve it.

    Join us on May 26 at 11am ET/4pm BST to learn how to gain the four layers of visibility and automation:
    1. Decommissioning access that is obsolete or unauthorized
    2. Visibility of all the rules implementing the access
    3. Control which rules not to remove access from
    4. Which devices, programs and workloads are running
  • Automating Zero Trust Principles into Your Network Security Model Recorded: May 26 2021 25 mins
    Thorsten Geissel, Senior Director, Sales Engineering, and Sigalit Kaidar, Director of Product Marketing
    This webinar addresses the main use cases customers currently focus on as they move towards a Zero Trust model. Thorsten Geissel, Senior Director, Sales Engineering, and Sigalit Kaidar, Director of Product Marketing, will demonstrate how organizations use automation to effectively design and manage Zero Trust network security policies across the hybrid cloud.

    Join us on May 26 at 1pm SGT as we discuss how to:
    • Dynamically set and manage micro-segmentation policies
    • Ensure current policies are compliant with ZT policies
    • Gain accurate, end-to-end visibility from the perimeter to the micro-perimeter

    Save your seat. Register today.
  • Automating Zero Trust Principles into Your Network Security Model Recorded: May 25 2021 28 mins
    Thorsten Geissel, Senior Director, Sales Engineering, and Sigalit Kaidar, Director of Product Marketing
    This webinar addresses the main use cases customers currently focus on as they move towards a Zero Trust model. Thorsten Geissel, Senior Director, Sales Engineering, and Sigalit Kaidar, Director of Product Marketing, will demonstrate how organizations use automation to effectively design and manage Zero Trust network security policies across the hybrid cloud.

    Join us on May 25 at 11 am EDT/4 pm BST as we discuss how to:
    • Dynamically set and manage micro-segmentation policies
    • Ensure current policies are compliant with ZT policies
    • Gain accurate, end-to end visibility from the perimeter to the micro-perimeter

    Save your seat. Register today.
  • TechTalk: Security Policy Automation for Hybrid-Tying Cloud and On-prem Together Recorded: May 6 2021 28 mins
    Ricky Egge, Pre-Sales Engineer
    Cloud teams are marching forward with automation tools to quickly and effectively automate changes in both on-premises and cloud infrastructure. With the agility promised by the cloud, balancing the requirements of security and speed can get tricky. Understanding how security policy management can be automated to achieve both is key.

    Join Tufin on May 6 at 1pm SGT/ 3pm AEST to discuss how to:
    • Integrate SecureChange ticket API's into the DevOps process
    • Automate risk evaluation for DevOps requests
    • Drive secure, agile development with automated security policy management
  • TechTalk: Hybrid Security Policy Automation - Tying Cloud and On-prem Together Recorded: May 4 2021 25 mins
    Ricky Egge, Sales Engineer
    Cloud teams are marching forward with automation tools to quickly and effectively automate changes in both on-premises and cloud infrastructure. With the agility promised by the cloud, balancing the requirements of security and speed can get tricky. Understanding how security policy management can be automated to achieve both is key.

    Join us as we discuss how to:
    • Integrate SecureChange ticket API's into the DevOps process
    • Automate risk evaluation for DevOps requests
    • Drive secure, agile development with automated security policy management
  • Cisco and Tufin team up to discuss ACI security automation with Ansible & Tufin Recorded: Mar 26 2021 46 mins
    Steve Sharman Technical Solutions Architect, Cisco & Roi Alon, Senior Product Manager, Tufin
    As an industry-leading secure, open, and comprehensive Software-Defined Networking (SDN) solution, Cisco® Application Centric Infrastructure (Cisco ACI™) simplifies, optimizes, and accelerates infrastructure deployment and governance, and expedites the application deployment lifecycle.

    In this webinar, Steve Sharman, Technical Solutions Architect at Cisco, and Roi Alon, Senior Product Manager at Tufin, will discuss how ACI users can accelerate business application deployments, and simplify security policy management for the ACI Fabric, and across their hybrid environment.

    Based on an integration between Tufin and Ansible, the latest app from the Tufin Marketplace is the Policy Change Automation app for Cisco ACI. This new app enables users to deploy Tufin to automate changes to ACI contracts and corresponding firewall rules, providing the right access for accelerated deployment of business applications in the ACI Fabric, and across the hybrid network.

    Join us on March 26 at 1pm SGT to learn how you can:
    * Accelerate business application deployment in the ACI Fabric by eliminating the risk of configuration errors
    * Centrally and automatically manage changes to multiple EPGs, contracts, and firewall rules in the ACI Fabric and across the hybrid network
    * Run proactive risk assessments against your organization’s security policy, to ensure changes are not violating policies or introducing additional risks
    *Use the Ansible playbook directly from the Tufin Policy Change Automation app, for simple, automated, and secure access changes within the ACI Fabric
    Register now
  • Cisco and Tufin team up to discuss ACI security automation with Ansible & Tufin Recorded: Mar 25 2021 46 mins
    Steve Sharman Technical Solutions Architect, Cisco & Roi Alon, Senior Product Manager, Tufin
    As an industry-leading secure, open, and comprehensive Software-Defined Networking (SDN) solution, Cisco® Application Centric Infrastructure (Cisco ACI™) simplifies, optimizes, and accelerates infrastructure deployment and governance, and expedites the application deployment lifecycle.

    In this webinar, Steve Sharman, Technical Solutions Architect at Cisco, and Roi Alon, Senior Product Manager at Tufin, will discuss how ACI users can accelerate business application deployments, and simplify security policy management for the ACI Fabric, and across their hybrid environment.

    Based on an integration between Tufin and Ansible, the latest app from the Tufin Marketplace is the Policy Change Automation app for Cisco ACI. This new app enables users to deploy Tufin to automate changes to ACI contracts and corresponding firewall rules, providing the right access for accelerated deployment of business applications in the ACI Fabric, and across the hybrid network.

    Join us on March 25 at 11am ET/3pm GMT to learn how you can:
    * Accelerate business application deployment in the ACI Fabric by eliminating the risk of configuration errors
    * Centrally and automatically manage changes to multiple EPGs, contracts, and firewall rules in the ACI Fabric and across the hybrid network
    * Run proactive risk assessments against your organization’s security policy, to ensure changes are not violating policies or introducing additional risks
    *Use the Ansible playbook directly from the Tufin Policy Change Automation app, for simple, automated, and secure access changes within the ACI Fabric
    Register now
  • Accenture Insights – Avoid Security Misconfigurations in the Cloud Recorded: Mar 3 2021 53 mins
    Sattwik Gavli, Director Cloud Security Product at Tufin and Shaan Mulchandani, Global AWS Security Lead at Accenture
    Working with the world’s largest enterprises, Accenture sees the most common pitfalls in cloud security - from misconfigurations to ever-changing technology. Learn from Accenture’s Senior Cloud Security Manager, Shaan Mulchandani, how their clients combat the burning problem of misconfigurations in their large, heterogeneous environments.

    In this webinar you will hear:
    - Real client scenarios describing what caused misconfigurations in their network
    - The key reasons for misconfigurations in multi-cloud and hybrid cloud environments
    - Best practices to avoid misconfigurations

    Register now and gain a strategy to secure your cloud environment without misconfigurations.

    Unable to attend? Sign up here and we’ll send you the recording.
Security Policy Orchestration Solutions
Tufin® is the leader in Network Security Policy Orchestration, serving more than half of the top 50 companies in the Forbes Global 2000. Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. Tufin reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries.

Find out more at www.tufin.com
Tufin blog SuiteTalk™ http://www.tufin.com/blog/
Twitter: http://twitter.com/TufinTech
Webinars http://www.tufin.com/resources/webinars/
YouTube https://www.youtube.com/user/Tufintech

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Webinar: Was ist neu in der Tufin Orchestration Suite R20-1
  • Live at: May 20 2020 9:00 am
  • Presented by: Manuel Haehr Pre Sales Engineer, Germany
  • From:
Your email has been sent.
or close