Hi [[ session.user.profile.firstName ]]

Prioritizing Network Security Investments During Covid & Beyond

Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organizations from following their standard security processes. Learn how our Fortune 500 customers transformed overnight, the implications on their network security risks, the solutions employed, and what’s next.

Based on results of a recent survey of Tufin customers, in this webinar, we’ll take a closer look at:
Key security challenges organizations introduced when enabling remote workers
Best practices for how-to asses and improve network security, with a large remote workforce, through segmentation and access controls
Investments customers plan to make to restore their security posture, increase the productivity of their network and security teams, and prepare for another possible pivot or shock in the future

Please join us on August 14th at 2pm (SGT)

If you're unable to attend the live webinar, sign up here and we’ll send you the recording
Recorded Aug 14 2020 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chintan Patnaik, Pre-Sales Engineer, India - Tufin
Presentation preview: Prioritizing Network Security Investments During Covid & Beyond
  • Channel
  • Channel profile
  • Make Zero Trust a Strategic Priority – Tips and Advice from Forrester Oct 1 2020 6:00 am UTC 60 mins
    David Holmes, Senior Security & Risk Analyst, Forrester; Alex Apt, Solutions Architect, Ruvi Kitov, CEO and Co-Founder, Tufin
    Join David Holmes, Senior Security & Risk Analyst at Forrester, as he shares advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.

    Please join us on October 1st to learn about the importance of defining a Zero Trust network access strategy and roadmap, how this will help align many other security initiatives, and the major challenges likely to be encountered. David will impart his view on:
    • Why Zero Trust should be a strategic priority that drives technology adoption
    • The importance of network segmentation, visibility, and continuous inspection to enable Zero Trust
    • How vulnerability management is integral to the success of Zero Trust initiatives and how they can work hand in hand
    • The cost, productivity, compliance and security benefits of consolidating multiple security functions into a single platform
    • Ways to leverage Zero Trust to foster close relationships with other technology teams and break down silos
  • SecureCloud Webinar: Cloud-Native Security without Compromise Recorded: Sep 30 2020 49 mins
    Ben Grissinger, Cloud SME and Henry Pea Sales Engineering Director, APAC - Tufin
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.

    In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and move to the cloud by giving security, devops, and cloud operations teams a cloud-native automation solution for security policy. Topics covered:
    • Why traditional IT security processes and approaches don’t work for cloud-native
    • Align devops, security, and cloud-ops to create a security-first approach to cloud security
    • Automate security in a CI/CD process
    • Best practices for getting started
  • SecureCloud Webinar: Cloud-Native Security without Compromise Recorded: Sep 29 2020 45 mins
    Ben Grissinger, Cloud SME
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.

    In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and move to the cloud by giving security, devops, and cloud operations teams a cloud-native automation solution for security policy. Topics covered:
    • Why traditional IT security processes and approaches don’t work for cloud-native
    • Align devops, security, and cloud-ops to create a security-first approach to cloud security
    • Automate security in a CI/CD process
    • Best practices for getting started
  • How a leading utility company secures network infrastructure continuity Recorded: Sep 25 2020 63 mins
    Pam Cyr - SVP Business and Corporate Development, Tufin and Henry Pea Sales Engineering Director, APAC - Tufin
    Watch this panel discussion led by industry leaders, Dr. Juergen Tusch, Head of Telecommunications at Innogy Westenergie GmbH, Reuven Harrison CTO at Tufin, and John Jacobs, VP Global Solutions Architecture at Fortinet.

    This expert panel will discuss how the German utility services company, Innogy Westenergie GmbH, protects and simplifies network operations while maintaining mission-critical infrastructure via automation and zero trust architecture.

    Panelists will discuss lessons learned on:
    • How to enable secure infrastructure changes, and in parallel, reduce Germany’s global energy footprint
    • Simplifying network operation via automation to enhance productivity, speed, and accuracy
    • Best practices of how to s
  • TechTalk: Solutions for Creating & Enforcing Policies for Kubernetes Flows Recorded: Sep 24 2020 24 mins
    Chintan Patnaik, Pre-Sales Engineer and Ricky Egge, Sales Engineer
    Are you looking for an effective and automated way to secure Kubernetes deployments and automate security across your hybrid network? Watch this webinar to learn how you can use Tufin solutions to establish your firewalls as a second layer of defense around your Kuberenets clusters. This can help enable network level and app level segmentation, risk analysis, and compliance assessment of your IT environment, irrespective of the underlying platform or network security devices.

    In this webinar we’ll review use cases and best practices, as well as demonstrate:
    • How to gain visibility to avoid blind spots of Kubernetes N-S traffic
    • How to easily audit if policies differ from corporate standards
    • How to maintain the benefits of your existing admin processes and workflows to yield consistent, efficient, and comprehensive hybrid management
  • How a leading utility company secures network infrastructure continuity Recorded: Sep 22 2020 62 mins
    Pam Cyr - SVP Business and Corporate Development, Tufin
    Watch this panel discussion led by industry leaders, Dr. Juergen Tusch, Head of Telecommunications at Innogy Westenergie GmbH, Reuven Harrison CTO at Tufin, and John Jacobs, VP Global Solutions Architecture at Fortinet.

    This expert panel will discuss how the German utility services company, Innogy Westenergie GmbH, protects and simplifies network operations while maintaining mission-critical infrastructure via automation and zero trust architecture.

    Panelists will discuss lessons learned on:
    • How to enable secure infrastructure changes, and in parallel, reduce Germany’s global energy footprint
    • Simplifying network operation via automation to enhance productivity, speed, and accuracy
    • Best practices of how to secure diverse multi-vendor networks through visibility and segmentation
  • TechTalk: Solutions for Creating & Enforcing Policies for Kubernetes Flows Recorded: Sep 22 2020 20 mins
    Ricky Egge, Sales Engineer
    Are you looking for an effective and automated way to secure Kubernetes deployments and automate security across your hybrid network? Watch this webinar to learn how you can use Tufin solutions to establish your firewalls as a second layer of defense around your Kuberenets clusters. This can help enable network level and app level segmentation, risk analysis, and compliance assessment of your IT environment, irrespective of the underlying platform or network security devices.

    In this webinar we’ll review use cases and best practices, as well as demonstrate:
    • How to gain visibility to avoid blind spots of Kubernetes N-S traffic
    • How to easily audit if policies differ from corporate standards
    • How to maintain the benefits of your existing admin processes and workflows to yield consistent, efficient, and comprehensive hybrid management
  • SecureCloud Webinar: Avoiding Cloud Policy Misconfigurations Recorded: Sep 4 2020 53 mins
    Colby Dyess, Director, Product Management, Cloud and Henry Pea, Sales Engineering Director, APAC - Tufin
    According to Gartner, 99% of the security breaches in the cloud will occur from policy misconfigurations made by the customer – not the cloud platform vendor.

    This webinar will provide an overview of these misconfiguration issues and how you can use Tufin SecureCloud to automate the creation and ongoing management of security policy configurations.

    Topics covered:
    • Why misconfigurations are so easy to create
    • Create policies using automation
    • Manage and monitor policy configuration throughout the SDLC lifecycle
  • SecureCloud Webinar: Avoiding Cloud Policy Misconfigurations Recorded: Sep 3 2020 52 mins
    Colby Dyess, Director, Product Management, Cloud
    According to Gartner, 99% of the security breaches in the cloud will occur from policy misconfigurations made by the customer – not the cloud platform vendor.

    This webinar will provide an overview of these misconfiguration issues and how you can use Tufin SecureCloud to automate the creation and ongoing management of security policy configurations.

    Topics covered:
    • Why misconfigurations are so easy to create
    • Create policies using automation
    • Manage and monitor policy configuration throughout the SDLC lifecycle
  • TechTalk: Gain Vendor-Agnostic Visibility to Secure your Hybrid Network Recorded: Sep 3 2020 46 mins
    Alex Apt, Solutions Architect, APAC Sales - Tufin
    Maintaining and controlling a healthy compliance posture across the fragmented network is complex and challenging. This is due to the lack of visibility of what talks to what across your hybrid network. When visibility is afforded, combined with a centralized multi-vendor control plane, you can achieve enforcement of consistent security and compliance across different types of apps and workloads, environments (public, private, multi-cloud) as well as network platforms and infrastructure devices.

    Join us for a TechTalk webinar where you will learn from real world scenarios on how to gain visibility and achieve continuous compliance of your security policy management.

    We will demonstrate how to:
    • Gain visibility of your security policies both on-premises and across the multi-cloud vendors
    • Identify and mitigate highly permissive rules
    • Define security policy guiderails and automatically compare rules against them
    • Automate compliance controls
  • TechTalk: Gain Vendor-Agnostic Visibility to Secure your Hybrid Network Recorded: Sep 2 2020 46 mins
    Jojo Aricat, Sales Engineer
    Maintaining and controlling a healthy compliance posture across the fragmented network is complex and challenging. This is due to the lack of visibility of what talks to what across your hybrid network. When visibility is afforded, combined with a centralized multi-vendor control plane, you can achieve enforcement of consistent security and compliance across different types of apps and workloads, environments (public, private, multi-cloud) as well as network platforms and infrastructure devices.

    Join us for a TechTalk webinar where you will learn from real world scenarios on how to gain visibility and achieve continuous compliance of your security policy management.

    We will demonstrate how to:
    • Gain visibility of your security policies both on-premises and across the multi-cloud vendors
    • Identify and mitigate highly permissive rules
    • Define security policy guiderails and automatically compare rules against them
    • Automate compliance controls
  • Webinar: Rethinking Security Segmentation for the Remote Workforce Recorded: Sep 2 2020 45 mins
    Panel Discussion
    Live Panel: Rethinking Security Segmentation for the Remote Workforce

    The abruptness and unprecedented scale at which organizations moved to a remote workforce has given rise to complex and widespread IT security challenges. Ensuring employees had the tools and access they needed to be productive was the priority. But now IT, Compliance & Security teams needs to consider the security issues created.

    IT admins had to hurriedly configure and scale their VPN infrastructure to accommodate the surge of connections. VPNs are complex to manage and given the short time frame, there are likely insufficiently strong policies and misconfigurations that will create vulnerabilities.

    In this webinar, experts will share key insights and discuss recommendations. Talking points could include:
    - Real world examples – lessons learned from customer experience managing security postures during the “big switch”
    - How to identify and mitigate risks introduced when going remote, without utilizing all IT resources
    - Considerations for updating your segmentation strategy for remote workers

    Register now to garner thoughts from experts on how to improve your security posture for the new normal.

    Panelists, each with over 20 years of experience managing security postures for global, Fortune 2000 organizations, include:
    1. Justin Anthony Pitt, Senior Security Engineer, Duke Energy
    2. David Goodman, Director of Engineering & Founder, G2 Deployment Advisors, IT Security Consulting
  • Webinar: Rethinking Security Segmentation for the Remote Workforce Recorded: Sep 1 2020 42 mins
    Panel Discussion
    Live Panel: Rethinking Security Segmentation for the Remote Workforce

    The abruptness and unprecedented scale at which organizations moved to a remote workforce has given rise to complex and widespread IT security challenges. Ensuring employees had the tools and access they needed to be productive was the priority. But now IT, Compliance & Security teams needs to consider the security issues created.

    IT admins had to hurriedly configure and scale their VPN infrastructure to accommodate the surge of connections. VPNs are complex to manage and given the short time frame, there are likely insufficiently strong policies and misconfigurations that will create vulnerabilities.

    In this webinar, listen to a panel of experts share key insights and discuss recommendations including:
    •Real world examples – lessons learned from customer experience managing security postures during the “big switch”
    •How to identify and mitigate risks introduced when going remote, without utilizing all of your IT resources
    •Considerations for updating your segmentation strategy for remote workers
    •Security policy best practices


    Register now to garner thoughts from experts on how to improve your security posture for the new normal.

    Panelists, each with over 20 years of experience managing security postures for global, Fortune 2000 organizations, include:
    1. Justin Anthony Pitt, Senior Security Engineer, Duke Energy
    2. David Goodman, Director of Engineering & Founder, G2 Deployment Advisors, IT Security Consulting
  • 如何在疫情期间及以后的工作中规划网络安全投资 Recorded: Aug 18 2020 24 mins
    赵不灏 Pat Chiu, Tufin北亚区售前工程师
    随着远程工作的流行,网络安全状态几乎在一夜之间发生了巨大变化。当务之急是速度,以及对员工的干扰最小,这使许多机构无法遵循其标准安全流程。了解我们的财富500强客户如何在一夜之间转变,其网络安全风险的变化,采用的解决方案以及下一步的策略。

    根据对Tufin客户的最近调查结果,研讨会将讨论以下内容:
    • 远程工作时机构面临的重大安全挑战
    • 大量员工远程工作时,通过分段和访问控制,评估和改善网络安全的最佳实践
    • 客户计划恢复其安全状态的投资,提高其网络和安全团队的效率,并为将来可能发生的关键转折或冲击做准备

    诚邀您参加 8月18日下午2:30举行的研讨会。
  • Investitionen in Netzwerksicherheit priorisieren Recorded: Aug 14 2020 39 mins
    Paul Bauer, Regional Sales Manager, Germany - Tufin
    Die Anforderungen an Netzwerksicherheit haben sich aufgrund der notwendigen Verlagerung zur Arbeit im Homeoffice praktisch über Nacht grundlegend verändert. Die Notwendigkeit dieser extrem schnellen Anpassung – bei minimalen Unterbrechungen für Mitarbeiter – hat aber in vielen Organisationen dazu geführt, dass Standardsicherheitsverfahren nicht umfassend beachtet wurden. Erfahren Sie, wie unsere Fortune-500-Kunden die Veränderungen bewältigt, die Auswirkungen auf Netzwerksicherheitsrisiken bewertet und entsprechende Lösungen ausgewählt haben, sowie sie für die Zukunft planen.

    Auf Grundlage der Ergebnisse einer kürzlich von Tufin durchgeführten Kundenumfrage, werden wir in diesem Webinar folgende Aspekte näher betrachten:
    • Die wichtigsten Herausforderungen im Zusammenhang mit Sicherheit, durch die Einrichtung von Homeoffice-Kapazitäten
    • Bewährte Verfahren für die Bewertung und Verbesserung der Netzwerksicherheit bei einer großen Anzahl von Mitarbeitern im Homeoffice – mit Segmentierung und Zugriffskontrollen
    • Geplante Investitionen von Kunden, um Sicherheitsanforderungen erneut zu erfüllen, die Produktivität der Netzwerk- und Sicherheitsteams zu steigern und für mögliche Veränderungen oder Krisen in Zukunft gerüstet zu sein

    Seien Sie mit dabei, am 14. August um 10:00 Uhr

    Falls Sie nicht am Live-Webinar teilnehmen können, melden Sie sich hier an und wir werden Ihnen die Aufzeichnung zusenden.
  • Prioritizing Network Security Investments During Covid & Beyond Recorded: Aug 14 2020 51 mins
    Chintan Patnaik, Pre-Sales Engineer, India - Tufin
    Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organizations from following their standard security processes. Learn how our Fortune 500 customers transformed overnight, the implications on their network security risks, the solutions employed, and what’s next.

    Based on results of a recent survey of Tufin customers, in this webinar, we’ll take a closer look at:
    Key security challenges organizations introduced when enabling remote workers
    Best practices for how-to asses and improve network security, with a large remote workforce, through segmentation and access controls
    Investments customers plan to make to restore their security posture, increase the productivity of their network and security teams, and prepare for another possible pivot or shock in the future

    Please join us on August 14th at 2pm (SGT)

    If you're unable to attend the live webinar, sign up here and we’ll send you the recording
  • Prioritizing Network Security Investments During Covid & Beyond Recorded: Aug 13 2020 43 mins
    Roi Alon, Senior Product Manager - Tufin
    Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organizations from following their standard security processes. Learn how our Fortune 500 customers transformed overnight, the implications on their network security risks, the solutions employed, and what’s next.

    Based on results of a recent survey of Tufin customers, in this webinar, we’ll take a closer look at:
    Key security challenges organizations introduced when enabling remote workers
    Best practices for how-to asses and improve network security, with a large remote workforce, through segmentation and access controls
    Investments customers plan to make to restore their security posture, increase the productivity of their network and security teams, and prepare for another possible pivot or shock in the future

    Please join us on August 13th at 11am (EST)

    If you're unable to attend the live webinar, sign up here and we’ll send you the recording
  • Prioritizzare gli investimenti in sicurezza della rete nell’era COVID e oltre Recorded: Aug 13 2020 24 mins
    Flavio Di Cosmo, Pre Sales engineer, Italy - Tufin
    I livelli di sicurezza della rete hanno subito una brusca trasformazione con il passaggio improvviso al telelavoro. La necessità imprescindibile di velocità, con disagi minimi per i dipendenti, ha impedito a molte organizzazioni di seguire le proprie procedure tradizionali in materia di sicurezza. Scopri la trasformazione che i nostri clienti Fortune 500 hanno attuato dall'oggi al domani, le implicazioni relative ai rischi per la sicurezza della propria rete, le soluzioni utilizzate e i piani per il futuro.

    Sulla base dei risultati di un recente sondaggio condotto tra i clienti Tufin, in questo webinar esamineremo in maggiore dettaglio:
    • Le principali sfide per la sicurezza che le organizzazioni si sono trovate ad affrontare nel passaggio al telelavoro.
    • Le pratiche migliori per valutare e potenziare la sicurezza della rete, con un gran numero di dipendenti che lavora da remoto, attraverso la segmentazione e il controllo degli accessi.
    • Gli investimenti che i clienti prevedono di effettuare per ripristinare il proprio livello di sicurezza, aumentare la produttività dei team incaricati della rete e della sicurezza e prepararsi a un altro possibile colpo o scossa in futuro.

    Unisciti a noi il 13 agosto alle 15:00 (CEST).

    Se non puoi partecipare al webinar in diretta, iscriviti qui e ti invieremo la registrazione.
  • Security Policy Clean-Up and Optimization through Administrative Automation Recorded: Aug 13 2020 37 mins
    Alex Apt, Solutions Architect, APAC Sales - Tufin
    Security policy clean-up does not need to be a drag. Imagine automated identification or alerts for policies which haven’t been used for three months, automatic populating of tickets to decommission these rules, automated server decommissioning, and automated group modifications aligned with your IPAM changes.

    Join us for a TechTalk to learn how to take the drag out of security policy clean-up, and how to optimize your policy management efficiently, productively and accurately.
  • SecureCloud Webinar Series: Cloud Security Posture Visibility Recorded: Aug 13 2020 35 mins
    Jonathan Campbell, Cloud SME and Pat Chiu Pre Sales Engineer, North Asia - Tufin
    Gaining visibility into public cloud and Kubernetes environments is a critical first step to ensuring your cloud is secure. Using Tufin SecureCloud, we will show you how to gain valuable insight and visibility into your cloud security posture, and discuss the next steps to actionable remediation and continued compliance.

    This webinar will review the key metrics, insights, industry standards, and best-practices required to determine your current cloud security posture. Topics covered:
    • Cloud platform vendor best practices
    • CIS Benchmarks – how to interpret and act on them
    • Find and understand overly permissive security policies
Security Policy Orchestration Solutions
Tufin® is the leader in Network Security Policy Orchestration, serving more than half of the top 50 companies in the Forbes Global 2000. Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. Tufin reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries.

Find out more at www.tufin.com
Tufin blog SuiteTalk™ http://www.tufin.com/blog/
Twitter: http://twitter.com/TufinTech
Webinars http://www.tufin.com/resources/webinars/
YouTube https://www.youtube.com/user/Tufintech

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Prioritizing Network Security Investments During Covid & Beyond
  • Live at: Aug 14 2020 6:00 am
  • Presented by: Chintan Patnaik, Pre-Sales Engineer, India - Tufin
  • From:
Your email has been sent.
or close