Hi [[ session.user.profile.firstName ]]

Make Zero Trust a Strategic Priority – Tips and Advice from Forrester

Join David Holmes, Senior Security & Risk Analyst at Forrester, as he shares advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.

Please join us on September 30th to learn about the importance of defining a Zero Trust network access strategy and roadmap, how this will help align many other security initiatives, and the major challenges likely to be encountered. David will impart his view on:
• Why Zero Trust should be a strategic priority that drives technology adoption
• The importance of network segmentation, visibility, and continuous inspection to enable Zero Trust
• How vulnerability management is integral to the success of Zero Trust initiatives and how they can work hand in hand
• The cost, productivity, compliance and security benefits of consolidating multiple security functions into a single platform
• Ways to leverage Zero Trust to foster close relationships with other technology teams and break down silos
Recorded Sep 30 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Holmes, Senior Security & Risk Analyst, Forrester; Ruvi Kitov, CEO and Co-Founder, Tufin
Presentation preview: Make Zero Trust a Strategic Priority – Tips and Advice from Forrester
  • Channel
  • Channel profile
  • TechTalk: Blueprint for Zero-Trust Networks Nov 12 2020 4:00 pm UTC 45 mins
    Sagi Bar-Zvi, Strategic Pre-Sales Manager
    As organizations accelerate ‘work from home’ programs, more and more businesses are turning to the zero-trust model – “trust nothing, verify everything” to reinforce their security posture.

    Join us to learn what zero-trust really looks like in practice, how to leverage Tufin's capabilities to create an effective blueprint for implementing zero-trust networks, make policy dynamic, and the immediate security benefits achieved across the enterprise network, regardless of the vendor or platform.

    In this webinar, we’ll review:
    • Key elements and tips of how to build a zero-trust model
    • The components of the violation dashboard and how to configure alerts
    • How to provision and manage segmentation/micro-segmentation policies
    • The range of documentation and audit capabilities to establish full accountability
  • The Future of Vulnerability Management is Contextual, Integrated, and Automated Nov 10 2020 4:00 pm UTC 60 mins
    Brian Kime, Security and Risk Senior Analyst at Forrester
    Brian Kime, Security and Risk Senior Analyst at Forrester, will share advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.
    Please join us on November 10th to learn how vulnerability management programs are expanding beyond vulnerability scanning, are being integrated into a firm’s security fabric, and are being defined as a comprehensive vulnerability mitigation and management strategy. Brian will impart his view on:
    • Top 5 components of a vulnerability management strategy
    • How to mature a vulnerability risk management program by leveraging the combination of network context and vulnerability data
    • Use cases for the evolution of vulnerability management
    • Opportunities to reduce risk without disabling the business through immediate and automated mitigation with planned remediation
  • Tufin R20-2 - Enhanced NGFW Support, Azure Visibility, and Doubled Risk Analysis Nov 5 2020 6:00 am UTC 60 mins
    Roi Alon, Senior Product Manager - Tufin; Hadas Lahav, Director, Automation Products - Tufin
    Looking for an easier way to know whether an access request is risky? Do you want to effectively manage rules with FQDNs or gain visibility and control of Azure north-south or VNets traffic?

    Join us on November 5 to learn how you can use Tufin’s latest security automation features and functionality to:
    • Integrate your vulnerability scan outputs into a new access request workflow by running additional security checks on source/destination
    • Automatically manage rules containing FQDNs (Fortinet/Panaroma) and tags (Panorama)
    • View and control traffic between your on-premises and Azure environments, and between VNets
  • Webinar Series: Are You Paying Ransom to Your Own Cloud Security Vendor? Nov 3 2020 4:00 pm UTC 60 mins
    Colby, Dyess Director, Cloud Product management
    Many organizations attempting to secure their cloud-native deployments end up paying a hidden tax due to the additional agents, cloud-native firewalls, and other security control planes required to run in public cloud environments. This hidden tax can increase your ongoing cloud compute costs by 25% or more and lock you into a single vendor solution.

    Join our SecureCloud expert, Colby Dyess on Tuesday, November 3 rd at 11am EDT to learn how you can avoid these hidden costs when moving workloads to the cloud securely. Topics will include defining, automatically generating, and managing cloud-native security policies across multi and hybrid-cloud applications and workloads by leveraging native controls of your cloud.

    Register now to take full advantage of the cloud-native security controls and avoid the hidden tax imposed by other cloud security solutions.
    If you're unable to attend the live webinar, sign up here and we’ll send you the recording.
  • TechTalk: How to Automate Compliance Controls Across the Hybrid Environment Recorded: Oct 22 2020 50 mins
    Dan Roberts, Sales Engineer Team Lead
    Are you looking to automate compliance controls across your hybrid network? Join us for an informative webinar and learn from real-life business scenarios how you can use segmentation policies to effectively automate compliance controls, and prevent security and compliance violations when making network access changes.

    In this webinar, we’ll review real use cases, discuss best practices, and demonstrate how to:
    • Define, set, and manage compliance policy to be applied across the hybrid network
    • Use topology insights, path analysis, and risk assessment in the network change process to help prevent new risks or additional violations
    • Generate audit trail and full accountability for all security policy changes
  • Make Zero Trust a Strategic Priority – Tips and Advice from Forrester Recorded: Oct 1 2020 60 mins
    David Holmes, Senior Security & Risk Analyst, Forrester; Ruvi Kitov, CEO & Co-Founder, Tufin; Alex Apt, Solutions Architect
    Join David Holmes, Senior Security & Risk Analyst at Forrester, as he shares advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.

    Please join us on October 1st to learn about the importance of defining a Zero Trust network access strategy and roadmap, how this will help align many other security initiatives, and the major challenges likely to be encountered. David will impart his view on:
    • Why Zero Trust should be a strategic priority that drives technology adoption
    • The importance of network segmentation, visibility, and continuous inspection to enable Zero Trust
    • How vulnerability management is integral to the success of Zero Trust initiatives and how they can work hand in hand
    • The cost, productivity, compliance and security benefits of consolidating multiple security functions into a single platform
    • Ways to leverage Zero Trust to foster close relationships with other technology teams and break down silos
  • Make Zero Trust a Strategic Priority – Tips and Advice from Forrester Recorded: Sep 30 2020 58 mins
    David Holmes, Senior Security & Risk Analyst, Forrester; Ruvi Kitov, CEO and Co-Founder, Tufin
    Join David Holmes, Senior Security & Risk Analyst at Forrester, as he shares advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.

    Please join us on September 30th to learn about the importance of defining a Zero Trust network access strategy and roadmap, how this will help align many other security initiatives, and the major challenges likely to be encountered. David will impart his view on:
    • Why Zero Trust should be a strategic priority that drives technology adoption
    • The importance of network segmentation, visibility, and continuous inspection to enable Zero Trust
    • How vulnerability management is integral to the success of Zero Trust initiatives and how they can work hand in hand
    • The cost, productivity, compliance and security benefits of consolidating multiple security functions into a single platform
    • Ways to leverage Zero Trust to foster close relationships with other technology teams and break down silos
  • SecureCloud Webinar: Cloud-Native Security without Compromise Recorded: Sep 30 2020 49 mins
    Ben Grissinger, Cloud SME and Henry Pea Sales Engineering Director, APAC - Tufin
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.

    In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and move to the cloud by giving security, devops, and cloud operations teams a cloud-native automation solution for security policy. Topics covered:
    • Why traditional IT security processes and approaches don’t work for cloud-native
    • Align devops, security, and cloud-ops to create a security-first approach to cloud security
    • Automate security in a CI/CD process
    • Best practices for getting started
  • SecureCloud Webinar: Cloud-Native Security without Compromise Recorded: Sep 29 2020 45 mins
    Ben Grissinger, Cloud SME
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.

    In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and move to the cloud by giving security, devops, and cloud operations teams a cloud-native automation solution for security policy. Topics covered:
    • Why traditional IT security processes and approaches don’t work for cloud-native
    • Align devops, security, and cloud-ops to create a security-first approach to cloud security
    • Automate security in a CI/CD process
    • Best practices for getting started
  • How a leading utility company secures network infrastructure continuity Recorded: Sep 25 2020 63 mins
    Pam Cyr - SVP Business and Corporate Development, Tufin and Henry Pea Sales Engineering Director, APAC - Tufin
    Watch this panel discussion led by industry leaders, Dr. Juergen Tusch, Head of Telecommunications at Innogy Westenergie GmbH, Reuven Harrison CTO at Tufin, and John Jacobs, VP Global Solutions Architecture at Fortinet.

    This expert panel will discuss how the German utility services company, Innogy Westenergie GmbH, protects and simplifies network operations while maintaining mission-critical infrastructure via automation and zero trust architecture.

    Panelists will discuss lessons learned on:
    • How to enable secure infrastructure changes, and in parallel, reduce Germany’s global energy footprint
    • Simplifying network operation via automation to enhance productivity, speed, and accuracy
    • Best practices of how to s
  • TechTalk: Solutions for Creating & Enforcing Policies for Kubernetes Flows Recorded: Sep 24 2020 24 mins
    Chintan Patnaik, Pre-Sales Engineer and Ricky Egge, Sales Engineer
    Are you looking for an effective and automated way to secure Kubernetes deployments and automate security across your hybrid network? Watch this webinar to learn how you can use Tufin solutions to establish your firewalls as a second layer of defense around your Kuberenets clusters. This can help enable network level and app level segmentation, risk analysis, and compliance assessment of your IT environment, irrespective of the underlying platform or network security devices.

    In this webinar we’ll review use cases and best practices, as well as demonstrate:
    • How to gain visibility to avoid blind spots of Kubernetes N-S traffic
    • How to easily audit if policies differ from corporate standards
    • How to maintain the benefits of your existing admin processes and workflows to yield consistent, efficient, and comprehensive hybrid management
  • How a leading utility company secures network infrastructure continuity Recorded: Sep 22 2020 62 mins
    Pam Cyr - SVP Business and Corporate Development, Tufin
    Watch this panel discussion led by industry leaders, Dr. Juergen Tusch, Head of Telecommunications at Innogy Westenergie GmbH, Reuven Harrison CTO at Tufin, and John Jacobs, VP Global Solutions Architecture at Fortinet.

    This expert panel will discuss how the German utility services company, Innogy Westenergie GmbH, protects and simplifies network operations while maintaining mission-critical infrastructure via automation and zero trust architecture.

    Panelists will discuss lessons learned on:
    • How to enable secure infrastructure changes, and in parallel, reduce Germany’s global energy footprint
    • Simplifying network operation via automation to enhance productivity, speed, and accuracy
    • Best practices of how to secure diverse multi-vendor networks through visibility and segmentation
  • TechTalk: Solutions for Creating & Enforcing Policies for Kubernetes Flows Recorded: Sep 22 2020 20 mins
    Ricky Egge, Sales Engineer
    Are you looking for an effective and automated way to secure Kubernetes deployments and automate security across your hybrid network? Watch this webinar to learn how you can use Tufin solutions to establish your firewalls as a second layer of defense around your Kuberenets clusters. This can help enable network level and app level segmentation, risk analysis, and compliance assessment of your IT environment, irrespective of the underlying platform or network security devices.

    In this webinar we’ll review use cases and best practices, as well as demonstrate:
    • How to gain visibility to avoid blind spots of Kubernetes N-S traffic
    • How to easily audit if policies differ from corporate standards
    • How to maintain the benefits of your existing admin processes and workflows to yield consistent, efficient, and comprehensive hybrid management
  • SecureCloud Webinar: Avoiding Cloud Policy Misconfigurations Recorded: Sep 4 2020 53 mins
    Colby Dyess, Director, Product Management, Cloud and Henry Pea, Sales Engineering Director, APAC - Tufin
    According to Gartner, 99% of the security breaches in the cloud will occur from policy misconfigurations made by the customer – not the cloud platform vendor.

    This webinar will provide an overview of these misconfiguration issues and how you can use Tufin SecureCloud to automate the creation and ongoing management of security policy configurations.

    Topics covered:
    • Why misconfigurations are so easy to create
    • Create policies using automation
    • Manage and monitor policy configuration throughout the SDLC lifecycle
  • SecureCloud Webinar: Avoiding Cloud Policy Misconfigurations Recorded: Sep 3 2020 52 mins
    Colby Dyess, Director, Product Management, Cloud
    According to Gartner, 99% of the security breaches in the cloud will occur from policy misconfigurations made by the customer – not the cloud platform vendor.

    This webinar will provide an overview of these misconfiguration issues and how you can use Tufin SecureCloud to automate the creation and ongoing management of security policy configurations.

    Topics covered:
    • Why misconfigurations are so easy to create
    • Create policies using automation
    • Manage and monitor policy configuration throughout the SDLC lifecycle
  • TechTalk: Gain Vendor-Agnostic Visibility to Secure your Hybrid Network Recorded: Sep 3 2020 46 mins
    Alex Apt, Solutions Architect, APAC Sales - Tufin
    Maintaining and controlling a healthy compliance posture across the fragmented network is complex and challenging. This is due to the lack of visibility of what talks to what across your hybrid network. When visibility is afforded, combined with a centralized multi-vendor control plane, you can achieve enforcement of consistent security and compliance across different types of apps and workloads, environments (public, private, multi-cloud) as well as network platforms and infrastructure devices.

    Join us for a TechTalk webinar where you will learn from real world scenarios on how to gain visibility and achieve continuous compliance of your security policy management.

    We will demonstrate how to:
    • Gain visibility of your security policies both on-premises and across the multi-cloud vendors
    • Identify and mitigate highly permissive rules
    • Define security policy guiderails and automatically compare rules against them
    • Automate compliance controls
  • TechTalk: Gain Vendor-Agnostic Visibility to Secure your Hybrid Network Recorded: Sep 2 2020 46 mins
    Jojo Aricat, Sales Engineer
    Maintaining and controlling a healthy compliance posture across the fragmented network is complex and challenging. This is due to the lack of visibility of what talks to what across your hybrid network. When visibility is afforded, combined with a centralized multi-vendor control plane, you can achieve enforcement of consistent security and compliance across different types of apps and workloads, environments (public, private, multi-cloud) as well as network platforms and infrastructure devices.

    Join us for a TechTalk webinar where you will learn from real world scenarios on how to gain visibility and achieve continuous compliance of your security policy management.

    We will demonstrate how to:
    • Gain visibility of your security policies both on-premises and across the multi-cloud vendors
    • Identify and mitigate highly permissive rules
    • Define security policy guiderails and automatically compare rules against them
    • Automate compliance controls
  • Webinar: Rethinking Security Segmentation for the Remote Workforce Recorded: Sep 2 2020 45 mins
    Panel Discussion
    Live Panel: Rethinking Security Segmentation for the Remote Workforce

    The abruptness and unprecedented scale at which organizations moved to a remote workforce has given rise to complex and widespread IT security challenges. Ensuring employees had the tools and access they needed to be productive was the priority. But now IT, Compliance & Security teams needs to consider the security issues created.

    IT admins had to hurriedly configure and scale their VPN infrastructure to accommodate the surge of connections. VPNs are complex to manage and given the short time frame, there are likely insufficiently strong policies and misconfigurations that will create vulnerabilities.

    In this webinar, experts will share key insights and discuss recommendations. Talking points could include:
    - Real world examples – lessons learned from customer experience managing security postures during the “big switch”
    - How to identify and mitigate risks introduced when going remote, without utilizing all IT resources
    - Considerations for updating your segmentation strategy for remote workers

    Register now to garner thoughts from experts on how to improve your security posture for the new normal.

    Panelists, each with over 20 years of experience managing security postures for global, Fortune 2000 organizations, include:
    1. Justin Anthony Pitt, Senior Security Engineer, Duke Energy
    2. David Goodman, Director of Engineering & Founder, G2 Deployment Advisors, IT Security Consulting
  • Webinar: Rethinking Security Segmentation for the Remote Workforce Recorded: Sep 1 2020 42 mins
    Panel Discussion
    Live Panel: Rethinking Security Segmentation for the Remote Workforce

    The abruptness and unprecedented scale at which organizations moved to a remote workforce has given rise to complex and widespread IT security challenges. Ensuring employees had the tools and access they needed to be productive was the priority. But now IT, Compliance & Security teams needs to consider the security issues created.

    IT admins had to hurriedly configure and scale their VPN infrastructure to accommodate the surge of connections. VPNs are complex to manage and given the short time frame, there are likely insufficiently strong policies and misconfigurations that will create vulnerabilities.

    In this webinar, listen to a panel of experts share key insights and discuss recommendations including:
    •Real world examples – lessons learned from customer experience managing security postures during the “big switch”
    •How to identify and mitigate risks introduced when going remote, without utilizing all of your IT resources
    •Considerations for updating your segmentation strategy for remote workers
    •Security policy best practices


    Register now to garner thoughts from experts on how to improve your security posture for the new normal.

    Panelists, each with over 20 years of experience managing security postures for global, Fortune 2000 organizations, include:
    1. Justin Anthony Pitt, Senior Security Engineer, Duke Energy
    2. David Goodman, Director of Engineering & Founder, G2 Deployment Advisors, IT Security Consulting
  • 如何在疫情期间及以后的工作中规划网络安全投资 Recorded: Aug 18 2020 24 mins
    赵不灏 Pat Chiu, Tufin北亚区售前工程师
    随着远程工作的流行,网络安全状态几乎在一夜之间发生了巨大变化。当务之急是速度,以及对员工的干扰最小,这使许多机构无法遵循其标准安全流程。了解我们的财富500强客户如何在一夜之间转变,其网络安全风险的变化,采用的解决方案以及下一步的策略。

    根据对Tufin客户的最近调查结果,研讨会将讨论以下内容:
    • 远程工作时机构面临的重大安全挑战
    • 大量员工远程工作时,通过分段和访问控制,评估和改善网络安全的最佳实践
    • 客户计划恢复其安全状态的投资,提高其网络和安全团队的效率,并为将来可能发生的关键转折或冲击做准备

    诚邀您参加 8月18日下午2:30举行的研讨会。
Security Policy Orchestration Solutions
Tufin® is the leader in Network Security Policy Orchestration, serving more than half of the top 50 companies in the Forbes Global 2000. Tufin simplifies management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the award-winning Tufin Orchestration Suite™ to increase agility in the face of ever-changing business demands while maintaining a robust security posture. Tufin reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries.

Find out more at www.tufin.com
Tufin blog SuiteTalk™ http://www.tufin.com/blog/
Twitter: http://twitter.com/TufinTech
Webinars http://www.tufin.com/resources/webinars/
YouTube https://www.youtube.com/user/Tufintech

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Make Zero Trust a Strategic Priority – Tips and Advice from Forrester
  • Live at: Sep 30 2020 6:50 pm
  • Presented by: David Holmes, Senior Security & Risk Analyst, Forrester; Ruvi Kitov, CEO and Co-Founder, Tufin
  • From:
Your email has been sent.
or close