Welcome!

Cloud Security Authors: Yeshim Deniz, Zakia Bouachraoui, Liz McMillan, Elizabeth White, Ravi Rajamiyer

Related Topics: Cloud Security

News Feed Item

Tufin Technologies Delivers on the Vision of Security Lifecycle Management With Tufin Security Suite (TSS) 5.0

TSS' Distributed Deployment Architecture, New Workflow GUI and Tufin Open Platform APIs Provide Organizations With an Automated, Flexible, and Highly Robust Platform to Create, Monitor, Manage and Audit Network Security Policies

WASHINGTON, DC -- (Marketwire) -- 06/29/09 -- Gartner Information Security Summit -- Tufin Technologies, the leading provider of Security Lifecycle Management solutions, today announced a new release of its Tufin Security Suite (TSS). Version 5.0 elevates TSS from an integrated offering of Tufin's award-winning SecureTrack and SecureChange Workflow product set to a robust, flexible and fully automated security and network policy management platform.

The significant innovations to the TSS architecture and workflow interface, combined with new functionality provided by the Automatic Policy Generator (announced today in a separate release), has provided Tufin with the foundation to deliver on its vision of Security Lifecycle Management: A cohesive framework for centralized network security policy management.

"Simplicity is the best antidote for complexity, which in the world of security operations, takes the form of automation and ease of use," said Richard Stiennon, chief analyst of IT-Harvest. "What makes delivering that automation easier said than done is two things: the need to introduce it into the environment without creating new management complexity, and to be able to adjust it as needed based on business or regulatory requirements. Tufin has been consistent in delivering solutions that tackle these industry challenges head on, and this release is a huge step forward in extending its success beyond firewall operations."

TSS 5.0 - End-to-end Security Lifecycle Management

TSS 5.0 enables administrators to accomplish more, more securely and in less time. As the company and market continues to evolve, the architecture, usability, and functional innovations introduced in TSS 5.0 provide the foundation required for Tufin to extend its award-winning automation and management to any network device. These innovations include:

Automatic Policy Generation - True to its name, Tufin's Automatic Policy Generator (APG) automates the creation of optimized rule bases for new and existing firewall deployments. This not only eliminates the risk introduced by overly permissive policies without impacting business continuity, it reduces future complexity that comes over time by ensuring the initial rule base is optimized from day one. For more information on the APG, please see the today's press release at http://www.tufin.com/news_press_releases.php.

Distributed Deployment Architecture - For organizations spread across multiple data centers or a single large data center, TSS now supports a distributed deployment architecture, meaning that multiple TSS appliances can be centrally managed from a single console. By providing a flexible, distributed deployment architecture, Tufin Security Suite installations can scale to support any size organization while reducing the total cost of ownership and maintaining ease of deployment of its award-winning solutions.

New Workflow Interface - Tufin's workflow engine is the core of its SecureChange Workflow product, a change management solution designed specifically for security and network policy change requests. Using Tufin's re-engineered, user-friendly workflow GUI, organizations can easily and intuitively design an unlimited number of fully customizable policy changes with tight integration with directory services (such as Microsoft Active Directory) and proactively manage incoming change tickets with risk analysis, business continuity and compliance information.

Tufin Open Platform (TOP) - TOP is both an industry-wide alliance of leading security and networking vendors and the management framework for delivering open, multi-vendor Security Lifecycle Management. Purpose-built to enable streamlined, policy-driven network and security management, Tufin's open architecture supports and expedites third party interoperability with TSS and helps joint customers to be better equipped to manage day-to-day operations of today's complex, intertwined, dynamic networks. TOP was formally launched last month with support for Check Point, Cisco, Juniper, Fortinet, F5 and Blue Coat. More alliance partners will be announced over the coming months.

"The launch of TSS 5.0 heralds a huge step forward in delivering on our vision of security lifecycle management by extending our ability to automate policy management for any device in an organizations network security eco-system," said Ruvi Kitov, CEO, Tufin Technologies. "We have been able to execute on such a broad vision in a short period of time by maintaining a tight, laser-like focus on our fundamental mission -- to make security administrators' lives easier while reducing operational costs. At the end of the day, that's what drives both our roadmap and our decision making process."

Pricing and Availability

TSS 5.0 will be Generally Available in August 2009. Pricing starts at $20,000.

About Tufin Security Suite

Tufin Security Suite (TM) (TSS) is industry's first comprehensive Security Lifecycle Management solution. Seamlessly integrating its award-winning SecureTrack and SecureChange Workflow solutions into an open, extensible and distributed architecture, TSS features full interoperability with Check Point, Cisco, Juniper, Fortinet, F5 and Blue Coat. TSS provides the capacity to automate security policy management for any device in the Security Lifecycle Management eco-system, enabling organizations to reduce the cost of security operations and compliance while increasing operational efficiency, tightening network security, and ensuring business continuity.

About Tufin Technologies

Tufin Technologies is the leading provider of Security Lifecycle Management solutions that enable large organizations to enhance security, ensure business continuity and increase operational efficiency. Tufin's products SecureTrack(TM), SecureChange(TM) Workflow, and the Tufin Security Suite(TM), help security operations teams to manage change, minimize risks and dramatically reduce manual, repetitive tasks through automation. Tufin's open, extensible architecture enables any company with best of breed applications, devices and systems to take advantage of Tufin's unmatched policy optimization, change management, and auditing capabilities. With a combination of accuracy and simplicity, Tufin empowers security officers to perform reliable audits and demonstrate compliance with corporate and government standards. Founded in 2005 by leading firewall and business systems experts, Tufin now serves more than 325 customers around the world, including leading financial institutions, telecom service providers, transportation, energy and pharmaceutical companies. For more information visit www.tufin.com, or follow Tufin on: Twitter at http://twitter.com/TufinTech.

LinkedIn at http://www.linkedin.com/groupRegistration?gid=1968264,
FaceBook at http://www.facebook.com/home.php#/group.php?gid=84473097725
The Tufin Blog at http://tufintech.wordpress.com/

Media Contact:
Elizabeth Safran
[email protected]
(o) 212-740-1037
(c) 408-348-1214

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...