Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 20 May 2009

The KBC Group Taps Tufin Technologies to Streamline Firewall Operations and Policy Management

Posted on 06:33 by Unknown
Security Lifecycle Management Leader Automates Change Tracking, Risk Analysis, Compliance Checks and Optimization of KBC’s Juniper Networks Firewalls

Tufin Technologies, the leading provider of Security Lifecycle Management solutions, announced on May 11, 2009 that the KBC Group, a Belgium based financial institution, has selected Tufin’s flagship product, SecureTrack, to manage policies for its Juniper Networks high-performance firewalls. SecureTrack will enable KBC to increase network security and automate day-to-day tasks through its powerful change tracking, rule-base optimization and risk analysis capabilities. Interoperating seamlessly with the Juniper Networks firewalls, SecureTrack enables KBC to dramatically simplify its firewall policy management, resulting in more efficient, cost effective and manageable firewall operations.

"Tufin’s SecureTrack provides us with a complete picture of our Juniper firewall solutions, which ensures correct change implementation and helps us identify obsolete or conflicting policies,” said Aresh Ghannad, System Engineer for the KBC Group, a Belgium-based financial services institution. “With real-time e-mail notifications and detailed reporting on all policy changes, SecureTrack significantly reduces time required to perform audits and consequently, improves KBC’s overall network security.”

The KBC Group manages network firewalls across many locations in several countries. Each firewall has its own rule base - a complex set of rules defining access privileges and restrictions for specific users and services. SecureTrack provides the KBC Group with a unified, top-down view of all firewall policies and a powerful auditing tool that allows it to proactively manage configuration changes, which simplifies firewall operations while maintaining compliance with corporate and regulatory policies.

SecureTrack provides KBC Group with detailed notifications of firewall changes as soon as they are made. The system maintains a complete and accurate account of each incremental configuration change and can attribute each action to the firewall administrator who performed it. This gives administrators unprecedented, real-time visibility into who made what change and when, analyzing the effect of each change on the network while incorporating accountability and proper governance into security operations.

Tufin Secure Track Firewall Policy Management

SecureTrack provides comprehensive auditing features to support corporate change management procedures and compliance with international regulatory standards such as PCI-DSS and Sarbanes-Oxley. Available as a hardened security appliance or Linux-based software, SecureTrack can be installed and integrated in the enterprise network with minimum effort. Key features include:

· Change Management: Monitors firewall policy changes, reports them in real time and maintains a comprehensive, accurate audit trail for full accountability.
· Security Policy Optimization and Cleanup: Analysis and clean-up of complex rule bases and objects to eliminate potential security breaches and improve performance.
· Risk Analysis and Business Continuity: Powerful simulation and risk analysis to identify potential security risks, ensure compliance with organizational security standards, and prevent service interruptions.
· Cross-Platform Visual Monitoring: Intuitive, graphical views of firewall policies, rule bases and configuration changes for routers and switches.
· Auditing and Regulatory Compliance: Thorough auditing of firewall policy changes by an objective third party supports industry regulations including PCI-DSS, SOX, HIPAA, ISO 17799 and Basel II

“Manual change tracking and auditing is just not feasible in large organizations with numerous firewalls across multiple data centers and different time zones”, said Shaul Efraim , vice president of Products, Marketing and Business Development for Tufin Technologies. “SecureTrack offers administrators a single interface for management of all Juniper firewall operations, with automated reports and change alerts, eliminating much of the management burden associated with daily operations.”

In addition, Tufin announced today that it has joined the Juniper Networks J-Partner Program as a Solutions Alliance partner. More information about the joint Firewall Operations Management solution can be found at http://www.juniper.net/solutions/literature/solutionbriefs/351401.pdf (PDF file)

Tufin SecureTrack™ is the market-leading Security Operations Management solution. SecureTrack enables organizations to enhance security, reduce service interruptions and automate day-to-day tasks through powerful firewall management capabilities and reporting. SecureTrack helps security operations teams to control and manage policy changes, analyze risks, and ensure business continuity and allows managers to easily understand the big picture and align operations with corporate and government security standards.

Tufin Technologies is the leading provider of Security Lifecycle Management solutions that enable large organizations to enhance security, ensure business continuity and increase operational efficiency. Tufin's products SecureTrack and SecureChange Workflow help security operations teams to manage change, minimize risks and dramatically reduce manual, repetitive tasks through automation. With a combination of accuracy and simplicity, Tufin empowers security officers to perform reliable audits and demonstrate compliance with corporate and government standards. Founded in 2003 by leading firewall and business systems experts, Tufin now serves 300 customers around the world, including leading financial, telecom, transportation, energy and pharmaceutical companies. For more information visit on the web at http://www.tufin.com or on Twitter at http://www.twitter.com/TufinTech

Source: Tuffin
<>
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Tufin Technologies | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ▼  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ▼  May (21)
      • Impressions of an ASUS Eee PC 900
      • Touch the Light Fantastic
      • Survey Reveals Workaholics now working 2-6 hours a...
      • Tufin survey reveals the truth about fudging audit...
      • UK SMEs drastically underestimate IT security dang...
      • Experts says trashed hard drive fiasco at Pfizer c...
      • New In-Line product doubles network throughput
      • Beware fake security software
      • TDK bid to use solid state technology will not fly
      • Fortify says online credit card security lapse may...
      • The KBC Group Taps Tufin Technologies to Streamlin...
      • MPAA/RIAA Web site security flaw ironic, but unsur...
      • Mio launches new Navman range
      • ASUS Eee PC Seashell Netbook launched in UK
      • US missile launch data on eBay hard drive signifie...
      • Is Your Firewall A Fire Hazard?
      • Throwing Sheep in the Boardroom – Book Review
      • IT experts say MI6 drug information loss in Columb...
      • IT Security Solution helps keep Swine Flu under co...
      • Tufin Technologies supports Rt Hon David Blunkett'...
      • Tufin Open Platform launched providing platform fo...
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile