Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 12 February 2011

Tufin unveils new functionality & updated PCI DSS 2.0 compliance reporting

Posted on 05:13 by Unknown

TUFIN TECHNOLOGIES UNVEILS enhanced firewall operations management functionality and UPDATEd pci dss 2.0 compliance reporting

New Permissive Firewall Policy Optimization Features Enable Security Teams to Instantly Identify and Remediate Potential Policy Risks

London Feb. 9, 2011–Tufin Technologies, the leading provider of Security Lifecycle Management solutions, today unveiled version 5.3 of its award-winning Tufin Security Suite (TSS), which features enhancements that further accelerate Tufin’s market lead and significantly raises the bar for what any organization should expect from firewall operations, compliance and change automation solutions. Tufin will demonstrate its new release next week at the RSA Conference 2011 in San Francisco, in its Booth No. 2551.

The Tufin Security Suite is made up of two core products: SecureTrack, Tufin’s firewall operations, compliance and auditing product; and SecureChange Workflow, Tufin’s security change automation solution.  Enhancements to SecureTrack include:

  • Enhanced Automatic Policy Generator (APG). SecureTrack’s Automatic Policy Generator enables administrators to instantly create a firewall rule base through analysis of firewall traffic logs.  TSS 5.3 includes an enhanced, interactive interface as well as new features that enable security teams to rapidly diagnose and remediate excessively permissive security policy rules, including:

    • Permissiveness Score: APG now reviews security policies for firewalls, routers or other network devices and assigns a permissiveness score to every rule. With the permissiveness score, security teams can instantly identify and address potential risks.
    • Permissive Rule Optimization: APG provides specific recommendations on how to optimize overly permissive rules. Since there is a tradeoff between the degree of permissiveness and the number of rules generated, security managers can adjust the optimization level before and after the analysis.

  • Zone Manager. SecureTrack’s new Zone Manager provides a central interface for defining and managing network zones. All SecureTrack features access the zone manager, making it faster and easier than ever before to define reports and queries in SecureTrack.  It is also possible to export zone definitions for use in other management systems.

  • PCI DSS Support for Industry Standard--Version 2.0. SecureTrack’s Payment Card Industry Data Security Standards (PCI DSS) Audit Report now supports the latest version of the industry standard, version 2.0. The automated report helps organizations address the requirements relating to firewall auditing, network security, data safety, access control, and accountability.

In addition to the latest advances in SecureTrack, Tufin’s SecureChange Workflow change automation tool is also updated to include an out-of-the-box API for integration with the popular BMC Remedy Change Management system. The enhanced API enables SecureChange Workflow to automatically update the enterprise change management system in order to comply with organizational change policies.

“As the leader in Security Lifecycle Management, Tufin has a broad customer base which works closely with us to identify product updates to keep up with their changing, complex firewall management and compliance needs,” said Ruvi Kitov, CEO and Co-Founder, Tufin Technologies. “With this new release, SecureTrack addresses the latest in firewall compliance and automation requirements as demanded by enterprises. Coupled with our recent announcement of next-generation firewall support, SecureTrack is today’s most comprehensive solution for firewall management.”

Availability and Pricing

The latest version of SecureTrack and SecureChange Workflow is available immediately.  Pricing starts at $20,000.

™ is the leading provider of Security Lifecycle Management solutions that enable companies to cost-effectively manage their network security policy, comply with regulatory standards, and minimize IT risk. Tufin’s award-winning products SecureTrack™ and SecureChange™ Workflow help security operations teams to manage change and perform reliable audits while dramatically reducing manual, repetitive tasks through automation. Founded in 2005 by leading firewall and business systems experts, Tufin serves more than 700 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals. Tufin partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Blue Coat, McAfee and BMC Software, and is committed to setting the gold standard for technological innovation and dedicated customer service.

For more information visit www.tufin.com, or follow Tufin on:

·         Twitter at http://twitter.com/TufinTech

·         Facebook at http://www.facebook.com/Tufintech

·         LinkedIn at http://www.linkedin.com/companies/tufin-technologies

·         The Tufin Channel on YouTube at http://www.youtube.com/user/Tufintech

·         The Tufin Blog at http://www.tufin.com/blog

Source: Eskenzi PR

This press release is presented without editing for your information only.

Full Disclosure Statement: The ICT REVIEW received no compensation for any component of this article.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ▼  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ▼  February (30)
      • Security Concerns over Cloud Storage
      • Lieberman Software warns on new hacking trend of m...
      • 95% of parents found children accessing internet p...
      • Parallels to leverage Scality RING technology in i...
      • Connectria selects Scality to launch a public clou...
      • Flash disk security is very different to magnetic ...
      • New Financial Trojan OddJob Keeps Online Banking S...
      • US worries over Internet `kill switch' highlights ...
      • CREDANT TECHNOLOGIES LAUNCHES BETA PROGRAM FOR CLO...
      • Beware the Enemy Within
      • Infosecurity Europe welcomes plans for rapid taked...
      • ISACA’s EuroCACS Examines Data Protection, Cloud C...
      • Imperva warns on the real insider security threat
      • Tufin unveils new functionality & updated PCI DSS ...
      • Trusteer Secure Web Access prevents attacks that e...
      • Venafi launches 1st universal automated management...
      • Safer Internet Day - The role of Security within S...
      • `What are the banks not telling us about card frau...
      • DES Offers Free Encryption
      • Tufin introduces next generation firewall manageme...
      • Infosecurity Europe 2011 Hall of Fame nominations ...
      • Huddersfield NHS laptop loss highlights need to pr...
      • Innovative software solutions to reduce business e...
      • Talk of Intel developing IT security game-changer ...
      • SOURCEFIRE’S IMMUNET ANTI-MALWARE SOLUTION DELIVERS
      • Lieberman Software and Q1 Labs Partner to stop ins...
      • Data governance and leaks drives Varonis growth
      • ISACA report emphasizes governance's central role ...
      • WikiLeaks DDoS arrests welcomed by Infosecurity Eu...
      • KOBIL mIDentity secures e-Banking of the BBVA (Sui...
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile