Tufin Software Technologies Ltd, which is developing a unified management station for real-time security and network policy administration, has extended the reach of its system to monitor devices from application security and delivery systems, as well as firewalls from the likes of Check Point, Juniper, Cisco and Fortinet.

Tufin Open Platform or TOP is designed to feed admins with views of policy changes, configuration changes so that they can carry out compliance monitoring, performance optimisation and auditing across a wide variety of security and networking devices. 

With the launch today of the Tufin Open Platform (TOP) alliance the company has extended its policy management and auditing to application security and delivery network systems and devices from F5 Networks and BlueCoat.

Calum Macleod of Tufin told us the Tufin Open Platform addresses all aspects of security lifecycle management. “At one level it ensures organisations stay compliant with their security and network policies, but it will also provide early alerts on a policy breach or attack, and help admins coordinate a response.”

The system is intended to be used more as an operational checkpoint, as opposed to security event management systems like a netForensics or envision, which Macleod suggests are more focused on gathering logs for purposes of analytics and reporting. 

“Part of the system ties in with a classic workflow system like Remedy. It will see that all the appropriate checks and balances are made before an access request is granted. It looks at the source, the destination and the services involved in a request, and will interrogate these against the network or security policy to check for potential breaches.” 

Tufin has developed SecureChange Workflow to automate some of these types of repetitive routines for the security operations teams.

The company has also released a Software Development Kit that allows vendors, systems integrators or enterprise development teams to build bridges to the SecureChange system, as well as to its SecureTrack monitor.

This is used to run real-time checks on network security devices to see what is happening, and will trigger information to administrators should a policy be breached.

“That system can also be used to model proposed configuration or network security changes, to see if a change request would impact in any way on a policy,” Macleod explained.

The company claims its product is used by over 300 organisations, and is popular in many large financial services, retail and telco businesses.