View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
April 22, 2009

Tufin tops out network security console

System reaches out to range of security devices

By CBR Staff Writer

Tufin Software Technologies Ltd, which is developing a unified management station for real-time security and network policy administration, has extended the reach of its system to monitor devices from application security and delivery systems, as well as firewalls from the likes of Check Point, Juniper, Cisco and Fortinet.

Tufin Open Platform or TOP is designed to feed admins with views of policy changes, configuration changes so that they can carry out compliance monitoring, performance optimisation and auditing across a wide variety of security and networking devices. 

With the launch today of the Tufin Open Platform (TOP) alliance the company has extended its policy management and auditing to application security and delivery network systems and devices from F5 Networks and BlueCoat.

Calum Macleod of Tufin told us the Tufin Open Platform addresses all aspects of security lifecycle management. “At one level it ensures organisations stay compliant with their security and network policies, but it will also provide early alerts on a policy breach or attack, and help admins coordinate a response.”

The system is intended to be used more as an operational checkpoint, as opposed to security event management systems like a netForensics or envision, which Macleod suggests are more focused on gathering logs for purposes of analytics and reporting. 

“Part of the system ties in with a classic workflow system like Remedy. It will see that all the appropriate checks and balances are made before an access request is granted. It looks at the source, the destination and the services involved in a request, and will interrogate these against the network or security policy to check for potential breaches.” 

Content from our partners
How to turn the evidence hackers leave behind against them
Why food manufacturers must pursue greater visibility and agility
How to define an empowered chief data officer

Tufin has developed SecureChange Workflow to automate some of these types of repetitive routines for the security operations teams.

The company has also released a Software Development Kit that allows vendors, systems integrators or enterprise development teams to build bridges to the SecureChange system, as well as to its SecureTrack monitor.

This is used to run real-time checks on network security devices to see what is happening, and will trigger information to administrators should a policy be breached.

“That system can also be used to model proposed configuration or network security changes, to see if a change request would impact in any way on a policy,” Macleod explained.

The company claims its product is used by over 300 organisations, and is popular in many large financial services, retail and telco businesses.


Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.