Network Topology Intelligence
As your network grows in size and complexity, it's no simple
task to maintain a clear picture of all of its devices and zones.
When faced with a network access request from a user, or a change
request from IT, it can take time to understand which firewalls and
network components are involved.
Saving Time, Increasing Accuracy
SecureTrack™'s Network Topology Intelligence automatically
analyzes routing tables and detects all of the devices and zones on
the network. It delivers comprehensive visibility into access paths
between any source and destination, and automatically creates a
graphical network layout map that gives security teams the
visibility required to rapidly understand and manage configuration
SecureTrack supports large maps with an unlimited number of
interconnected firewalls, devices and zones, and continuously
updates the topology in response to network changes. To increase
the scope and accuracy of the topology map, you can add routers
that are not actively managed by SecureTrack. To keep the map
manageable and readable, SecureTrack displays subnets in groups,
and enables you to view the routing table for each device with a
You can export topology maps in PDF, PNG and Visio formats to
facilitate communication and collaboration, and for use in network
Network Topology Intelligence technology is an integral part of
many Tufin Security Suite features including:
Policy Analysis Queries: Network topology intelligence
automatically identifies the path, security rules and ACLs between
any source and destination. Use this tool to diagnose network
connectivity, plan changes and prepare for audits.
Security Risk Report and PCI DSS Audit Report: Network
topology intelligence detects risky and non-compliant connections
that break your security zone architecture (internal, DMZ, external
and custom-defined zones).
Access Requests: Network topology intelligence automatically
determines the firewalls and routers that must be configured in
order to implement the request.
- SecureChange Designer
and Verifier: Network topology intelligence suggests changes to
rule bases and ACLs and automatically verifies correct
implementation of access requests.
Connectivity Monitoring: SecureApp uses network topology
intelligence along with other technologies in order to determine an
application's connectivity status.