AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Posts by Avigdor Book

Tufin Blog: PCI Firewall Review Checklist: Pro Tips and Common Pitfalls
Firewall Best Practices

PCI Firewall Review Checklist: Pro Tips and Common Pitfalls

Tufin Blog: CIS Firewall Hardening: Best Practices and Guidelines
Cybersecurity

CIS Firewall Hardening: Best Practices and Guidelines

Tufin Blog: Firewall Maintenance Checklist: Ensure Continuous Network Security
Firewall Best Practices

Firewall Maintenance Checklist: Ensure Continuous Network Security

Tufin Resources
Cybersecurity

Tufin Orchestration Suite R24-2: Unmatched Automation, Extended Coverage, and Enhanced Compliance

Thufin Blog: Safeguarding Against Air Gap Attacks: Tufin's Approach to Network Security
Cybersecurity

Safeguarding Against Air Gap Attacks: Tufin’s Approach to Network Security

The Importance of PCI Firewall Review in Network Security
Cybersecurity

The Importance of PCI Firewall Review in Network Security

Network Security Automation

The Importance of Streamlining Network Operations Management through a Single Pane of Glass

Cybersecurity

Enhancing Network Security with Tufin: The Role of Air Gapped Backups

Cybersecurity

Firewall Monitoring Best Practices: One Part of Robust Network Security

Firewall Best Practices

AWS vs Palo Alto: Either Way Tufin Integrates

Cybersecurity

Optimizing and Simplifying the Firewall Request Process with Tufin

Network Security Automation

How to Streamline the Change Management Process with Tufin

Tufin Resources
Tech Partners

Tufin’s Integration with Cisco Meraki: Simplifying and Securing Software-Defined Networking

Cybersecurity

ISO 27001 Firewall Security Audit Checklist: Essential for Robust Network Security

Cybersecurity

WAF Checklist: Proactively ManageYour Web Application Security

Cybersecurity

Top Firewall Vulnerabilities for Securing Your Network

Cybersecurity

Tufin: Extending Network Security to the Cloud from a Single Platform

Cybersecurity

Firewall Resilience: Your First Line of Defense in Cybersecurity