AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Cybersecurity

Cybersecurity

Increase Network and Security Team Efficiency With Tufin Orchestration Suite’s Visibility and Automation for Fortinet

cybersecurity hacker
Cybersecurity

Zero Trust Metrics – The Metrics That Matter

Cybersecurity

How Policy Automation Helps Prevent the Success of Advanced Persistent Threats (APTs)

Cybersecurity

Day 2: Tufinnovate Americas 2021

Cybersecurity

Tufinnovate Americas 2021

Cybersecurity

WannaCry Ransomware is Trending Again. Here’s What you Need to Know

cybersecurity hacker
Cybersecurity

Steering Towards a Zero Trust Model: A 5-Step Approach

Tufin Blog: How to Relocate a Server During Server Relocation | Firewall Expert Tip #1
Cybersecurity

How to Relocate a Server During Server Relocation – Firewall Expert Tip #1

Cybersecurity

Could the “Ex-Factor” Limit the Blast Radius and Reduce the Impact of the SolarWinds Breach?

Cybersecurity

Internet Egress Filtering to Prevent Server Firewall Breaches

Cybersecurity

IPAM Security Policy App: Gain Consistent Security Policy Management; and Vulnerability Mitigation App Enhancements

Cybersecurity

What’s Inside Tufin R20-2: Enhanced NGFW Support, Azure Visibility, and Doubled Risk Analysis

Cybersecurity

Lessons Learned and Best Practices for Remote Workforce Network Security

Cybersecurity

How to Accelerate and Automate Incident Response (IR) Based on Real-Time Network Visibility and Policy Intelligence

Cybersecurity

Tufin Adds Network Insights and Business Context to Vulnerability Scans to Prioritize Remediation and Mitigation Efforts

Cybersecurity

NEW Tufin Marketplace: Extend Your Network Security Benefits With Innovative Integrations From Tufin and its Partners

Cybersecurity

Managing Cybersecurity Challenges During COVID-19 – A CISO Perspective

Cybersecurity

Are We More Secure In 2020 Than In 2010? Summarizing a Decade of Cybersecurity