AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Network Security and Cloud Security Blog

Cybersecurity

Internet Egress Filtering to Prevent Server Firewall Breaches

Cybersecurity

IPAM Security Policy App: Gain Consistent Security Policy Management; and Vulnerability Mitigation App Enhancements

Firewall Best Practices

To Have or Not to Have: Firewall Policies as Part of Your Security Strategy

Cybersecurity

What’s Inside Tufin R20-2: Enhanced NGFW Support, Azure Visibility, and Doubled Risk Analysis

Firewall Best Practices

Manage Palo Alto Networks NGFW Policies with App-ID, Content-ID, User-ID (and more!) with Tufin

Events

Tufinnovate Americas 2020: part II

Events

Tufinnovate Americas 2020: The New Normal

Cybersecurity

Lessons Learned and Best Practices for Remote Workforce Network Security

Cybersecurity

How to Accelerate and Automate Incident Response (IR) Based on Real-Time Network Visibility and Policy Intelligence

Cybersecurity

Tufin Adds Network Insights and Business Context to Vulnerability Scans to Prioritize Remediation and Mitigation Efforts

Cybersecurity

NEW Tufin Marketplace: Extend Your Network Security Benefits With Innovative Integrations From Tufin and its Partners

Regulations and Compliance

Six Capabilities Required to Meet ECB Network Security Audit Requirements and Achieve Least Privilege Segmentation

Network Security Automation

Announcing Tufin Orchestration Suite R20-1

Network Security Automation

Network Security Automation to Manage Access Request Spikes and IT Skills Shortages

Firewall Best Practices

Multi-Vendor Firewall Change Tracker for Network Security Admins (and it’s free)

Cybersecurity

Managing Cybersecurity Challenges During COVID-19 – A CISO Perspective

Firewall Best Practices

Vendor and Model-Specific Tips for Optimizing Firewall Performance – Tufin Firewall Expert Tip #4

Network Security Automation

Security Policy Automation – A Requirement for Digital Transformation