AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Network Security and Cloud Security Blog

Cloud Security

CISA Makes Cloud Security Recommendations. How Tufin can Help

topology
Tech Partners

Increase Network and Security Teams’ Efficiency via Infrastructure Visibility and Policy Automation for Fortinet

Cybersecurity

Could the “Ex-Factor” Limit the Blast Radius and Reduce the Impact of the SolarWinds Breach?

Tech Partners

Increase Security Policy Accuracy With IPAM Integration

Cybersecurity

Internet Egress Filtering to Prevent Server Firewall Breaches

Cybersecurity

IPAM Security Policy App: Gain Consistent Security Policy Management; and Vulnerability Mitigation App Enhancements

Firewall Best Practices

To Have or Not to Have: Firewall Policies as Part of Your Security Strategy

Cybersecurity

What’s Inside Tufin R20-2: Enhanced NGFW Support, Azure Visibility, and Doubled Risk Analysis

Firewall Best Practices

Manage Palo Alto Networks NGFW Policies with App-ID, Content-ID, User-ID (and more!) with Tufin

Events

Tufinnovate Americas 2020: part II

Events

Tufinnovate Americas 2020: The New Normal

Cybersecurity

Lessons Learned and Best Practices for Remote Workforce Network Security

Cybersecurity

How to Accelerate and Automate Incident Response (IR) Based on Real-Time Network Visibility and Policy Intelligence

Cybersecurity

Tufin Adds Network Insights and Business Context to Vulnerability Scans to Prioritize Remediation and Mitigation Efforts

Cybersecurity

NEW Tufin Marketplace: Extend Your Network Security Benefits With Innovative Integrations From Tufin and its Partners

Regulations and Compliance

Six Capabilities Required to Meet ECB Network Security Audit Requirements and Achieve Least Privilege Segmentation

Network Security Automation

Announcing Tufin Orchestration Suite R20-1

Network Security Automation

Network Security Automation to Manage Access Request Spikes and IT Skills Shortages