AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Network Security and Cloud Security Blog

Uncategorized

2024 Vulnerability and Threats Trends Report Highlights the Escalating Battle Security Teams Face

Tufin Resources
Networking Trends

Reflections on Recent Executive Advisory Boards and User Group Events: A Journey of Collaboration and Innovation

Uncategorized

The Timeline of Cybersecurity: Why Organizations Need to Find Better Ways to Mitigate Risk

Tech Partners

Unlocking your Hybrid-Network with Tufin’s Open Policy Model

Tufin Blog: Enhancing AWS Route Tables for High Availability and Disaster Recovery
Cybersecurity

Enhancing AWS Route Tables for High Availability and Disaster Recovery

Tufin Blog: Removing Firewall Audit Pain to Reach the Unreachable Network Performance Star
Firewall Best Practices

Removing Firewall Audit Pain to Reach the Unreachable Network Performance Star

Tufin Blog: It’s *Not* Complicated: Making Security Policy Management Simple
Cybersecurity

It’s *Not* Complicated: Making Security Policy Management Simple

Tufin Resources
Firewall Best Practices

Choose Your Own Network Adventure: SecureTrack+, SecureChange+, or Enterprise?

Tufin Blog: NIS2 Security Regulations Went Into Effect October 17: What You Need to Know
Cybersecurity

NIS2 Security Regulations Went Into Effect October 17: What You Need to Know

Tufin Blog: Cybersecurity Awareness Month 2024: Three Elements to Incorporate When Securing Your World
Cybersecurity

Cybersecurity Awareness Month 2024: Three Elements to Incorporate When Securing Your World

Tufin Blog: Next-Generation Firewall Review: Enhancing Network Security
Cybersecurity

Next-Generation Firewall Review: Enhancing Network Security

Tufin Blog: North-South or East-West? How to Best Filter Your Firewall Traffic
Cybersecurity

North-South or East-West? How to Best Filter Your Firewall Traffic

Tufin Blog: Web Application Firewall Best Practices
Cybersecurity

Web Application Firewall Best Practices

Tufin Blog: A Firewall Is Born: Your Firewall Deployment Checklist
Firewall Best Practices

A Firewall Is Born: Your Firewall Deployment Checklist

Tufin Blog: Cloud vs On-Premises: Here’s What You Need to Know
Cloud Security

Cloud vs On-Premises: Here’s What You Need to Know

Tufin Blog: Understanding Open Source Firewalls
Cybersecurity

Understanding Open Source Firewalls

Tufin Blog: FortiGate Firewall Audit for Enhanced Cybersecurity
Cybersecurity

FortiGate Firewall Audit for Enhanced Cybersecurity

Tufin Blog: PCI Firewall Review Checklist: Pro Tips and Common Pitfalls
Firewall Best Practices

PCI Firewall Review Checklist: Pro Tips and Common Pitfalls