Cisco ASA, FirePOWER, ACI, Public Cloud and Kubernetes: End-to-End Policy Management

Cisco® is one of the longtime leaders in enterprise networking and one of the most trusted names in IT. Many of today’s largest, most sophisticated datacenters are built with its market-leading solutions, which include firewalls, switches, routers, Application Centric Infrastructure (ACI™) SDN platform, and other innovative Nextgen technologies such as Viptella® and Tetration Analytics™.
Read More

Network Segmentation in the Cloud: Mission Impossible?

Who wouldn’t want to segment in the cloud? Network segmentation is a proven security strategy that lets you set strict rules for which services are permitted between accessible zones. Designating sensitive data and resources within zones ensures only designated hosts and users belonging to other approved zones can reach them.
Read More

Tufin Extends Automation Leadership in Support of Digital Transformation Initiatives with An End to Manual Cloning of Server Policies

A recent report found that eight out of ten IT decision makers believe digital transformation increases cyber risk. Policy-based automation increases security and reduces the efforts invested in migrating existing applications and deploying new services. Tufin Orchestration Suite R19-1 delivers a unique automated process for server policy cloning, and also enables the enforcement of a unified security policy across unassociated IPs in the private network.
Read More

Why Network Complexity Kills Security

The increasing complexity of networks is a growing concern for most enterprises. Networks have been built with a number of diverse network technologies, often starting with switches, routers, servers, and firewalls, all likely procured from different vendors at different times.
Read More

7 Reasons to Adopt a Policy-Centric Approach to Security and IT Operations

A unified, comprehensive security policy provides the foundational control for the hybrid network to bring automation and analytics to security and network operations that is severely lacking today. Organizations are adopting this approach as a strategic initiative to create a more informed, secure and efficient way to orchestrate security-related changes across enterprise networks. Here are seven reasons to adopt a policy-centric approach to security and IT operations.
Read More