SecureChange

Tufin SecureChange provides policy-based automation and orchestration, enabling enterprises to implement accurate network changes in minutes instead of days. 

Ottieni una demo

Eliminate network change and rule review backlogs.

Tufin lets your team do more with existing resources by providing flexible workflows and automation that can dramatically reduce your time spent on network changes and rule lifecycle management.

Repeatable, auditable and policy-driven processes also reduce risk for your organization, while making it easier for you to implement and maintain more advanced network segmentation.

Tufin integrates with leading ITSM solutions, allowing for a ticket in your ITSM to trigger a workflow within Tufin.

Workflow Examples:

  • Access/Decommission Request
  • Group Modification
  • Rule Modification
  • Rule Recertification

 

remove-jump-buttons

Fully Automated with SecureChange+

Submit approval

Use SecureChange+ or integrate with your ITSM to submit the requests with your ITSM

Business approval
Target Selection

Automatically identifies firewall targets and security groups based on real-time, full path analysis of your network

Risk Analysis

Automatically performs risk assessment against the policy, vulnerability data and other third-party security intelligence to avert policy change violations and prevent access to risky assets

Security Review
Design

SecureChange+ automatically suggests the most efficient set of changes necessary across network devices and security groups to process a request ticket

Verification

The Verifier automatically tests to confirm that your change was implementated

Audit & Report

All changes made are documented and reportable

Access Request Workflow - a unified change process enables collaboration and visibility across teams.

Unlock end-to-end change automation, including automated change provisioning with Tufin Enterprise.

Automate rule lifecycle management.

Tufin orchestrates rule review across owners with an automated recertification process. It identifies expiring or expired rules and maps them to owners, eliminating many of the manual steps normally required.

  • Customize your rule review process.
  • Identify inactive owners for rule reassignment.
  • Orchestrate rule review across owners.
  • Automate rule certification, changes when needed, and decommissioning when appropriate.
  • Maintain a consistent audit trail.

 

Reduce downtime with network topology intelligence that supports 100M+ routes.

SecureChange+ topology intelligence and dynamic mapping powers many of the capabilities that set Tufin apart from the competition.

  • Highly accurate target selection and visualization of proposed change designs
  • Verification that access was successfully added
  • Path analysis enables investigation of traffic paths for fast troubleshooting
  • Simulating and managing network traffic paths (e.g. managing multi-cloud paths)

 

Proactive risk assessment incorporates third-party security intelligence.

SecureChange enables continuous compliance with internal policies and industry regulations, such as PCI-DSS, NERC-CIP, and HIPAA.

Proactive risk assessment is part of the network change design process. This vets proposed changes against your security/compliance policies, and it can be customized to cross-reference intelligence from third-party solutions, such as vulnerability management tools, SIEM, SOAR and endpoint threat detection tools.

Inject vulnerability awareness into the change design process.

Vulnerability-based Change Automation (VCA) integrates vulnerability awareness into the change design process, by checking for vulnerabilities on source and destination during the change design process.

Gain advanced audit readiness with enterprise-wide change logging.

As with SecureTrack+, SecureChange+ provides real-time compliance monitoring and a variety of customizable audit reports that align with regulatory standards, such as PCI-DSS, NERC-CIP, HIPAA, GDPR and more. However, SecureChange+ enables a more advanced state of audit readiness by providing a comprehensive audit trail for network changes, including full change accountability and audit-ready reports. All related tickets and every change is logged and reportable.

remove-jump-buttons