Logo

Tufin offers three subscription options. The following details the functionality delivered in each solution tier and how subscriptions are priced.

  SecureTrack+ SecureChange+ Enterprise
Compliance, Monitoring and Reporting
Automatic Network Access Builder
Policy Optimization and Cleanup Automation
Rule and Object Cleanup Reporting
Rule and Server Optimization
Vulnerability Prioritization and Mitigation (VMA)
Distributed Architecture
Vulnerability-based Change Automation (VCA)  
Rule Recertification Management  
Access Change Automation  
Interactive Topology Mapping  
Change Deployment    
Application Connectivity Management    
High Availability    
Support* Standard Standard Premium 24/7

*https://www.tufin.com/support

Fully Automated with SecureChange+

Submit approval

Use SecureChange+ or integrate with your ITSM to submit the requests with your ITSM

Business approval
Target Selection

Automatically identifies firewall targets and security groups based on real-time, full path analysis of your network

Risk Analysis

Automatically performs risk assessment against the policy, vulnerability data and other third-party security intelligence to avert policy change violations and prevent access to risky assets

Security Review
Design

SecureChange+ automatically suggests the most efficient set of changes necessary across network devices and security groups to process a request ticket

Verification

The Verifier automatically tests to confirm that your change was implementated

Audit & Report

All changes made are documented and reportable

Access Request Workflow - a unified change process enables collaboration and visibility across teams.

Automate rule lifecycle management.

Tufin orchestrates rule review across owners with an automated recertification process. It identifies expiring or expired rules and maps them to owners, eliminating many of the manual steps normally required.

  • Customize your rule review process.
  • Identify inactive owners for rule reassignment.
  • Orchestrate rule review across owners.
  • Automate rule certification, changes when needed, and decommissioning when appropriate.
  • Maintain a consistent audit trail.

Reduce downtime with network topology intelligence that supports 100M+ routes.

SecureChange+ topology intelligence and dynamic mapping powers many of the capabilities that set Tufin apart from the competition.

  • Highly accurate target selection and visualization of proposed change designs
  • Verification that access was successfully added
  • Path analysis enables investigation of traffic paths for fast troubleshooting
  • Simulating and managing network traffic paths (e.g. managing multi-cloud paths)

Proactive risk assessment incorporates third-party security intelligence.

SecureChange enables continuous compliance with internal policies and industry regulations, such as PCI-DSS, NERC-CIP, and HIPAA.

Proactive risk assessment is part of the network change design process. This vets proposed changes against your security/compliance policies, and it can be customized to cross-reference intelligence from third-party solutions, such as vulnerability management tools, SIEM, SOAR and endpoint threat detection tools.

Extend network security policy orchestration and automation to the cloud.

Only Tufin provides agentless, multi-cloud policy management. Take full advantage of cloud-native infrastructure, maintain enterprise-wide visibility and control, and optimize segmentation across on-prem and cloud.

Integrate security guardrails into the CI/CD process.

Tufin easily integrates into your CI/CD process to serve as the security gatekeeper for your DevOps team, so they don’t need to change how they work. Tufin will alert on access changes that violate segmentation policies and proactively block the changes pre-deployment. This simple step can vastly reduce risk for your organization while trimming workload.

Inject vulnerability awareness into the change design process.

Vulnerability-based Change Automation (VCA) integrates vulnerability awareness into the change design process, by checking for vulnerabilities on source and destination during the change design process.

Try it for free