Logo

Resources.

Type: Webinars

Link to Automation on the Way to Zero Trust
Webinar

Automation on the Way to Zero Trust

Link to New Tufin Release (R21-2) – Advanced Automation for Network Access Decommissioning and NSX-T Enhancements
hybrid network segmentation
Webinar

New Tufin Release (R21-2) – Advanced Automation for Network Access Decommissioning and NSX-T Enhancements

Link to Employing Vulnerability-based Change Automation
vulnerabilities hero
Webinar

Employing Vulnerability-based Change Automation

Link to Tech Talk: Decommissioning Access And Rule Cleanup
abstract network photo
Webinar

Tech Talk: Decommissioning Access And Rule Cleanup

Link to Automating Zero Trust Principles into Your Network Security Model
hybrid network segmentation
Webinar

Automating Zero Trust Principles into Your Network Security Model

Link to TechTalk: Hybrid Security Policy Automation – Tying Cloud and On-prem Together
SecureCloud blog
Webinar

TechTalk: Hybrid Security Policy Automation – Tying Cloud and On-prem Together

Link to Balancing Transformation and Security without Compromising Agility with Zero Trust
cybersecurity hacker
Webinar

Balancing Transformation and Security without Compromising Agility with Zero Trust

Link to Cisco and Tufin team up to discuss ACI security automation with Ansible & Tufin
firewall automation
Webinar

Cisco and Tufin team up to discuss ACI security automation with Ansible & Tufin

Link to Optimize Secure Network Operations with IPAM and Segmentation
abstract network
Webinar

Optimize Secure Network Operations with IPAM and Segmentation

Link to TechTalk: Utilizing Topology to Troubleshoot Connectivity Across the Enterprise
network topology
Webinar

TechTalk: Utilizing Topology to Troubleshoot Connectivity Across the Enterprise

Link to Accenture and Tufin team up to discuss how to achieve Zero Trust network security
server room 5 hero
Webinar

Accenture and Tufin team up to discuss how to achieve Zero Trust network security

Link to TechTalk: Attaining Least Access and Zero Trust
cybersecurity hacker
Webinar

TechTalk: Attaining Least Access and Zero Trust