Tufin: Maximizing Agility and Security Henry Pea Digital - - PowerPoint PPT Presentation

tufin
SMART_READER_LITE
LIVE PREVIEW

Tufin: Maximizing Agility and Security Henry Pea Digital - - PowerPoint PPT Presentation

Tufin: Maximizing Agility and Security Henry Pea Digital Transformation is all about Business Agility 2 The Tradeoff Balancing Security and Agility 3 The Problem: Manual Processes Speed Cost Risk Compliance 4 The Solution: Security


slide-1
SLIDE 1

Tufin: Maximizing Agility and Security

Henry Pea

slide-2
SLIDE 2 2

Digital Transformation is all about Business Agility

slide-3
SLIDE 3 3

The Tradeoff Balancing Security and Agility

slide-4
SLIDE 4 4

The Problem: Manual Processes

Speed Cost Risk Compliance

slide-5
SLIDE 5 5

The Solution: Security Automation and Orchestration

efficient fast error-free Secured!

+

slide-6
SLIDE 6 6

Visibility

Network Security Policy Management

Agile but Risky Secure but Slow

SECURITY BUSINESS AGILITY

Secure and Agile

Zero-Touch Automation Cleanup & Compliance Application Driven Automation Analysis & Design

slide-7
SLIDE 7 7

SecureChange: Policy-Based Automation

Agility Efficiency Security Compliance

slide-8
SLIDE 8 8

SecureChange: Policy-Based Automation

Agility Efficiency Security Compliance

slide-9
SLIDE 9 9

SecureChange Maximizes Agility with Zero-Touch Automation

  • Automate the change process end-to-end to speed up

implementation

  • Skip security approvals for low risk changes
  • Avoid errors and reduce rate of redos
  • Out of the box integration with leading ticketing

systems and an open API to facilitate integration with custom portals

slide-10
SLIDE 10 10

Automate the Change Process End-to-End

Build an automated workflow process:

  • Auto steps
  • Skip steps
  • Dynamic assignment
slide-11
SLIDE 11 11

Improve SLA and Eliminate Redos

  • Automated design and

implementation

  • Automated verification
slide-12
SLIDE 12 12

OOTB Integration with Leading Ticketing Systems

Open Ticket Update/close Ticket

Available on ServiceNow Marketplace

slide-13
SLIDE 13 13

Maximizing Agility: Proof Points

RWE reduced change implementation from 6-8 days to 6 hours Slovak Telekom reduced the time to implement changes from 1 week to 1 day A leading global hotel chain reduced the SLA for implementing changes from 15 days to 2 days Leading global hotel chain

slide-14
SLIDE 14 14

SecureChange: Policy-Based Automation

Compliance Agility Security Efficiency

slide-15
SLIDE 15 15

SecureChange Increases Efficiency and Helps Reduce Costs

  • Manage changes consistently from a central console
  • Automate manual time-consuming tasks:
  • Change analysis and design
  • Change provisioning and scheduling
  • Firewall admin tasks
  • Automatically identify and close changes that are

already implemented

  • Measure productivity gains with an executive

dashboard

slide-16
SLIDE 16 16

Manage Changes From a Central Console Across Vendors

Save time and resources by managing changes across the hybrid network

slide-17
SLIDE 17 17

Automated Target Selection Based on Accurate Topology

Save time and resources invested in searching for the right target device

slide-18
SLIDE 18 18

Automated Design Aligned with Policy Optimization

  • Save time and resources invested in

planning the change

  • Avoid adding shadowed rules
slide-19
SLIDE 19 19

Schedule Changes Based on Change Windows

Automate the change from request to implementation and adhere to

  • rganizational standards
slide-20
SLIDE 20 20

Automate Firewall Administration Tasks

Build an automated process for:

  • Rule decommissioning
  • Server decommissioning
  • Group modifications
  • Rule recertification
  • Server cloning (coming soon)
slide-21
SLIDE 21 21

Example: Automate Group Modification

Save time and effort on making changes to firewall network object groups with automation

slide-22
SLIDE 22 22

Automatically Close Changes Already Implemented

In some cases:

20% of all changes

slide-23
SLIDE 23 23

Measure productivity gains with an executive dashboard

Easily demonstrate efficiency and service level improvements to management

slide-24
SLIDE 24 24

Increase Efficiency: Proof Points

Time and effort of change submission and staging reduced by 50%-75% = eliminate the need to hire 3 more people Leading Telecom Provider in the US Leading Insurance Company in the US Change Request Processing has gone from 4 hours to 4 minutes

“ ”

  • 75% of requests were already implemented
  • Average time for changes was 10-14 days and was

cut to a few hours

slide-25
SLIDE 25 25

SecureChange: Policy-Based Automation

Efficiency Compliance Agility Security

slide-26
SLIDE 26 26

Tighten Network Security Posture with SecureChange

  • Automated firewall cleanup to tighten security posture
  • Automated, proactive risk analysis to control policy

violations

  • Automated change design, implementation and

verification to eliminate risky misconfigurations

  • Granular control of the process automation level
  • Open APIs to achieve security automation
slide-27
SLIDE 27 27

Automate Firewall Cleanup to Tighten Security: Rules

Automatically decommission redundant rules identified in SecureTrack

slide-28
SLIDE 28 28

Automate Firewall Cleanup to Tighten Security: Servers

Automatically decommission servers to streamline migration and remove redundant access

slide-29
SLIDE 29 29

Automated and Proactive Risk Analysis

Identify potential violations to the unified security policy

slide-30
SLIDE 30 30

Mitigate Risky Changes Before Implementation

Escalate for approval, add an exception, or send back to the requester

slide-31
SLIDE 31 31

Automated Provisioning Reduces Misconfigurations

Automatically provision changes across vendors and platforms to maximize accuracy and security

slide-32
SLIDE 32 32

Granular Control of the Process Automation Level

Complete flexibility to accommodate the right level

  • f control required
slide-33
SLIDE 33 33

Open APIs: Scan for Vulnerabilities

Ticket is created in SecureChange or triggered by ticketing system Results are added to ticket risk analysis Tufin sends destination(s) and source(s) to Vulnerability Scanner and triggers a scan

Check hosts or vulnerabilities as part of SecureChange risk assessment

slide-34
SLIDE 34 34

Open APIs: SIEM Integration

SecureChange

Source, Destination, and Service sent to SIEM SIEM queries correlated vulnerability data to determine risk SecureChange incorporates risk data into the ticket

SecureChange

slide-35
SLIDE 35 35

SecureChange: Policy-Based Automation

Efficiency Security Agility Compliance

slide-36
SLIDE 36 36

Achieve Continuous Compliance with SecureChange Baked-in Policy

  • Auditable change process to align with organizational

guidelines (e.g. separation of duties)

  • Proactive risk analysis to avoid violations
  • Full documentation of ticket history
  • Rule justification and recertification to comply with

internal and regulatory mandates

slide-37
SLIDE 37 37

Proactive Risk Analysis Identifies Compliance Violations

The USP has templates and guidance to help comply with:

  • PCI
  • NERC
  • HIPAA
  • GDPR
  • Best Practices

And more…

slide-38
SLIDE 38 38

Full Audit Trail and Complete History

Complete documentation of all changes

slide-39
SLIDE 39 39

Rule Recertification Process to Enforce Compliance

Automate and streamline recertification

slide-40
SLIDE 40 40

Automated Change Authorization in SecureTrack

Compare change implemented to access requested

slide-41
SLIDE 41 41

Tufin Orchestration Suite

Infrastructure Abstraction Layer RESTful APIs

Firewalls Public Cloud Private Cloud

SecureApp™

Application Connectivity Automation

SecureChange™

Network Change Automation

SecureTrack™

Security & Compliance

IT Service Management Scripting & Automation Other 3rd Party Solutions Networks Enterprise Applications

slide-42
SLIDE 42 42

Security Policy Automation for Cloud and Containers

  • Gain visibility into microservices environments
  • Enforce network policy across microservices and firewalls
  • Integrates with CI/CD to enable DevSecOps
  • Gain app-centric visibility of security risks
  • Define and control cloud-native security policies
  • Identify compliance violations pre-deployment
slide-43
SLIDE 43 43

Managing Your Security Policy – Everywhere

TRADITIONAL NETWORKS PRIVATE CLOUD PUBLIC CLOUD MICROSERVICES

SECURITY POLICY

A continuum from the macro to the micro

slide-44
SLIDE 44 44

Why Tufin?

  • Accurate end-to-end change design and automation
  • Open and customizable
  • Firewall cleanup automation
  • Enterprise readiness
slide-45
SLIDE 45 45

The Security Policy Company

slide-46
SLIDE 46

Thank You

Tufin: Maximizing Agility and Security