
Tufin launches innovative firewall technology
Offering allows for automated policy generation to minimise downtime

Tufin Technologies, a network security lifecycle management firm, has launched a product which it claims will help firms merge or upgrade new firewalls in a smooth, automated manner, improving security and reducing costs.
The Tufin Automatic Policy Generator (APG) monitors firewall traffic for a set period of time, and then automatically generates a new policy to permit business-critical traffic while minimising the risks to the organisation, the firm said.
Shaul Efraim, Tufin's vice president of products, explained that APG will allow IT teams to introduce firewalls into environments that they would previously have ignored because of the inevitable downtime caused by trying to do so.
The APG can also be deployed on existing firewalls with highly permissive rules that need to be tightened up to comply with regulations, according to Efraim.
"It's a big pain for customers and they are really eager to start using this, " he said. "Security teams have been tasked with placing firewalls on internal network segments, but this is a huge task because it is highly likely to cause downtime."
The new technology, which is available as an add-on to Tufin's existing SecureTrack product, part of Tufin Security Suite 5.0, could also save money by removing the need for costly consultancy work in upgrading or merging new firewalls, said the firm.
Further reading
V3 Latest
TSMC starts high volume production of 7nm chips
Claims to have "the most competitive logic density" in the industry
Dell unveils Precision 5530 2-in-1 mobile workstation with Radeon Pro WX Vega M GL graphics
Dell's high-end mobile workstations upgraded with Intel Coffee Lake CPUs
Europol coordinates close down of 'world's biggest' DDoS-for-hire service
Webstresser admins were also arrested in the UK, Croatia, Canada and Serbia
Almost 90 per cent of UK websites suffer from 'serious' security flaws
Security firm claims that 117,638 sites out of 135,035 analysed contain serious security flaws