AI Is Changing Network Security. Tufin Is Leading the Way.

Learn More

Sitemap

Blog

Understanding AWS Route Table: A Practical Guide

Cyber Security Team Roles and Responsibilities

Inbound vs Outbound Firewall Rules: Simplifying Network Security

4 Changes Between PCI DSS 3.2 and PCI DSS 4 You Should Be Aware Of, and How Tufin Can Help You Switch Gears

STIG vs CIS: The Landscape of Security Baselines

WannaCry Ransomware is Trending Again. Here’s What you Need to Know

Demystifying the Azure Route Table

Building an Effective SOC Playbook

A Deep Dive into SOAR Playbooks: Automating Security Operations

Your Comprehensive Firewall Migration Checklist

Demystifying AWS Hub and Spoke Network Topology

How to Secure RDP: Safeguarding Remote Desktop Access in Windows

Your Complete Network Audit Checklist

Network Segmentation vs Segregation: Balancing Security and Accessibility

Navigating Cyber Security Insurance Requirements in 2023: A Comprehensive Guide

Understanding VPC Security Groups: A Comprehensive Guide

Least Privilege vs Need to Know in Cybersecurity

3 Common Challenges and Solutions when Implementing Zero Trust Networking Policies

Maximizing Network Security: Understanding the Internal Segmentation Firewall (ISFW)

Perimeter Security vs Zero Trust: Paving the Way for Cybersecurity Transformation

Cloud Network Segmentation: Mission Impossible?

Understanding Operational Technology (OT) Cyber Security

Scaling Security Policy Management: Tufin’s Unmatched Approach

What’s New in Tufin Orchestration Suite R19-3

Cloud Security Configuration Management: A Comprehensive Guide

Understanding the Application Layer Firewall: The Future of Online Security

Gartner Reports: Network Security Policy Management & Orchestration

An In-depth Look at Firewall Security Standards

Navigating PCI DSS Network Segmentation: A Key to Compliance

Zero Trust vs Least Privilege: The Battle of Cybersecurity Giants

Tufin Orchestration Suite R23-2: Pioneering the Evolution of Network Security in a Borderless World

Inter-VPC vs Intra-VPC – Which One are You Securing?

Essential Security Operations Metrics for Effective Cybersecurity

What is a Packet Filtering Firewall? Unraveling the Basics and Benefits

Zero Trust Metrics – The Metrics That Matter

Unlocking the Benefits of Network Segmentation: A Key to Enhanced Cybersecurity

Understanding the Importance of Cloud Security Controls

Elevating Security Operations: The SOAR Solution

Zero Trust vs Micro-Segmentation: The Modern Network’s Security Playbook

Understanding the Zero Trust Firewall

Active Directory Provisioning: Unveiling the What, How, and Why

7 Reasons to Adopt a Policy-Centric Approach to Security and IT Operations

Enterprise Network Segmentation Strategy & Best Practices

Maximize Your Tufin Investment with Prisma Access Automation

The Role of a SOC Runbook: Streamlining SOC Operations

Unlocking the Power of Azure Network Security Groups

The Lifecycle of a Firewall Rule – Tufin Firewall Expert Tip #9

Network Segmentation vs VLAN: Unlocking Efficient Cybersecurity Strategies

Drawing on All the Facts Makes a BIG Difference in the ROI

What are AWS Security Groups?

Managing Access Request Spikes in Network Traffic: How Tufin Helps Ensure Security & Efficiency

A Deep Dive into Automated Incident Response: Streamlining the Process for Enhanced Cybersecurity

Navigating Firewall Rules: Understanding, Configuring, and Optimizing

Understanding the Role and Value of a DMZ Environment

Top Five Micro-segmentation Strategies for Large, Hybrid Enterprises

Automating Rule Recertification Management

Tufin Orchestration Suite R24-1: Empowering Network Security Across Your Hybrid-Cloud

Steering Towards a Zero Trust Model: A 5-Step Approach