Logo

Tufin is trusted by +2900 of the world’s leading companies

BlueCross BlueShield Bloomberg United Airlines Verizon IBM

Better Visibility with the Best Dynamic Topology Modeling

Tufin provides the most accurate topology and path analysis, powering enterprise-wide network awareness across on-premises networks and hybrid cloud environments. Tufin’s unmatched visibility is why so many organizations rely on us to improve their cybersecurity posture via real-time risk alerting, automated target selection and network security control optimization recommendations. Firemon lacks the topology modeling functionality necessary to power comprehensive security policy automation from ground to cloud.

Features Comparison

G2 Marketing Solutions

 

Tufin

Firemon

Accurate topology modeling for VMware NSX-T and Cisco ACI

 

 

Accurate topology modeling for public cloud environments, including AWS, Azure and Google Cloud Platform

 

 

OOTB topology support for NAT, VPN, MPLS, BGP and more

 

 

Network topology expansion via the UI with generic capabilities, such as interface, route, VPN, L2 FW and more

 

 

Network connectivity troubleshooting via an interactive topology map using NGFW features, such as UserID, AppID, and more

 

 

Ability to generate security policy based on existing connectivity

 

 

Risk analysis against internal policies and industry regulations with OOTB regulation templates

 

 

Risk analysis takes into account vulnerability scans and other third-party security intel to operationalize cybersecurity fundamentals that are difficult to master via manual processes

 

 

Continuous monitoring for violations and real-time alerting

 

 

Centralized, holistic security policy management and change tracking

 

 

Superior Automation from Network Change Request to Provisioning

Tufin delivers superior firewall management and cloud connectivity management, and it easily integrates with ITSMs and any other 3rd-party system to automate and orchestrate network access configuration changes, rule cleanup, server decommissioning, and more. Every action is logged for comprehensive, automated change management. Firemon cannot match Tufin’s automation functionality.

Features Comparison

G2 Marketing Solutions

 

Tufin

Firemon

Fully customizable, end-to-end network access change workflow with the ability to easily add/remove steps to align with the organizational process

 

 

Possible to establish zero-touch automation from request to provisioning

 

 

Construct a global security policy based on App IDs

 

 

Change automation support for VMware NSX-T and Cisco ACI

 

 

Design, provisioning, and ongoing management of network security device rules

 

 

Policy design based on existing network traffic and least-privilege principles

 

 

Manage the entire rule lifecycle with rule recertification and cleanup workflows

 

 

Risk analysis incorporating security intelligence, internal policies and regulations

 

 

NGFW support (e.g. Palo Alto Networks Panorama and Fortinet Fortigate integration)

 

 

Automate policy changes for user access based on LDAP groups

 

 

Vulnerability mitigation and vulnerability-based change automation

 

 

Access decommissioning

 

 

Auto zone updating via IPAM integration

 

 

Rule and group modification

 

 

Server policy cloning

 

 

Server decommissioning

 

 

Swisscom logo
Tufin provided us with an overall state of our firewalls that enables us to operate in a much more agile, proactive and strategic manner.
Michel Muller,
Head of IT and Cloud Innovation, Swisscom

Performance at Scale with Unmatched Extensibility

No cracking under complexity. Tufin’s security policy management solution supports 1000s of firewalls, network devices, and public cloud resources — and up to 100 million routes.

Features Comparison

G2 Marketing Solutions

 

Tufin

Firemon

A single topology view for thousands of devices; no grouping requirements or small number limits

 

 

Automatic population of zones from IPAM solution

 

 

Can manage thousands of devices and cloud resources and 100M+ routes with little or no performance degradation

 

 

Tufin enables API integration with the more solutions than Firemon, AlgoSec or Skybox across the network operations, network security, cloud security and incident response ecosystems.

 

 

Code free integration – easy, GUI-driven integration with third-party products

 

 

OOTB integrations with vulnerability scanners, IPAM, ITSM, SIEM, SOAR, and more

 

 

Enrich SOAR playbook and SIEM analysis with network intelligence

 

 

FAQs

What is network security policy management (NSPM)?

According to Gartner, “Network security policy management tools can help security and risk management leaders meet multiple use cases by offering centralized visibility and control of security policies across hybrid networks, risk analysis, real-time compliance and application mapping.”

NSPMs provide a central management layer across multi-vendor on-premises networks and hybrid cloud environments from which to design network security policies and segmentation strategies, deploy those security policies across devices, monitor for violations and track policy changes.

Tufin is the leading NSPM due to its dynamic network and cloud topology modeling, advanced automation workflows, scalability and extensibility.

What is firewall management?

Firewall management is the process of ensuring firewall rulesets, that determine who can talk to whom and what can talk to what, are in compliance with an organization’s internal security policies and industry regulations. Firewall teams are to review these rules periodically and confirm that they should remain active. Shadowed and unused firewall rules should also be removed to minimize the risk of unauthorized access and to maintain network performance. Changes to firewall rules need to be carried out to establish network access as needed and every firewall change must be logged. Ineffective firewall change management exposes organizations to greater cybersecurity risk. Finally firewall teams must demonstrate compliance by conducting regular firewall audits. Firewall management is often a fragmented and manual task because many organizations are using firewalls from a multiple vendors with no vendor-agnostic, centralized management plane. For example, many organizations have considerable firewall rule cleanup and recertification backlog due to the manual nature of these tasks without a centralized NSPM in place.

How can Tufin’s network and cloud topology intelligence help me?

Topology Intelligence lets you use the routing information in your devices to make better network security decisions. Tufin software collects the interface information and routing tables with the policy revisions. It updates the network topologyonce a day, so as your network evolves, the topology model does as well. This can include syncing your subnet changes.

The network topology intelligence powers the following:

Interactive Map: This is a dynamic map of your monitored network devices and the subnets to which they are connected. You can enter the details of a network traffic flow to see the path of traffic on the map.

Security Risk Report: This illuminates the network security policies with violations. The report also calculates a security score, and tracks network security trends. You can run the Security Risk report based on the network segment types from the topology map.

  • You can run the Security Risk report:

    • Manually

    • Automatically on change events so that the report includes new and resolved risks

    • Schedule a report to run periodically

Network access change automation workflow via SecureChange+

  • Target selection for access requests

  • Calculates the necessary change and shows a picture of the path between the source and destination.

  • Automatically verifies if an Access Request was successfully added

The visibility provided through Tufin’s dynamic topology intelligence enables comprehensive change management and compliance reporting.

What is application connectivity management?

All network applications require connectivity between network resources, and some applications may require multiple types of connectivity to function.

For example, a basic website can require connectivity:

  • From the internet to a web server over HTTP

  • From the web server to a database server over specific ports

If any of these connections is blocked by a firewall, users cannot access the website. The business owner can keep a list of all of the required connectivity, but cannot create a detailed set of instructions for implementing the connectivity in the firewalls. The network and security teams can analyze the locations of each server to decide which firewalls need to have rules to allow the connectivity, but they cannot easily manage all of the firewall rulesets to make sure they are all maintained correctly. An application connectivity management solution allows security policy to be designed, implemented and managed based on application connectivity requirements.

Which firewall brands does Tufin support?

Tufin Orchestration Suite supports all major firewall brands, including Cisco, Juniper, Palo Alto Networks, Check Point, Fortinet, Azure Firewall andmore.

Get the visibility and control you need to secure your enterprise.

Only Tufin provides automation and a unified security policy, from on-prem to cloud, across NetSec and DevOps.

Get a Demo