28.09.2012 Views

Tufin SecureTrack

Tufin SecureTrack

Tufin SecureTrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

untracked or unlogged), permissive rules (that allow traffic from too many IP addresses),<br />

network object name patterns, firewall OS settings, and more.<br />

Scalable, Distributed Deployment Architecture and<br />

Multi-Tenancy<br />

At large organizations, firewalls and related security infrastructure are frequently distributed at<br />

multiple sites, even in different countries. Slow network connections can frustrate attempts to<br />

analyze data from a central location and maintain consistency throughout the organization.<br />

Similarly, at large datacenters, network devices are often distributed on multiple management<br />

servers to increase performance. Yet it is still important to manage the security posture<br />

centrally.<br />

<strong>Tufin</strong> <strong>SecureTrack</strong> features a robust distributed architecture that uses T-Series appliances to<br />

collect data from each site. Suitable for wide area networks, the collectors forward data to a<br />

central database for administration. <strong>SecureTrack</strong> is designed to overcome connection<br />

downtime between components and ensure a continuous, centralized management<br />

environment.<br />

If you need to maintain integrity between sites or business units, <strong>SecureTrack</strong> provides full<br />

segregation of data along with flexible, role-based administrator definitions that provide<br />

access control for each management domain. At the same time, it gives you the ability to<br />

leverage Policy Analysis Queries and reports that you have designed for multiple tenants.<br />

For all mission critical data centers, <strong>Tufin</strong> offers high availability, database compression, highperformance<br />

appliances and disaster recovery.<br />

Firewall Operations, Auditing and Compliance: The<br />

Automated Solution<br />

As network security infrastructure grows more distributed and diverse, operations teams must<br />

have central management solutions to ensure network security and Continuous Compliance,<br />

while keeping costs under control. <strong>Tufin</strong> <strong>SecureTrack</strong> enables you to monitor, track and<br />

report changes for all Cisco firewalls, routers and switches in the organization. It creates a<br />

complete audit trail with full personal accountability for every change, along with configurable<br />

audit reports that support a wide variety of standards and regulations. With in-depth analysis<br />

tools, it gives you the power to proactively assess risks, replace permissive rules, and<br />

optimize the performance of your firewalls. <strong>SecureTrack</strong> is an essential solution for any<br />

organization that cannot afford to compromise on security and efficiency.<br />

<strong>Tufin</strong> is a member of the Cisco Developer Network and <strong>Tufin</strong> Security Suite has successfully<br />

completed interoperability testing with Cisco Security Manager 4.3.<br />

According to an analysis performed by Frost & Sullivan, organizations can slash the time<br />

required to make configuration changes, and to perform security audits, by as much as 75%<br />

(see Security Lifecycle Management ROI). <strong>Tufin</strong> customers report that on average,<br />

<strong>SecureTrack</strong> cuts the cost of daily operations tasks in up to a half, so that they can focus on<br />

the strategic part of their jobs instead of on routine, manual work.<br />

<strong>SecureTrack</strong> features all of the tools that operations teams need to ensure network security<br />

every day:<br />

� Change tracking and analysis: Monitors firewall changes, reports them in real-time and<br />

maintains a comprehensive, accurate audit trail for full accountability.<br />

� Security infrastructure optimization: Analysis and clean-up of complex ACLs and<br />

objects to eliminate potential security breaches and improve performance.<br />

Firewall Operations for Cisco 10/11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!