Articles
Categories

Microsegmentation with Tufin: How to Ensure Zero Trust in a Modern Network
Modern networks are becoming increasingly complex and vulnerable. Traditional perimeter-based network security approaches no longer provide adequate protection. Once inside the network, attackers gain access to many resources. Critical data...
14/10/2025Articles, Tufin
Zero Trust Architecture from Tufin: A Comprehensive Approach to Network Security
In today’s digital environment, where network boundaries are blurred and threats are becoming increasingly sophisticated (e.g., Lateral Movement, supply chain attacks), traditional security models based on the “trust but verify”...
12/10/2025Articles, Tufin
Network Vulnerability Analysis with Tufin: A Comprehensive Approach to Security
In today’s dynamic digital landscape, protecting network infrastructure from threats is a top priority for any organization. Companies face a continuous stream of new vulnerabilities, increasingly complex configurations, and growing...
10/10/2025Articles, Tufin
Risk and Vulnerability Management in Network Security with Tufin
Modern organizations face the need to manage complex and dynamic network infrastructures, especially in hybrid cloud environments. Managing firewall rules scattered across various platforms is becoming an increasingly complex task,...
08/10/2025Articles, Tufin
Secure Application Access with Tufin: A Deep Dive into Management and Security
Modern organizations face increasing complexity in managing application security. Threats are becoming more sophisticated, and infrastructure is becoming more distributed, encompassing cloud and hybrid environments. Ensuring secure access to applications...
06/10/2025Articles, Tufin
Application Connectivity Management with Tufin: A Comprehensive Guide for Technical Specialists
In the modern digital landscape, where network infrastructure is becoming increasingly complex and the number of applications is growing exponentially, ensuring effective security management and control of application connections presents...
04/10/2025Articles, Tufin
Automating Security Policy Management with Tufin: A Comprehensive Guide for Technical Specialists
In today’s dynamic world, where network infrastructure is becoming increasingly complex and distributed, manual security policy management is not only laborious but also risky. For example, manually configuring a rule...
02/10/2025Articles, Tufin
Security Policy Orchestration with Tufin: A Deep Dive
In today’s digital landscape, where cyber threats are becoming increasingly sophisticated and network infrastructures are becoming more complex, effective security policy management is becoming a critical task. Traditional methods, based...
30/09/2025Articles, Tufin
Compliance with Security Standards with Tufin: Automation and Centralized Management
In today’s rapidly evolving digital landscape, where cyber threats are becoming increasingly sophisticated and regulatory requirements are becoming ever more stringent, ensuring regulatory compliance is a significant challenge for organizations....
28/09/2025Articles, Tufin
Exabeam: Artificial Intelligence Amplifies Insider Threats
Exabeam, a global leader in intelligent analytics and automation for security operations, has published the results of its new international report From Human to Hybrid: How AI and the Analytics...
26/09/2025Articles, Exabeam, News, SIEM
Compliance Audit with Tufin: A Comprehensive Guide for Technical Specialists
In today’s world, where network security and compliance are becoming increasingly critical (for instance, the rising number of data breaches and fines for GDPR non-compliance, as shown in the Verizon...
26/09/2025Articles, Tufin
Compliance with Tufin: A Comprehensive Approach to Network Security
In today’s dynamic digital environment, ensuring regulatory compliance is not merely a formality but a critical aspect of maintaining an organization’s security and reputation. The risk of non-compliance can lead...
24/09/2025Articles, Tufin