12/19/2016 3:08:30 PM
Tufin extends Check Point R80 security management
Multi-Vendor Network Security,Network Security,Network Security Management
https://appdevelopermagazine.com/images/news_images/Tufin-Extends-Check-Point-R80-App-Developer-Magazine_if7mf8ip.jpg
App Developer Magazine

Tufin extends Check Point R80 security management



Richard Harris Richard Harris in Security Monday, December 19, 2016
19,727

Tufin, a network security policy orchestration solutions, has announced support for Check Point R80 Security Management, delivering end-to-end change automation and continuous policy compliance for joint customers across hybrid networks. With Tufin, Check Point users who are currently deploying or plan to deploy R80 Security Management can extend the benefits of consolidated security across physical networks, private and public cloud platforms.

"By supporting R80 Security Management, we are taking our relationship with Check Point a step further, offering joint customers a powerful yet seamless way of managing security policies across a multi-vendor network," said Ofer Or, vice president of products, Tufin. "Customers can now have the best of both worlds: consolidated security management of Check Point R80 for reduced complexity and stronger security, combined with application-driven end-to-end change automation from Tufin to boost productivity and accelerate application delivery."

Features include:


- Application-centric management of network connectivity and security policies

- End-to-end change automation for Check Point firewall policies, as well as other network devices and hybrid cloud platforms

- Accelerated implementation with central, automated provisioning of network access changes for Check Point firewalls and for other network devices

- Tightened security controls by enforcing a unified security policy across a multi-vendor network

- Audit readiness and continuous policy compliance across Check Point firewall policies and security policies of other network devices and cloud platforms

- Full visibility of network security policies and connectivity across complex, heterogeneous networks from a single pane of glass, including a vendor-agnostic network topology path analysis