12/19/2016 3:08:30 PM
Tufin extends Check Point R80 security management
Multi-Vendor Network Security,Network Security,Network Security Management
App Developer Magazine

Tufin extends Check Point R80 security management

Richard Harris Richard Harris in Security Monday, December 19, 2016

Tufin, a network security policy orchestration solutions, has announced support for Check Point R80 Security Management, delivering end-to-end change automation and continuous policy compliance for joint customers across hybrid networks. With Tufin, Check Point users who are currently deploying or plan to deploy R80 Security Management can extend the benefits of consolidated security across physical networks, private and public cloud platforms.

"By supporting R80 Security Management, we are taking our relationship with Check Point a step further, offering joint customers a powerful yet seamless way of managing security policies across a multi-vendor network," said Ofer Or, vice president of products, Tufin. "Customers can now have the best of both worlds: consolidated security management of Check Point R80 for reduced complexity and stronger security, combined with application-driven end-to-end change automation from Tufin to boost productivity and accelerate application delivery."

Features include:

- Application-centric management of network connectivity and security policies

- End-to-end change automation for Check Point firewall policies, as well as other network devices and hybrid cloud platforms

- Accelerated implementation with central, automated provisioning of network access changes for Check Point firewalls and for other network devices

- Tightened security controls by enforcing a unified security policy across a multi-vendor network

- Audit readiness and continuous policy compliance across Check Point firewall policies and security policies of other network devices and cloud platforms

- Full visibility of network security policies and connectivity across complex, heterogeneous networks from a single pane of glass, including a vendor-agnostic network topology path analysis


Your name and email will not be public or shared in any way.

Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE

The necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM and Linux on z Systems. 

A new way to manage your development projects

Learn the best ways to organize your app development projects, and keep code straight, clients happy, and breathe a easier through launches.

The Latest Nerd Ranch Guide (3rd Edition) to Android Programming

Write and run code every step of the way, using Android Studio to create apps that integrate with other apps, download and display pictures from the web, play sounds, and more. Each chapter and app has been designed and tested to provide the knowledge and experience you need to get started in Android development.

Starting your own app business?

How to create a profitable, sustainable business developing and marketing mobile apps.