Tufin

Last updated
Tufin
Company type Private
IndustryNetwork Security
Founded2005;19 years ago (2005)
Founders
  • Ruvi Kitov
  • Reuven Harrison
Headquarters Boston, MA
ProductsTufin Orchestration Suite: SecureTrack, SecureChange, SecureApp, SecureCloud, Tufin Cloud
Owner
  • Turn/River Capital
  • (2022–present)
Number of employees
533 (in 2020)
Website www.tufin.com

Tufin is a security policy management company founded in 2005 that specializes in the automation of security policy changes across hybrid platforms and security and compliance. [1] The Tufin Orchestration Suite supports next-generation firewalls, network layer firewalls, routers, network switches, load balancers, web proxies, private and public cloud platforms and micro-services.

Contents

On August 25, 2022, Turn/River Capital completed the acquisition of Tufin. [2]

History

Until its initial public offering in 2019, Tufin was privately funded. [3]

On April 6, 2022, Tufin announced that it had entered into a definitive agreement to be acquired by software-focused investment firm Turn/River Capital. The agreement valued the company at $570 million and was an all-cash deal. Since the closing of the transaction, Tufin is a private company. [4]

Products

Tufin develops and markets the Tufin Orchestration Suite [5] which consists of:

The company releases updates to Tufin Orchestration Suite each quarter. [10]

The Suite is designed for large enterprises, along with managed security service providers (MSSP) and IT security auditors. [11] Tufin products help security teams implement and maintain their security policy on all of their firewalls, routers and network switches. [12] They accelerate service delivery through network change automation and expedite the process of compliance audits for security standards such as PCI DSS, NERC and Sarbanes Oxley. [13] Tufin products also help companies to manage and automate the daily configuration changes to network security devices. [14]

Innovation

Tufin's innovation includes several technologies, such as the Automatic Policy Generator which refines security rules based on network traffic, [15] methods for automating security policy management [16] and the concept of managing network security policies from an application scope. [17]

Partnerships

Other network security vendors provide operations management, auditing and change automation for Tufin products. Tufin technology partners include Check Point, Cisco, Fortinet, Juniper Networks, McAfee, Palo Alto Networks, [18] Stonesoft, [19] F5 Networks, [20] VMware, Zscaler, Amazon Web Services (AWS), Microsoft Azure, BMC, ServiceNow, Puppet Labs and others. [21]

Related Research Articles

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

<span class="mw-page-title-main">McAfee</span> American global computer security software company

McAfee Corp., formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company headquartered in San Jose, California.

<span class="mw-page-title-main">Trend Micro</span> Japanese multinational cyber security company

Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, and cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.

<span class="mw-page-title-main">Opsware</span> Software company

Opsware, Inc. was a software company based in Sunnyvale, California, that offered products for server and network device provisioning, configuration, and management targeted toward enterprise customers. Opsware had offices in New York City, Redmond, Washington, Cary, North Carolina, and an engineering office in Cluj, Romania.

Microsoft Servers is a discontinued brand that encompasses Microsoft software products for server computers. This includes the Windows Server editions of the Microsoft Windows operating system, as well as products targeted at the wider business market. Microsoft has since replaced this brand with Microsoft Azure, Microsoft 365 and Windows 365.

<span class="mw-page-title-main">F5, Inc.</span> U.S. information technology company

F5, Inc. is an American technology company specializing in application security, multi-cloud management, online fraud prevention, application delivery networking (ADN), application availability & performance, network security, and access & authorization.

Qualys, Inc. is an American technology firm based in Foster City, California, specializing in cloud security, compliance and related services.

<span class="mw-page-title-main">Proofpoint, Inc.</span> American cybersecurity company

Proofpoint, Inc. is an American enterprise cybersecurity company based in Sunnyvale, California that provides software as a service and products for email security, identity threat defense, data loss prevention, electronic discovery, and email archiving.

<span class="mw-page-title-main">Linoma Software</span>

Linoma Software was a developer of secure managed file transfer and IBM i software solutions. The company was acquired by HelpSystems in June 2016. Mid-sized companies, large enterprises and government entities use Linoma's software products to protect sensitive data and comply with data security regulations such as PCI DSS, HIPAA/HITECH, SOX, GLBA and state privacy laws. Linoma's software runs on a variety of platforms including Windows, Linux, UNIX, IBM i, AIX, Solaris, HP-UX and Mac OS X.

Security information and event management (SIEM) is a field within computer security that combines security information management (SIM) and security event management (SEM) to enable real-time analysis of security alerts generated by applications and network hardware. SIEM systems are central to the operation of security operations centers (SOCs), where they are employed to detect, investigate, and respond to security incidents. SIEM technology collects and aggregates data from various systems, allowing organizations to meet compliance requirements while safeguarding against threats.

Stonesoft Corporation was a public company that developed and sold network security solutions based in Helsinki, Finland. It was publicly owned until 2013 when it was acquired by Intel's subsidiary McAfee.

HP Cloud Service Automation is cloud management software from Hewlett Packard Enterprise (HPE) that is used by companies and government agencies to automate the management of cloud-based IT-as-a-service, from order, to provision, and retirement. HP Cloud Service Automation orchestrates the provisioning and deployment of complex IT services such as of databases, middleware, and packaged applications. The software speeds deployment of application-based services across hybrid cloud delivery platforms and traditional IT environments.

Host Based Security System (HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer Network Defense Solutions Steering Group (ESSG) sponsored the acquisition of the HBSS System for use within the DOD Enterprise Network. HBSS is deployed on both the Non-Classified Internet Protocol Routed Network (NIPRNet) and Secret Internet Protocol Routed Network (SIPRNet) networks, with priority given to installing it on the NIPRNet. HBSS is based on McAfee, Inc's ePolicy Orchestrator (ePO) and other McAfee point product security applications such as Host Intrusion Prevention System (HIPS).

HP Business Service Automation was a collection of software products for data center automation from the HP Software Division of Hewlett-Packard Company. The products could help Information Technology departments create a common, enterprise-wide view of each business service; enable the automation of change and compliance across all devices that make up a business service; connect IT processes and coordinate teams via common workflows; and integrate with monitoring and ticketing tools to form a complete, integrated business service management solution. HP now provides many of these capabilities as part of HP Business Service Management software and solutions.

HP Network Management Center (NMC) is a suite of integrated HP software used by network managers in information technology departments. The suite allows network operators to see, catalog and monitor the routers, switches, and other devices on their network. IT staff is alerted when a network device fails, and it predicts when a network node or connection point may go down. The suite was designed to address operational efficiency.

HP CloudSystem is a cloud infrastructure from Hewlett Packard Enterprise (HPE) that combines storage, servers, networking and software.

<span class="mw-page-title-main">Netwrix</span>

Netwrix is a Frisco, Texas-based private IT security software company that develops software to help companies identify and secure sensitive data and assist with compliance auditing. After eight acquisitions the company's team geographically expanded to Latin America, UK, Germany, France, Asia, USA as well as other countries. The company's flagship products are Netwrix Auditor and StealthAUDIT that help information security and governance professionals manage sensitive, regulated and business-critical data.

<span class="mw-page-title-main">Dell Software</span> Former software division of Dell, Inc.

Dell Software was a former division of Dell with headquarters in Round Rock, Texas, United States. Dell Software was created by merging various acquisitions by Dell Inc., the third-largest maker of PCs and now a privately held company, to build out its software offerings for data center and cloud management, information management, mobile workforce management, security and data protection for organizations of all sizes.

Cloud management is the management of cloud computing products and services.

<span class="mw-page-title-main">MaaS 360</span> Unified endpoint management software

IBM MaaS360 is a SaaS Unified Endpoint Management (UEM) solution offered by IBM that manages and protects any existing endpoint including laptops, desktops, mobile devices and apps, wearables, IoT and purpose built devices and allow protected, low risk access to company resources. IBM Security MaaS360 with Watson integrates with current security platforms owned by different companies. It’s AI powered analytics removes friction by reducing actions required from the device user.

References

  1. "The Security Policy Company". Tufin. Retrieved 2024-10-03.
  2. "Turn/River Capital Completes Acquisition of Tufin". GlobeNewswire. Retrieved 2022-12-28.
  3. "Company Overview of Tufin Ltd". Boston Business Journal. 2017.
  4. "Tufin Enters Into Definitive Agreement to be Acquired by Turn/River Capital in a $570 million Transaction" (Press release). 2022-04-06. Retrieved 2022-04-07.
  5. "Tufin Technologies Security Suite". SC Magazine. 2011. Archived from the original on 3 March 2014.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  6. "Tufin Technologies Wins Customers Hearts and Minds". Vigilance. 2011. Archived from the original on 11 May 2011. Retrieved 28 June 2011.
  7. "Products of the Week". Network World. 2011. Archived from the original on 11 May 2011. Retrieved 2 July 2011.
  8. "Tufin's SecureApp Completes Trifecta Of Security Policy Management". Network World. 2012. Retrieved 28 Sep 2012.
  9. "Tufin SecureCloud: Providing unified security policy management for the hybrid cloud". Help Net Security. 2020. Retrieved 13 Feb 2020.
  10. "New products of the week 5.22.17". Network World. 2017. Archived from the original on 2017-09-18. Retrieved 2017-09-18.
  11. "IBM MSD Standardizes on Tufin SecureTrack". Info Security Products Guide. 2011. Archived from the original on 19 June 2011. Retrieved 10 June 2011.
  12. "Security's Risk And Change Management Tools: Drawing A Picture Of Security Posture". Dark Reading. 2010. Retrieved 9 December 2017.
  13. "How to Conduct a Security Audit". Security Matters. 2010. Archived from the original on 20 March 2012.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  14. "Firewall Audit Tools: Features and Functions". CSO Data Protection. 2010. Retrieved 20 May 2010.
  15. "Tufin tool automates firewall switch-on". 2009. Archived from the original on 2014-02-23. Retrieved 2013-03-23.
  16. "Tufin Talks 'Magic' in Network Security Abstraction". 2013. Archived from the original on 2017-12-10. Retrieved 2017-12-10.
  17. "Firewalls get simpler admin with Tufin SecureApp tool". 2012. Archived from the original on 2014-02-22. Retrieved 2013-03-23.
  18. "Palo Alto Networks and Tufin Partnership". 2011. Archived from the original on 2019-04-16. Retrieved 2014-01-25.
  19. "Stonesoft and Tufin Deliver Integrated Security Management Capabilities". 2013.
  20. "F5 and Tufin SecureTrack Partnership Overview" (PDF). 2013. Archived from the original (PDF) on 2015-01-22. Retrieved 2014-01-25.
  21. "Tufin Technologies Revamps Partner Program". Channel Insider. 2008. Archived from the original on 21 June 2020. Retrieved 29 September 2008.