top of page

How to balance business security & agility with Security Policy Automation



As businesses across the world undergo rapid digital transformation, business agility has been emerging as a primary concern for those who wish to stay ahead of the competition. However, many enterprises, regardless of size and scale often struggle with balancing agility and cybersecurity. Time to market and responsiveness are critical factors in order to meet revenue goals and remain competitive, and in order to achieve the kind of business agility that digital environments mandate, there is a strong need to revolutionize the way existing IT and digital controls work.

This was the core topic of discussion in the recent webinar hosted by Cyber Management Alliance with Tufin, the US-based Security Policy Management company. Watch the full webinar entitled, “How to Break Automatic Policy Enforcement in Network Security,” here.

Panelists in the webinar:

Amar Singh, CEO and Co-founder, Cyber Management Alliance

Hadas Lahav: Director of Product Management at Tufin for Automation Products

Sagi Bar-Zvi, Global Strategic Pre-Sales Director, Tufin

Core topics covered in the webinar:

What does security automation include?

Tufin Secure Change: Policy-based automation technologies

The 4 pillars of Secure Change: Agility, Efficiency, Security and Compliance

Two interesting use cases to illustrate how automation in security policy boosts efficiency and security

Tufin Value

Hadas Lahav opened the discussion in the webinar by reiterating that digital transformation is all about business agility. Thanks to this digital transformation, there’s growing systems network complexity because of firewalls from vendors, routers, switches, public and private cloud & other new technology. Many organisations have multi-cloud environments. As a result of these large and fragmented networks, enterprises have managed to create a huge attack surface for themselves. Despite spending millions, most businesses lack a unified security policy and without such a policy, there are often many challenges with respect to complex IT environments and security operations.

What are the critical security policy challenges today?

Businesses are launching new applications at a rapid pace. These applications must be connected through an increasingly complex and fragmented network and every new application connection opens an avenue for hackers to exploit the enterprise and its critical infrastructure.

Network engineers are struggling to keep up. They need to do a lot of analysis regarding which applications to allow and which to leave out. They must also conduct multiple rounds of reviews.

Implementing application connections manually can take days or even weeks and can result in errors and actually lead to introduction of new security risks.

Manual processes cannot address today’s challenges of information security and network operations. In order to become agile, competitive and secure all at once, manual approaches are just not enough anymore.

What is the solution to these challenges?

The solution to all these challenges is security automation and orchestration. This is a more informed, efficient and mature way to orchestrate security-related changes across enterprise networks.

Tufin offers a security policy management platform that brings automation and analytics to the security and network operations team. Zero-touch automation enables a policy-centric approach for the security policy and allows businesses to implement network changes in minutes and meet business requirements very fast.

What does Tufin’s Secure Change offer?

Sagi Bar-Zvi then took over to explain the salient features of policy-based automation that Tufin’s Secure Change enables:

Gives a massive boost to organisational efficiency and agility because one no longer has to spend several days on manual processes.

Businesses are able to significantly amplify security with better controls built into the automation process.

They’re also able to ensure better compliance as they adhere to an auditable and fully documented process.

Capabilities of Secure Change and how to maximize their use:

The discussion on the webinar then deep dives into the capabilities of Secure Change and how enterprises can maximize their use. Some of the capabilities that are discussed in detailed (13:00 minutes onwards) are:

1.Enhanced agility through rich and flexible tools.

2.Increased efficiency and reduced costs.

3.Tightened network security posture against security breaches and cyber threats.

4.Continuous Compliance.

Use Cases to illustrate what Secure Change can bring to the table

The webinar elucidates the ease and efficiency that Tufin Secure Change can bring to businesses with the two real-world use cases given below:

#1 To open a ticket using an external ticketing tool

What usually happens in this case is that users may request network changes through the organisation’s ticketing system. The challenge arises when firewall admins have to work with several different tools to implement requests and the information required for change implementation is not always complete. This process is time-consuming and could lead to errors.

The solution for this use case is simply to integrate with a ticketing tool to enable an end-to-end automatic process.

#2 Fully Automated Network Access Request Users, many of whom have limited or no network knowledge, often request access to multiple network locations.