Tufin Change Request Violation

Do you use this solution to automatically check if a change request will violate any security policy rules? If yes, please explain with examples.

NetworkS6585
Network Security at a transportation company with 10,001+ employees
We use this solution to automatically check if a change request will violate any security policy rules. Similar to what we are doing with Azure, where they request a change, and if it violates policies, it gets kicked back. Then, we have to review it and figure out what they're doing. We can then move forward with it, if it's approved.
View full review »
NetworkS3480
Network Security at a insurance company with 1,001-5,000 employees
We use this solution to automatically check if a change request will violate any security policy rules. For example, if the engineer is making a change that hasn't been authorized, we will know about it.
View full review »
Salvador Teran
Network Security at a tech services company with 5,001-10,000 employees
We use the solution to automatically check if a change request will violate any security policy rules by generating a Sunday email report in these type of situations.
View full review »
John Fulater
Security Engineering at a financial services firm with 10,001+ employees
There's a new feature that validates standards. It allows the checks and balances against it, so it doesn't even go forward. It just says, "You're not right. Do it again."
View full review »
ITSecuri46f3
IT Security Professional at a pharma/biotech company with 10,001+ employees
Our company has a grid, and there are different blocks of public domains and internal domains. It checks all that on our security grid. That has been customized by our administrator.
View full review »
Security4691
Security Engineer at a manufacturing company with 10,001+ employees
We use this solution to automatically check if a change request will violate any security policy rules. Every change request has to go through a security approval step, but we also leverage the Unified Security Policy to automate some of that decision-making.
View full review »
Marko Martin
Technical Team Lead at Paragon
Inside of Tufin, we plan to leverage the USB in solutions.
View full review »
SrAdvisof832
Senior Adviser Cyber Security at a comms service provider with 10,001+ employees
In the future, we will use the solution to check if a change request will violate any security policy rules.
View full review »
Managerfac3
Manager at a manufacturing company with 10,001+ employees
We use Tufin to automatically check if a change request will violate any security policy rules. One of the things we want to do is to have a blacklist/whitelist policy. A blacklist of things that can never be allowed and a whitelist of things which are always allowed. I want this tool to block or report ports that should not be used, putting somebody in a change. In addition to that, I want it to be able to block people from mapping IP addresses in North Korea, Iran, or whatever is on the blacklist.
View full review »
NetworkS2260
Network/Security Engineer at a leisure / travel company with 51-200 employees
The solution will automatically check if a change request will violate any security policy rules. We have an auditing staff using this feature within Tufin. If we have an open rule, it will send us an alert and we can see why this alert has been sent and take action on it.
View full review »
Mohd Majmi Mohamad
Regional OSH at Pos Malaysia Berhad
Tufin was able to automatically check if a change request would violate any security policy rules. During our PoC I tested it by trying to do unauthorized changes and Tufin met our requirements.
View full review »

Sign Up with Email