Business Process Automation Featured Article
Tufin Releases Survey on Firewall Management Challenges
In recent years, one of the biggest problems facing IT departments is the management of the network connectivity of enterprise applications. Managing application connectivity has remained a manual and error-prone process in spite of the advanced automation provided by present day firewall management solutions.
Tufin Technologies, a provider of Security Policy Management Solutions, recently conducted a survey to find out more about the challenges facing IT companies in firewall management.
According to this survey, enterprise application connectivity is their biggest headache.
But interestingly, the survey states that in spite of enterprise application connectivity posing so many challenges, many companies do not have a reliable process to counter them.
In fact, one-fifth of the respondents didn’t even have any processes in place to manage enterprise application connectivity-related firewall data.
This poses many problems, the survey has stated. For one, a majority of network configuration changes result in application service disruptions for various companies.
“This survey supports our belief that application connectivity management is the next frontier of firewall management," said Ruvi Kitov, CEO and cofounder, Tufin. "Just as Next Generation Firewalls caused a paradigm shift in the firewall market by enabling policies to be based on users and applications, SecureApp heralds a paradigm shift in the security policy management market by delivering a top-down approach based on business requirements, instead of a bottom-up approach based on configurations.”
Recently, the company unveiled a new product known as SecureApp, which can manage the network connectivity of enterprise applications. According to a majority of network security professionals, the reason for a firewall change request is application connectivity-related. Also, according to many professionals, a rule change has to do with a new application which is responsible for a breach.
Many network professionals install a new application every week.
Edited by Braden Becker