We use this solution for workflow intake and policy cleanup. It is also used for firewall policy requests.
Automation Engineer at Cox Communications
Improves our efficiency and assists with compliance, although many features are yet unsupported
Pros and Cons
- "This solution provides a more organized manner for us to track towards compliance for our PCI audits."
- "One feature that is missing is the ability to assign a step in the workflow to a specific user at a specific time, based on how the previous steps of the workflow have been handled."
What is our primary use case?
How has it helped my organization?
We make use of the ability to automatically validate changes to security policy rules. For example, we have four workflows currently in SecureChange, and for two of these workflows, the very first thing that we do in response to a policy request is to evaluate it. We check to see if the new policy is needed or not, and we determine how to proceed from there.
The biggest benefit for us is from an efficiency perspective. The longest part of our firewall policy implementation has been verifying the network and finding out where policy needs to be put in place. Tufin takes this job down from a day, to sometimes five minutes.
This solution provides a more organized manner for us to track towards compliance for our PCI audits.
What is most valuable?
The most valuable feature for us is the topology validation that is part of the workflow.
This visibility that this solution provides is better than that of the competitors that I have looked at.
When this solution works in the way that we need it to, my impressions of the change impact analysis are very good. The hardest thing for us is the inefficiencies with topology. This often means that the results we get are inaccurate.
What needs improvement?
One feature that is missing is the ability to assign a step in the workflow to a specific user at a specific time, based on how the previous steps of the workflow have been handled.
For the traditional application, SecureChange, my impressions of its cloud mandated security features are not very good. Tufin Iris looks more promising.
We have had issues with the stability of this solution, and the basic technical support is not very good.
In the next release of this solution, I would like to see the normalization of configuration files as they're brought in so that there can be some regular expressions set up to parse them. I would like to see additional cloud support, and the inclusion of security tags as a way of determining risk in the USP.
Buyer's Guide
Tufin Orchestration Suite
November 2024
Learn what your peers think about Tufin Orchestration Suite. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
What do I think about the stability of the solution?
So far, our impressions of stability are not very good. We have already had to RMA one of our boxes, and it was not being utilized very heavily. We've had different issues on some of our other devices, as well.
What do I think about the scalability of the solution?
Scalability is hard for me to say based on what we have deployed so far. We do have issues, but it's hard for me to say whether they are because of the hardware, or are an issue of scale.
How are customer service and support?
The basic technical support for this solution is not very good. However, the Critical Situation Team is actually very good. I would say that the support experience depends on which group you get put under.
Which solution did I use previously and why did I switch?
Prior to implementing this solution, the majority of our security engineering's time was spent working with these policy requests. It was a manual process where a requester would submit and Excel sheet, and the changes were being done from there. This was not leaving time for that team to work on projects and initiatives that were furthering or bettering the company. We started looking into Tufin as a way to automate some of that process and free up some of their time.
How was the initial setup?
The initial setup of this solution is very complex. Putting all of the devices into the topology, and then getting it to a place where it can provide meaningful and accurate results, and then building the USP on top of that, are all very complex. Out of the box, I don't think that Tufin really provides very much until you get through a lot of those complexities.
What about the implementation team?
We handled the deployment in-house.
What was our ROI?
I'm sure that there is ROI with the time savings that we received, or that we get as part of working the secure change workflows, but I couldn't speak to any hard numbers.
Which other solutions did I evaluate?
The shortlist included both Tufin and AlgoSec. Our evaluation showed that Tufin's features were on par with AlgoSec, but Tufin was the better financial choice.
What other advice do I have?
Prior to using this solution, our SLA for any change that went into production was ten days. We’ve now lowered that down to two days.
For the most part, our engineers are spending less time on manual processes, but this is when the topology works the way it's supposed to. When it isn’t working the way it's supposed to, then they spend more time than they would normally.
My advice to anybody who is implementing this solution is to start small. Pick an area of your network and deploy Tufin, then get it working in a manner that suits your needs. After this, expand it out to the entirety of your network.
This is a good solution but it is not perfect. There is a lot of stuff that is unsupported and it is inefficient.
I would rate this solution a seven out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Manager at a financial services firm with 10,001+ employees
Valuable reporting helps us to satisfy our audit requirements
Pros and Cons
- "The most valuable feature is the reporting of our risk poster in our firewall."
- "I would like to see improved role-based access."
What is our primary use case?
Our primary use case for this solution is risk visibility.
How has it helped my organization?
We use this solution to clean up our firewall policies.
Prior to using this solution, and according to our best practices, we didn't have a baseline of the security poster that we have with our rule sets. Now, with this reporting, we're able to provide that to our management.
It has helped us meet your compliance mandates. We are getting this from the data and reports. This was one of our requirements.
What is most valuable?
The most valuable feature is the reporting of our risk poster in our firewall. We clean up our firewall rules using this solution. The reporting helps us carry this out quickly.
This visibility is good and I would say that the change workflow process is average to good.
We expect that SecureChange will help us to reduce the time it takes to make changes. It is on our roadmap.
What needs improvement?
The reporting still has a lot of improvements to be made.
I would like to see improved role-based access.
For how long have I used the solution?
We are still implementing.
What do I think about the stability of the solution?
For us, this product has been very stable. We don't have any trouble with it.
What do I think about the scalability of the solution?
Our deployment is quite small, so I cannot speak to the scalability yet.
How are customer service and technical support?
Technical support for this solution needs improvement. We usually get a callback from an engineer, but the escalation of support should be faster.
Our account manager at Tufin is very engaged and has been super helpful.
Which solution did I use previously and why did I switch?
Adopting this solution was an easy decision for us because it is an audit requirement.
How was the initial setup?
The initial setup of this solution is straightforward. Installing SecureTrack was not difficult, after browsing through the knowledge base. With the documentation that is available, it is easy to deploy.
What about the implementation team?
We implemented this solution ourselves.
What was our ROI?
We have not yet seen ROI, but when we go with the SecureChange model, we will automate and reduce overtime hours. At this point, we will see a very valuable return on investment. For the time being, it is on our roadmap.
Which other solutions did I evaluate?
We did evaluate other solutions before choosing Tufin. This solution is used by many large companies, which is one of the reasons that we selected it.
What other advice do I have?
There is always room for improvement, but with the performance and the day to day stability that we have, I think that it's a very good product. Overall, I am very happy and satisfied with the product, and I am looking forward to a lot of new features.
I would rate this solution an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Tufin Orchestration Suite
November 2024
Learn what your peers think about Tufin Orchestration Suite. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
Network Architect at a transportation company with 10,001+ employees
SecureChange feature enables firewall rule automation, but Security Groups are pricey
Pros and Cons
- "SecureChange is the most interesting part. It all comes down to having the user request firewall access and SecureChange, based on workflows, takes care of it, sending two or three emails to the business approvers. With one click, you can automate a firewall rule."
- "The change workflow process is flexible and customizable. I was really impressed with it. It's pretty easy. You can add automatic validation steps. Depending on the security matrix, you can pre-allow whatever flow you want."
- "The interface is like a 1990s kind of thing. It's a little ugly. There are many things that you cannot tweak, little things like the column width and how you display the information. You end up exporting everything to an Excel file and doing your work there."
- "The documentation site is horrible as well. It has a tree structure, and you really get lost quite easily."
What is our primary use case?
We deployed a proof of concept. We added most of our firewall base to Tufin, although not all. We checked and tested Check Point, Palo Alto, Juniper, Cisco routers, Juniper routers, and F5 load balancers. Mostly we grabbed one instance of each of our technology devices, added it to Tufin, and tried different things. We tried SecureTrack and some basic SecureChange to try to automate our firewall partitions, the firewall "tickets." We presented a form to users to enter the source, destination, service, etc. This was our PoC.
Right now, we're in the process of purchasing Tufin.
How has it helped my organization?
With path analysis, you can specify a source, a destination, and a port and it will tell you whether it's blocked or not, and where; which firewall is doing the blocking or the allowing, or whatever. That part is very useful. When you have feedback from the user and you have your source, destination, and port, instead of trying to search on the Check Point console or the Panorama console or the Juniper console to figure out where that packet being dropped, you go to Tufin, put it in and, in 30 seconds, you have your answer.
It saves time on each ticket. Instead of playing around for 15 or 20 minutes, it's down to 30 seconds. Any first-line of support can go to Tufin, put in the source, destination, and port and they can at least know what to look for, who to involve to further troubleshoot the issue. It's a first-step investigation that saves time.
It also helps us ensure that our security policies are followed across our entire hybrid network.
What is most valuable?
SecureChange is the most interesting part. It all comes down to having the user request firewall access and SecureChange, based on workflows, takes care of it, sending two or three emails to the business approvers. With one click, you can automate a firewall rule. We have many problems like, I imagine, the whole industry, with delays in implementing firewall rules.
SecureTrack provides all these regulations, PCI kinds of things, so you can try to match all your security policies and firewall configuration to the standard.
There is also a feature to optimize firewall policies that will delete duplicate objects and rearrange the rules so the machine will function faster.
In addition, the change impact analysis capabilities allow you to do automatic checks of whatever rules you are implementing.
Finally, the change workflow process is flexible and customizable. I was really impressed with it. It's pretty easy. You can add automatic validation steps. Depending on the security matrix, you can pre-allow whatever flow you want. You can do your change analysis automatically or risk analysis automatically; whichever steps you want. It's pretty cool.
What needs improvement?
The visibility that Tufin provides us with is improvable. The interface is like a 1990s kind of thing. It's a little ugly. There are many things that you cannot tweak, little things like the column width and how you display the information. You end up exporting everything to an Excel file and doing your work there. They tried to put too much stuff on the screen. It's a little difficult to find what we want. It's a design issue, it's not a functionality issue.
The web interface is really like going back in time 20 years. You have to move columns back and forth and make them big to see the whole text in them. If you hover over a name, it won't show the content. You have to click on it and open it. It's a bit cumbersome.
The documentation site is horrible as well. It has a tree structure, and you really get lost quite easily. If you have the patience to browse through that hell of documentation, you will find what you need, but it is hell to browse and search. The information is there, it's just difficult to filter and search it. Documentation is one thing they can improve on.
What do I think about the stability of the solution?
I haven't found any issues with the stability. In the beginning, it was our problem, our mistake, because we configured the box with eight gigs of RAM. Then we checked and, obviously, we needed 16. After enlarging it to 16, there was no issue whatsoever. It was pretty responsive. Obviously, it was only one user, me, doing things, but I didn't find any issues performance-wise or stability-wise.
What do I think about the scalability of the solution?
We don't have that big of an environment. We added some 20 pairs of firewalls and another 20 or 30 routers, and one F5. I don't think we have scaled Tufin sufficiently to put it under some stress. Our DC is pretty small, we don't have many devices.
How are customer service and technical support?
Tufin's technical support is excellent. In my old job, I also implemented Tufin, and I was in touch with their Israeli people, the technicians; they're really good. They really know their stuff. In Spain, for southern Europe, they have a couple of people. The technician there is excellent, and the commercial guy is fun. It's the perfect combination.
How was the initial setup?
The setup was straightforward, absolutely. The only problem we had was with Check Point, but I think it's a Check Point problem, not a Tufin problem. Check Point is horribly configured. Managing it is hell. You have to define the OPSEC server with a user name and password, and you have to create the same thing on the provider one. They have to be same user but have different passwords. It's a little difficult. You have to pay close attention so you don't make a mistake. But I think that's a Check Point issue, not a Tufin issue.
The whole Tufin deployment took us about four months, with SecureChange, etc.
Up to the point with Check Point, it was easy. We created a read-only user for our infrastructure, and once we had connectivity from the Tufin box to all the devices, it was pretty simple. It was just IP address of the device, username, password, and go. Except Check Point. We needed to spend a day or two on that.
In terms of our implementation strategy, we wanted to test each of our technology manufacturers: F5, Check Point, Palo Alto, etc. We left our main public-facing networks out of the equation for the PoC. Whenever we implement the whole thing, we will include those. We made SecureTrack work well. We will define our security matrix correctly with all our networks, as granular as we would like it to be. Once we have that, we will go to SecureChange. So it's SecureTrack, do a good security matrix and, once we're confident with that, we'll go to SecureChange.
For deployment, it was just myself and the people who deployed the VM, with the help of Tufin's team. I'm the only one who was involved in maintaining it.
What about the implementation team?
Tufin's team helped us mainly with the Check Point stuff when we ran into some problems.
What was our ROI?
In a PoC it's difficult to see ROI. Seeing how the tool performs, I think we will see a return on investment, of course.
What's my experience with pricing, setup cost, and licensing?
It's not that expensive, except for Security Groups. For us, just the Security Groups were about half of the total price. The total was about €500,000 a year, of which €200,000 was for Security Groups. For the rest, it's not that expensive, given all the benefits we will get and all the time we will save.
Which other solutions did I evaluate?
We could only test AlgoSec for a little while. Our group is part of a larger group of products. When we were doing our PoC for AlgoSec, we were told to stop. The decision was made to move to Tufin because it has group-wise technology, chosen for the acclimation of firewall policies.
AlgoSec is much prettier, it's much simpler, and has a cleaner interface. Functionality-wise, it's pretty similar, from what I read in the AlgoSec documentation. Tufin has a few extra features, but AlgoSec is much cleaner, it's prettier.
Going with Tufin was not a technical decision, it was "politics." The largest group uses Tufin, so other group members have to use Tufin as well. It's mandatory.
What other advice do I have?
Don't bother with the web interface, calm down, don't worry, everything will be fine. They will improve it. The rest of it, I don't have any issues. They're technically prepared, the tool does its thing. The only two things I would be patient with are the web interface and that documentation which is not really well organized. Besides that, it's pretty easy. It's pretty easy to configure and, once you start using it, you will see the potential. AlgoSec, Skybox, and all those tools probably have the potential as well. But Tufin is easy enough for everybody.
What we don't use, and what we are not planning to use, is the third module, the SecureApp. We haven't played with it and we're not planning on using it, for the moment.
In terms of using Tufin to automatically check if change requests will violate any security policy rules, we would love to do that. What we didn't do is build the security matrix. That part is the one that takes a lot of time to build. You have to work with the security team and all the players involved. Because we did not design the security matrix, we couldn't match a firewall rule with the security matrix and say, "Okay", or "Not okay," and do some automation there.
What we did is prepare a form for a firewall petition, and some automatic steps. For instance, in the first step, you enter the request and it sends an email to a business approver. Depending on whether that firewall or that flow is predefined as allowed or not, you can skip that step and go to the next step. We did a little bit of logic with the change-request form. It worked pretty well for us.
The purchasing process takes a little bit of time because of all the different groups involved. But we're planning on implementing it and to finish around next summer, 2020; to have both SecureTrack and SecureChange up and running.
As for compliance, we don't have many requirements. Of course, we are bound to some ISO certifications, because it's the car industry, but we don't have any specific PCI. We don't sell cars over the internet, so we don't have to do that.
When it comes to Tufin's cloud-native security features, what we have is our landing zone in AWS - a VPN tunnel from on-premise to Amazon, with Transit VPC. We have a couple of Palo Altos, securing the track from on-premise to the cloud. And we added those Palo Altos to Tufin. We needed to tweak and include some virtual devices in Tufin so the routing would be okay. But that was quite easy. It was well-documented as well.
The only problem is that we got our quotation from our supplier, and the Security Groups are extremely expensive. They bill you $1,200 dollars per Security Group per year, which is really high. We're not that big, we may have 100 or 150 Security Groups. That's would be about $200,000 just to manage Security Groups. We were put off by that. From the start, we won't have the Security Group feature. We think it's too expensive.
As for increasing our usage of Tufin, we'll go day by day and see how it responds to our requirements. SecureTrack at the beginning, then SecureChange. Maybe, if everything goes well, we will think about SecureApp. It's not in the scope at the moment, but maybe we will implement it.
I would rate Tufin a seven out of ten. It will get better once they get their act together with the documentation and the interface.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network Engineer at a financial services firm with 1,001-5,000 employees
SecureChange makes our lives easier with automation
Pros and Cons
- "SecureChange makes our lives easier with automation."
- "We will be using the appliance based product, which cannot be scaled as much. It is a limitation in the hardware."
What is our primary use case?
Tufin is the product which we do our compliance under. That's one of the requirements. We also do change control tracking: who does what and the impact.
The users have reports for best practices and clean up.
The primary use case going forward will be automation, changing the internal process by trying to eliminate human errors.
How has it helped my organization?
Change management tracking is important: Who does what when. We know if something happens by checking the reports and comparing. We know exactly what mistakes were made and corrections.
In a financial organization, there are so many approval processes. At the designing levels, you can add any number of layers (for approval/decline), add qualifications, and traffic flow analysis.
Because it is a predefined customized, we can define whatever we want it to be and add the exceptions.
What is most valuable?
SecureChange makes our lives easier with automation.
It provides a granular report, like what is there or not and what is required or not in the clean up. This makes our lives operationally easier.
It is very easy to learn and is user friendly. The GUI is user-friendly.
What needs improvement?
I'm looking for the backup change. I want a predefined backup plan.
For how long have I used the solution?
Still implementing.
What do I think about the stability of the solution?
The stability is a pretty standard. It is working, and not like other products where it is breaking the system. It is pretty stable.
What do I think about the scalability of the solution?
We will be using the appliance based product, which cannot be scaled as much. It is a limitation in the hardware.
How are customer service and technical support?
The technical support is very good and helpful. We have not encountered that many issues in any one place.
How was the initial setup?
The initial setup was very straightforward because the documentation was straightforward.
What about the implementation team?
We did it ourselves. Tufin support helped us with the configuration.
Which other solutions did I evaluate?
We are also evaluated Skybox and AlgoSec.
Tufin is meeting one of our requirments, which is why we are looking to the future with the product.
What other advice do I have?
There is room for the product to grow.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer at a manufacturing company with 10,001+ employees
We leverage the Unified Security Policy to automate some of our decision-making. The cloud-native security features are lackluster.
Pros and Cons
- "It has allowed us to be more efficient in our processing of firewall requests."
- "The change impact analysis doesn't even get close to actually solving our problems. I am not impressed with it."
What is our primary use case?
Firewall automation and orchestration.
How has it helped my organization?
It has allowed us to be more efficient in our processing of firewall requests.
We use this solution to automatically check if a change request will violate any security policy rules. Every change request has to go through a security approval step, but we also leverage the Unified Security Policy to automate some of that decision-making.
What is most valuable?
Workflows that help continue automation.
The change workflow process is flexible and customizable. Just about every step has some flexibility to it. While there is room for it to improve, it is very flexible to our needs.
What needs improvement?
The change impact analysis doesn't even get close to actually solving our problems. I am not impressed with it.
The solution's cloud-native security features are lackluster. They need to catch up to where the industry is at.
Our engineers still require quite a bit of manual digging to find the data that they need. It would be nice if the product would allow more flexibility around that and the workflow to present more data to correct this.
There are tons of things that the solution needs. They just need to prioritize them and get some of their customers satisfied.
What do I think about the stability of the solution?
It's not a very stable product. It doesn't stay up as often as I would like. It crashes at very inopportune times that we just can't afford.
What do I think about the scalability of the solution?
It is not very good. It scales but not eloquently. It is complex and not easy for our organization to stay on top of managing it.
How are customer service and technical support?
The technical support is okay. It's not the best, but it's not the worst.
Which solution did I use previously and why did I switch?
Tufin is our first solution of this type.
How was the initial setup?
It was pretty straightforward. It was not too challenging to get it going. This issue is just maintaining it.
What about the implementation team?
We worked with Tufin Professional Services to do some deployment. Most of it was internal, in-house customization and put together.
What was our ROI?
I have seen ROI with this product.
We've seen a decrease of about 50 percent in the overall time it takes to complete a firewall change.
Which other solutions did I evaluate?
We chose Tufin because its flexibility at the time was much greater than their competition.
We did not evaluate less costly solutions.
What other advice do I have?
While it has its highlights, it has deep issues that need to be addressed.
This solution help us ensure that security policy is followed across our hybrid network.
Our company doesn't really have federal or regulatory compliance requirements.
Spend a lot of time testing and doing a PoC for it, before you make the final decision to go for it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Consulting Information Security Engineer at HCA
Automated reporting is quite valuable. I also like the ability to get visibility without giving someone admin rights in the Check Point consoles.
Valuable Features:
The biggest thing that we have been using is the automated reporting. I work on a very specific portion of our network enclaving strategy. For the initial ones we’re working on, I get a big report every Monday that has a full listing of volumes and changes on all the rules. It means I don't have to log into the firewall to see how we're doing as far as progress and what we're doing.
We also use the on-demand stuff every time they make a change, I get a report of the change that's happening. We don't necessarily do the operational side but we have a sort of governance and policy oversight, and consulting oversight. We can determine whether this is the right thing to do for what they're doing. I don’t even have to log in and I don't have to go look for the information. I don’t have to go in to the Check Point console, log in, and do a lot of stuff. I get these reports in my email and I can analyze them and look at them when I want to. That's very helpful for me.
We also use it in the field for the people that have oversight over their zones. They get a change report and a risk analysis report out of Tufin. They don't have to log in every time something happens. It gets pushed to their email. To me that's a big value.
The other thing that brings a lot of value is the ability to get visibility without giving someone admin rights in the Check Point consoles. We are able to specify for these roles. While we're doing policy and strategy in consulting, we don't need admin rights to be able to make changes. That's a big help also. We can get to the info without having to log into the consoles and get those type of permissions that we really don't need in our role.
Improvements to My Organization:
We've used some of the rules recommendation modules. You can give it a certain data feed and it will recommend a rule set to accommodate that. That's the other tool that has been helpful for us. Our biggest problem is that we have a very complex environment. It can get a little crazy when we throw it at the rule engine.
Room for Improvement:
I haven't seen where they've gotten recently with the whole zone policy matrix that they showed us a year or so ago, but to me that's going to be one of the big things, it's going to drive us.
There was a feature they were working on that will allow you to go in and set up your zones, and you do a to-and-from policy for each zone. It uses that when it evaluates the rules that you try to put in to determine whether it complies with the zone policy. We need to be able to build out a business decision model with the zone policy that lives on without someone having to look at it every time. I think that's going to be one of the better things for us. So that we can see the zone policy management and we can be assured that policy is being enforced. If they get outside of that, we get notified. We know that nothing can happen unless we get notified. Even if they declare emergency, which sometimes you have to do, that we will get notified. Nothing can happen without us getting notified. To me, that's going to be one of the big things to try and keep the whole environment in the level of security posture that we want to try to get done.
The biggest thing for a very, very complex environment like ours is to keep everything in line with what we're trying to do.
I’m rating the product an 8 mainly because I want it to get into the zone area and those kinds of things. I think it's a great product, but there's a couple of spaces that would be very helpful if they could improve on. It is a good product. Don't think 8 is really bad. It's really good.
Other Advice:
Learn it and dig into it, because it's got some great capabilities. For me, it's been great.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior Security Engineer at a hospitality company with 1,001-5,000 employees
I like the compliance portion of the SecureApp feature, where you build your security database.
Valuable Features
We can identify rules that are not used. We can identify rules that are open.
When importing the devices, they made it nice where you can script it and import all the devices into Tufin. That was a nice little feature.
I like the SecureApp feature. That looks like it's pretty handy. The compliance portion of it, where you build your security database. It runs against that security database and figures out whether the correct ports are opened up or if there are vulnerabilities.
Room for Improvement
I know that in importing some devices, I think routers and switches showed up the same. Router would be layer 3 but they would only show up in Tufin as a layer 2 device. On the Cisco portion of it, there wasn't separation between that.
At this point, there aren’t any other configurations I’d like to see.
Use of Solution
I’m using SecureTrack basically to evaluate rule bases.
I have not really found any other side benefits. I don't really use it that much and it's relatively new. I don’t use any of the recording features.
Stability Issues
I wouldn't say we had stability issues.
Scalability Issues
We have, I think, over a thousand devices right now, and we haven’t had any scalability issues.
Customer Service and Technical Support
I’ve never used technical support.
Initial Setup
I was part of the initial setup. I imported devices but that's about it. It was pretty easy. You can put it in an Excel spreadsheet and import it that way or as a CSV file.
Other Advice
It's a pretty useful tool if you have a large environment with a lot of devices and you're trying to make it easier for the technicians to basically pawn the work off and make the application team more accountable.
With the limited knowledge I have of it and the limited use, I would probably give them an 8. I never give anyone 10's or 9's.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Manager at a financial services firm with 10,001+ employees
I like being able to use the historical data and well as compare what changed.
Valuable Features:
- The comparison of what changed.
- I also like being able to use the historical data - did this access exist on this date a week ago, two weeks ago, etc. Because I'll have a customer who's like, "Hey, our traffic isn't working anymore. It used to work, and now it doesn't. Why not?" I would go, and I'd check the policies, see what existed, if it did exist, and then I know that somebody removed it, and I can find out who. It's a great tool.
Improvements to My Organization:
We're currently using SecureTrack. We've deployed SecureChange, it's currently essentially at this point in a deaf status. But from SecureTrack, one of the most useful tools that I've had as well is the usage reports. Whether it's zero usage or if it's the higher use rules. Let's say I've got a rule at rule number four thousand that's just getting pegged like crazy. It's the number one hit rule. We're wondering why our firewall CPU is going crazy? It's spiking. So we go over to the report, see what rules are getting hit, and we see the bottom of our rule base is getting slammed. Now we know we need to move those rules up and optimize our policy.
Room for Improvement:
We're in talks with sales about them writing code to integrate with some of our different tools, so that's nice. I can't really think of any features that either don't exist or we haven't already requested.
We've asked for integration with the tool that does our baseline, that tells what traffic is and isn't allowed with our change control system. We've got the core routing and everything imported, so that was nice. A couple integrations there.
Stability Issues:
When we initially had it, it was on a single box, so it was pretty slow. A lot of people had access and they ran reports after reports after reports, and it got stepped on a lot. Once we upgraded, we got HA Pair, and then we've got distributed log folders now, and it runs super smooth. Maybe three years ago I experienced some bugs where it would kick me out of policy query. I would be building a query, and it would just kick me out, or it didn't save the changes, or it just forgot that I was doing something, but I haven't had that happen in maybe two and a half years.
Scalability Issues:
Well, we did, and then we upgraded the hardware. Not a big deal at that point.
Upgrading the hardware resolved the issues because the amount of logs that we generate is pretty insane. Having that one little box handle the entire enterprise full of logs was not very efficient.
Initial Setup:
I wasn't involved in the initial setup. I've been involved in the upgrades for the recent versions.
I was a secondary contact, so I was only helping, but it was extremely easy. I watched what he did, and it was a piece of cake. He's our Tufin guru on site, so we let him handle the majority of the implementation.
Other Solutions Considered:
Most important decision criteria: ease of use and the robustness of the tool. We checked FireMon, for instance, and they didn't have anywhere near the features we were looking at, and it was nowhere near as user friendly.
Other Advice:
Play with the tools. See what kind of reasons you think you'd need to use it. Why are you looking for this tool to begin with? See how easy it is to pick up for your team. They may not be familiar with a tool; let them play with it for a few minutes and see. Give them a task. How easy was it to get that task done?
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free Tufin Orchestration Suite Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
FireMon Security Manager
Skybox Security Suite
Palo Alto Networks Panorama
AWS Firewall Manager
Azure Firewall Manager
ManageEngine Firewall Analyzer
Cisco Defense Orchestrator
Buyer's Guide
Download our free Tufin Orchestration Suite Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between AlgoSec and Tufin?
- Comparing network security vendors and devices
- When should companies use SSL Inspection?
- When evaluating Firewall Security Management, what aspect do you think is the most important to look for?
- What are the most important features you would be looking for in a firewall?
- How do I estimate the required firewall throughput for my organization?
- What are the pros and cons of Tufin, AlgoSec and RedSeal?
- Tasks to Perform on Preventive Maintenance.
- Why is network segmentation important?
- Can a router with automatically-created firewall access lists be considered a scrubbing center?
Hi! Thanks for your review. I am so happy you have seen a 50% decrease in the time it takes to make firewall changes and are finding value in automation. I would like to address this comment "The solution's cloud-native security features are lackluster. They need to catch up to where the industry is at." At present Tufin's cloud-native security product (Iris) is still in beta - so I would love to explore more about what you are trying to accomplish. Tufin strives to meet our customers' needs. When working with some of the most complex configurations it is difficult to cover every conceivable possibility and while not perfect we continue to improve our capabilities to help customers do more with automation and scale their deployments. If you are not in touch with us to solve some of the challenges that are specific to your organization, please reach out to me!