Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Ansible serves as an exceptionally straightforward automation engine, streamlining tasks such as cloud provisioning, configuration management, application deployment, and intra-service orchestration, among various other IT requirements. Over the years, the Ansible Automation Platform has evolved to deliver robust automation solutions tailored for operators, administrators, and IT decision-makers across diverse technology sectors. As a premier enterprise automation offering from Red Hat®, which is backed by a vibrant open source community, it has emerged as the standard technology for IT automation. With this enterprise automation platform, organizations can scale their automation efforts, efficiently manage intricate deployments, and enhance productivity across their entire IT teams. Additionally, Red Hat and its consulting partners provide valuable services that support your comprehensive automation journey, enabling a quicker realization of benefits. This collaborative approach not only accelerates implementation but also fosters innovation in automation practices.

Description

Tufin empowers companies to streamline their security policy management, risk oversight, provisioning, and compliance within diverse, hybrid environments featuring multiple vendors. By using Tufin, organizations achieve enhanced visibility and control over their networks, ensuring they meet security standards continuously while integrating security protocols into their workflows and development processes. This approach eliminates security-related delays, thereby enhancing overall business agility. Traditional methods for managing network modifications often span weeks and may lead to mistakes that pose security threats. Businesses globally depend on Tufin’s automation based on policies to facilitate visibility and provisioning, ultimately boosting both agility and security. In the face of increasingly intricate and disjointed networks, maintaining compliance with industry regulations and internal policies can be challenging. Tufin assists enterprises in ensuring they remain in continuous compliance and ready for audits, providing peace of mind in a complex regulatory landscape. Furthermore, this level of automation allows organizations to adapt quickly to changing security demands, reinforcing their resilience in a dynamic threat environment.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

BlueCat Gateway
Check Point IPS
Check Point Infinity
Akeyless Identity Security Platform
Cloudaware
Datablast
Doctor Droid
GenRocket
HCL BigFix Cloud Lifecycle Management
IBM DevOps Deploy
NetBrain
Pliant
Red Hat Satellite
RegScale
RunCode
SIRP
Stonebranch
Sweagle
TCPWave
Vulcan Cyber

Integrations

BlueCat Gateway
Check Point IPS
Check Point Infinity
Akeyless Identity Security Platform
Cloudaware
Datablast
Doctor Droid
GenRocket
HCL BigFix Cloud Lifecycle Management
IBM DevOps Deploy
NetBrain
Pliant
Red Hat Satellite
RegScale
RunCode
SIRP
Stonebranch
Sweagle
TCPWave
Vulcan Cyber

Pricing Details

Free
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Red Hat

Founded

1993

Country

United States

Website

www.ansible.com

Vendor Details

Company Name

Tufin

Founded

2005

Country

United States

Website

www.tufin.com

Product Features

Configuration Management

Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management

Continuous Delivery

Application Lifecycle Management
Application Release Automation
Build Automation
Build Log
Change Management
Configuration Management
Continuous Deployment
Continuous Integration
Feature Toggles / Feature Flags
Quality Management
Testing Management

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Network Automation

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Software Configuration Management (SCM)

Automated Cleanup
Branch Merging
Code Review
Concurrency Management
Defect Tracking
Flexible Branching
Rapid Hotfix
Rapid Rebuilds
Regulatory Compliance
Version Control / Management
Workflow / Process Automation

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

ITSM

Asset Tracking
Availability Management
Change Management
Configuration Management
Contract/License Management
Dashboard
Incident Management
Problem Management
Project Management
Release & Deployment Management
Self Service Portal

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Alternatives

NetBrain Reviews

NetBrain

NetBrain Technologies

Alternatives

Unimus Reviews

Unimus

NetCore j.s.a. (Unimus)
Chef Reviews

Chef

Progress Software