Our primary use case for this solution is risk visibility.
IT Manager at a financial services firm with 10,001+ employees
Valuable reporting helps us to satisfy our audit requirements
Pros and Cons
- "The most valuable feature is the reporting of our risk poster in our firewall."
- "I would like to see improved role-based access."
What is our primary use case?
How has it helped my organization?
We use this solution to clean up our firewall policies.
Prior to using this solution, and according to our best practices, we didn't have a baseline of the security poster that we have with our rule sets. Now, with this reporting, we're able to provide that to our management.
It has helped us meet your compliance mandates. We are getting this from the data and reports. This was one of our requirements.
What is most valuable?
The most valuable feature is the reporting of our risk poster in our firewall. We clean up our firewall rules using this solution. The reporting helps us carry this out quickly.
This visibility is good and I would say that the change workflow process is average to good.
We expect that SecureChange will help us to reduce the time it takes to make changes. It is on our roadmap.
What needs improvement?
The reporting still has a lot of improvements to be made.
I would like to see improved role-based access.
Buyer's Guide
Tufin Orchestration Suite
September 2025

Learn what your peers think about Tufin Orchestration Suite. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
For how long have I used the solution?
We are still implementing.
What do I think about the stability of the solution?
For us, this product has been very stable. We don't have any trouble with it.
What do I think about the scalability of the solution?
Our deployment is quite small, so I cannot speak to the scalability yet.
How are customer service and support?
Technical support for this solution needs improvement. We usually get a callback from an engineer, but the escalation of support should be faster.
Our account manager at Tufin is very engaged and has been super helpful.
Which solution did I use previously and why did I switch?
Adopting this solution was an easy decision for us because it is an audit requirement.
How was the initial setup?
The initial setup of this solution is straightforward. Installing SecureTrack was not difficult, after browsing through the knowledge base. With the documentation that is available, it is easy to deploy.
What about the implementation team?
We implemented this solution ourselves.
What was our ROI?
We have not yet seen ROI, but when we go with the SecureChange model, we will automate and reduce overtime hours. At this point, we will see a very valuable return on investment. For the time being, it is on our roadmap.
Which other solutions did I evaluate?
We did evaluate other solutions before choosing Tufin. This solution is used by many large companies, which is one of the reasons that we selected it.
What other advice do I have?
There is always room for improvement, but with the performance and the day to day stability that we have, I think that it's a very good product. Overall, I am very happy and satisfied with the product, and I am looking forward to a lot of new features.
I would rate this solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Regional OSH at Pos Malaysia Bhd
Gives us real-time firewall policy management
Pros and Cons
- "I like the fact that Tufin was able to integrate with our firewalls, which include Palo Alto and FortiGate."
- "Our project is running on Riverbed for SDN. I don't know if Tufin can integrate with Riverbed. Other than that, I have no issues with this product."
What is our primary use case?
Our primary use case was firewall policy management. We did a PoC with Tufin.
How has it helped my organization?
There was no issue with slowness, especially when it came to pulling the data in real-time.
Tufin was able to automatically check if a change request would violate any security policy rules. During our PoC I tested it by trying to do unauthorized changes and Tufin met our requirements.
We are looking to become ISO 27001 certified for information security management. We need a solution like this for the audit side. They need to be able to check our firewall policies.
What is most valuable?
The goal was policy management and Tufin's policy management features met our requirements. It allowed us to crosscheck policies.
I like the fact that Tufin was able to integrate with our firewalls, which include Palo Alto and FortiGate.
What needs improvement?
I work on the network and security sides. The network visibility side needs improvement. I need to be able to see what the configuration changes are inside. On the firewall side, there are no visibility issues.
Also, I'm not sure if it integrates with Riverbed.
What do I think about the stability of the solution?
So far we have had no issues. We're running it on a VM and there are no issues with the VM.
What do I think about the scalability of the solution?
We had no issues with scalability.
We are a big company and our network is complex. We have a lot of servers and we have about 700-plus branches connecting to HQ. HQ is our main site to go with the ISP. But we only implemented Tufin at our HQ and two of our main branches.
There were only four users on my team.
How are customer service and technical support?
I did not engage with Tufin's technical support. We used a third-party.
How was the initial setup?
The setup was not too complex but not completely straightforward. It was so-so, at least for our environment.
We had an issue with how to push the policy changes. It took about a week, during which our engineer conferred with Tufin. Tufin had to do some fine-tuning.
In terms of an implementation strategy, at that time we were only doing a PoC to see the policy management functionality. Tufin can also integrate networking and security to show an overall network mapping, from site to site. We have a lot of branches. And we are now moving to SD-WAN, to see the mapping. We need to see if Tufin can integrate with that.
What was our ROI?
On the technical side, the Tufin solution was very helpful for my team. It would save my team time. Using Tufin they could check all the firewall policies in one console, for both Palo Alto and FortiGate, at the same time.
What's my experience with pricing, setup cost, and licensing?
There is no issue with the pricing because we used a VM. That kept the cost low, as compared to an appliance. The licensing cost quote met our budget.
Which other solutions did I evaluate?
We have done other PoCs with AlgoSec and FireMon. But as we compared Tufin with them I preferred Tufin rather than AlgoSec. They were basically the same, but then Tufin came out with a lot of changes in their recent update. Also, Tufin is real-time while AlgoSec is near-real-time, for policy management.
What other advice do I have?
In terms of advice, it depends on what a user's needs are. For us, we only considered Tufin for the security and the network parts, especially the network mapping. I need to see the hop-by-hop, from this site to that site, how many hops for a transfer packet.
Tufin is good for beginners. Tufin filters based on rules, even if a beginner doesn't know what to do, how to configure the firewall. Tufin can then monitor based on those rules.
It's a good value for what it does. We had no issues with this product. It was good for us. We could deploy it in our environment without any issue.
I rate it at eight out of ten because we are still evaluating Tufin. Our project is running on Riverbed for SDN. I don't know if Tufin can integrate with Riverbed. Other than that, I have no issues with this product.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Tufin Orchestration Suite
September 2025

Learn what your peers think about Tufin Orchestration Suite. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Network/Security Engineer at a leisure / travel company with 51-200 employees
Firewall automation saves us hours of time, but the platform stability needs work
Pros and Cons
- "The change workflow process is flexible and customizable... If we have a firewall completed and we want to redo it, if we need to re-engineer a particular firewall and open a different destination, we can do that by creating a break-fix... That is one of its useful tools."
- "When it comes to web services, in my experience, Tomcat has always gone down; after a certain amount of load it breaks down and we have to get things restored again."
What is our primary use case?
We are doing firewall automation through Tufin.
How has it helped my organization?
In terms of the change impact analysis capabilities of this solution, we get a lot of CNR queues and it has saved a lot of time when making changes. And the analysis tells us that we have made a particular change and it sends out a lot of alerts. We can analyze them and do some auditing stuff as well with Tufin.
We have a lot of teams that do stuff in Tufin, management teams, auditing staff, and a team for implementation. So the time it saves us across that whole scenario is hard to pin down, but it has saved us a lot of hours in implementing the CNR queues, approximately 20 to 30 hours a week. That a big time savings.
The solution will automatically check if a change request will violate any security policy rules. We have an auditing staff using this feature within Tufin. If we have an open rule, it will send us an alert and we can see why this alert has been sent and take action on it.
Tufin helps us ensure that security policy is followed across our entire hybrid network. We can set up rules and policies for this and we can do a lot of auditing as a result.
What is most valuable?
The topology and the config backup that we see for devices are key features we get from Tufin.
The change workflow process is flexible and customizable. We went through a lot of difficulties while doing stuff, and it now provides a lot of flexibility while making changes. We can go back and implement the changes again and that is one of the things that is very flexible. If we have a firewall completed and we want to redo it, if we need to re-engineer a particular firewall and open a different destination, we can do that by creating a break-fix. A break-fix is one of the things that we can use to redo things on Tufin, itself. That is one of its useful tools.
Auditing is another good tool within Tufin. The automation stuff and searching of reports are good for auditing as well.
What needs improvement?
I have gone over compliance issues in Tufin, but compliance is one of the things which might not be that clear in Tufin. It just shows the configuration. That is one of the things they have to work on. It is one of the constraints, in my opinion.
The topology is good but they could work on it and get something better out of it.
If we talk about the complexity of getting more nodes over Tufin, Tomcat or web services become flat. This is one of the constraints that I have seen. The web services are not that stable. This has to be checked and taken care of.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
If you have a normal load in Tufin it works perfectly fine. But they need to work on the stability because if a certain amount of load is put in Tufin it just breaks downs, from what I've seen lately. That has to be taken care of. The parameters for the platform also matter in that situation, but if they can work on the stability, that would be great.
What do I think about the scalability of the solution?
The scalability is fine but when it comes to web services, in my experience, Tomcat has always gone down; after a certain amount of load it breaks down and we have to get things restored again. The scalability is perfectly fine but, performance-wise, they have to work on the platform or the base of Tufin to make it more robust. In a bad situation, if a lot of guys are logging in, it breaks down.
How are customer service and technical support?
Although I am in India, we have U.S. support. I haven't had any interactions directly with tech support, but one of my counterparts in the U.S. talks to them and sorts things out for us. I haven't had any discussions with them where I can analyze their work.
It was challenging at the time because we wanted to implement a lot of things which Tufin doesn't have as default. There was a lot of customization required and it took a lot of time - one or two months - to sort that out.
Which solution did I use previously and why did I switch?
We did not have a previous solution. We were moving towards automation and we wanted something that would save time in doing firewall queues and creating firewall rules. We were looking for a good tool and Tufin was one of them. It is a multipurpose tool that gives us topologies, and auditing and alerting.
How was the initial setup?
I don't think we had any issues installing it. That was not a problem. It is not that difficult but it is not easy either. The setup was normal and I wouldn't complain about it.
Our deployment took about ten to 15 days to get things onboarded. There were many other guys who were also involved in it and I don't remember entirely, but I think that's how long it took to onboard things.
The number of people involved in the deployment depends on the infrastructure and what kind of services you are looking for. If you're looking at server management, that would require one or two guys. If you're looking at onboarding of devices, you would need another one or two guys. For the auditing stuff, again, another one or two guys could do it. So for each of these areas, one or a maximum of two guys could handle it. Once you are done with onboarding, managing it takes two guys.
Regarding our implementation strategy, our primary motive was to get firewall automation in place. With that in mind, we worked to bring in all the devices and all the firewalls. Then we started talking about getting the different packages over to it and working to get the firewall automation done. There were a lot of things we had to do - it took months - when we had to bring in new patches or requests.
What about the implementation team?
It was Tufin only and one or two guys within our team. There was no third-party involved.
What was our ROI?
Firewall automation was one of the biggest concerns we had, and we have largely sorted that out with this tool. If we are saving hours, then we are saving money.
What's my experience with pricing, setup cost, and licensing?
I was involved with the pricing at the start. But then management took over that issue. In terms of affordability, this company is using it, so it seems they are fine with it. We just provide management with our requirements and it's their concern and responsibility to bring us what we need. Since we still have this solution, I think they are fine with it. But it's a management call.
What other advice do I have?
My advice would depend on what kind of implementation and what kind of environment you have. If you are looking for automation and auditing you should think about this solution. Talk to the technical guys at Tufin about how your environment works and can ask them about what they can do. If you are looking for automation you should look at Tufin.
Regarding Tufin's cloud-native security features, I am only familiar with their on-prem stuff. I haven't seen any of the cloud features on Tufin yet. I would really like to know what it will bring us at the end of the day.
We have three or four teams using it on different platforms and for different use cases, like auditing and alerting. On my team there are 25 guys using it. I don't have any idea how many guys on other teams are using it. Our security area is managing and maintaining it.
As engineers, we are certainly using it daily. I just made a scheduled change today through Tufin. We are certainly using it but I can't say what our plans are for it in the future.
I would rate Tufin at seven out of ten. The things that come to mind with this rating are the implementation of firewalls, the alerting and security. We can set out the security rules. I deducted three points because of the platform. I don't think that it has a stable platform. If there are 20 people and 22 need it, it will not be able to support us in that scenario. So that is a weak point. Stability and robustness are the things I'm looking for.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Engineer at BCBSMA
Enables us to perform self-audits and use rule-based accountability
Pros and Cons
- "The most valuable features are the Security Risks and Best Practices reporting/Rule base cleanup."
- "I feel that the user interface is a bit dated."
What is our primary use case?
Our primary use case for this solution is for audit and firewall rule base management.
How has it helped my organization?
Tufin allows us to perform self-audits and use rule-based accountability.
What is most valuable?
The most valuable features are the Security Risks and Best Practices reporting/Rule base cleanup.
What needs improvement?
I feel that the user interface is a bit dated. The product version updates should be automated, and the reports could be a bit cleaner.
For how long have I used the solution?
More than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Specialist in Network Security Operations Support at a financial services firm with 10,001+ employees
SecureChange automates everything from the validation to the pushing of rules
Pros and Cons
- "The most valuable function is the SecureChange where it is able to automate everything from the validation of the rules to the pushing of the rules."
- "There is room for improvement in the speed of Tufin. It is using so many of my VM resources and yet it is still a bit slow... Even though we are allocating 130 gigs of RAM, we still have to wait for a few minutes for a single report to be generated. Otherwise it would be a perfect tool."
What is our primary use case?
We are using Tufin to generate reports on unused rules and for compliance reporting.
How has it helped my organization?
In our environment we have two data centers which have the same IP address for service in both. This means that in data center A, server X's IP address is the same as server X's IP address in data center B, but it's sitting in a different firewall. So we are exploring SecureChange to automate the pushing of rules in both gateways at the same time. That way we will be able to track to which firewall, in which data center, we have pushed rules.
It helps us to meet our compliance mandates because we are able to define whatever compliance we are subject to. We are a financial institution so we have to comply with PCI DSS, we have to comply with certain financial rules and regulations. We are able to do that with Tufin.
It also helps ensure that security policies are followed across our entire hybrid network. So far there have been no complaints from the auditor who is checking our firewall rules. The only exception is that, because we have so many requests in a day, some of them are not used yet by the requester. What our auditor sees is only the unused part. But we are 80 to 90 percent compliant.
Finally, I expect it will help our engineers to spend less time on manual processes, that it will cut half of the time spent looking at all the rules and validation. Currently, 70 percent of my engineers' load is looking at rule validation and requests that are not being made correctly.
What is most valuable?
We are still using only one-third of the functions that Tufin has, but SecureTrack is among the most valuable.
The most valuable function is the SecureChange where it is able to automate everything from the validation of the rules to the pushing of the rules. We are mainly using Checkpoint and Tufin together.
In addition, it's helpful that we can generate accurate and detailed rule-usage reports. That enables quick clean up.
In terms of visibility, Tufin does show all the schedules based on the usage.
Another feature I like in Tufin is that we are able to track the flow of the source and destination, passing through which level of device and which firewall. It makes our operation, our daily tasks, much easier than doing it manually for each and every request.
What needs improvement?
There is room for improvement in the speed of Tufin. It is using so many of my VM resources and yet it is still a bit slow. They need to improve how they do their database indexing. That is the main fault of Tufin right now for us. It's slow. Even though we are allocating 64 gigs of RAM, we still have to wait for a few minutes for a single report to be generated. Otherwise, it would be a perfect tool.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
The stability is great. It has never gone down. The only problem is the slowness.
The stability is dependent on the devices. The part where we are having a problem now is the result of migrating to RAT which is using APIs which keep going down when our MDS has a heavy load.
What do I think about the scalability of the solution?
In terms of scalability, the only issue is the licensing part. You have to have the correct license to go to a larger installment.
Which solution did I use previously and why did I switch?
This solution is the first of its kind in our bank.
How was the initial setup?
The initial setup was straightforward. I was able to deploy Tufin in a few minutes only. Integrating with devices - as we are using Checkpoint, API, Syslog - is simple.
For now, we have only installed one server, not distributed. Soon we will go for distributed, because we need to collect all the logs from all our overseas sources.
I was the only one involved in the deployment and am the only one who takes care of the maintenance and day-to-day configuration. Our firewall team will be using Tufin but they don't do the maintenance. At the moment there are about 15 users. Half of them are the firewall team and then there are a few auditors and a few people in the business unit who are monitoring the rules.
What was our ROI?
ROI is measured in engineers having time for their families and being able to have more time to do other things. It is not a specific figure, it is more a matter of how time is spent.
What's my experience with pricing, setup cost, and licensing?
The current licensing scheme is quite confusing but it is clearer than the old one. If you have one MDS you just buy the MDS license and the gateway license. That's most of it.
Before this, they broke it down into VS, virtual environment, physical environment, single boxes, cluster boxes. Now the licensing part is much more straightforward. If you have ten gateways you don't need to define one as a single and another as a cluster gateway.
Pricing is quite high. We did compare it with AlgoSec but the pricing is not much different between the two.
Which other solutions did I evaluate?
The decision was made before I joined the organization. I don't know if they looked at competitors or not. Currently, we are looking at AlgoSec, if it can replace Tufin or compete with Tufin in terms of features.
The main differences between the two are only in the pricing and the look and feel. They both do the same thing. Both will be able to achieve our organization's targets. But in terms of look and feel, our engineers are already used to what we have. And I do prefer Tufin.
What other advice do I have?
If you are looking at a large environment and a large number of policies, you really need Tufin to help you manage all the rules. We have 25 policies, and each policy has around 1,000 to 1,500 lines of rules. Managing that manually would not be easy.
We haven't started using the change impact analysis capabilities of this solution yet. We are still testing it. We are not that familiar with the process yet.
Because our team is doing cleanup every three months, we need to keep generating a report every day to have correct visibility: which rules are unused and which rules need to be removed to be optimized. We are using it quite intensively. I don't know how we can increase usage until we deploy and start using SecureChange. At that point it will be more intensive because after SecureChange everything will be automated and they will start only using and looking at the secure Tufin interface, in terms of rolling out all the requests.
We haven't seen a reduction in the time it takes to make changes yet, because we are still tweaking the SecureChange part. We will be testing it in a few months' time. We need to see integration with our ticketing system because people are making requests over HPSM and Tufin needs to be able to grab them first, before we can start to roll out SecureChange.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Business Director at a tech services company with 201-500 employees
Gives our customer the ability to centrally monitor and view all changes made in the network
Pros and Cons
- "The policy overview is valuable."
- "Our customer has the ability to centrally monitor and view all changes that have been made in the network, and they are able to revert any problems that they encounter, if somebody has made a problematic change."
- "The key area for improvement is the integration to F5. One of the things that we encountered with another customer is that there were some limitations when we tried to migrate policies from F5 into Tufin."
What is our primary use case?
For us, it's more about managing the policies and having an overview of all the policies that are available, that we currently implement, and bringing them to a central console so that we can have an overview of what's going on. We deploy Tufin for one of our customers, it's not for ourselves.
How has it helped my organization?
The key, convincing element that made our customer go with Tufin is that they have the ability to centrally monitor and view all changes that have been made in the network, and they are able to revert any problems that they encounter, if somebody has made a problematic change.
What is most valuable?
The policy overview is valuable.
What needs improvement?
The key area for improvement is the integration to F5. One of the things that we encountered with another customer is that there were some limitations when we tried to migrate policies from F5 into Tufin. Half of the network is F5 and there were a couple of other firewalls and they're trying to centrally manage them. There were issues in terms of managing the policies for F5. It's not as seamless as it should be.
Documentation to help users integrate to an F5-type of environment would be great, so that users would understand and know the limitations, rather than having to go through a PoC and then realize that it's just not suitable for integrating F5 products.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
So far, the stability has been reasonably good. We haven't encountered any major issues. Even when integrating to overseas central management systems, it has been quite seamless.
What do I think about the scalability of the solution?
Scalability is something the customer will be exploring in the next phase.
I think that the major limitation is its ability to integrate into more products. With the common products, the older products, it integrates very well. But with the newer products, like I said, F5 for example, they do have some issues. I'm not too sure about other firewall products and other DDoS products that could be in the network.
For now, the customer is trying to integrate the product into the rest of the group. That's currently being studied by some of their overseas counterparts to see if it's suitable. The plan is that the customer intends to proliferate this across the entire network, but that step will take place over five years' time.
How are customer service and technical support?
Technical support is excellent, I would give a big thumbs-up to the technical support team.
Which solution did I use previously and why did I switch?
We didn't use a previous solution, this is our main solution.
How was the initial setup?
The initial setup is reasonably straightforward and the support team is quite good. They're very helpful and they're very knowledgeable.
The deployment, overall, took about three months, in terms of studying the customer's environment and doing some consultation and a deep-dive with the Tufin consultancy team.
What about the implementation team?
We are an integrator, so we have a fairly decent understanding of the product and it wasn't that difficult to deploy.
What's my experience with pricing, setup cost, and licensing?
Pricing played a big part here. We didn't present AlgoSec or FireMon. We got good support from Tufin directly. We managed to position it with an effective price for the customer. The customer had evaluated other products but, due to price as well as support, they chose Tufin.
Which other solutions did I evaluate?
We evaluated Tufin together with FireMon and AlgoSec.
What other advice do I have?
The first priority is to evaluate how expensive your firewall family is. If you have, for example, F5 then you would probably have similar problems to what we encountered with F5. But if you are deploying general firewalls, like Palo Alto and Cisco, that's fine. You have to evaluate how you are going to import existing policies and how you are going to monitor those policies when they transfer them across to be centrally managed and monitored by Tufin.
In terms of users of the solution, we set up for the customer a central admin who is the main administrator that controls the entire dashboard. In addition, there are viewers who only need to view and monitor the reports and the like. It's the IT firewall team that makes changes to the firewall and backend system. So there are three main groups of users.
We do the maintenance for the customer, so if there are any patches or any updates that are critical we work with the customer to identify a suitable time for us to do the system upgrade.
We manage our customers' IT infrastructures. We then bring in vendors according to what each customer requires. We are the system integrator, integrating to their backhand system. We provide consultancy and advice to the customer with regards to the types of products that they should choose. Eventually, we support products once they have deployed them. A lot of customers don't have a big IT team locally to support the infrastructure, so we provide that level of support.
From an implementation and costing-strategy standpoint, I would give Tufin eight out of ten. It would be much better if they could improve the F5 support and also enhance the documentation in terms of integrating firewall products.
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator.
Senior Adviser Cyber Security at a comms service provider with 10,001+ employees
It's pretty useful when you have an audit going on, but I don't like the way the reports are shown
Pros and Cons
- "It provides a great visibility around the roots: Root implementing which can be done, roots that have changed, and what has been done. So, it's pretty useful when you have an audit going on."
- "I would rate their reports as a four out of ten. I don't like the way that they are shown. It is too hard to export and send them to our clients."
What is our primary use case?
We use it for advanced reporting and root analysis. In some cases for clients, we use it for root deployment.
How has it helped my organization?
Some clients wanted to have more latitude with root deployment. Instead of deploying through us every time, they want to deploy a new root, making quick roots or small roots, like adding an object to a root. They now have the possibility to go direct.
It has helped our clients to meet their compliance mandates. They will ask us for evidence that we can provide them.
What is most valuable?
The analysis is the most valuable feature. People see it first and that is why they want in their enterprises, then they start explore the other features.
It provides a great visibility around the roots: Root implementing which can be done, roots that have changed, and what has been done. So, it's pretty useful when you have an audit going on.
What needs improvement?
I would rate their reports as a four out of ten. I don't like the way that they are shown. It is too hard to export and send them to our clients.
We are switching to AlgoSec. It's a corporate decision. There's probably room for improvement.
What do I think about the stability of the solution?
It is pretty stable. We have more issues with the VMs than with the software.
What do I think about the scalability of the solution?
We have not had any issues with scalability. When we needed more power, we just added a new server, and that was straightforward. So, it is pretty scalable.
How are customer service and technical support?
I have not personally used Tufin's technical support.
How was the initial setup?
The last time that we initialed setup, it was straightforward.
If you want to install a new root automatically using the tool, the change impact analysis capabilities are useful.
What about the implementation team?
We deployed it in-house.
What was our ROI?
This solution helps us to reduce the time it takes to make changes (by 10 to 15 percent).
Which other solutions did I evaluate?
We are going to keep Tufin as is, but we are going to add AlgoSec. The prices are comparable. We have corporate pricing with AlgoSec. The ease of use of AlgoSec is one of the reasons why we considered using it.
What other advice do I have?
You need a product like this, but look at difference solutions in the market. I would rate it a seven out of ten.
We do not use the product across our entire network. We do not use the cloud native security features.
In the future, we will use the solution to check if a change request will violate any security policy rules.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Professional Services Engineer at a tech services company
While the product was a little slow, it did look full-featured
Pros and Cons
- "The initial setup was straightforward."
- "I needed more help getting the product to work in the lab."
What is our primary use case?
Our primary use case for this solution is firewall remediation.
I didn't get very far with it because I didn't used Tufin in production, only during the evaluation phase.
How has it helped my organization?
I tested it for the change orchestration. That is what my evaluation recently was specifically for. While the product was a little slow, it did look full-featured.
What is most valuable?
The firewall remediation and compliance pieces are the most valuable features.
What needs improvement?
I couldn't get it to work in the lab, even with help, on multiple occasions, from one of Tufin's engineers. It was set up in my private lab per all their instructions, and I gave them control of the system. However, they were unable to make it install the policies to Check Point in an automated fashion. So, I unfortunately gave up on the proof of concept at that point.
What do I think about the stability of the solution?
In terms of stability, the version I tested in the lab was okay.
What do I think about the scalability of the solution?
I don't know about the scalability, as I never got it out a very small VM.
How are customer service and technical support?
Their technical support was okay. I needed more help getting the product to work in the lab.
Which solution did I use previously and why did I switch?
We did not have an automated provisioning solution. At that time, all firewall changes were being implemented manually by administrators.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
I was working directly with Tufin's sales team and SEs.
Which other solutions did I evaluate?
We looked at AlgoSec and Tufin. However, we did not chose Tufin because of the issues.
What other advice do I have?
Check the product out for yourself.
I wasn't using it for visibility into my firewall infrastructure, because I have other avenues.
I wasn't using the compliance portion when I was testing it, only the orchestration.
I want to look at Tufin for remediation and compliance in the future.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.

Buyer's Guide
Download our free Tufin Orchestration Suite Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Firewall Security ManagementPopular Comparisons
FireMon Security Manager
Skybox Security Suite
Palo Alto Networks Panorama
AWS Firewall Manager
Azure Firewall Manager
ManageEngine Firewall Analyzer
Cisco Security Cloud Control
Buyer's Guide
Download our free Tufin Orchestration Suite Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between AlgoSec and Tufin?
- Which lesser known firewall product has the best chance at unseating the market leaders?
- Comparing network security vendors and devices
- When should companies use SSL Inspection?
- When evaluating Firewall Security Management, what aspect do you think is the most important to look for?
- What are the most important features you would be looking for in a firewall?
- How do I estimate the required firewall throughput for my organization?
- What are the pros and cons of Tufin, AlgoSec and RedSeal?
- Tasks to Perform on Preventive Maintenance.
- Why is network segmentation important?