Securing the business network has been and continues to be one of the top initiatives for engineers. Suffering a breach can have catastrophic consequences to a business, including lawsuits, fines, and brand damage from which some companies never recover.\nTo combat this, security professionals have deployed a number of security tools, including next-generation firewalls (NGFW) such as Cisco\u2019s Firepower, which is one of the most widely deployed in the industry.\u00a0\nManaging firewalls becomes increasingly difficult\nManaging a product like Firepower has become increasingly difficult, though, because the speed at which changes need to be made has increased. Digital businesses operate at a pace never seen before in the business world, and the infrastructure teams need to keep up. If they can\u2019t operate at this accelerated pace, the business will suffer. And firewall rules continue to grow in number and complexity, making it nearly impossible to update them manually.\n\nTufin unveils new features to automate the management of Firepower\nThis week at Cisco Live, network security policy orchestration vendor Tufin announced the release of Tufin Orchestration Suite R18-1 (TOS 18-1), which includes several new features, including enhanced support and integration for Cisco Firepower. As far as I am aware, TOS 18-1 is\u00a0first to automate change management for Cisco Firepower policies for customers using Cisco Firepower Management Center (FMC).\u00a0\nChanging firewall rules can be a long and painful process, and removing rules can be even more painful, which is why firewall rules wind up being unmanageable in a fairly short period of time. With Tufin's product, though,\u00a0customers can make changes and propagate them across all the firewalls in a matter of minutes instead of having to touch each box one at a time.\nAnother new feature of Orchestration Suite R18-1 is the ability to migrate the configuration from Cisco\u2019s Adaptive Security Appliance (ASA) to Firepower.\u00a0 Without an automated tool, migrating from one product to the other can take a significant amount of time and be filled with errors, as rules have to be manually ported from one system to the other. Any mistake is then carried over. The complexity of this process often holds companies back from upgrading or switching platforms.\nTufin\u2019s products make moving from ASA to Firepower error-free, reducing the risk of switching while validating the rules to ensure no broken or expired rules are migrated. The enhanced support in TOS 18-1 will allow security professionals to ensure they meet compliance mandates with an auditable, documented process for Firepower policy changes.\nTOS 18-1 helps meet compliance mandates\nIn addition to the Firepower enhancements, TOS 18-1 includes the ability to automate the process of tracking, monitoring, and managing the expiration of firewall rules to ensure compliance mandates are met. This can be particularly useful for businesses in an industry that has strict compliance guidelines and issues big fines for non-compliance, such as PCI DSS in retail. The software automatically identifies expiring rules and then automatically recertifies them across a wide range of vendors, reducing or even eliminating that risk vector as it continuously ensures compliance and automates the enforcement of the rule recertification policies.\nKeeping up with firewall rules is extremely important for digital businesses in both regulated and non-regulated industries. Changing them can be a daunting task, though, as the number of rules and their complexity can be overwhelming. Tufin\u2019s Orchestration Suite R18-1 makes this process considerably easier. Cisco customers in particular can use Firepower to its fullest and create a rapid, error-free migration path to it from ASA.\nNote: Cisco is a client of ZK Research.