SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Palo Alto Networks Overview
                   November 2011
About Palo Alto Networks


   • Palo Alto Networks is the Network Security Company

   • World-class team with strong security and networking experience
              -    Founded in 2005, first customer July 2007, top-tier investors

   • Builds next-generation firewalls that identify / control 1,300+ applications
              -    Restores the firewall as the core of enterprise network security infrastructure

              -    Innovations: App-ID™, User-ID™, Content-ID™

   • Global momentum: 6,000+ customers
              -    August 2011: Annual bookings run rate is over US$200 million*, cash-flow positive last
                   five consecutive quarters



                                                   •A few of the many enterprises that have deployed more than $1M

       Page 2 |       © 2011 Palo Alto Networks. Proprietary and Confidential.
(*) Bookings run rate is defined as 4 (four) times the bookings amount of the most recently finished fiscal quarter. Bookings are defined as non-cancellable
orders received during the fiscal period. Palo Alto Networks’ fiscal year runs from August 1st until July 31st.
Next-Generation Firewalls Are Network Security




Page 3 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
2011 Magic Quadrant for Enterprise Network Firewalls




Page 4 |   © 2010 Palo Alto Networks. Proprietary and Confidential.
Applications Have Changed; Firewalls Have Not
The firewall is the right place
to enforce policy control
• Sees all traffic
• Defines trust boundary
• Enables access via positive
  control




                                                                      BUT…applications have changed
                                                                      • Ports ≠ Applications
                                                                      • IP Addresses ≠ Users
                                                                      • Packets ≠ Content


             Need to restore visibility and control in the firewall
Page 5 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
Enterprise 2.0 Applications and Risks Widespread

Palo Alto Networks’ latest Application Usage & Risk
Report highlights actual behavior of 1M+ users in 1253
organizations
    -   More enterprise 2.0 application use for personal and
        business reasons.
    -   Tunneling and port hopping are common
    -   Bottom line: all had firewalls, most had IPS, proxies, &
        URL filtering – but none of these organizations could
        control what applications ran on their networks




  Page 6 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
Technology Sprawl & Creep Are Not The Answer




                                                                      Internet




   • “More stuff” doesn’t solve the problem
   • Firewall “helpers” have limited view of traffic
   • Complex and costly to buy and maintain
   • Putting all of this in the same box is just slow



Page 7 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
The Right Answer: Make the Firewall Do Its Job


 New Requirements for the Firewall


 1. Identify applications regardless of port,
    protocol, evasive tactic or SSL

 2. Identify users regardless of IP address


 3. Protect in real-time against threats
    embedded across applications

 4. Fine-grained visibility and policy control
    over application access / functionality

 5. Multi-gigabit, in-line deployment with no
    performance degradation



Page 8 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
Why Visibility & Control Must Be In The Firewall
                                                                        Application Control as an Add-on
                                                                        • Port-based FW + App Ctrl (IPS) = two policies
Traffic                             Port
                                                                        • Applications are threats; only block what you
              Firewall                               IPS                  expressly look for

                                               Applications             Implications
                                                                        • Network access decision is made with no
             •Port Policy                  •App Ctrl Policy               information
              Decision                        Decision
                                                                        • Cannot safely enable applications




  NGFW Application Control
  • Application control is in the firewall = single policy                  Traffic                 Application
  • Visibility across all ports, for all traffic, all the time
                                                                                         Firewall                  IPS
  Implications
  • Network access decision is made based on                                            Applications
    application identity
                                                                                      •App Ctrl Policy       •Scan Application
  • Safely enable application usage                                                      Decision               for Threats



  Page 9 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
Your Control With a Next-Generation Firewall


                                                                                  Safely enable the
                                                     Only allow the
                                                                                 applications relevant
                                                     apps you need
                                                                                   to your business



                                                     » Traffic limited to       » Complete threat library with no
                                                         approved business        blind spots
                                                         use cases based on
                                                         App and User                 Bi-directional inspection
                                                     » Attack surface                 Scans inside of SSL
                                                         reduced by orders of         Scans inside compressed
                                                         magnitude                     files

» The ever-expanding                                                                  Scans inside proxies and
 universe of applications,                                                             tunnels
 services and threats
  Page 10 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
Identification Technologies Transform the Firewall

                •App-ID™
•Identify the application



               •User-ID™
      •Identify the user



            •Content-ID™
      •Scan the content

Page 11 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
Single-Pass Parallel Processing™ (SP3) Architecture
                                                                       Single Pass
                                                                       • Operations once per
                                                                         packet
                                                                            -   Traffic classification (app
                                                                                identification)
                                                                            -   User/group mapping
                                                                            -   Content scanning –
                                                                                threats, URLs,
                                                                                confidential data
                                                                       • One policy

                                                                       Parallel Processing
                                                                       • Function-specific parallel
                                                                         processing hardware
                                                                         engines
                                                                       • Separate data/control
                                                                         planes


                                           •Up to 20Gbps, Low Latency
Page 12 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
PA-5000 Series Architecture

                                                                                                           RAM                            RAM
  • Highly available mgmt                   Signature Match HW Engine
 • High speed logging and               • Stream-based uniform sig. match                                  RAM                            RAM
        route update
     • Dual hard drives
                                                                  • 40+ processors
                                        • Vulnerability exploits (IPS), virus,
                                                                                      Signature
                                                                                        Match
                                                                                                                           Signature
                                                                                                                             Match
                                            spyware, CC#, SSN, and more                                    RAM                            RAM

                                                                  • 30+ GB of RAM                          RAM                            RAM
                   RAM
                                                • Separate high speed data and
                                                                   10Gbps                                                   10Gbps

Quad-core          RAM
  CPU                                  CPU      CPU CPU
                                                          control planesCPU RAM
                                                        RAM    CPU CPU                                              CPU     CPU ... CPU      RAM
                   HDD                                 ...                                      ...
                                         1        2          12        RAM       1         2          12     RAM      1      2       12      RAM
                   HDD

  Control Plane                          SSL       • 20Compress. firewall IPSec Compress.
                                                   IPSec
                                                          De-
                                                         Gbps        SSL
                                                                                  De-
                                                                          throughput                                 SSL      IPSec
                                                                                                                                          De-
                                                                                                                                        Compress.

                                        • 10 Gbps threat prevention throughput
                                                            20Gbps
 • 80 Gbps switch fabric
                                             Security Processors
       interconnect
  • 20 Gbps QoS engine
                                                 • 4 Million concurrent sessions
                                      • High density parallel processing
                                              for flexible security                            Route,
                                                  functionality                  Flow                                      Network Processor
                                                                                                ARP,
                                         • Hardware-acceleration for                            MAC
                                                                                                            NAT       • 20 Gbps front-end network
                  Switch                                                         control
  QoS                                   standardized complex functions                         lookup                           processing
                  Fabric                  (SSL, IPSec, decompression)                                              • Hardware accelerated per-packet
                                                                                                                      route lookup, MAC lookup and
  Switch Fabric                                                                         Data Plane                                 NAT



Page 13 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
PAN-OS Core Firewall Features
Visibility and control of applications, users and content
            complement core firewall features                                                                         PA-5060


• Strong networking foundation                                          • Zone-based architecture                     PA-5050
    -   Dynamic routing (BGP, OSPF, RIPv2)                                 -   All interfaces assigned to
                                                                               security zones for policy
    -   Tap mode – connect to SPAN port                                        enforcement                            PA-5020
    -   Virtual wire (“Layer 1”) for true
        transparent in-line deployment                                  • High Availability
                                                                                                                      PA-4060
    -   L2/L3 switching foundation                                         -   Active/active, active/passive
    -   Policy-based forwarding                                            -   Configuration and session
                                                                               synchronization                        PA-4050
• VPN                                                                      -   Path, link, and HA monitoring
    -   Site-to-site IPSec VPN
                                                                                                                      PA-4020
    -   SSL VPN                                                         • Virtual Systems
                                                                           -   Establish multiple virtual firewalls
• QoS traffic shaping                                                          in a single device (PA-5000, PA-
                                                                                                                      PA-2050
                                                                               4000, and PA-2000 Series)
    -   Max/guaranteed and priority
                                                                                                                      PA-2020
    -   By user, app, interface, zone, & more                           • Simple, flexible
    -   Real-time bandwidth monitor                                      management                                   PA-500
                                                                           -   CLI, Web, Panorama, SNMP,
                                                                               Syslog                                 PA-200

 Page 14 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
Introducing GlobalProtect

• Users never go “off-network” regardless of location
• All firewalls work together to provide “cloud” of network
  security
• How it works:
     -      Small agent determines network
            location (on or off the enterprise
            network)
     -      If off-network, the agent
            automatically connects the laptop to
            the nearest firewall via SSL VPN
     -      Agent submits host information
            profile (patch level, asset type, disk
            encryption, and more) to the
            gateway
     -      Gateway enforces security policy
            using App-ID, User-ID, Content-ID
            AND host information profile


Page 15 |    © 2011 Palo Alto Networks. Proprietary and Confidential.
Enterprise-Wide Next-Generation Firewall Protection
          •Perimeter                             •Data Center                       •Distributed Enterprise




                                                                                 •Branch                       •Remote
                                                                                  Office                        Users



• Identify and control applications,   • Network segmentation based on users   • Extending consistent security to all users
  users and content                      and applications                        and locations
• Positive enablement                  • High performance threat prevention    • Visibility and control over applications,
                                                                                 users and content




               Same Next-Generation Firewall, Different Benefits…
Comprehensive View of Applications, Users & Content
                                                                                      • Application Command
                                                                                         Center (ACC)
                                                                                          -    View
                                                                                               applications, URLs, threat
                                                                                               s, data filtering activity
                                                                                      • Add/remove filters to
                                                                                         achieve desired result




    Page 17 | © 2010 Palo Alto Networks. Proprietary and Confidential.
Filter on Facebook-base                     Filter on Facebook-base      Remove Facebook to
                                                    and user cook        expand view of cook
Palo Alto Networks Next-Gen Firewalls

 PA-5060                                                PA-5050                                   PA-5020
 • 20 Gbps FW/10 Gbps threat                            • 10 Gbps FW/5 Gbps threat                • 5 Gbps FW/2 Gbps threat
   prevention/4,000,000 sessions                          prevention/2,000,000 sessions             prevention/1,000,000 sessions
 • 4 SFP+ (10 Gig), 8 SFP (1 Gig), 12                    • 4 SFP+ (10 Gig), 8 SFP (1 Gig), 12     • 8 SFP, 12 copper gigabit
   copper gigabit                                                    copper gigabit




 PA-4060                                                 PA-4050                                  PA-4020
 • 10 Gbps FW/5 Gbps threat                              • 10 Gbps FW/5 Gbps threat               • 2 Gbps FW/2 Gbps threat
   prevention/2,000,000 sessions                           prevention/2,000,000 sessions            prevention/500,000 sessions
 • 4 XFP (10 Gig), 4 SFP (1 Gig)                         • 8 SFP, 16 copper gigabit               • 8 SFP, 16 copper gigabit




 PA-2050                                  PA-2020                              PA-500                        PA-200
 • 1 Gbps FW/500 Mbps                     • 500 Mbps FW/200 Mbps               • 250 Mbps FW/100 Mbps        • 100 Mbps FW/50 Mbps
   threat                                   threat                               threat prevention/64,000      threat prevention/64,000
   prevention/250,000                       prevention/125,000                   sessions                      sessions
   sessions                                 sessions                           • 8 copper gigabit            • 4 copper gigabit
 • 4 SFP, 16 copper gigabit               • 2 SFP, 12 copper gigabit
   Page 18 |   © 2011 Palo Alto Networks. Proprietary and Confidential
Addresses Three Key Business Problems
• Identify and Control Applications
     -      Visibility of over 1300 applications, regardless of port, protocol, encryption, or
            evasive tactic
     -      Fine-grained control over applications (allow, deny, limit, scan, shape)
     -      Addresses the key deficiencies of legacy firewall infrastructure
• Prevent Threats
     -      Stop a variety of threats – exploits (by vulnerability), viruses, spyware
     -      Stop leaks of confidential data (e.g., credit card #, social security #, file/type)
     -      Stream-based engine ensures high performance
     -      Enforce acceptable use policies on users for general web site browsing
• Simplify Security Infrastructure
     -      Put the firewall at the center of the network security infrastructure
     -      Reduce complexity in architecture and operations

Page 19 |   © 2011 Palo Alto Networks. Proprietary and Confidential.
Thank You




Page 20 |   © 2010 Palo Alto Networks. Proprietary and Confidential.

Weitere ähnliche Inhalte

Was ist angesagt?

Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You Castleforce
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
Palo Alto Networks - Magnifier
Palo Alto Networks - MagnifierPalo Alto Networks - Magnifier
Palo Alto Networks - MagnifierJisc
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASBAlberto Rivai
 
Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015Silva_2
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...SWITCHPOINT NV/SA
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Xylos
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 

Was ist angesagt? (20)

Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Palo Alto Networks - Magnifier
Palo Alto Networks - MagnifierPalo Alto Networks - Magnifier
Palo Alto Networks - Magnifier
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
 
Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 

Andere mochten auch

Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewallpillardata
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authenticationAlberto Rivai
 
2016 Wake of Fame Induction Ceremony Fact Sheet
2016 Wake of Fame Induction Ceremony Fact Sheet2016 Wake of Fame Induction Ceremony Fact Sheet
2016 Wake of Fame Induction Ceremony Fact SheetK 38
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye, Inc.
 
Securing your Rails application
Securing your Rails applicationSecuring your Rails application
Securing your Rails applicationclucasKrof
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSForgeRock
 
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networksdtimal
 
Vsphere 4-partner-training180
Vsphere 4-partner-training180Vsphere 4-partner-training180
Vsphere 4-partner-training180Suresh Kumar
 
Vfm website-projects
Vfm website-projectsVfm website-projects
Vfm website-projectsvfmindia
 
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...Netgear Italia
 

Andere mochten auch (17)

Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewall
 
Palo alto networks
Palo alto networksPalo alto networks
Palo alto networks
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
2016 Wake of Fame Induction Ceremony Fact Sheet
2016 Wake of Fame Induction Ceremony Fact Sheet2016 Wake of Fame Induction Ceremony Fact Sheet
2016 Wake of Fame Induction Ceremony Fact Sheet
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Securing your Rails application
Securing your Rails applicationSecuring your Rails application
Securing your Rails application
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 
rpt-world-eco-forum Final
rpt-world-eco-forum Finalrpt-world-eco-forum Final
rpt-world-eco-forum Final
 
Champion building
Champion buildingChampion building
Champion building
 
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networks
 
FlexPod_for_HondaTH
FlexPod_for_HondaTHFlexPod_for_HondaTH
FlexPod_for_HondaTH
 
NATE-Central-Log
NATE-Central-LogNATE-Central-Log
NATE-Central-Log
 
PAN Platform Summary
PAN Platform SummaryPAN Platform Summary
PAN Platform Summary
 
Vsphere 4-partner-training180
Vsphere 4-partner-training180Vsphere 4-partner-training180
Vsphere 4-partner-training180
 
Vfm website-projects
Vfm website-projectsVfm website-projects
Vfm website-projects
 
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
 

Ähnlich wie Palo alto networks_customer_overview_november2011-short

Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablementresponsedatacomms
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Companydtimal
 
DSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF TechDSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF TechAndris Soroka
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 
Fact v fiction_competing_with_checkpoint_applicationblade
Fact v fiction_competing_with_checkpoint_applicationbladeFact v fiction_competing_with_checkpoint_applicationblade
Fact v fiction_competing_with_checkpoint_applicationbladeChandan Munshi
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- DatasheetINSPIRIT BRASIL
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADFF5 Networks
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...BAKOTECH
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Securityneoma329
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011Agora Group
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Palo Alto Networks K-12
Palo Alto Networks K-12Palo Alto Networks K-12
Palo Alto Networks K-12Altaware, Inc.
 
Moving Security Model From Content to Context
Moving Security Model From Content to ContextMoving Security Model From Content to Context
Moving Security Model From Content to ContextPaolo Passeri
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorCA API Management
 
Pro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsPro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsBelsoft
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1Andris Soroka
 

Ähnlich wie Palo alto networks_customer_overview_november2011-short (20)

Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablement
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
DSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF TechDSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF Tech
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
Fact v fiction_competing_with_checkpoint_applicationblade
Fact v fiction_competing_with_checkpoint_applicationbladeFact v fiction_competing_with_checkpoint_applicationblade
Fact v fiction_competing_with_checkpoint_applicationblade
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
NetSafe - 11nov2011
NetSafe - 11nov2011NetSafe - 11nov2011
NetSafe - 11nov2011
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Palo Alto Networks K-12
Palo Alto Networks K-12Palo Alto Networks K-12
Palo Alto Networks K-12
 
Moving Security Model From Content to Context
Moving Security Model From Content to ContextMoving Security Model From Content to Context
Moving Security Model From Content to Context
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
 
Pro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsPro& Contra Next Generation Firewalls
Pro& Contra Next Generation Firewalls
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Palo alto networks_customer_overview_november2011-short

  • 1. Palo Alto Networks Overview November 2011
  • 2. About Palo Alto Networks • Palo Alto Networks is the Network Security Company • World-class team with strong security and networking experience - Founded in 2005, first customer July 2007, top-tier investors • Builds next-generation firewalls that identify / control 1,300+ applications - Restores the firewall as the core of enterprise network security infrastructure - Innovations: App-ID™, User-ID™, Content-ID™ • Global momentum: 6,000+ customers - August 2011: Annual bookings run rate is over US$200 million*, cash-flow positive last five consecutive quarters •A few of the many enterprises that have deployed more than $1M Page 2 | © 2011 Palo Alto Networks. Proprietary and Confidential. (*) Bookings run rate is defined as 4 (four) times the bookings amount of the most recently finished fiscal quarter. Bookings are defined as non-cancellable orders received during the fiscal period. Palo Alto Networks’ fiscal year runs from August 1st until July 31st.
  • 3. Next-Generation Firewalls Are Network Security Page 3 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 4. 2011 Magic Quadrant for Enterprise Network Firewalls Page 4 | © 2010 Palo Alto Networks. Proprietary and Confidential.
  • 5. Applications Have Changed; Firewalls Have Not The firewall is the right place to enforce policy control • Sees all traffic • Defines trust boundary • Enables access via positive control BUT…applications have changed • Ports ≠ Applications • IP Addresses ≠ Users • Packets ≠ Content Need to restore visibility and control in the firewall Page 5 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 6. Enterprise 2.0 Applications and Risks Widespread Palo Alto Networks’ latest Application Usage & Risk Report highlights actual behavior of 1M+ users in 1253 organizations - More enterprise 2.0 application use for personal and business reasons. - Tunneling and port hopping are common - Bottom line: all had firewalls, most had IPS, proxies, & URL filtering – but none of these organizations could control what applications ran on their networks Page 6 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 7. Technology Sprawl & Creep Are Not The Answer Internet • “More stuff” doesn’t solve the problem • Firewall “helpers” have limited view of traffic • Complex and costly to buy and maintain • Putting all of this in the same box is just slow Page 7 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 8. The Right Answer: Make the Firewall Do Its Job New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Protect in real-time against threats embedded across applications 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, in-line deployment with no performance degradation Page 8 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 9. Why Visibility & Control Must Be In The Firewall Application Control as an Add-on • Port-based FW + App Ctrl (IPS) = two policies Traffic Port • Applications are threats; only block what you Firewall IPS expressly look for Applications Implications • Network access decision is made with no •Port Policy •App Ctrl Policy information Decision Decision • Cannot safely enable applications NGFW Application Control • Application control is in the firewall = single policy Traffic Application • Visibility across all ports, for all traffic, all the time Firewall IPS Implications • Network access decision is made based on Applications application identity •App Ctrl Policy •Scan Application • Safely enable application usage Decision for Threats Page 9 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 10. Your Control With a Next-Generation Firewall Safely enable the Only allow the applications relevant apps you need to your business » Traffic limited to » Complete threat library with no approved business blind spots use cases based on App and User  Bi-directional inspection » Attack surface  Scans inside of SSL reduced by orders of  Scans inside compressed magnitude files » The ever-expanding  Scans inside proxies and universe of applications, tunnels services and threats Page 10 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 11. Identification Technologies Transform the Firewall •App-ID™ •Identify the application •User-ID™ •Identify the user •Content-ID™ •Scan the content Page 11 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 12. Single-Pass Parallel Processing™ (SP3) Architecture Single Pass • Operations once per packet - Traffic classification (app identification) - User/group mapping - Content scanning – threats, URLs, confidential data • One policy Parallel Processing • Function-specific parallel processing hardware engines • Separate data/control planes •Up to 20Gbps, Low Latency Page 12 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 13. PA-5000 Series Architecture RAM RAM • Highly available mgmt Signature Match HW Engine • High speed logging and • Stream-based uniform sig. match RAM RAM route update • Dual hard drives • 40+ processors • Vulnerability exploits (IPS), virus, Signature Match Signature Match spyware, CC#, SSN, and more RAM RAM • 30+ GB of RAM RAM RAM RAM • Separate high speed data and 10Gbps 10Gbps Quad-core RAM CPU CPU CPU CPU control planesCPU RAM RAM CPU CPU CPU CPU ... CPU RAM HDD ... ... 1 2 12 RAM 1 2 12 RAM 1 2 12 RAM HDD Control Plane SSL • 20Compress. firewall IPSec Compress. IPSec De- Gbps SSL De- throughput SSL IPSec De- Compress. • 10 Gbps threat prevention throughput 20Gbps • 80 Gbps switch fabric Security Processors interconnect • 20 Gbps QoS engine • 4 Million concurrent sessions • High density parallel processing for flexible security Route, functionality Flow Network Processor ARP, • Hardware-acceleration for MAC NAT • 20 Gbps front-end network Switch control QoS standardized complex functions lookup processing Fabric (SSL, IPSec, decompression) • Hardware accelerated per-packet route lookup, MAC lookup and Switch Fabric Data Plane NAT Page 13 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 14. PAN-OS Core Firewall Features Visibility and control of applications, users and content complement core firewall features PA-5060 • Strong networking foundation • Zone-based architecture PA-5050 - Dynamic routing (BGP, OSPF, RIPv2) - All interfaces assigned to security zones for policy - Tap mode – connect to SPAN port enforcement PA-5020 - Virtual wire (“Layer 1”) for true transparent in-line deployment • High Availability PA-4060 - L2/L3 switching foundation - Active/active, active/passive - Policy-based forwarding - Configuration and session synchronization PA-4050 • VPN - Path, link, and HA monitoring - Site-to-site IPSec VPN PA-4020 - SSL VPN • Virtual Systems - Establish multiple virtual firewalls • QoS traffic shaping in a single device (PA-5000, PA- PA-2050 4000, and PA-2000 Series) - Max/guaranteed and priority PA-2020 - By user, app, interface, zone, & more • Simple, flexible - Real-time bandwidth monitor management PA-500 - CLI, Web, Panorama, SNMP, Syslog PA-200 Page 14 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 15. Introducing GlobalProtect • Users never go “off-network” regardless of location • All firewalls work together to provide “cloud” of network security • How it works: - Small agent determines network location (on or off the enterprise network) - If off-network, the agent automatically connects the laptop to the nearest firewall via SSL VPN - Agent submits host information profile (patch level, asset type, disk encryption, and more) to the gateway - Gateway enforces security policy using App-ID, User-ID, Content-ID AND host information profile Page 15 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 16. Enterprise-Wide Next-Generation Firewall Protection •Perimeter •Data Center •Distributed Enterprise •Branch •Remote Office Users • Identify and control applications, • Network segmentation based on users • Extending consistent security to all users users and content and applications and locations • Positive enablement • High performance threat prevention • Visibility and control over applications, users and content Same Next-Generation Firewall, Different Benefits…
  • 17. Comprehensive View of Applications, Users & Content • Application Command Center (ACC) - View applications, URLs, threat s, data filtering activity • Add/remove filters to achieve desired result Page 17 | © 2010 Palo Alto Networks. Proprietary and Confidential. Filter on Facebook-base Filter on Facebook-base Remove Facebook to and user cook expand view of cook
  • 18. Palo Alto Networks Next-Gen Firewalls PA-5060 PA-5050 PA-5020 • 20 Gbps FW/10 Gbps threat • 10 Gbps FW/5 Gbps threat • 5 Gbps FW/2 Gbps threat prevention/4,000,000 sessions prevention/2,000,000 sessions prevention/1,000,000 sessions • 4 SFP+ (10 Gig), 8 SFP (1 Gig), 12 • 4 SFP+ (10 Gig), 8 SFP (1 Gig), 12 • 8 SFP, 12 copper gigabit copper gigabit copper gigabit PA-4060 PA-4050 PA-4020 • 10 Gbps FW/5 Gbps threat • 10 Gbps FW/5 Gbps threat • 2 Gbps FW/2 Gbps threat prevention/2,000,000 sessions prevention/2,000,000 sessions prevention/500,000 sessions • 4 XFP (10 Gig), 4 SFP (1 Gig) • 8 SFP, 16 copper gigabit • 8 SFP, 16 copper gigabit PA-2050 PA-2020 PA-500 PA-200 • 1 Gbps FW/500 Mbps • 500 Mbps FW/200 Mbps • 250 Mbps FW/100 Mbps • 100 Mbps FW/50 Mbps threat threat threat prevention/64,000 threat prevention/64,000 prevention/250,000 prevention/125,000 sessions sessions sessions sessions • 8 copper gigabit • 4 copper gigabit • 4 SFP, 16 copper gigabit • 2 SFP, 12 copper gigabit Page 18 | © 2011 Palo Alto Networks. Proprietary and Confidential
  • 19. Addresses Three Key Business Problems • Identify and Control Applications - Visibility of over 1300 applications, regardless of port, protocol, encryption, or evasive tactic - Fine-grained control over applications (allow, deny, limit, scan, shape) - Addresses the key deficiencies of legacy firewall infrastructure • Prevent Threats - Stop a variety of threats – exploits (by vulnerability), viruses, spyware - Stop leaks of confidential data (e.g., credit card #, social security #, file/type) - Stream-based engine ensures high performance - Enforce acceptable use policies on users for general web site browsing • Simplify Security Infrastructure - Put the firewall at the center of the network security infrastructure - Reduce complexity in architecture and operations Page 19 | © 2011 Palo Alto Networks. Proprietary and Confidential.
  • 20. Thank You Page 20 | © 2010 Palo Alto Networks. Proprietary and Confidential.

Hinweis der Redaktion

  1. Google Docs and Calendar resource consumption* is up significantly Google Talk Gadget shot up by 56% while Google Talk dropped 76% Bandwidth consumed by Facebook, per organization, is a staggering 4.9 GBBandwidth consumed by Sharepoint and LinkedIn is up 14% and 48% respectively67% of the applications use port 80, port 443, or hop portsMany (190) are client–server 177 can tunnel other applications, a feature no longer reserved for SSL or SSH