SlideShare a Scribd company logo
1 of 26
the  changed enterprise  has arrived . . . . . . and you need to get control of it! Wat is er aan de hand op het gebied van security en firewalls? Marcel Derksen System Engineer, Noord Europa
Our enterprise is changing ,[object Object],[object Object],[object Object],[object Object],[object Object],Internet Enterprise Work Life Home Life Rewards Risks
Enterprise applications take many forms What’s running on YOUR network?
what we recently found on enterprise networks ,[object Object],[object Object]
employees use them, but management is struggling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
business benefits of enterprise applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],internal risks of enterprise applications
but employees are unconcerned about risks  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
summary of the social enterprise challenge for IT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
the underlying cause of the security problem ,[object Object],[object Object]
The current solving Internet ,[object Object],[object Object],[object Object],© 2009 Palo Alto Networks. Proprietary and Confidential. Page    |
enough!  it’s time to fix the firewall! How to Make  the Firewall Useful Again 1. Identify applications regardless of    port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address  3. Identify and prevent potential threats  associated with all high risk applications 4. Granular policy-based control over applications, users, functionality 5. Multi-gigabit, in-line deployment with    no performance degradation
Einde deel 1 Marcel Derksen System Engineer, Noord Europa
Palo Alto Next Generation Firewalls Marcel Derksen System Engineer, Noord Europa
enough!  it’s time to fix the firewall! How to Make  the Firewall Useful Again 1. Identify applications regardless of    port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address  3. Identify and prevent potential threats  associated with all high risk applications 4. Granular policy-based control over applications, users, functionality 5. Multi-gigabit, in-line deployment with    no performance degradation
About Palo Alto Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],© 2009 Palo Alto Networks. Proprietary and Confidential. Page    |
Unique Technologies Transform the Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2009 Palo Alto Networks. Proprietary and Confidential. Page    |
Purpose-Built Architecture: PA-4000 Series  © 2009 Palo Alto Networks. Proprietary and Confidential. Page    |  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],10Gbps Dual-core CPU RAM RAM HDD ,[object Object],[object Object],[object Object],CPU 16 . . SSL IPSec De-Compression CPU 1 CPU 2 10Gbps Control Plane Data Plane RAM RAM CPU 3 QoS Route, ARP, MAC lookup NAT Content Scanning Engine RAM RAM RAM RAM
Enables Executive Visibility © 2009 Palo Alto Networks. Proprietary and Confidential. Page    |  © 2008 Palo Alto Networks. Proprietary and Confidential. Page    |  © 2008 Palo Alto Networks. Proprietary and Confidential. Page    |
Palo Alto Networks-OS Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2009 Palo Alto Networks. Proprietary and Confidential. Page    |  Visibility and control of applications, users and content are  complemented by core firewall features   PA-500 PA-2020 PA-2050 PA-4020 PA-4050 PA-4060
Flexible Deployment Options © 2009 Palo Alto Networks. Proprietary and Confidential. Page    |  Visibility Transparent In-Line Firewall Replacement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
you decide how much control is needed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
next generation firewalls for everyone ,[object Object],[object Object],[object Object],PA-2000 Series PA-4000 Series PA-500
Leading Organizations Trust Palo Alto Networks © 2009 Palo Alto Networks. Proprietary and Confidential Page    |  Financial Services Government Media / Entertainment / Retail Service Providers / Services
Leading Organizations Trust Palo Alto Networks © 2009 Palo Alto Networks. Proprietary and Confidential Page    |  Education Mfg / High Tech / Energy Healthcare Industry
thank you! enough talking, show us  

More Related Content

What's hot

NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
Mohit8780
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
Kristin Helgeson
 

What's hot (20)

Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
Industrial Communication Systems
Industrial Communication SystemsIndustrial Communication Systems
Industrial Communication Systems
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile DevicesSecure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 

Similar to Palo Alto Networks Soc Ent Okt2009

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
Sergiy Pitel
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 

Similar to Palo Alto Networks Soc Ent Okt2009 (20)

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Information Security
Information SecurityInformation Security
Information Security
 
Secure Enterprise Mobility
Secure Enterprise MobilitySecure Enterprise Mobility
Secure Enterprise Mobility
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
Palo Alto Networks K-12
Palo Alto Networks K-12Palo Alto Networks K-12
Palo Alto Networks K-12
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 

More from Zernike College

2011-0623-PresentatieWirelessHacking.docx
2011-0623-PresentatieWirelessHacking.docx2011-0623-PresentatieWirelessHacking.docx
2011-0623-PresentatieWirelessHacking.docx
Zernike College
 
2011-0623Mobilesinonderwijs.pdf
2011-0623Mobilesinonderwijs.pdf2011-0623Mobilesinonderwijs.pdf
2011-0623Mobilesinonderwijs.pdf
Zernike College
 
2011 0414 digiborden presentatie ipon
2011 0414 digiborden presentatie ipon2011 0414 digiborden presentatie ipon
2011 0414 digiborden presentatie ipon
Zernike College
 
PRESENTATIE MOVARE over live@edu ipon 2011
PRESENTATIE MOVARE over live@edu ipon 2011PRESENTATIE MOVARE over live@edu ipon 2011
PRESENTATIE MOVARE over live@edu ipon 2011
Zernike College
 
2010 1124 digiborden presentatie i&i
2010 1124 digiborden presentatie i&i2010 1124 digiborden presentatie i&i
2010 1124 digiborden presentatie i&i
Zernike College
 
Why buy the taxi if you can pay
Why buy the taxi if you can payWhy buy the taxi if you can pay
Why buy the taxi if you can pay
Zernike College
 
2010 1111 live edu gebruikersdag
2010 1111 live edu gebruikersdag2010 1111 live edu gebruikersdag
2010 1111 live edu gebruikersdag
Zernike College
 

More from Zernike College (20)

2013 0605 presentatie ict-dag klaar
2013 0605 presentatie ict-dag klaar2013 0605 presentatie ict-dag klaar
2013 0605 presentatie ict-dag klaar
 
Mart 120419 ict noord
Mart 120419 ict noordMart 120419 ict noord
Mart 120419 ict noord
 
2011-0623-PresentatieWirelessHacking.docx
2011-0623-PresentatieWirelessHacking.docx2011-0623-PresentatieWirelessHacking.docx
2011-0623-PresentatieWirelessHacking.docx
 
2011-0623Mobilesinonderwijs.pdf
2011-0623Mobilesinonderwijs.pdf2011-0623Mobilesinonderwijs.pdf
2011-0623Mobilesinonderwijs.pdf
 
2011 0414 digiborden presentatie ipon
2011 0414 digiborden presentatie ipon2011 0414 digiborden presentatie ipon
2011 0414 digiborden presentatie ipon
 
It service management
It service managementIt service management
It service management
 
Kunst en technologie
Kunst en technologieKunst en technologie
Kunst en technologie
 
Energie en ict presentatie flexines - 2011-03-10
Energie en ict    presentatie flexines - 2011-03-10Energie en ict    presentatie flexines - 2011-03-10
Energie en ict presentatie flexines - 2011-03-10
 
Ict is fantastisch ict-noord-nederland - maart 2011
Ict is fantastisch  ict-noord-nederland - maart 2011Ict is fantastisch  ict-noord-nederland - maart 2011
Ict is fantastisch ict-noord-nederland - maart 2011
 
PRESENTATIE MOVARE over live@edu ipon 2011
PRESENTATIE MOVARE over live@edu ipon 2011PRESENTATIE MOVARE over live@edu ipon 2011
PRESENTATIE MOVARE over live@edu ipon 2011
 
2011 0414 google docs versus microsoft live@edu
2011 0414 google docs  versus microsoft live@edu2011 0414 google docs  versus microsoft live@edu
2011 0414 google docs versus microsoft live@edu
 
Office 365
Office 365Office 365
Office 365
 
2010 1124 digiborden presentatie i&i
2010 1124 digiborden presentatie i&i2010 1124 digiborden presentatie i&i
2010 1124 digiborden presentatie i&i
 
Battle of the clouds
Battle of the cloudsBattle of the clouds
Battle of the clouds
 
Cloudcomputingkennisnet
CloudcomputingkennisnetCloudcomputingkennisnet
Cloudcomputingkennisnet
 
Why buy the taxi if you can pay
Why buy the taxi if you can payWhy buy the taxi if you can pay
Why buy the taxi if you can pay
 
Office 365
Office 365Office 365
Office 365
 
OFFICE 365 peter dehaas
OFFICE 365 peter dehaasOFFICE 365 peter dehaas
OFFICE 365 peter dehaas
 
2010 1111 live edu gebruikersdag
2010 1111 live edu gebruikersdag2010 1111 live edu gebruikersdag
2010 1111 live edu gebruikersdag
 
Ruckus Wireless bij ICT-noord
Ruckus Wireless bij ICT-noordRuckus Wireless bij ICT-noord
Ruckus Wireless bij ICT-noord
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Palo Alto Networks Soc Ent Okt2009

  • 1. the changed enterprise has arrived . . . . . . and you need to get control of it! Wat is er aan de hand op het gebied van security en firewalls? Marcel Derksen System Engineer, Noord Europa
  • 2.
  • 3. Enterprise applications take many forms What’s running on YOUR network?
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. enough! it’s time to fix the firewall! How to Make the Firewall Useful Again 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Identify and prevent potential threats associated with all high risk applications 4. Granular policy-based control over applications, users, functionality 5. Multi-gigabit, in-line deployment with no performance degradation
  • 13. Einde deel 1 Marcel Derksen System Engineer, Noord Europa
  • 14. Palo Alto Next Generation Firewalls Marcel Derksen System Engineer, Noord Europa
  • 15. enough! it’s time to fix the firewall! How to Make the Firewall Useful Again 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Identify and prevent potential threats associated with all high risk applications 4. Granular policy-based control over applications, users, functionality 5. Multi-gigabit, in-line deployment with no performance degradation
  • 16.
  • 17.
  • 18.
  • 19. Enables Executive Visibility © 2009 Palo Alto Networks. Proprietary and Confidential. Page | © 2008 Palo Alto Networks. Proprietary and Confidential. Page | © 2008 Palo Alto Networks. Proprietary and Confidential. Page |
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Leading Organizations Trust Palo Alto Networks © 2009 Palo Alto Networks. Proprietary and Confidential Page | Financial Services Government Media / Entertainment / Retail Service Providers / Services
  • 25. Leading Organizations Trust Palo Alto Networks © 2009 Palo Alto Networks. Proprietary and Confidential Page | Education Mfg / High Tech / Energy Healthcare Industry
  • 26. thank you! enough talking, show us 

Editor's Notes

  1. Inernet coming in; enterprise apps moving out. Users right in the middle. Hard to define/manage a hard boundary users also in the middle of personal/professional life – internet is part of both How do you control boundary there? Your challenge – minimize risks/max rewards
  2. 494 unique apps * 30 business apps * 44 file sharing apps (all types) * 43 photo/video apps * 17 social networking * 45 IM
  3. Now lets change gears and think positive… What the firewall really did provide innovation? What would it look like? Based on whats really happening, here are 5 critical requirements. Networks exist to support apps – you need to see them Ip addresses are annoying – you need to know the user by name Forget adding other threat prevention stuff – make the FW stop the damn threats! If you have this level of visibility, the policies you create will be effective and enforceable at the end of the day, it must keep pace with your business – security stuff should not slow you down.
  4. Now lets change gears and think positive… What the firewall really did provide innovation? What would it look like? Based on whats really happening, here are 5 critical requirements. Networks exist to support apps – you need to see them Ip addresses are annoying – you need to know the user by name Forget adding other threat prevention stuff – make the FW stop the damn threats! If you have this level of visibility, the policies you create will be effective and enforceable at the end of the day, it must keep pace with your business – security stuff should not slow you down.
  5. 03/05/07