SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Palo Alto Networks Customer Presentation May 2010
About Palo Alto Networks ,[object Object]
World-class team with strong security and networking experience
Founded in 2005 by security visionary NirZuk
Top-tier investors
Builds next-generation firewalls that identify / control 1000+ applications
Restores the firewall as the core of the enterprise network security infrastructure
Innovations:  App-ID™, User-ID™, Content-ID™
Global footprint: 1,300+ customers in 50+ countries, 24/7 support,[object Object]
 Defines trust boundaryBUT…applications have changed ,[object Object]
 IP Addresses ≠ Users
 Packets ≠ ContentNeed to restore visibility and control in the firewall
Applications Carry Risk © 2010 Palo Alto Networks. Proprietary and Confidential. Page 4   | Applications can be “threats” ,[object Object],Applications carry threats ,[object Object],Applications & application-level threats result in major breaches – Pfizer, VA, US Army
Enterprise 2.0 Applications and Risks Widespread © 2010 Palo Alto Networks. Proprietary and Confidential. Page 5   | Palo Alto Networks’ latest Application Usage & Risk Report highlights actual behavior of 1M+ users across more than 340 organizations ,[object Object]
Tunneling and port hoppingare common
Bottom line:  all had firewalls, and most had IPS, proxies, & URL filtering – but none of these organizations could control what applications ran on their networks,[object Object],[object Object]
Why It Has To Be The Firewall IPS IPS Applications Firewall Path of least resistance - build it with legacy security boxes Applications = threats Can only see what you expressly look for Can’t “allow, but…” Most difficult path - can’t be built with legacy security boxes Applications = applications, threats = threats Can see everything Can “allow, but…” Firewall Applications Traffic decision is made at the firewall No application knowledge = bad decision
Identification Technologies Transform the Firewall © 2010 Palo Alto Networks. Proprietary and Confidential. Page 9   | ,[object Object]
Identify the application
User-ID™
Identify the user
Content-ID™
Scan the content,[object Object]
Traffic classification (app identification)
User/group mapping
Content scanning – threats, URLs, confidential data
One policyParallel Processing ,[object Object]
Separate data/control planesUp to 10Gbps, Low Latency
© 2010 Palo Alto Networks. Proprietary and Confidential. Page 11   | Comprehensive View of Applications, Users & Content Filter on Facebook-baseand user cook Remove Facebook to expand view of cook Application Command Center (ACC) View applications, URLs, threats, data filtering activity Add/remove filters to achieve desired result  Filter on Facebook-base
© 2010 Palo Alto Networks. Proprietary and Confidential. Page 12   | PAN-OS Core Firewall Features Visibility and control of applications, users and content complement core firewall features Zone-based architecture All interfaces assigned to security zones for policy enforcement  High Availability Active / passive  Configuration and session synchronization Path, link, and HA monitoring Virtual Systems Establish multiple virtual firewalls in a single device (PA-4000 and PA-2000 Series only) Simple, flexible management CLI, Web, Panorama, SNMP, Syslog Strong networking foundation Dynamic routing (BGP, OSPF, RIPv2) Tap mode – connect to SPAN port Virtual wire (“Layer 1”) for true transparent in-line deployment L2/L3 switching foundation Policy-based forwarding VPN Site-to-site IPSec VPN  SSL VPN  QoS traffic shaping Max/guaranteed and priority  By user, app, interface, zone, & more Real-time bandwidth monitor PA-4060 PA-4050 PA-4020 PA-2050 PA-2020 PA-500
2010 Magic Quadrant for Enterprise Network Firewalls © 2010 Palo Alto Networks. Proprietary and Confidential. Page 13   | Cisco Juniper Networks Fortinet Check Point Software Technologies McAfee ability to execute Stonesoft Palo Alto Networks SonicWALL WatchGuard NETASQ Astaro phion 3Com/H3C visionaries niche players As of March 2010 completeness of vision Source: Gartner
Addresses Three Key Business Problems Identify and Control Applications Visibility of 1000+ applications, regardless of port, protocol, encryption, or evasive tactic Fine-grained control over applications (allow, deny, limit, scan, shape) Addresses the key deficiencies of legacy firewall infrastructure Prevent Threats Stop a variety of threats – exploits (by vulnerability), viruses, spyware Stop leaks of confidential data (e.g., credit card #, social security #) Stream-based engine ensures high performance Enforce acceptable use policies on users for general web site browsing Simplify Security Infrastructure Put the firewall at the center of the network security infrastructure Reduce complexity in architecture and operations © 2010 Palo Alto Networks. Proprietary and Confidential. Page 14   |
Thank You © 2010 Palo Alto Networks. Proprietary and Confidential. Page 15   |

Weitere ähnliche Inhalte

Was ist angesagt?

Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008eComm2008
 
Meraki Solution Overview
Meraki Solution OverviewMeraki Solution Overview
Meraki Solution OverviewClaudiu Sandor
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 
Meraki Cloud Wireless Lan
Meraki Cloud Wireless LanMeraki Cloud Wireless Lan
Meraki Cloud Wireless LanChikPea
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 PraesentationSophan_Pheng
 
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Dialogic Inc.
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)subtitle
 
SD-WAN's Role in the Multi-Cloud Digital Transformation
SD-WAN's Role in the Multi-Cloud Digital TransformationSD-WAN's Role in the Multi-Cloud Digital Transformation
SD-WAN's Role in the Multi-Cloud Digital TransformationRalph Santitoro
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Mahbubul Alam
 
Global Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorsGlobal Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorspaul young cpa, cga
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...PositiveTechnologies
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
Deploying Access for 3G and 4G Mobile Networks
Deploying Access for 3G and 4G Mobile NetworksDeploying Access for 3G and 4G Mobile Networks
Deploying Access for 3G and 4G Mobile NetworksCisco Canada
 
Unravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesUnravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesRalph Santitoro
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5GDirk Kutscher
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
 
Wireless Cloud
Wireless CloudWireless Cloud
Wireless CloudAzmat Anis
 

Was ist angesagt? (18)

Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008
 
Meraki Solution Overview
Meraki Solution OverviewMeraki Solution Overview
Meraki Solution Overview
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
Meraki Cloud Wireless Lan
Meraki Cloud Wireless LanMeraki Cloud Wireless Lan
Meraki Cloud Wireless Lan
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
 
Meraki overview 2011 general (2) (1)
Meraki overview 2011   general (2) (1)Meraki overview 2011   general (2) (1)
Meraki overview 2011 general (2) (1)
 
SD-WAN's Role in the Multi-Cloud Digital Transformation
SD-WAN's Role in the Multi-Cloud Digital TransformationSD-WAN's Role in the Multi-Cloud Digital Transformation
SD-WAN's Role in the Multi-Cloud Digital Transformation
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
 
Global Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorsGlobal Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendors
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
Deploying Access for 3G and 4G Mobile Networks
Deploying Access for 3G and 4G Mobile NetworksDeploying Access for 3G and 4G Mobile Networks
Deploying Access for 3G and 4G Mobile Networks
 
Mobile Scoping 05-13-11
Mobile Scoping 05-13-11Mobile Scoping 05-13-11
Mobile Scoping 05-13-11
 
Unravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesUnravelling Managed SD-WAN Services
Unravelling Managed SD-WAN Services
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
Wireless Cloud
Wireless CloudWireless Cloud
Wireless Cloud
 

Andere mochten auch

Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networksdtimal
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-idAlberto Rivai
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configurationAlberto Rivai
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewallpillardata
 

Andere mochten auch (7)

Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networks
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configuration
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewall
 

Ähnlich wie Palo Alto Networks, The Networking Security Company

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...BAKOTECH
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityZymbian
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablementresponsedatacomms
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSLarry Austin
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywhereGlobal Knowledge Training
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IPJisc
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIARobb Boyd
 

Ähnlich wie Palo Alto Networks, The Networking Security Company (20)

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablement
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention Everywhere
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IP
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
 

Palo Alto Networks, The Networking Security Company

  • 1. Palo Alto Networks Customer Presentation May 2010
  • 2.
  • 3. World-class team with strong security and networking experience
  • 4. Founded in 2005 by security visionary NirZuk
  • 6. Builds next-generation firewalls that identify / control 1000+ applications
  • 7. Restores the firewall as the core of the enterprise network security infrastructure
  • 8. Innovations: App-ID™, User-ID™, Content-ID™
  • 9.
  • 10.
  • 11. IP Addresses ≠ Users
  • 12. Packets ≠ ContentNeed to restore visibility and control in the firewall
  • 13.
  • 14.
  • 15. Tunneling and port hoppingare common
  • 16.
  • 17. Why It Has To Be The Firewall IPS IPS Applications Firewall Path of least resistance - build it with legacy security boxes Applications = threats Can only see what you expressly look for Can’t “allow, but…” Most difficult path - can’t be built with legacy security boxes Applications = applications, threats = threats Can see everything Can “allow, but…” Firewall Applications Traffic decision is made at the firewall No application knowledge = bad decision
  • 18.
  • 23.
  • 24. Traffic classification (app identification)
  • 26. Content scanning – threats, URLs, confidential data
  • 27.
  • 28. Separate data/control planesUp to 10Gbps, Low Latency
  • 29. © 2010 Palo Alto Networks. Proprietary and Confidential. Page 11 | Comprehensive View of Applications, Users & Content Filter on Facebook-baseand user cook Remove Facebook to expand view of cook Application Command Center (ACC) View applications, URLs, threats, data filtering activity Add/remove filters to achieve desired result Filter on Facebook-base
  • 30. © 2010 Palo Alto Networks. Proprietary and Confidential. Page 12 | PAN-OS Core Firewall Features Visibility and control of applications, users and content complement core firewall features Zone-based architecture All interfaces assigned to security zones for policy enforcement High Availability Active / passive Configuration and session synchronization Path, link, and HA monitoring Virtual Systems Establish multiple virtual firewalls in a single device (PA-4000 and PA-2000 Series only) Simple, flexible management CLI, Web, Panorama, SNMP, Syslog Strong networking foundation Dynamic routing (BGP, OSPF, RIPv2) Tap mode – connect to SPAN port Virtual wire (“Layer 1”) for true transparent in-line deployment L2/L3 switching foundation Policy-based forwarding VPN Site-to-site IPSec VPN SSL VPN QoS traffic shaping Max/guaranteed and priority By user, app, interface, zone, & more Real-time bandwidth monitor PA-4060 PA-4050 PA-4020 PA-2050 PA-2020 PA-500
  • 31. 2010 Magic Quadrant for Enterprise Network Firewalls © 2010 Palo Alto Networks. Proprietary and Confidential. Page 13 | Cisco Juniper Networks Fortinet Check Point Software Technologies McAfee ability to execute Stonesoft Palo Alto Networks SonicWALL WatchGuard NETASQ Astaro phion 3Com/H3C visionaries niche players As of March 2010 completeness of vision Source: Gartner
  • 32. Addresses Three Key Business Problems Identify and Control Applications Visibility of 1000+ applications, regardless of port, protocol, encryption, or evasive tactic Fine-grained control over applications (allow, deny, limit, scan, shape) Addresses the key deficiencies of legacy firewall infrastructure Prevent Threats Stop a variety of threats – exploits (by vulnerability), viruses, spyware Stop leaks of confidential data (e.g., credit card #, social security #) Stream-based engine ensures high performance Enforce acceptable use policies on users for general web site browsing Simplify Security Infrastructure Put the firewall at the center of the network security infrastructure Reduce complexity in architecture and operations © 2010 Palo Alto Networks. Proprietary and Confidential. Page 14 |
  • 33. Thank You © 2010 Palo Alto Networks. Proprietary and Confidential. Page 15 |
  • 34. Additional Information Speeds and Feeds, Deployment, Customers, TCO, Support, and Management
  • 35.
  • 36. 5 Gbps threat prevention
  • 39.
  • 40. 2 Gbps threat prevention
  • 43.
  • 44. 5 Gbps threat prevention
  • 46. 4 XFP (10 Gig) I/O
  • 47.
  • 48. 500 Mbps threat prevention
  • 51.
  • 52. 200 Mbps threat prevention
  • 55.
  • 56. 100 Mbps threat prevention
  • 58.
  • 59. G2000 Organizations Trust Palo Alto Networks © 2010 Palo Alto Networks. Proprietary and Confidential. Page 19 |
  • 60.
  • 61.
  • 65. Save on “soft” costs too
  • 66. Rack space, deployment/integration, headcount, training, help desk callsCut by as much as 65%
  • 67. Legendary Customer Support Experience Strong TSE team with deep network security and infrastructure knowledge Experience with every major firewall TSEs average over 15 years of experience TSEs co-located with engineering – in Sunnyvale, CA Premium and Standard offerings Rave reviews from customers © 2010 Palo Alto Networks. Proprietary and Confidential. Page 21 | Customer support has always been amazing. Whenever I call, I always get someone knowledgeable right away, and never have to wait. They give me the answer I need quickly and completely. Every support rep I have spoken with knows his stuff. -Mark Kimball, Hewlett-Packard Customer support has been extraordinarily helpful – which is not the norm when dealing with technology companies. Their level of knowledge, their willingness to participate – it’s night and day compared to other companies. It’s an incredible strength of Palo Alto Networks. -James Jones, UPMC
  • 68.
  • 69. IPS with app visibility & control
  • 70. Consolidation of IPS & URL filtering
  • 71. Firewall replacement with app visibility & control
  • 73.
  • 74. Enables Visibility Into Applications, Users, and Content
  • 75. Site-to-Site and Remote Access VPN Site-to-site VPN connectivity Remote user connectivity Secure connectivity Standards-based site-to-site IPSec VPN SSL VPN for remote access Policy-based visibility and control over applications, users and content for all VPN traffic Included as features in PAN-OS at no extra charge
  • 76. Traffic Shaping Extends Policy Control Options Traffic shaping policies ensure business applications are not bandwidth starved Guaranteed, prioritized and maximum bandwidth settings Apply traffic shaping policies by application, user, source, destination, interface, IPSec VPN tunnel and more Enables more effective deployment of appropriate application usage policies Included as a feature in PAN-OS at no extra charge
  • 77. Real-time Bandwidth Monitor Real-time view of bandwidth and session consumption for applications, users, and rules
  • 78. Flexible Policy Control Responses Intuitive policy editor enables appropriate usage policies with flexible policy responses
  • 79. App-ID: Comprehensive Application Visibility Policy-based control more than 1000 applications distributed across five categories and 25 sub-categories Balanced mix of business, internet and networking applications and networking protocols 3 - 5 new applications added weekly App override and custom HTTP/SSL applications address internal applications
  • 80. User-ID: Enterprise Directory Integration Users no longer defined solely by IP address Leverage existing enterprise directory services (Active Directory, LDAP, eDirectory) without desktop agent rollout Identify Citrix users and tie policies to user and group, not just the IP address Manage and enforce policy based on user and/or group Understand user application and threat behavior based on username, not just IP Investigate security incidents, generate custom reports XML API enables integration with other user repositories
  • 81. Content-ID: Real-Time Content Scanning Detect and block a wide range of threats, limit unauthorized data transfer and control non-work related web surfing Stream-based, not file-based, for real-time performance Uniform signature engine scans for broad range of threats in single pass Vulnerability exploits (IPS), viruses, and spyware (both downloads and phone-home) Block transfer of sensitive data and file transfers by type Looks for CC # and SSN patterns Looks into file to determine type – not extension based Web filtering enabled via fully integrated URL database Local 20M URL database (78 categories) maximizes performance (1,000’s URLs/sec) Dynamic DB and customizable categories adapts to local, regional, or industry focused surfing patterns
  • 82. Trace Session Tool Improve forensics and incident investigation - View all logs from other databases a particular session.

Hinweis der Redaktion

  1. Google Docs and Calendar resource consumption* is up significantly Google Talk Gadget shot up by 56% while Google Talk dropped 76% Bandwidth consumed by Facebook, per organization, is a staggering 4.9 GBBandwidth consumed by Sharepoint and LinkedIn is up 14% and 48% respectively67% of the applications use port 80, port 443, or hop portsMany (190) are client–server 177 can tunnel other applications, a feature no longer reserved for SSL or SSH