防火墙

Find everything you need to know about trends, issues and innovations in firewalls from industry analysts, Palo Alto Networks experts, and the media here in our Firewalls Resources section. You'll also find stories about real-world implementations of our next-generation firewalls by customers, as well as white papers and much more. Up-to-date information on the latest developments in our next-generation firewalls is also readily available.

 

Filter Results By

Filter by Type

Filter by Topic

Filter by Industry

Filter by Product

Viewing All Results

Most Viewed

This technical document provides details of the VMware NSX and Palo Alto Networks integration, including descriptions of the components of the solution, and key use cases.

59 视图
资源
September 9, 2014, 02:45 PM

Security Information & Event Management

With the rapid rise and evolution of cyber threats, the traditional network perimeter is eroding and endpoint compromise is inevitable. Security and networking teams must collaborate to quickly identify and contain compromised endpoint devices.

Palo Alto Networks and Bradford Networks have partnered to automate the complex threat triage and response process and empower organizations to contain advanced threats in seconds.

白皮书
August 8, 2014, 11:00 AM

Defense in Depth does not mean more security tools. The key to thwarting advanced attacks in today’s government networks is to reduce the attack surface to increase visibility to what matters: the anomalies in your network, across the kill chain. 

白皮书
August 8, 2014, 11:00 AM

Once creation of application whitelisting, policies and file types allowed on each segment of the government network is complete, it is necessary to identify any anomalous applications and files. The Palo Alto Networks® enterprise security platform prevents all known file types from traversing government networks in-line while unknown files are dynamically analyzed by the WildfireTM Threat Intelligence Cloud or your own private instance of the WildFire Threat Intelligence Cloud, the WF-500. Unknown threats are identified, and protections are created and shared with all customers within as little as 30 minutes.

白皮书
August 5, 2014, 12:45 PM

This white paper describes a structured approach toward the formation of a government security operations center (SOC) that enables organizations to integrate this capability into their overall Information Security Management System (ISMS) and align with many of the requirements introduced by ISO/IEC 27001:2013.

白皮书
July 18, 2014, 11:00 AM

Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for everyone in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as companies that store, process or transmit cardholder data (CHD) and/or sensitive authentication data. With approximately three hundred individual requirements to address, organizations subject to the standard have their work cut out for them.

资源
January 14, 2014, 05:06 AM

This eight-page datasheet provides a comprehensive overview of the critical PAN-OS features that power all next-generation firewalls from Palo Alto Networks.

资源
按 Danelle Au | Palo Alto Networks | August 27, 2012, 08:04 AM

以免您尚未听说,我们将参加下周在旧金山举办的 2012 年 VMWorld 大会。我们将在这场盛会上主打的关键解决方案之一便是我们如何使用下一代防火墙保障 FlexPod 架构安全的解决方案。也许有些人对 FlexPod 不太熟悉,这是一种基于思科(Cisco® )统一计算系统(Unified Computing System™,简称UCS™)、思科 Nexus® 数据中心交换机,以及 NetApp® FAS 存储元件的数据中心预设计基础架构堆栈。

资源
按 Brian Tokuyoshi | Palo Alto Networks | August 6, 2012, 04:31 PM

在向移动办公的发展道路发生了一件有趣的事情。过去,出差的员工仅需一条 VPN 链接即可不时地访问公司资源。这也正是设计 VPN 的目的所在,即节省现代银行费用和设立免费电话的费用,取而代之的是采用互联网服务提供商的更廉价连接方式。VPN 可提供一种让用户能够通过公共网络临时远程接入公司网络的方式。尽管 VPN 远程访问仍然是一种移动办公解决方案的关键组件,但是并非唯一的要求。

资源
按 Brian Tokuyoshi | Palo Alto Networks | July 11, 2012, 08:00 AM

随着公司组织做好准备从状态检测型防火墙转向使用 Palo Alto Network 下一代防火墙,我们发现一些客户对下一代防火墙的作用以及如何实现最佳部署的理解还处在不同的阶段。在了解下一代防火墙的作用后,下一步就是了解如何利用其控制功能,满足他们当前的商业要求。

资源
按 Chris King | Palo Alto Networks | May 18, 2012, 11:47 AM

最近,Roger Grimes 宣称防火墙已经死亡。有人打断说他错了,接下来便是一场大辩论,引述了有关最近数据泄漏事件的性质、过去的网络攻击方式,以及当前的网络攻击方式的报告。

资源
按 Kevin | Palo Alto Networks | March 8, 2012, 10:19 AM

我叫 Kevin Butler,是阿肯色州小石城阿肯色大学医学院的防火墙管理员。我就是负责要么允许要么拒绝流量通过我们网络的人。我负责我们所有的 VPN 解决方案,并确保尽最大可能满足 HIPAA 的要求,因为我们是一家医疗机构,同时还是一家教学机构。我们还是 Palo Alto Network 的一家客户。

资源
按 Chris King | Palo Alto Networks | November 11, 2011, 01:01 PM

本周我们已经推出了 PA-200 下一代防火墙和 PAN-OS 4.1。此次新发布的产品在我们企业客户需要帮助的两大关键领域进行了切实的改进。

资源
按 Matt Keil | Palo Alto Networks | October 12, 2011, 11:45 PM

谷歌 Chrome 新增的远程桌面控制功能听起来很酷——现在,无聊的技术发烧友现在可以帮助他们的朋友或家人解决面临的电脑问题啦。尽管远程访问控制功能确实能带来一定的益处,但是如果用户不注意,这一功能已经被证实将成为一个巨大的网络安全问题。

资源
按 Matt Keil | Palo Alto Networks | August 29, 2011, 10:00 PM

为了测试其功能,NWW 测试的重点是该防火墙对应用的可视化和控制能力、确保用户遵守安全政策及可视化的能力,以及检测内容发现威胁的能力。这篇功能型文章的标题简明扼要地总结了测试的结果:Palo Alto [Networks] 成功入围。

资源
按 Sandeep | Palo Alto Networks | August 19, 2011, 11:32 PM

在这篇博客中,我将谈论我们的下一代防火墙是如何防御 Torpig 等僵尸网络攻击的。

资源
按 Chris King | Palo Alto Networks | April 29, 2011, 04:19 PM

Gartner 有关下一代防火墙及其如何改变防火墙市场的调查结果非常引人入胜。此项研究鲜明地给出了从传统防火墙和 IPS 向新时代的下一代防火墙迁移的建议。这是您聆听 Gartner 研究副总裁和 2010 年企业防火墙“魔力象限”报告的作者之一 Greg Young 建议的一次机会。同时还有机会参加本年度最火爆电影的首映式。

资源
按 Matt Keil | Palo Alto Networks | December 16, 2009, 03:35 PM

SearchEnterpriseWAN 上有一篇关于 Palo Alto Networks 客户的好文章。IDT 向 SearchEnterpriseWAN 谈论了他们对 Palo Alto Networks 防火墙的使用体验,并讨论了这一防火墙给他们团队在管理企业安全时带来的益处和变化。

资源
按 Chris King | Palo Alto Networks | October 16, 2009, 11:46 AM

Greg Young 和 John Pescatore 刚刚为下一代防火墙给出了一个良好的注解。在“定义下一代防火墙”的注释中,Greg 和 John 出色地给出了企业下一代防火墙的定义、要求和他们的推荐建议。

白皮书

This technical document provides details of the VMware NSX and Palo Alto Networks integration, including descriptions of the components of the solution, and key use cases.

聊天
有问题吗?
与我们沟通寻求答案。
立即聊天