证明书

Filter Results By

Filter by Type

Filter by Topic

  • 网络安全 (3)

Filter by Industry

  • 政府 (3)

Filter by Product

Viewing All Results

Most Viewed

"The days when port = protocol = application are behind us. An increasing percentage of enterprise network traffic is being funneled through a few well-known ports, more port-hopping or dynamic application content, such as Web 2.0. In many cases, traffic is being encrypted."

"Most enterprise firewalls are not fully featured NGFW but, rather, early versions. This slowness to market has opened the door to competition, such as that from startups."

Greg Young, Research Vice President

28 视图
引言 - 客户

"Instead of using a lot of different solutions, Palo Alto Networks gives us everything we need all in one box. By consolidating devices we've reduced our operational complexity and capital costs."

John Shaffer, Director Global Systems and Technology
Read the Case Study

引言 - 客户

"We know that port 80 is used for more than just Web surfing. The PA-4000 Series gives us visibility into and control over what’s on our network at all times, allowing us to be proactive in our security."

Frank Chambers, Director, IS Management

引用 - 分析

"This week, we've seen some genuine innovation—and perhaps more importantly, some new approaches to solving some very old problems…. Just when you thought firewalls had dead-ended, for example, startup Palo Alto Networks launched a new firewall, the PA-4000, which can identify—and restrict—more than 500 types of application traffic. Instead of just two settings for Port 80 ("off" or "on") this firewall enables enterprises to allow, block, or truncate the use of all sorts of applications, including those running over SSL."

引言 - 客户

"Using the PA-4000 Series' reporting tools I can solve a problem now in ten minutes that used to take me three hours to fix. Everyone is amazed by what we can do with the Palo Alto Networks firewall. It certainly gives us the tools and network granularity we need to do our jobs."

Neal Moss, Network Engineer
Garland Independent School District
Read the Case Study

引用 - 分析

"The days when port = protocol = application are behind us. An increasing percentage of enterprise network traffic is being funneled through a few well-known ports, more port-hopping or dynamic application content, such as Web 2.0. In many cases, traffic is being encrypted."

"Most enterprise firewalls are not fully featured NGFW but, rather, early versions. This slowness to market has opened the door to competition, such as that from startups."

Greg Young, Research Vice President

引用 - 分析

"The one lone voice in the wilderness these days that seems to be questioning much of the conventional wisdom of the security industry these days is Nir Zuk, who is the founder and chief technology officer for Palo Alto Networks, a startup company that is dedicated to overhauling the firewall has we know it….After 10 years of watching security infrastructure costs spiral out of control, it’s nice to see somebody talking about not only an improved firewall design but also a more efficient approach to the whole security model."

引言 - 客户

"Our IT group is responsible for fending off spyware and other web-based threats that can infect our network users. URL filtering alone was not solving this problem – we needed a firewall that enabled us to set policy and scan for threats all the way down to the application level. With Palo Alto Networks next-generation firewall, now we can not only see what’s on our network, we can control it."

Bruce Waslie, Senior Systems Engineer
Read the Case Study

引用 - 分析

"[The PA-4000 Series] makes all kinds of interesting things possible…. First, it provides visibility into and control of the applications on your network. If you don't want users fooling around with P2P apps, you shut them down at the gateway. If you only want them to use a corporate-approved IM system, Palo Alto's firewall allows that one and no others."

客户故事

As one of the premier government research and development (R&D) organizations for national security in the world, this organization needed to secure some of the country’s most sensitive weapons information. With over 5,000 employees and a relatively small real estate footprint, they were convinced that they could consolidate their multi-vendor approach into a singular next-generation cyber security platform. Given its mission, the importance of the information to be secured could not be underestimated. Palo Alto Networks was a natural fit. This Case Study available in Japanese and German.

引用 - 分析

"With a cast of characters that represents much of the intellectual capital surrounding firewalls, it’s a pretty fair bet that its efforts to clean up the security perimeter nightmare is going to attract some big-time attention."

引用 - 分析

"In every company in the world users install and use applications that are not approved by IT, which makes it challenging to establish uniform security and compliance policies. Establishing application visibility and control based on actual user identity, not just IP address, is an important feature in next-generation firewalls."

Jeff Wilson, Research Vice President

引言 - 客户

"Our existing infrastructure couldn’t tell us which applications were running on our network. After deploying Palo Alto Networks’ PA-4000 Series, we were able to not only see which applications were on our network, but we were also able to understand the benefits and risks associated with them, allowing the enforcement of specific policies appropriate to our needs. The result is a more secure network, focused on our mission to provide the highest quality in learning for our students."

Scott McCollum, IT Services Director
Read the Press Release

引言 - 客户

"With Palo Alto Networks, we are now for the first time able to identify rogue applications on the network such as P2P and Skype, and then block them accordingly."

Justin Smith, Staff Network Engineer

引言 - 客户

"I never had any idea what my users were doing on the Internet, and the pipe was getting saturated with traffic and made the Internet almost unusable for a lot of users. I just wanted to be able to see what was happening on my network and be able set policies based on users to more tightly control the traffic traversing our network. With Palo Alto Networks, I have eliminated the non-business activities and have reclaimed the Internet as a productive business tool for my users."

Chuyen Nguyen, IS Manager

State of Pennsylvania

引用 - 分析

"First it was ports, then protocols, and now, applications: A new generation of firewalls is slowly emerging with more sophisticated inspection and blocking features at higher speeds. These new devices will not only do intrusion prevention, but also filter by application type. The protocol inspection method used by traditional firewalls is no longer enough, as more and more applications use Port 80, or HTTP."

引言 - 客户

"We looked at several other solutions on the market and found that they all required too many boxes, management interfaces and support contracts. After evaluating the PA-4000 Series, its ability to control applications and perform access control, as well as inspect content for threats and vulnerabilities – all through an easy, simple management structure – just blew us away."

Joe Funaro, Director of IT
Read the Press Release

引言 - 客户

"Like many successful organizations, we needed to ensure that our infrastructure addressed our current security and compliance needs, but also protected us against emerging threats. Not knowing what was flowing in and out of our network was a huge vulnerability. The PA-4000 Series gives us a comprehensive view of our application and Internet traffic, and as a result we’re able to set smarter, more effective policies to allow what we want and restrict what we don’t."

George Morse, Senior Network Analyst
Read the Case Study

引言 - 客户

"We had major plans to upgrade our network infrastructure in conjunction with implementing an MPLS data network. With a single Internet connection for the MPLS network at a co-location site, we needed to put in a good, high-performance firewall to protect the agency. The first day of deploying the PA-4000 Series I was able to see and fix bad things on my network that I did not previously know was happening."

Will Bailey, IT Manager
Read the Case Study

引言 - 客户

"Ensuring business applications are available, and that customer and operational data is protected, are sometimes competing demands we must meet.  The PA-4000 Series helps us achieve this goal by enabling us to extend appropriate control over users and applications."

Jon Biskner, CISO
Read the Case Study

资源

Being a high profile government organization, this multinational Defense Agency needed to ensure a secondary layer of defense for its network at the edge, and for both its restricted and secure networks. Serving up to 10,000 users, its current solution was costly and was not from a preferred country of origin. This Case Study available in Japanese and German.

 

客户故事

As one of the largest, this U.S. Agency serves over 400,000 users with a large external user base, numerous outlying facilities globally and operates on a budget of over $100 billion. Originally looking to refresh their URL filtering, they quickly discovered much more security for their dollar, and ultimately scaled with our firewall and IPS/IDS solution. This Case Study available in Japanese and German.

 

引言 - 客户

"Like many large schools, we have significant IT resources to serve our faculty, staff, and students. Ensuring those resources are not overwhelmed by threats and risky applications is challenging, given the nature of university environments.  The PA-4000 Series enables us to understand and control applications on our networks to achieve that goal."

Bob Neal, Sr. Director, Network Services
Read the Press Release

引言 - 客户

"With Palo Alto Networks, we now know what we didn’t know. And it’s scary what some of our users and contractors were doing."

Mark Rein, Senior Director, IT
Read the Case Study

引言 - 客户

"By managing which applications are allowed on our networks, and scanning those applications for personally identifiable information or malicious content, we can ensure our data is managed appropriately. Doing this with the Palo Alto firewall means that we can prevent issues, instead of potentially not finding out about a problem until months later."

Carol Campbell Beggs
Vice President of Technology Sonesta Hotels

引言 - 客户

"Our existing security infrastructure was completely blind to what was tunneling over port 80. With the PA-4000 Series, we have visibility and control over all Web traffic, enabling our employees the access they need to work effectively, without compromising network bandwidth or security. And the integration with Active Directory enables us to monitor and control applications on a per-user basis, resulting in more effective application usage and security policies. This has enabled us to improve our intellectual property protection dramatically. We can consolidate our firewall infrastructure and provide better protection in doing so."

Roger Blakely, VP Information Security
Read the Case Study

聊天
有问题吗?
与我们沟通寻求答案。
立即聊天