Filter Results By
Viewing All Results
This brief provides details on how Palo Alto Networks eliminates some of the complexities involved with point products — firewall, IPS, IDS, URL filtering — by providing visibility at all layers, and into every step of an advanced attack, with a single inline security appliance augmented with cloud intelligence.
Viewed as both a means to enhance the bottom line and kill productivity, Facebook is in use on enterprise networks. Learn more about how Palo Alto Networks can help you securely enable Facebook.
Browser-based filesharing applications have the potential to become the next P2P application category in terms of illegal copyrighted information. Learn how Palo Alto Networks provides your university with the ability to identify, monitor and analyze the use of browser-based filesharing applications traversing your network.
More and more enterprise traffic is being obscured by SSL, including some of the applications and sites that introduce the most risk for your business. This paper lays out a basic approach that you can use to strike an appropriate balance between security and performance by selectively decrypting and inspecting SSL traffic based on policy.
This tech brief provides an overview of our patent-pending App-ID classification technology that determines the exact identify of applications, irrespective of port, protocol, evasive tactic, or SSL encryption.
Identifying security risks proactively and systematically in a large network is like looking for a needle in a haystack. To address the challenge, it is imperative that the network firewall, as a first line of defense, is optimally configured for security, continuous compliance and high performance. Palo Alto Networks and Skybox® Security have partnered to monitor and prevent security or compliance gaps in an enterprise firewall deployment, and minimize overall firewall management costs.
Palo Alto Networks and ArcSight have partnered to deliver unprecedented visibility and correlation of enterprise network security events. Utilizing the ArcSight Flexconnector and Common Event Format (CEF), Palo Alto Networks’ next-generation firewalls add rich context encompassing all user and application activity into ArcSight’s Enterprise Security Manager Platform. This integration allows ArcSight to correlate additional relevant data with other data sources into a single cohesive view, unifying critical user, application, and threat visibility.
Overview of our user identification technology that integrates with Active Directory, Citrix and Microsoft Terminal Services.
Palo Alto Networks and Arista Networks have partnered to offer the highest performance next-generation firewall implementation in the industry. The modern data center has ever-increasing demands for throughput and performance,
and the security infrastructure required to protect and segment the network must be able to meet those demands. The combination of Arista Networks’ Datacenter Switches along with Palo Alto Networks’ next-generation firewalls provides unmatched security in high-performance data centers without impacting throughput.
Large, complex networks require the implementation and management of thousands of access rules. It can be difficult to determine the devices and rules that are responsible for unwanted access. Unwanted open access paths that contain vulnerabilities can leave organizations open to attack and allow an intruder to gain access to critical data systems. To increase operational efficiency and reduce risk, Palo Alto Networks and RedSeal have partnered to ensure uniform visibility, defense and ongoing management of an organization’s entire firewall and network device infrastructure.
Comparison of next generation firewall technology with Web Application Firewalls (WAF).
The number of smartphones and tablets accessing data on the corporate networks is exploding. Some of these devices are enterprise owned, while many others are user owned. The new IT challenge deals with balancing security with end-user freedom, particularly on personally owned devices. These challenges intensify when considering the increasing demand for application and data access on smartphones and tablets. These devices and apps create new threat vectors that must be addressed by IT executives to prevent data leakage of sensitive corporate information.
Microsoft SharePoint helps streamline workflow and accelerate time to market by enabling employees and non-employees alike to collaborate using fami liar tools such as Microsoft Office (Word, PowerPoint, Access, Excel, and Outlook). When de ploying SharePoint, there are several network security factors to consider, over and above the defa ult SharePoint security and control capabilities.
On mission critical network segments, customers may prefer to deploy a tap/bypass switch to maintain network continuity to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair.
Palo Alto Networks and Avaya™ have partnered to provide high-performance next-generation security solutions for data center networks. The mission critical data centers of today have no tolerance for disruptions in throughput or availability. At the same time, the threats imposed on data centers by modern malware require a security solution that has next-generation firewall intelligence.
When customers deploy inline appliances on mission critical network segments, they have the option to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair scenarios by adding a tap/bypass switch to maintain network continuity. Palo Alto Networks has partnered with Garland Technology to provide the ability to install Palo Alto Networks next-generation firewall inline without compromising network uptime.
As organizations deploy multiple security solutions to safeguard corporate networks from wide-ranging threats, it becomes increasingly difficult to perform labor-intensive and error-prone tasks such as risk analysis, change management, auditing and compliance checks. Palo Alto Networks and Tufin® have partnered to help customers increase operational efficiency and reduce risk by intelligently automating firewall policy management.
Most organizations that allow remote access to applications and data over the Internet need to authenticate remote users to enable policy-based access. This security challenge is being amplified from proliferation of web-based enterprise applications and an increasing range of mobile and portable devices used to access sensitive applications and data under the backdrop of rapidly evolving security landscape. Palo Alto Networks has partnered with RSA to provide two-factor authentication solutions to our joint customers to safely enable access to sensitive applications and data.
Palo Alto Networks and NetWitness have partnered to provide unified security event analysis and resolution. The combined solution validates application execution, speeds incident investigation and eliminates wasted time navigating disparate systems.
Many organizations are looking for ways to address the need for mobile security with the desire for employees to choose their own devices. Find out how the next-generation firewall makes it possible.
Intelligent tablets and smartphones are now the primary personal communications and computing platform for Mobile IT business operations and apps. As a result, IT needs to consider how to provide secure network access to both enterprise and end user owned mobile devices. Moreover, an exponential increase in the number and usage of mobile apps is creating new threat vectors that must be addressed by IT to safeguard mobile devices and prevent data loss.
Twitter has rapidly established itself in the business world, despite its business and security risks. Learn more about how Palo Alto Networks can help you identify and control Twitter.
While organizations have gained operational flexibility and lowered data center costs by deploying virtualization solutions, the true promise of a secure, agile, extensible, and flexible private cloud continues to be elusive. One of the key barriers is the ability to deploy security services at the same pace as virtual machine deployments without compromising the level of protection needed. VMware and Palo Alto Networks have partnered to address these challenges.
Demand for managed security services is on the rise as many enterprises and governments struggle to contend with an increasingly complex threat landscape, a shortage of skilled personnel, and the need to rapidly adapt to dynamic business conditions while still keeping security costs under control.
Performance and accountability of enterprise IT infrastructure has shifted from an incidental focus to one that requires real-time visibility for proactive monitoring and compliance. Traditional network security devices posed a blind spot for network monitoring and management solutions for basic network parameters such as NAT tables and traffic sessions.
Overview of virtual systems, their benefits, possible deployment scenarios and how to configure them.