SlideShare a Scribd company logo
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud
Marcelo Ezequiel Rey
Sr. Sales Engineer, Palo Alto Networks
CORPORATE HIGHLIGHTS
• Founded in 2005; first customer shipment in 2007
• Safely enabling applications and preventing cyber threats
• Able to address all enterprise cybersecurity needs
• Exceptional ability to support global customers
• Experienced team of 3,800+ employees
• Q4 FY16: $401.8M revenue
Palo Alto Networks At-a-Glance
* Non-GAAP financial measures. See appendix for reconciliation to most comparable GAAP measure.
• Total revenue grew 34% year-over-
year to a record $398.1Mn
• Recurring services revenue grew
57% year-over-year to $234.3Mn
• Deferred revenue grew 69% year-
over-year to $1.4 billion
• Billings grew 33% year-over-year to
$516.9Mn*
• Generated free cash flow of $182
million*
Q1 FY’17 Highlights
REVENUE
ENT CUSTOMERS
2016 Magic Quadrant for Enterprise Network Firewalls
IMDLPIPS ProxyURLAV
Internet/WAN
Una Arquitectura “Accidental”
Red
Organizacional
UTM
Evolucion de la seguridad al dia de hoy
Fallas en las arquitecturas de
seguridad
Anti-APT for
port 80 APTs
Anti-APT for
port 25 APTs
Endpoint AV
DNS protection cloud
Network AV
DNS protection for
outbound DNS
Anti-APT cloud
Internet
Red Corporativa
UTM/Blades
Visibilidad Limitada Respuesta ManualSin correlación
Vendor 1
Vendor 2
Vendor 3
Vendor 4
Internet Connection
Malware Intelligence
DNS Alert
Endpoint Alert
AV Alert
SMTP Alert
AV Alert
Web Alert
Web Alert
SMTP Alert
DNS Alert
AV Alert
DNS Alert
Web Alert
Endpoint Alert
Requerimientos de hoy y para el futuro
En el acceso a
Internet
Entre los
empleados y
dispositivos dentro
de la LAN
En el Datacenter y
entre maquinas
virtuales
Cloud
En el dispositivo
movil
DETECTAR Y PREVENIR AMENAZAS EN CUALQUIER PUNTO DE LA EMPRESA
Entre nubes
publicas, privadas
e hibridas
Plataforma de próxima generación….
Public Cloud Software as a Service
GLOBALPROTECT
APERTURE
WildFire
TRAPS
COMPLETE CLOUD SECURITY
Private Cloud
Traps
Innovacion continua
GlobalProtect
WildFire
AutoFocus
Aperture
Threat Prevention
URL Filtering
Plataforma unica y distintiva
Cloud Datacenter Enterprise perimeter Distributed/BYOD Endpoint
Next-Generation Firewall
Cybersecurity:
IDS / IPS / APT
Web gateway VPN Mobile security
Panorama, M-100 & M-500 appliances
PAN-OS™
Consistency
Products
Subscriptions
Use cases
Management system
Physical: PA-200, PA-220, PA-500, PA-800 Series, PA-3000 Series, PA-5000
Series, PA-5200 Series, PA-7000 Series
Virtual: VM-Series for ESXi, NSX, Hyper-V, AWS, Azure, KVM and Citrix
URL Filtering
GlobalProtect™
WildFire™
Threat Prevention
Operating system
Traps™Aperture™
Private Cloud (NSX, OpenStack)
EXPANDED DATA AND APPLICATION LOCATIONS
13 | ©2017, Palo Alto Networks.
Confidential and Proprietary.
Private Cloud(NSX, OpenStack)
Software as a Service(SaaS)
Con grupos de direccionamiento dinámico y conciencia del contexto entre NSX Manager y Panorama
Beneficios de la Integración
Aplicar automáticamente
protecciones de Seguridad
Bajo Demanda
Movimiento de las cargas de trabajo con protección avanzada contra amenazas y políticas de
segmentación a nivel de las aplicaciones.
Reducir el área de la
superficie de ataque dentro
de su centro de datos
definido por Software
Proteger sus assets de
cyber-amenazas tanto
conocidas como
desconocidas
Mantener la seguridad en
sincronía con la creación
y movimientos de las
cargas de trabajo
Actualización Dinámica de Las Políticas de Seguridad
…utilizando Tags de Seguridad en la VM-Series de Palo Alto Networks
ABUNDANT USE OF SAAS APPLICATIONS
Palo Alto Networks - RSA 2017
15
Remote users
On-prem users
Sanctioned
Tolerated
Unsanctioned
SAAS RISKS
MALICIOUS
DATA EXFILTRATION
ACCIDENTAL
DATA EXPOSURE
MALWARE
PROPAGATION
OVERLAY APPROACH IS INSUFFICIENT AND DOES NOT SCALE
Sanctioned
Tolerated
Unsanctioned
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
CLOUD PROXY
CLOUD PROXY
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Sanctioned
Tolerated
Unsanctioned
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Remote users
On-prem users Log Forwarder
Traffic Forwarder
AD Connector
Pac File Merge
Or Addt’l VPN Agent
Pac File Merge
Evasion tools
CLOUD PROXY
CLOUD PROXY
OVERLAY APPROACH IS INSUFFICIENT AND DOES NOT SCALE
OUR PLATFORM APPROACH
Remote users
On-prem users
Sanctioned
Tolerated
Unsanctioned
Complete visibility and
control for on premise
activity with PAN-OS
Next Generation Firewall
Monitor and control
in-cloud activity with
Aperture
Complete visibility and
control for remote
users via
GlobalProtect
Firewall provides critical visibility and control of saas apps• Next-generation firewall
provides context and control
• Application or app function
• User or role
• Nature of content
• Core functionality of PAN-OS
from the beginning
• On-prem users covered by
gateway firewall policy
• Remote user traffic
transparently routed through
GlobalProtect
344 KBfile-sharing
URL category
PowerPoint
file type
“Confidential and
Proprietary”
content
mjacobsen
user
prodmgmt
group
canada
destination country
172.16.1.10
source IP
64.81.2.23
destination IP
TCP/443
destination port
SSL
protocol
HTTP
protocol
slideshare
application
slideshare-uploading
application function
Complete security for data in the cloud
via SaaS application APIs
• Advanced Data Classification
• Prevent Sensitive Data Leakage
• Eliminate Malware with WildFire
integration
INSTANTLY REMEDIATE RISKS WITH APERTURE
Quarantine
Limit Sharing
Notify
Log
APAC
BOX.COM
GITHUB
GOOGLE DRIVE
SFDC DROPBOX
YAMMER
SLACK SECURE DATA
SPACE
AMERICAS EMEA
JIVE SERVICENOW
EXCHANGE
ONLINE
AMAZON S3
SHAREPOINT
ONLINE
ONEDRIVE
FOR BUSINESS
EC2 / IAMG SUITE CONFLUENCE
CITRIX
SHAREFILE
APERTURE - Industry Leading App Support
Ransomware
Porque Palo Alto Networks?
Prevención
Zero-Day
Reduce Risk
Policy
Visibility
Remediation
Detection
Endpoint
Data Center
Mobility
BYOD Management
Vulnerability
Responsive
Exploit
Anti-Malware Forensics
Automation
Private Cloud
Public Cloud
Performance
Scalability
Platform
Segmentation
Applications
Users
Control
Agile
Perimeter
Integrated
Support
Web Security
Command-&-Control
Virtualization
Ecosystem
Context
Correlation
Services
People
Culture
Safe Enablement
Application
Por donde empezar?
• Para aprender más
Visite
https://downloads.cloudsecurityalliance.org/assets/research/collabora
tive/Security-Considerations-for-Private-vs-Public-Clouds.pdf
Por donde empezar?
Para aprender más
Visite https://www.paloaltonetworks.com/products/secure-the-
network/virtualized-next-generation-firewall/vm-series
Paper VMWare – Palo Alto Networks
Por donde empezar?
Para aprender más
Pruebe el Hands-On-Lab (HOL-1723-SDC-1) en
http://labs.hol.vmware.com/HOL/catalogs/lab/2727
Csa summit 2017 - Plataforma de Seguridad para entornos Cloud

More Related Content

PDF
Csa Summit 2017 - Un viaje seguro hacia la nube
PPTX
Csa Summit 2017 - Managing multicloud environments
PDF
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
PDF
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
PDF
F5 Automation Toolchain
PDF
Digitální transformace: zabezpečení agilních prostředí
PDF
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
PDF
Building and Adopting a Cloud-Native Security Program
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Managing multicloud environments
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
F5 Automation Toolchain
Digitální transformace: zabezpečení agilních prostředí
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Building and Adopting a Cloud-Native Security Program

What's hot (20)

PDF
Corpsec: “What Happened to Corpses A and B?”
PDF
DevOps Underground - DevOps Higher Maturity Levels
PDF
What's New with NGINX Application Security Solutions
PDF
SecOps Workshop (Gregory Pickett)
PPTX
Extend DevOps to Your SQL Server Databases
PDF
(SACON) M T Karunakaran  - Quantum safe Networks
PDF
Pragmatic Security Automation for Cloud
PDF
淺談WAF在AWS的架構
PDF
What's New With PureSec | April 2019
PDF
Succeeding with Secure Access Service Edge (SASE)
PDF
Palo Alto Networks CASB
PDF
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
PPTX
5 Highest-Impact CASB Use Cases
PDF
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
PDF
Cisco Connect Halifax 2018 Anatomy of attack
PDF
Serverless Security: A pragmatic primer for builders and defenders
PDF
AWS Well-Architected Framework (nov 2017)
PPTX
The user s identities
PPTX
Analysis of TLS in SMTP World
PDF
API Security - Everything You Need to Know To Protect Your APIs
Corpsec: “What Happened to Corpses A and B?”
DevOps Underground - DevOps Higher Maturity Levels
What's New with NGINX Application Security Solutions
SecOps Workshop (Gregory Pickett)
Extend DevOps to Your SQL Server Databases
(SACON) M T Karunakaran  - Quantum safe Networks
Pragmatic Security Automation for Cloud
淺談WAF在AWS的架構
What's New With PureSec | April 2019
Succeeding with Secure Access Service Edge (SASE)
Palo Alto Networks CASB
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
5 Highest-Impact CASB Use Cases
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
Cisco Connect Halifax 2018 Anatomy of attack
Serverless Security: A pragmatic primer for builders and defenders
AWS Well-Architected Framework (nov 2017)
The user s identities
Analysis of TLS in SMTP World
API Security - Everything You Need to Know To Protect Your APIs
Ad

Similar to Csa summit 2017 - Plataforma de Seguridad para entornos Cloud (20)

PDF
Forcepoint SD-WAN and NGFW + IPS
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PPTX
01-Chapter 01-Introduction to CASB and Netskope.pptx
PPT
Palo alto networks next generation firewalls
PDF
Network is the Firewall
PDF
Cisco Connect Halifax 2018 Simple IT
PDF
A New Approach to Continuous Monitoring in the Cloud
PDF
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
PDF
2019 10-app gate sdp 101 09a
PPT
Palo Alto Networks Soc Ent Okt2009
PDF
21st Docker Switzerland Meetup - ISTIO
PDF
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
PDF
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
PDF
Visibility and Automation for Enhanced Security
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PPTX
SecureTower General Info
PPTX
PCM Vision 2019 Breakout: Quest Software
 
PDF
A Different Approach to Securing Your Cloud Journey
Forcepoint SD-WAN and NGFW + IPS
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
01-Chapter 01-Introduction to CASB and Netskope.pptx
Palo alto networks next generation firewalls
Network is the Firewall
Cisco Connect Halifax 2018 Simple IT
A New Approach to Continuous Monitoring in the Cloud
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
2019 10-app gate sdp 101 09a
Palo Alto Networks Soc Ent Okt2009
21st Docker Switzerland Meetup - ISTIO
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Visibility and Automation for Enhanced Security
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Rethinking Cybersecurity for the Digital Transformation Era
SecureTower General Info
PCM Vision 2019 Breakout: Quest Software
 
A Different Approach to Securing Your Cloud Journey
Ad

More from CSA Argentina (20)

PDF
7o estudio-cloud security-esarsenu-2019-csaespearclbobrcomx-isacamad-v2
PDF
Cloud native y donde esta el piloto
PDF
Iam dev secops the infinity loop saga
PPTX
Presentacion DevSecOps Argentina
PDF
Revista CSA LATAM FORUM 2019
PPTX
Cloud security adoption sophos
PPTX
CSA LATAM FORUM - NETSKOPE
PPTX
Hardening usuarios smartfense
PPTX
Segurdad de red para la generacion de la nube symantec
PDF
Automated security analysis of aws clouds v1.0
PDF
2018 cyberark evento cloud
PPTX
Csa Summit 2017 - Obteniendo información de tu organización a través de aplic...
PPTX
Csa Summit 2017 - Csa Star for dummies
PPTX
CSA Summit 2017 - Infraestructuras Ágiles y Delivery Continuo, del testing ma...
PPTX
UNDER THE DOME - SEGURIDAD SI, PERO TRANSPARENTE
PPTX
SECURITY AS A WAR - Infosecurity 2015
PPTX
Csa summit el circulo de la confianza entre el cliente y el proveedor cloud
PDF
Csa summit la transformación digital y el nuevo rol del ciso
PPTX
Csa summit presentacion crozono
PDF
Csa summit cloud security. tendencias de mercado
7o estudio-cloud security-esarsenu-2019-csaespearclbobrcomx-isacamad-v2
Cloud native y donde esta el piloto
Iam dev secops the infinity loop saga
Presentacion DevSecOps Argentina
Revista CSA LATAM FORUM 2019
Cloud security adoption sophos
CSA LATAM FORUM - NETSKOPE
Hardening usuarios smartfense
Segurdad de red para la generacion de la nube symantec
Automated security analysis of aws clouds v1.0
2018 cyberark evento cloud
Csa Summit 2017 - Obteniendo información de tu organización a través de aplic...
Csa Summit 2017 - Csa Star for dummies
CSA Summit 2017 - Infraestructuras Ágiles y Delivery Continuo, del testing ma...
UNDER THE DOME - SEGURIDAD SI, PERO TRANSPARENTE
SECURITY AS A WAR - Infosecurity 2015
Csa summit el circulo de la confianza entre el cliente y el proveedor cloud
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit presentacion crozono
Csa summit cloud security. tendencias de mercado

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Encapsulation theory and applications.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Spectral efficient network and resource selection model in 5G networks
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Weekly Chronicles - August'25 Week I
Building Integrated photovoltaic BIPV_UPV.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Encapsulation theory and applications.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Review of recent advances in non-invasive hemoglobin estimation
Spectral efficient network and resource selection model in 5G networks
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
NewMind AI Monthly Chronicles - July 2025
Digital-Transformation-Roadmap-for-Companies.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Csa summit 2017 - Plataforma de Seguridad para entornos Cloud

  • 2. Marcelo Ezequiel Rey Sr. Sales Engineer, Palo Alto Networks
  • 3. CORPORATE HIGHLIGHTS • Founded in 2005; first customer shipment in 2007 • Safely enabling applications and preventing cyber threats • Able to address all enterprise cybersecurity needs • Exceptional ability to support global customers • Experienced team of 3,800+ employees • Q4 FY16: $401.8M revenue Palo Alto Networks At-a-Glance
  • 4. * Non-GAAP financial measures. See appendix for reconciliation to most comparable GAAP measure. • Total revenue grew 34% year-over- year to a record $398.1Mn • Recurring services revenue grew 57% year-over-year to $234.3Mn • Deferred revenue grew 69% year- over-year to $1.4 billion • Billings grew 33% year-over-year to $516.9Mn* • Generated free cash flow of $182 million* Q1 FY’17 Highlights REVENUE ENT CUSTOMERS
  • 5. 2016 Magic Quadrant for Enterprise Network Firewalls
  • 6. IMDLPIPS ProxyURLAV Internet/WAN Una Arquitectura “Accidental” Red Organizacional UTM Evolucion de la seguridad al dia de hoy
  • 7. Fallas en las arquitecturas de seguridad Anti-APT for port 80 APTs Anti-APT for port 25 APTs Endpoint AV DNS protection cloud Network AV DNS protection for outbound DNS Anti-APT cloud Internet Red Corporativa UTM/Blades Visibilidad Limitada Respuesta ManualSin correlación Vendor 1 Vendor 2 Vendor 3 Vendor 4 Internet Connection Malware Intelligence DNS Alert Endpoint Alert AV Alert SMTP Alert AV Alert Web Alert Web Alert SMTP Alert DNS Alert AV Alert DNS Alert Web Alert Endpoint Alert
  • 8. Requerimientos de hoy y para el futuro En el acceso a Internet Entre los empleados y dispositivos dentro de la LAN En el Datacenter y entre maquinas virtuales Cloud En el dispositivo movil DETECTAR Y PREVENIR AMENAZAS EN CUALQUIER PUNTO DE LA EMPRESA Entre nubes publicas, privadas e hibridas
  • 9. Plataforma de próxima generación….
  • 10. Public Cloud Software as a Service GLOBALPROTECT APERTURE WildFire TRAPS COMPLETE CLOUD SECURITY Private Cloud
  • 12. Plataforma unica y distintiva Cloud Datacenter Enterprise perimeter Distributed/BYOD Endpoint Next-Generation Firewall Cybersecurity: IDS / IPS / APT Web gateway VPN Mobile security Panorama, M-100 & M-500 appliances PAN-OS™ Consistency Products Subscriptions Use cases Management system Physical: PA-200, PA-220, PA-500, PA-800 Series, PA-3000 Series, PA-5000 Series, PA-5200 Series, PA-7000 Series Virtual: VM-Series for ESXi, NSX, Hyper-V, AWS, Azure, KVM and Citrix URL Filtering GlobalProtect™ WildFire™ Threat Prevention Operating system Traps™Aperture™
  • 13. Private Cloud (NSX, OpenStack) EXPANDED DATA AND APPLICATION LOCATIONS 13 | ©2017, Palo Alto Networks. Confidential and Proprietary. Private Cloud(NSX, OpenStack) Software as a Service(SaaS)
  • 14. Con grupos de direccionamiento dinámico y conciencia del contexto entre NSX Manager y Panorama Beneficios de la Integración Aplicar automáticamente protecciones de Seguridad Bajo Demanda Movimiento de las cargas de trabajo con protección avanzada contra amenazas y políticas de segmentación a nivel de las aplicaciones. Reducir el área de la superficie de ataque dentro de su centro de datos definido por Software Proteger sus assets de cyber-amenazas tanto conocidas como desconocidas Mantener la seguridad en sincronía con la creación y movimientos de las cargas de trabajo Actualización Dinámica de Las Políticas de Seguridad …utilizando Tags de Seguridad en la VM-Series de Palo Alto Networks
  • 15. ABUNDANT USE OF SAAS APPLICATIONS Palo Alto Networks - RSA 2017 15 Remote users On-prem users Sanctioned Tolerated Unsanctioned
  • 17. OVERLAY APPROACH IS INSUFFICIENT AND DOES NOT SCALE Sanctioned Tolerated Unsanctioned Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge CLOUD PROXY CLOUD PROXY
  • 18. Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Sanctioned Tolerated Unsanctioned Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Remote users On-prem users Log Forwarder Traffic Forwarder AD Connector Pac File Merge Or Addt’l VPN Agent Pac File Merge Evasion tools CLOUD PROXY CLOUD PROXY OVERLAY APPROACH IS INSUFFICIENT AND DOES NOT SCALE
  • 19. OUR PLATFORM APPROACH Remote users On-prem users Sanctioned Tolerated Unsanctioned Complete visibility and control for on premise activity with PAN-OS Next Generation Firewall Monitor and control in-cloud activity with Aperture Complete visibility and control for remote users via GlobalProtect
  • 20. Firewall provides critical visibility and control of saas apps• Next-generation firewall provides context and control • Application or app function • User or role • Nature of content • Core functionality of PAN-OS from the beginning • On-prem users covered by gateway firewall policy • Remote user traffic transparently routed through GlobalProtect
  • 21. 344 KBfile-sharing URL category PowerPoint file type “Confidential and Proprietary” content mjacobsen user prodmgmt group canada destination country 172.16.1.10 source IP 64.81.2.23 destination IP TCP/443 destination port SSL protocol HTTP protocol slideshare application slideshare-uploading application function
  • 22. Complete security for data in the cloud via SaaS application APIs • Advanced Data Classification • Prevent Sensitive Data Leakage • Eliminate Malware with WildFire integration INSTANTLY REMEDIATE RISKS WITH APERTURE Quarantine Limit Sharing Notify Log
  • 23. APAC BOX.COM GITHUB GOOGLE DRIVE SFDC DROPBOX YAMMER SLACK SECURE DATA SPACE AMERICAS EMEA JIVE SERVICENOW EXCHANGE ONLINE AMAZON S3 SHAREPOINT ONLINE ONEDRIVE FOR BUSINESS EC2 / IAMG SUITE CONFLUENCE CITRIX SHAREFILE APERTURE - Industry Leading App Support
  • 25. Porque Palo Alto Networks? Prevención Zero-Day Reduce Risk Policy Visibility Remediation Detection Endpoint Data Center Mobility BYOD Management Vulnerability Responsive Exploit Anti-Malware Forensics Automation Private Cloud Public Cloud Performance Scalability Platform Segmentation Applications Users Control Agile Perimeter Integrated Support Web Security Command-&-Control Virtualization Ecosystem Context Correlation Services People Culture Safe Enablement Application
  • 26. Por donde empezar? • Para aprender más Visite https://downloads.cloudsecurityalliance.org/assets/research/collabora tive/Security-Considerations-for-Private-vs-Public-Clouds.pdf
  • 27. Por donde empezar? Para aprender más Visite https://www.paloaltonetworks.com/products/secure-the- network/virtualized-next-generation-firewall/vm-series Paper VMWare – Palo Alto Networks
  • 28. Por donde empezar? Para aprender más Pruebe el Hands-On-Lab (HOL-1723-SDC-1) en http://labs.hol.vmware.com/HOL/catalogs/lab/2727

Editor's Notes

  • #4: Here are some additional facts you can use based on where we closed at the end of FY15. We’ll update these numbers quarterly following each earnings release. At the end of Q4, ‘15, we had more than 26,000 customers in over 140 countries across multiple industries. As of Q2 ’16, we now have more than 30,000 customers Palo Alto Networks has ranked an ”enterprise firewall market leader” by Gartner in 2011, 2012, 2013 and 2014 (published April 2015). FY’15 revenues grew 55% year over year We have consistently added more than 1,000 customers per quarter for the last 17 consecutive quarters, indicating a strong acceptance of our vision and strategy. We have over 3,300 employees worldwide. We’ve built a world-class global support operations with teams in the Americas, EMEA, Asia, and Japan.
  • #7: Let’s talk about how the security industry has responded as both threats and I.T. trends have evolved. Network security started with the “traditional”, port-based firewall [click] As with many advancements in Enterprise I.T. – as threats and I.T. technologies evolved, security products were added “one at a time”… The problem is that these are point products. They are each designed to address one type of problem, but they don’t work together. The implications of this approach are: Costly (both CapEx and OpEx) Difficult to Manage (in addition to cost, this is also an agility concern) The main issue, though, is that it results in inferior security posture (based on fundamental limitations in how information, or context, is shared between security devices). [click] Even when “consolidated” into a single device, context is still not fully shared, and security capability suffers. We’ll get specific on why that’s the case shortly, but it shouldn’t be surprising given that this architecture is the result of point-products (or functions) being added “one at a time” without a focus on coordination. This slide represents a perimeter deployment, but the problem is the same for other use cases (including distributed I.T. environments). Namely, that it’s an architecture consisting of largely uncoordinated security functions in series, or layered… [click] In fact this is more of an “accidental architecture”, and it can’t provide the level of security needed to stop modern threats across today’s I.T. environments. We’ll come back to specific examples that show how this architecture is limited…
  • #8: Most architectures today resemble what you see in this picture. A set of set of silo’d organizations, processes, and technical infrastructure that have largely been assembled like a manufacturing production line where a series of security events roll down a conveyor belt of individual point products, while different staff members perform their individual duties. Historically we’ve been able to get by. But as the attacks and the attackers evolve these architectures are beginning to show their weaknesses, and today we see how they’re costly both in their inability to prevent targeted attacks, and in their unnecessary cost to the organization. There are three specific issues we’ve pinpointed: Limited visibility: You can’t secure what you can’t see. Your security architecture must have the ability to see all applications, users and the individual devices on the network to prevent attacks that might utilize non-standard ports, protocols, or SSL encryption for evasion. Your security architecture must also have the ability to see and prevent new targeted attacks that are utilizing threats (malware, zero day vulnerability exploits) that have never been seen before. Eliminate all blind spots. Lacks correlation: If attacks are multi-dimensional so to must be your defenses. Your architecture must act like a system of systems where individual technologies work together in a coordinated manner to prevent attacks. Making each element within the system smarter. Manual response: With attacks evolving at a rapid pace it’s critical that we wean ourselves from the “man in the middle”. Your security architecture must employ a system of automation that’s constantly learning and applying new defenses without a requirement for any manual intervention. It must weed out the congestion, automatically handling low to medium level severity cases so you can focus your teams attention on only the highest priority incidents.
  • #9: Now…this is probably what your current network infrastructure looks like: Behind your port blocking firewall there is most likely a stand alone IPS, Quality of Service, URL Filtering, Data Leakage Prevention, Proxy, Antivirus, and maybe others…but our position is that sprawl is not the answer. <Click to animate> And bolting it all in one box, as UTM vendors have done, doesn’t work for several reasons: UTMs are all stateful inspection based – it is part of the UTM definition: stateful inspection + IPS + AV as outlined by IDC around 10 years ago. In all UTMs, the port-based decision is made first – this cannot be changed. Then the application, IPS, AV, URL decisions are made sequentially using a silo-based scanning approach – but it is all still based on what the stateful inspection (port-based) decision was. None of the information learned by the first scan is shared with the second, third or fourth. So ultimately, the decisions are either allow or deny – nothing in between. Sheet metal integration merely puts everything in one box for the sole purpose of lowering costs – nothing more. Nothing has changed. It’s all the same stuff just a lot slower and cheaper. We believe that the firewall is STILL the ideal location to exert control over traffic flowing across the network. But we believe control needs to be based on the application identify, regardless of which port/ports it uses – and here’s why… ------------------- Explain why customers have deployed all of these devices – the control that once existed in the firewall has eroded over time. Added devices or scanning engines do not solve the problem. UTMs exist for the sole purpose of consolidating devices to save money UTMs suffer from performance issues, multiple policies, silo-based scanning, multiple databases, logs, etc UTMs are all stateful inspection based – the all make their first decision on port. This is not our value-add
  • #10: We’d like to help you build a prevention-focused architecture that stops at nothing short of complete visibility into all traffic; is natively integrated in such a way that no gaps exist and context is delivered so you only have to react to the threats that are critically important; is highly automated to reduce or remove manual response; and enables you to drive seamless policy throughout your organization to reduce your attack surface and eliminate unnecessary risk. How do we do that? If you go back in time, the first thing we said we were going to do as a company was safely enable the use of all applications on your network. Why is that important? Attackers know that one of the easiest ways to get into your network is through an application. Back in the mid-90’s our founder, Nir Zuk, created the first stateful inspection firewall. Stateful inspection firewalls use port, protocol and IP addresses to make security policy decisions. That was OK in the mid-90’s when you had only two applications on your network – email and web that communicated over a very predictable set of ports. At the time there was also a very limited number of devices to contend with on your network. Fast forward to the early-2000’s and Nir could see that the number of applications landing on the network was about to explode, and that stateful-based firewalls would be incapable of handling this new environment where these applications utilized significantly more ports and followed non-standard patterns that the stateful firewall simply couldn’t anticipate. Mega trends like BYOD, mobility and cloud computing added further complications. Nir made the decision to re-invent the firewall and develop a new approach that took the guessing out of security, and provided a much more robust solution for managing applications, users and devices. That approach led to the formation of Palo Alto Networks in 2005, and the creation of the industries first next-generation firewall in 2007. The big different between stateful firewalls and next-generation firewalls is we don’t guess. We don’t guess about applications, we don’t guess about users, we don’t guess about content, and we don’t guess about devices. We definitively inspect and identify all applications, users, content, and devices operating across your network. That means you get real visibility on your network which leads to better security. The next thing we said we were going to do was prevent both known and unknown cyber threats for all users on any device across any network. To achieve this we developed a series of cloud-based services that integrate closely with the next-generation firewall and deliver automated threat detection and prevention. We have four cloud-based services today – Threat Prevention, URL Filtering, WildFire and GlobalProtect for mobile security. Let’s pick one of these services, WildFire, to demonstrate to power of this integrated approach. Now, if an attacker attempts to breach your organization using a known threat we’re going to automatically block that attack using a combination of our next-generation firewall and cloud-based services (Threat Prevention, URL Filtering and GlobalProtect). If the threat is unknown we’re going to quickly turn it into a known threat using WildFire which detects and analyzes potentially malicious files looking for new forms of malware, malicious URLs or command-and-control sites. As those unknown threats are detected, WildFire automatically develops new protections and within minutes routes those tools back to your cloud based services. We don’t just route those tools to your systems, we route them to the global customer base so you benefit from the multiplier effect of a large threat intelligence community. This automated process ensures that your platform can delivery the highest levels of security for all users on any device across your entire network. The newest technology we’ve brought to market is advanced endpoint protection. Let me tell you why we went down this path. Legacy providers have not been able to keep up with the challenges associated with advanced threats that have been finding their way onto the endpoint, then working their way into the network. We looked across the market, at all of the different approaches and decided something truly disruptive had to happen. Many of the “newer” technologies have effectively given up on prevention and instead focus their efforts on detection and remediation. Other prevention-based approaches were simply ineffective at stopping advanced threats, or imposed too much operational overhead to be viable on a large scale basis. We came up with a very unique approach that prevents all exploit and malware-based attacks, even those based on unknown zero-day vulnerabilities. And we do this with a very lightweight and scalable technology. This approach has proven to be highly effective at protecting endpoints from advanced attacks – including laptops, servers, industrial control systems, bank ATMs, medical devices and retail point of sale systems. So, to wrap it up our core value proposition is that we provide an enterprise security platform that safely enables all applications through granular use of controls and prevention of known and unknown cyber threats for all users on any device across any network. In doing so we’re able to deliver superior security with superior TCO.
  • #12: Our platform is highly extensible and over the years we have added many subscription services that provide additional security capabilities to our end-customers and additional revenue opportunities to us. Some of these subscriptions come in the form of an attached service to our Next-Generation Firewalls, such as WildFire, Threat Prevention, URL Filtering, and GlobalProtect. The Traps subscriptions is based on the number of protected endpoints and servers. The AutoFocus subscription will be based on the number of SOC users that make use of the service. The Aperture subscription will be based on the number of users for each sanctioned SaaS application that is covered by the service.
  • #14: Cloud architectures have fundamentally changed the way organizations manage their datacenter operations. The emergence of software defined data center powering private clouds (examples of which include VMware NSX and OpenStack), public cloud adoption of Amazon Web Services and Microsoft Azure growing at a rapid pace, organizations have rapidly adopted them to meet the business needs of agility, scale and competitive pressures. The third leg of the data center evolution is the expansive use of software as a service applications like Office365, Box, Dropbox and salesforce.com. During this evolution, the well understood principles of network security and defense in depth approaches practiced in traditional brick and mortar data centers are being challenged. Let’s look at these security challenges within cloud deployment… Not too long ago, data centers looked a bit like this. traditional on premises servers running all manner of apps. They might be a mix of different technology, from different acquisitions and mergers. Or merely from expansion over time. the challenge being a mixed environment that limits scale, agilty and competiveness. While increasing costs With the maturation of virtualization technology, a need to standardize their infrastructure and be more agile/flexible, customers have rapidly moved to a point where much of their on-premises DC is now virtualized. <click> Defined as a private cloud and/or as a software defined network, VMware NSX and Cisco ACI are the primary vendor examples here. Almost as rapidly as private cloud adoption occurred, organizations are moving workloads to public cloud environments such as amazon or azure. <click> Often referred to as IaaS or PaaS, these environments provide some added benefits over and above a private cloud, specifically they eliminate much of the underlying infrastructure management. The third leg of the data center evolution is the expansive use of software as a service applications like box, dropbox and salesforce.com. Further fueling this evolution is the goals and objectives of both the CISO and the CIO.
  • #17: SaaS has it’s own specific dangers to deal with that the NGFW does not see Protection from unknowing users is just as dangerous as malicious outsiders. So we have shown how the NGFW treats SaaS apps like any other app with visibility and granular control of access. But once a SaaS app is defined sanctioned and data is sent to the cloud where that app resides there are new challenges. The data is no longer under the companies control and visibility is often lost. Even though the SaaS companies do their best to protect the data it is not their responsibility in the end. Just like any other piece of the customers network it is the sec ops teams responsibility to protect and control access to the data. [click] The first challenge is that the application becomes a new entry and distribution point for malware. This is often the breach point for malicious outsiders we showed before as the most common type of breach and needs to be protected. Some malware even target SaaS applications changing their shares to public so the data can be retrieved externally. [click] Next is the accidental data exposure by unknowing employees. This is one of the most common use cases and as we showed before was the second largest causes of breaches last year. This can be as simply as an employee sharing with someone who also has share privileges and it eventually gets out of control when someone down the line shares publicly. Another common occurrence is mistyping a name when sharing and sharing with the wrong person, a group or even someone externally. And very commonly as ghost shares of employees and vendors that are no longer working with the company but their shares remain. [click] Last you have to deal with internal malicious user that purposely share data for theft or revenge. This is less common as the third most common form of breach last year but still a threat that needs to be addressed. This can be as simple as an employee that is leaving the company setting all the folders to be shared publicly or with an external email address to steal the data.
  • #18: Saas usage needs to be understood Know which apps are being used Know who is using them Know what data is going into them SaaS usage needs to be controlled Block apps where risk is unmanageable Control usage for apps that are allowed but not managed Apply deep security to apps that are sanctioned Apply device level access control from managed vs. unmanaged assets
  • #19: Saas usage needs to be understood Know which apps are being used Know who is using them Know what data is going into them SaaS usage needs to be controlled Block apps where risk is unmanageable Control usage for apps that are allowed but not managed Apply deep security to apps that are sanctioned Apply device level access control from managed vs. unmanaged assets
  • #25: N/A