SlideShare a Scribd company logo
11
Most read
13
Most read
14
Most read
Palo Alto Next-generation Firewalls Castle Force is an authorised partner of Palo Alto Networks in the UK http://www.castleforce.co.uk/Palo-Alto-Networks.php
Our enterprise is changing Driven by new generation of Internet-centric users Giant social system - traditional boundaries have been eliminated Built around communication, sharing, collaboration, group knowledge Full, unrestricted access to everything on the Internet is a right IT and business need to determine risk tolerance of Social Enterprise Internet Enterprise Work Life Home Life Page    |  Rewards Risks
Enterprise applications take many forms What’s running on YOUR network? Page    |
What we recently found on enterprise networks 484 total unique applications running on 60 large enterprises Application usage and Risk Report Page    |
Employees use them, but management is struggling 73% - like to read and write blogs for business 59% - use Instant Messaging at work 53% - like Twitter for business and personal use 52% - participate in online discussion forums at work 52% - execs admit they’re important to business goals, success 6% - but very few businesses deploy them widely today Page    |
Business benefits of enterprise applications Twitter – instant alerts on corporate news or information Blogs – instant perspective and analysis on relevant issues IM – instant communication with remote employees Webex – instant meetings with customers in another city Salesforce – instant update to sales data from any location YouTube – instant distribution of product training videos SharePoint – instant collaboration on complex projects Better communication, collaboration, information exchange Increased efficiency, lower cost, higher productivity for all Page    |
Data loss Unauthorized employee file transfer, data sharing Non-compliance Using unapproved applications – IM,  web mail in financial services Operational cost overruns Excessive bandwidth consumption, desktop cleanup  Employee productivity loss   Uncontrolled, excessive use of personal applications Business continuity Malware or application vulnerability induced downtime  Internal risks of enterprise applications Page    |
But employees are unconcerned about risks  64% - understand some apps can result in data leakage  33% - experienced security issues when using an app 45% - did nothing when confronted with a security breach  61% - feel more productive using internet apps The inmates are running the asylum  59% -  admit these apps are completely uncontrolled IT is losing control of applications, users, content 48% - don’t know what apps are used by employees Page    |
Summary of the social enterprise challenge for IT Employees Driving exploding use of collaborative Internet applications  Using an average of 6  different business and personal applications Ignoring policies and circumventing security controls to get them Unaware and unconcerned about data theft and potential threats In control of the network – more users, more apps coming IT Cannot see applications Cannot control applications Cannot identify specific users Cannot enforce effective policies Cannot manage the risk or rewards of these apps for the business Page    |
The underlying cause of the security problem Firewalls should see and control applications, users, and threats . . . . . . but they only show you ports, protocols, and IP addresses –all meaningless! Page    |
The current solving Internet Doesn’t solve the problem Firewall “helpers” have limited view of traffic Complex and costly to buy and maintain © 2009 Palo Alto Networks. Proprietary and Confidential. Page    |
Enough!  it’s time to fix the firewall! Page    |  How to Make  the Firewall Useful Again 1. Identify applications regardless of    port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address  3. Identify and prevent potential threats  associated with all high risk applications 4. Granular policy-based control over applications, users, functionality 5. Multi-gigabit, in-line deployment with    no performance degradation
About Palo Alto Networks Founded in 2005 by security visionary Nir Zuk World class team with strong security and networking experience  Innovations:  App-ID, User-ID, Content-ID Builds next-generation firewalls that identify and control more than 900 applications; makes firewall strategic again Global footprint:  presence in 50+ countries, 24/7 support © 2009 Palo Alto Networks. Proprietary and Confidential. Page    |
Unique Technologies Transform the Firewall App-ID Identify the application User-ID Identify the user Content-ID Scan the content © 2009 Palo Alto Networks. Proprietary and Confidential. Page    |
Purpose-Built Architecture: PA-4000 Series  © 2009 Palo Alto Networks. Proprietary and Confidential. Page    |  Content Scanning HW Engine Palo Alto Networks’ uniform signatures Multiple memory banks – memory bandwidth scales performance Multi-Core Security Processor High density processing for flexible security functionality Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression) Dedicated Control Plane Highly available mgmt High speed logging and route updates 10Gbps Dual-core CPU RAM RAM HDD 10 Gig Network Processor Front-end network processing offloads security processors Hardware accelerated QoS, route lookup, MAC lookup and NAT CPU 16 . . SSL IPSec De-Compression CPU 1 CPU 2 10Gbps Control Plane Data Plane RAM RAM CPU 3 QoS Route, ARP, MAC lookup NAT Content Scanning Engine RAM RAM RAM RAM
Enables Executive Visibility © 2009 Palo Alto Networks. Proprietary and Confidential. Page    |  © 2008 Palo Alto Networks. Proprietary and Confidential. Page    |  © 2008 Palo Alto Networks. Proprietary and Confidential. Page    |
Palo Alto Networks-OS Features Strong networking foundation Dynamic routing (OSPF, RIPv2) Site-to-site IPSec VPN  SSL VPN for remote access Tap mode – connect to SPAN port Virtual wire (“Layer 1”) for true transparent in-line deployment L2/L3 switching foundation QoS traffic shaping Max/guaranteed and priority  By user, app, interface, zone, and more Zone-based architecture All interfaces assigned to security zones for policy enforcement  High Availability Active / passive  Configuration and session synchronization Path, link, and HA monitoring Virtual Systems Establish multiple virtual firewalls in a single device (PA-4000 Series only) Simple, flexible management CLI, Web, Panorama, SNMP, Syslog © 2009 Palo Alto Networks. Proprietary and Confidential. Page    |  Visibility and control of applications, users and content are  complemented by core firewall features   PA-500 PA-2020 PA-2050 PA-4020 PA-4050 PA-4060
Flexible Deployment Options © 2009 Palo Alto Networks. Proprietary and Confidential. Page    |  Visibility Transparent In-Line Firewall Replacement Application, user and content visibility without inline deployment IPS with app visibility & control Consolidation of IPS & URL filtering Firewall replacement with app visibility & control Firewall + IPS Firewall + IPS + URL filtering
You decide how much control is needed Unprecedented level of application control Decrypt where appropriate Deny – even unknown applications Allow Allow but scan Allow certain users Allow certain functions Shape (QoS) … and various combinations of the above Page    |
Next-generation firewalls for everyone Performance Remote Office/ Medium Enterprise  Large  Enterprise PA-2000 Series PA-4000 Series PA-500 Page    |
Leading Organisations Trust Palo Alto Networks © 2009 Palo Alto Networks. Proprietary and Confidential Page    |  Financial Services Government Media / Entertainment / Retail Service Providers / Services
Leading Organisations Trust Palo Alto Networks © 2009 Palo Alto Networks. Proprietary and Confidential Page    |  Education Mfg / High Tech / Energy Healthcare Industry
Thank You Please contact us on Tel : +44(0)118 907 1600  Tel:  +44(0)151 203 1400  Email: info@castleforce.co.uk  Need a Quote for Palo Alto Firewall

More Related Content

PPTX
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
BAKOTECH
 
PDF
Palo alto networks product overview
Belsoft
 
PDF
3 palo alto ngfw architecture overview
Mostafa El Lathy
 
PDF
2 what is the best firewall (sizing)
Mostafa El Lathy
 
PPTX
Palo alto NGfw2023.pptx
ahmad661583
 
PDF
17 palo alto threat prevention concept
Mostafa El Lathy
 
PDF
Palo alto-review
Rayan Darine
 
PDF
4 palo alto licenses
Mostafa El Lathy
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
BAKOTECH
 
Palo alto networks product overview
Belsoft
 
3 palo alto ngfw architecture overview
Mostafa El Lathy
 
2 what is the best firewall (sizing)
Mostafa El Lathy
 
Palo alto NGfw2023.pptx
ahmad661583
 
17 palo alto threat prevention concept
Mostafa El Lathy
 
Palo alto-review
Rayan Darine
 
4 palo alto licenses
Mostafa El Lathy
 

What's hot (20)

PPT
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
 
PDF
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
 
PDF
Understanding SASE
Haris Chughtai
 
PDF
ClearPass Overview
JoAnna Cheshire
 
PPT
Fortigate Training
NCS Computech Ltd.
 
PDF
01- intro to firewall concepts
Mostafa El Lathy
 
PDF
Aruba Networks - Overview ClearPass
Paulo Eduardo Sibalde
 
PPTX
Zero Trust Network Access
Er. Ajay Sirsat
 
PPTX
4_Session 1- Universal ZTNA.pptx
aungyekhant1
 
PPTX
Technology Overview - Symantec Endpoint Protection (SEP)
Iftikhar Ali Iqbal
 
PDF
12 palo alto app-id concept
Mostafa El Lathy
 
PDF
Fortinet security fabric
ANSItunCERT
 
PDF
6 pan-os software update & downgrade instruction
Mostafa El Lathy
 
PDF
7 palo alto security zones & interfaces concepts
Mostafa El Lathy
 
PDF
Web Application Security
MarketingArrowECS_CZ
 
PPTX
Traditional Firewall vs. Next Generation Firewall
美兰 曾
 
PPTX
Network Security - Fortinet, Dublin June 2017
Novosco
 
PDF
19 high availability
Mostafa El Lathy
 
PDF
10 palo alto nat policy concepts
Mostafa El Lathy
 
PDF
Vulnerability and Patch Management
n|u - The Open Security Community
 
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
 
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
 
Understanding SASE
Haris Chughtai
 
ClearPass Overview
JoAnna Cheshire
 
Fortigate Training
NCS Computech Ltd.
 
01- intro to firewall concepts
Mostafa El Lathy
 
Aruba Networks - Overview ClearPass
Paulo Eduardo Sibalde
 
Zero Trust Network Access
Er. Ajay Sirsat
 
4_Session 1- Universal ZTNA.pptx
aungyekhant1
 
Technology Overview - Symantec Endpoint Protection (SEP)
Iftikhar Ali Iqbal
 
12 palo alto app-id concept
Mostafa El Lathy
 
Fortinet security fabric
ANSItunCERT
 
6 pan-os software update & downgrade instruction
Mostafa El Lathy
 
7 palo alto security zones & interfaces concepts
Mostafa El Lathy
 
Web Application Security
MarketingArrowECS_CZ
 
Traditional Firewall vs. Next Generation Firewall
美兰 曾
 
Network Security - Fortinet, Dublin June 2017
Novosco
 
19 high availability
Mostafa El Lathy
 
10 palo alto nat policy concepts
Mostafa El Lathy
 
Vulnerability and Patch Management
n|u - The Open Security Community
 
Ad

Similar to Palo alto networks next generation firewalls (20)

PPT
Palo Alto Networks Soc Ent Okt2009
Zernike College
 
PPTX
Palo Alto Networks, The Networking Security Company
dtimal
 
PPTX
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
 
PPT
Palo_Alto_Networks_Cust_June_2009.ppt
PatrickAng14
 
PPTX
Palo alto safe application enablement
responsedatacomms
 
PPTX
Palo Alto Networks 28.5.2013
Belsoft
 
PPTX
Why choose pan
Achmad Yudo
 
PPTX
Palo alto networks_customer_overview_november2011-short
Ten Sistemas e Redes
 
PDF
Palo Alto Networks y la tecnología de Next Generation Firewall
Mundo Contact
 
PDF
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
Aruba, a Hewlett Packard Enterprise company
 
PPTX
Vfm palo alto next generation firewall
vfmindia
 
PPTX
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
Tarek Nader
 
PDF
Plugging Network Security Holes Using NetFlow
NetFlow Analyzer
 
PPT
FaceTime Web 2.0
Chris Sparshott
 
PDF
Firewall buyers-guide
Andy Kwong
 
PDF
Watchguard security proposal 2012
Jimmy Saigon
 
PDF
[CLASS 2014] Palestra Técnica - Delfin Rodillas
TI Safe
 
PPTX
Avr presentation
พอแอกอ แพ็ก
 
PPTX
Avr_presentation
Pakky .
 
PPTX
An introduction to Unified Threat Management (UTM), for Dummies
Elsa Cariello
 
Palo Alto Networks Soc Ent Okt2009
Zernike College
 
Palo Alto Networks, The Networking Security Company
dtimal
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
 
Palo_Alto_Networks_Cust_June_2009.ppt
PatrickAng14
 
Palo alto safe application enablement
responsedatacomms
 
Palo Alto Networks 28.5.2013
Belsoft
 
Why choose pan
Achmad Yudo
 
Palo alto networks_customer_overview_november2011-short
Ten Sistemas e Redes
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Mundo Contact
 
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
Aruba, a Hewlett Packard Enterprise company
 
Vfm palo alto next generation firewall
vfmindia
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
Tarek Nader
 
Plugging Network Security Holes Using NetFlow
NetFlow Analyzer
 
FaceTime Web 2.0
Chris Sparshott
 
Firewall buyers-guide
Andy Kwong
 
Watchguard security proposal 2012
Jimmy Saigon
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
TI Safe
 
Avr_presentation
Pakky .
 
An introduction to Unified Threat Management (UTM), for Dummies
Elsa Cariello
 
Ad

Recently uploaded (20)

PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Software Development Methodologies in 2025
KodekX
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 

Palo alto networks next generation firewalls

  • 1. Palo Alto Next-generation Firewalls Castle Force is an authorised partner of Palo Alto Networks in the UK http://www.castleforce.co.uk/Palo-Alto-Networks.php
  • 2. Our enterprise is changing Driven by new generation of Internet-centric users Giant social system - traditional boundaries have been eliminated Built around communication, sharing, collaboration, group knowledge Full, unrestricted access to everything on the Internet is a right IT and business need to determine risk tolerance of Social Enterprise Internet Enterprise Work Life Home Life Page | Rewards Risks
  • 3. Enterprise applications take many forms What’s running on YOUR network? Page |
  • 4. What we recently found on enterprise networks 484 total unique applications running on 60 large enterprises Application usage and Risk Report Page |
  • 5. Employees use them, but management is struggling 73% - like to read and write blogs for business 59% - use Instant Messaging at work 53% - like Twitter for business and personal use 52% - participate in online discussion forums at work 52% - execs admit they’re important to business goals, success 6% - but very few businesses deploy them widely today Page |
  • 6. Business benefits of enterprise applications Twitter – instant alerts on corporate news or information Blogs – instant perspective and analysis on relevant issues IM – instant communication with remote employees Webex – instant meetings with customers in another city Salesforce – instant update to sales data from any location YouTube – instant distribution of product training videos SharePoint – instant collaboration on complex projects Better communication, collaboration, information exchange Increased efficiency, lower cost, higher productivity for all Page |
  • 7. Data loss Unauthorized employee file transfer, data sharing Non-compliance Using unapproved applications – IM, web mail in financial services Operational cost overruns Excessive bandwidth consumption, desktop cleanup Employee productivity loss Uncontrolled, excessive use of personal applications Business continuity Malware or application vulnerability induced downtime Internal risks of enterprise applications Page |
  • 8. But employees are unconcerned about risks 64% - understand some apps can result in data leakage 33% - experienced security issues when using an app 45% - did nothing when confronted with a security breach 61% - feel more productive using internet apps The inmates are running the asylum 59% - admit these apps are completely uncontrolled IT is losing control of applications, users, content 48% - don’t know what apps are used by employees Page |
  • 9. Summary of the social enterprise challenge for IT Employees Driving exploding use of collaborative Internet applications Using an average of 6 different business and personal applications Ignoring policies and circumventing security controls to get them Unaware and unconcerned about data theft and potential threats In control of the network – more users, more apps coming IT Cannot see applications Cannot control applications Cannot identify specific users Cannot enforce effective policies Cannot manage the risk or rewards of these apps for the business Page |
  • 10. The underlying cause of the security problem Firewalls should see and control applications, users, and threats . . . . . . but they only show you ports, protocols, and IP addresses –all meaningless! Page |
  • 11. The current solving Internet Doesn’t solve the problem Firewall “helpers” have limited view of traffic Complex and costly to buy and maintain © 2009 Palo Alto Networks. Proprietary and Confidential. Page |
  • 12. Enough! it’s time to fix the firewall! Page | How to Make the Firewall Useful Again 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Identify and prevent potential threats associated with all high risk applications 4. Granular policy-based control over applications, users, functionality 5. Multi-gigabit, in-line deployment with no performance degradation
  • 13. About Palo Alto Networks Founded in 2005 by security visionary Nir Zuk World class team with strong security and networking experience Innovations: App-ID, User-ID, Content-ID Builds next-generation firewalls that identify and control more than 900 applications; makes firewall strategic again Global footprint: presence in 50+ countries, 24/7 support © 2009 Palo Alto Networks. Proprietary and Confidential. Page |
  • 14. Unique Technologies Transform the Firewall App-ID Identify the application User-ID Identify the user Content-ID Scan the content © 2009 Palo Alto Networks. Proprietary and Confidential. Page |
  • 15. Purpose-Built Architecture: PA-4000 Series © 2009 Palo Alto Networks. Proprietary and Confidential. Page | Content Scanning HW Engine Palo Alto Networks’ uniform signatures Multiple memory banks – memory bandwidth scales performance Multi-Core Security Processor High density processing for flexible security functionality Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression) Dedicated Control Plane Highly available mgmt High speed logging and route updates 10Gbps Dual-core CPU RAM RAM HDD 10 Gig Network Processor Front-end network processing offloads security processors Hardware accelerated QoS, route lookup, MAC lookup and NAT CPU 16 . . SSL IPSec De-Compression CPU 1 CPU 2 10Gbps Control Plane Data Plane RAM RAM CPU 3 QoS Route, ARP, MAC lookup NAT Content Scanning Engine RAM RAM RAM RAM
  • 16. Enables Executive Visibility © 2009 Palo Alto Networks. Proprietary and Confidential. Page | © 2008 Palo Alto Networks. Proprietary and Confidential. Page | © 2008 Palo Alto Networks. Proprietary and Confidential. Page |
  • 17. Palo Alto Networks-OS Features Strong networking foundation Dynamic routing (OSPF, RIPv2) Site-to-site IPSec VPN SSL VPN for remote access Tap mode – connect to SPAN port Virtual wire (“Layer 1”) for true transparent in-line deployment L2/L3 switching foundation QoS traffic shaping Max/guaranteed and priority By user, app, interface, zone, and more Zone-based architecture All interfaces assigned to security zones for policy enforcement High Availability Active / passive Configuration and session synchronization Path, link, and HA monitoring Virtual Systems Establish multiple virtual firewalls in a single device (PA-4000 Series only) Simple, flexible management CLI, Web, Panorama, SNMP, Syslog © 2009 Palo Alto Networks. Proprietary and Confidential. Page | Visibility and control of applications, users and content are complemented by core firewall features PA-500 PA-2020 PA-2050 PA-4020 PA-4050 PA-4060
  • 18. Flexible Deployment Options © 2009 Palo Alto Networks. Proprietary and Confidential. Page | Visibility Transparent In-Line Firewall Replacement Application, user and content visibility without inline deployment IPS with app visibility & control Consolidation of IPS & URL filtering Firewall replacement with app visibility & control Firewall + IPS Firewall + IPS + URL filtering
  • 19. You decide how much control is needed Unprecedented level of application control Decrypt where appropriate Deny – even unknown applications Allow Allow but scan Allow certain users Allow certain functions Shape (QoS) … and various combinations of the above Page |
  • 20. Next-generation firewalls for everyone Performance Remote Office/ Medium Enterprise Large Enterprise PA-2000 Series PA-4000 Series PA-500 Page |
  • 21. Leading Organisations Trust Palo Alto Networks © 2009 Palo Alto Networks. Proprietary and Confidential Page | Financial Services Government Media / Entertainment / Retail Service Providers / Services
  • 22. Leading Organisations Trust Palo Alto Networks © 2009 Palo Alto Networks. Proprietary and Confidential Page | Education Mfg / High Tech / Energy Healthcare Industry
  • 23. Thank You Please contact us on Tel : +44(0)118 907 1600 Tel: +44(0)151 203 1400 Email: [email protected] Need a Quote for Palo Alto Firewall

Editor's Notes

  • #5: 494 unique apps * 30 business apps * 44 file sharing apps (all types) * 43 photo/video apps * 17 social networking * 45 IM
  • #13: Now lets change gears and think positive… What the firewall really did provide innovation? What would it look like? Based on whats really happening, here are 5 critical requirements. Networks exist to support apps – you need to see them Ip addresses are annoying – you need to know the user by name Forget adding other threat prevention stuff – make the FW stop the damn threats! If you have this level of visibility, the policies you create will be effective and enforceable at the end of the day, it must keep pace with your business – security stuff should not slow you down.
  • #16: 03/05/07