SlideShare a Scribd company logo
Next-Generation
Firewall
NETWORK SECURITY CHALLENGES
Lack of visibility
and control
Inconsistent tools
and management
Lack of automation
and scalability
Thank you
paloaltonetworks.com
WHAT IS A
NEXT-GENERATION FIREWALL
● Deep packet inspection
● Looks beyond basic network port and protocol activity
● Evaluates and filters application-level traffic
● Includes intrusion protection capabilities
● Incorporates intelligence from outside the firewall
Thank you
paloaltonetworks.com
OUR UNIQUE APPROACH
VM-Series
PA-Series Prisma Access
Next-Generation Firewall Platform
Panorama
Physical NGFW Virtual NGFW
Secure Access
Service Edge (SASE)
NGFW Management
Container NGFW
CN-Series
Thank you
paloaltonetworks.com
WHAT IS OUR
NEXT-GENERATION FIREWALL
Prevention Focused
Architecture
Zero Trust
Enforcement
Advanced
Security
| |
Thank you
paloaltonetworks.com
WHAT DOES OUR
NEXT-GENERATION FIREWALL PROVIDE
Unmistakable
Clarity
Predictable
Performance
Streamlined
Protection
Thank you
paloaltonetworks.com
WHAT COMPRISES OUR
NEXT-GENERATION FIREWALL
Form Factor Subscriptions Management
Thank you
paloaltonetworks.com
FORM FACTOR: PA-SERIES
PA-SERIES USAGE
PA-220 Branch offices, retail locations, midsize businesses
PA-220R
Severe environments: utility substations, manufacturing plants, oil
and gas facilities, building management systems, healthcare
networks
PA-400 Distributed branch offices, retail locations, and midsize businesses
PA-800 Branch offices, midsize businesses
Thank you
paloaltonetworks.com
PA-SERIES USAGE
PA-3200 Internet gateway
PA-3400 High-speed internet gateway deployments
PA-5200 Data center, Internet gateway, service provider deployments
PA-5400
High-speed data center, internet gateway, and service provider
deployments
PA-5450
Hyperscale data center, internet edge and campus segmentation
deployments
PA-7000 Large data centers, high-bandwidth network perimeter
FORM FACTOR: PA-SERIES
Thank you
paloaltonetworks.com
PAN-OS CAPABILITIES
CAPABILITY WHAT IS IT?
App-ID
Enables application visibility on your network to help you to create and
enforce security policies
Content-ID
Delivers a unified approach for traffic analysis using threat and data-loss
prevention techniques
Decryption Decrypt traffic to prevent unseen content and activity on your network
User-ID Identifies all users on your network regardless of location
Virtual Private Networking (VPN)
Create connections to allow users and systems to connect securely over a
public network
Reporting Keep a pulse on your network activity and validate your security policies
Thank you
paloaltonetworks.com
CLOUD-DELIVERED SECURITY SERVICES
Natively Integrated
Offering best-in-class
protection consistently,
everywhere
180x
Faster to stop known,
unknown, and zero day
threats than any other solution
+4.3M
Unique security updates per
day to ensure organizations
are protected
Thank you
paloaltonetworks.com
SUBSCRIPTIONS
SUBSCRIPTIONS WHAT IS IT?
DNS Security
Applies predictive analytics, machine learning, and automation to block attacks that
use Domain Name Service
Enterprise Data Loss
Prevention
Discovers, monitors and protects sensitive data for all traffic, applications, and users
IoT Security
Identifies Internet of Things (IoT) devices, assesses their risks and enforces security for
them
GlobalProtect
Extends prevention capabilities of the Strata firewall to mobile workers, regardless of
their location
Thank you
paloaltonetworks.com
SUBSCRIPTIONS
SUBSCRIPTIONS WHAT IS IT?
SD-WAN Secure and reliable software-defined WAN as an integrated solution
Threat Prevention Blocks known malware, exploits and command-and control activity on the network
URL Filtering Provides safe web access, preventing users from malicious and phishing sites
WildFire Detects and prevents unknown threats, quickly sharing protections automatically
AIOps for NGFW
Redefine firewall operational experience by interpreting, predicting, and resolving
problems before they become business impacting.
Thank you
paloaltonetworks.com
SUBSCRIPTIONS
SUBSCRIPTIONS WHAT IS IT?
Advanced URL Filtering
Uses a cloud-based ML-powered web security engine to perform ML-based
inspection of web traffic in real-time.
Advanced WildFire
Provides access to Intelligent Run-time Memory Analysis, a cloud-based, advanced
analysis engine that complements existing static, and dynamic analysis engines, to
detect and prevent evasive malware threats.
Advanced Threat
Prevention
Leverage full-featured IPS, antimalware, and command-and-control (C2) protection
Thank you
paloaltonetworks.com
● Tightly integrated security innovations
● Effectiveness with automation and analytics
● Consistent visibility and control everywhere
BENEFITS
Thank you
paloaltonetworks.com
THE VALUE OF OUR
NEXT-GENERATION FIREWALL
Reduce Human
Error
Reduce Legacy
Tools
Reduce Cost Reduce Risk
COMPETITIVE LANDSCAPE
Check Point Software Riddled with issues - performance and complexity
Cisco Firewall technology is behind
Fortinet Neither a market disruptor nor a market leader
Target Buyers Pain Points Solutions
Budget
Holder
● CIO
● VP of Infrastructure
● VP of IT
● Pressure to reduce
costs
● Demand for services
● Privacy and security
● Skills shortage
● Simplify your security
infrastructure
● Manage risk without
slowing down
● Protection everywhere
Influencer
● Network Security
Operations
● Network Security
Engineer
● Too much reactive
firefighting
● Lack of automation
● Tool complexity
● Lack of tool reliability
● Consistently protect with
flexible deployment
● Save time by automating
tasks
● Replace disconnected
tools
SALES POSITIONING
SALES PRIORITIZATION
● Prioritize organizations that value security
● Prioritize organizations that are concerned about data loss
● Prioritize organizations that have compliance requirements
● Prioritize organizations that use legacy security solutions
● De-prioritize organizations that make buying decisions
based on price
WHY DO WE WIN
A Different Standard for Security
● Security posture improvement
● Powerful threat identification and threat
prevention
● Ease of management
● Automated, fewer manual tasks
● Highly integrated
WHY SELL OUR
NEXT-GENERATION FIREWALL
$16.7B
Total Addressable Market
(TAM)
12K
Accounts Available
for Refresh
23.52%
Annual Growth Rate
Palo Alto Networks was named a Leader in the Gartner Magic Quadrant®
for Network Firewalls for the TENTH time in a row
Thank you
paloaltonetworks.com
WHAT TO LISTEN FOR
KEY TERMS USE CASES
● Next-generation firewall
● Intrusion prevention (IPS)/ Intrusion detection (IDS)
● Web proxy / Web gateway / Web security
● Malware analysis
● Sandboxing
● VPN / SD-WAN
● Cybersecurity breach
● Security consolidation
● Branches /
remote
locations
● Data center
● Mobile networks
● Network
perimeter
● Remote / Mobile
workforce
Thank you
paloaltonetworks.com
WHAT TO ASK
● How many locations do you secure?
● Are you able to secure all your locations consistently?
● How many network security vendors do you use?
● How do you align your network security policies with business requirements?
● Have you had to turn off security features (like decryption) to meet the
performance requirements of your organization?
● How do your security tools use automation to reduce manual tasks
● What impact have you seen by sophisticated attacks?
Thank you
paloaltonetworks.com
WANT TO KNOW MORE
Next-Generation Firewall
(NGFW)
Channel Marketing Campaigns
Help Me Sell NGFW Partner Enablement
Technical Learning Guide Hardware Refresh Program
Thank you
paloaltonetworks.com

More Related Content

PPTX
palo-alto-networks-sase-overview-deck.pptx
PPTX
Convergence without Compromise an Introduction to Prisma SASE.pptx
PDF
Secure Access – Anywhere by Prisma, PaloAlto
PDF
Demystifying Prisma Access
PPTX
Palo alto NGfw2023.pptx
PDF
Palo Alto Networks Portfolio & Strategy Overview 2019
PPT
Palo alto networks next generation firewalls
PDF
Palo alto networks product overview
palo-alto-networks-sase-overview-deck.pptx
Convergence without Compromise an Introduction to Prisma SASE.pptx
Secure Access – Anywhere by Prisma, PaloAlto
Demystifying Prisma Access
Palo alto NGfw2023.pptx
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo alto networks next generation firewalls
Palo alto networks product overview

What's hot (20)

PPTX
Check Point NGFW
PPTX
Palo Alto Cortex XDR presentation .......
PDF
2 what is the best firewall (sizing)
PDF
Understanding Cisco’ Next Generation SD-WAN Technology
PPTX
SD WAN
PDF
SD WAN Overview | What is SD WAN | Benefits of SD WAN
PPTX
SDWAN Introduction presentation & Public Speaking
PDF
A Software Defined WAN Architecture
PDF
Meraki Overview
PDF
Software-Defined WAN: A Real World Success Story
PDF
17 palo alto threat prevention concept
PPTX
Extending Security to EVERY Edge
PDF
IBM QRadar Security Intelligence Overview
PPTX
PDF
10 palo alto nat policy concepts
PPTX
Tanium Overview
PDF
Software Defined WAN – SD-WAN
PDF
Endpoint Security
PPTX
SD-WAN 2.0: Building a Better SD-WAN
PDF
Succeeding with Secure Access Service Edge (SASE)
Check Point NGFW
Palo Alto Cortex XDR presentation .......
2 what is the best firewall (sizing)
Understanding Cisco’ Next Generation SD-WAN Technology
SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SDWAN Introduction presentation & Public Speaking
A Software Defined WAN Architecture
Meraki Overview
Software-Defined WAN: A Real World Success Story
17 palo alto threat prevention concept
Extending Security to EVERY Edge
IBM QRadar Security Intelligence Overview
10 palo alto nat policy concepts
Tanium Overview
Software Defined WAN – SD-WAN
Endpoint Security
SD-WAN 2.0: Building a Better SD-WAN
Succeeding with Secure Access Service Edge (SASE)
Ad

Similar to Palo Alto strata NGFW overview-deck.pptx (20)

PDF
Palo Alto Networks y la tecnología de Next Generation Firewall
PPTX
Palo Alto Networks 28.5.2013
PPTX
Palo Alto Networks Juniper CheckPoint.pptx
PPTX
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
PPTX
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
PDF
Product brochure-print-spread
PDF
Understanding Next-Generation Firewalls (NGFW): The Future of Cybersecurity M...
PDF
Network Security - Defense Through Layered Information Security
PPTX
Why choose pan
PDF
G02.2013 magic quadrant for enterprise network firewall
PDF
Firewall buyers-guide
PPTX
Prevention first platform for cyber defence the alternative strategy khipu ...
PPTX
Palo Alto Networks, The Networking Security Company
PDF
What is next-gen firewall (NGFW) and why companies need it?
PPTX
seminar for RL.pptx duduigiu u fihsfdhfv bjbjvcbskdxhnso odh vhn hkhokrhboi ...
PPT
Next generation firewall(ngfw)feature and benefits
PDF
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
PPTX
Watchguard security proposal 2012
PPTX
NG Firewall (Network Security Solution).pptx
PPTX
Next-Generation Firewall Market by Product Type, Distribution Channel, End Us...
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks 28.5.2013
Palo Alto Networks Juniper CheckPoint.pptx
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
Product brochure-print-spread
Understanding Next-Generation Firewalls (NGFW): The Future of Cybersecurity M...
Network Security - Defense Through Layered Information Security
Why choose pan
G02.2013 magic quadrant for enterprise network firewall
Firewall buyers-guide
Prevention first platform for cyber defence the alternative strategy khipu ...
Palo Alto Networks, The Networking Security Company
What is next-gen firewall (NGFW) and why companies need it?
seminar for RL.pptx duduigiu u fihsfdhfv bjbjvcbskdxhnso odh vhn hkhokrhboi ...
Next generation firewall(ngfw)feature and benefits
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
Watchguard security proposal 2012
NG Firewall (Network Security Solution).pptx
Next-Generation Firewall Market by Product Type, Distribution Channel, End Us...
Ad

Recently uploaded (20)

PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PDF
KodekX | Application Modernization Development
PDF
SAP855240_ALP - Defining the Global Template PUBLIC.pdf
PPTX
CroxyProxy Instagram Access id login.pptx
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
REPORT: Heating appliances market in Poland 2024
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Cloud computing and distributed systems.
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PDF
Electronic commerce courselecture one. Pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
PDF
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
PDF
Chapter 2 Digital Image Fundamentals.pdf
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
KodekX | Application Modernization Development
SAP855240_ALP - Defining the Global Template PUBLIC.pdf
CroxyProxy Instagram Access id login.pptx
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
REPORT: Heating appliances market in Poland 2024
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Understanding_Digital_Forensics_Presentation.pptx
Cloud computing and distributed systems.
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
Reimagining Insurance: Connected Data for Confident Decisions.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
Chapter 2 Digital Image Fundamentals.pdf

Palo Alto strata NGFW overview-deck.pptx

  • 2. NETWORK SECURITY CHALLENGES Lack of visibility and control Inconsistent tools and management Lack of automation and scalability
  • 3. Thank you paloaltonetworks.com WHAT IS A NEXT-GENERATION FIREWALL ● Deep packet inspection ● Looks beyond basic network port and protocol activity ● Evaluates and filters application-level traffic ● Includes intrusion protection capabilities ● Incorporates intelligence from outside the firewall
  • 4. Thank you paloaltonetworks.com OUR UNIQUE APPROACH VM-Series PA-Series Prisma Access Next-Generation Firewall Platform Panorama Physical NGFW Virtual NGFW Secure Access Service Edge (SASE) NGFW Management Container NGFW CN-Series
  • 5. Thank you paloaltonetworks.com WHAT IS OUR NEXT-GENERATION FIREWALL Prevention Focused Architecture Zero Trust Enforcement Advanced Security | |
  • 6. Thank you paloaltonetworks.com WHAT DOES OUR NEXT-GENERATION FIREWALL PROVIDE Unmistakable Clarity Predictable Performance Streamlined Protection
  • 7. Thank you paloaltonetworks.com WHAT COMPRISES OUR NEXT-GENERATION FIREWALL Form Factor Subscriptions Management
  • 8. Thank you paloaltonetworks.com FORM FACTOR: PA-SERIES PA-SERIES USAGE PA-220 Branch offices, retail locations, midsize businesses PA-220R Severe environments: utility substations, manufacturing plants, oil and gas facilities, building management systems, healthcare networks PA-400 Distributed branch offices, retail locations, and midsize businesses PA-800 Branch offices, midsize businesses
  • 9. Thank you paloaltonetworks.com PA-SERIES USAGE PA-3200 Internet gateway PA-3400 High-speed internet gateway deployments PA-5200 Data center, Internet gateway, service provider deployments PA-5400 High-speed data center, internet gateway, and service provider deployments PA-5450 Hyperscale data center, internet edge and campus segmentation deployments PA-7000 Large data centers, high-bandwidth network perimeter FORM FACTOR: PA-SERIES
  • 10. Thank you paloaltonetworks.com PAN-OS CAPABILITIES CAPABILITY WHAT IS IT? App-ID Enables application visibility on your network to help you to create and enforce security policies Content-ID Delivers a unified approach for traffic analysis using threat and data-loss prevention techniques Decryption Decrypt traffic to prevent unseen content and activity on your network User-ID Identifies all users on your network regardless of location Virtual Private Networking (VPN) Create connections to allow users and systems to connect securely over a public network Reporting Keep a pulse on your network activity and validate your security policies
  • 11. Thank you paloaltonetworks.com CLOUD-DELIVERED SECURITY SERVICES Natively Integrated Offering best-in-class protection consistently, everywhere 180x Faster to stop known, unknown, and zero day threats than any other solution +4.3M Unique security updates per day to ensure organizations are protected
  • 12. Thank you paloaltonetworks.com SUBSCRIPTIONS SUBSCRIPTIONS WHAT IS IT? DNS Security Applies predictive analytics, machine learning, and automation to block attacks that use Domain Name Service Enterprise Data Loss Prevention Discovers, monitors and protects sensitive data for all traffic, applications, and users IoT Security Identifies Internet of Things (IoT) devices, assesses their risks and enforces security for them GlobalProtect Extends prevention capabilities of the Strata firewall to mobile workers, regardless of their location
  • 13. Thank you paloaltonetworks.com SUBSCRIPTIONS SUBSCRIPTIONS WHAT IS IT? SD-WAN Secure and reliable software-defined WAN as an integrated solution Threat Prevention Blocks known malware, exploits and command-and control activity on the network URL Filtering Provides safe web access, preventing users from malicious and phishing sites WildFire Detects and prevents unknown threats, quickly sharing protections automatically AIOps for NGFW Redefine firewall operational experience by interpreting, predicting, and resolving problems before they become business impacting.
  • 14. Thank you paloaltonetworks.com SUBSCRIPTIONS SUBSCRIPTIONS WHAT IS IT? Advanced URL Filtering Uses a cloud-based ML-powered web security engine to perform ML-based inspection of web traffic in real-time. Advanced WildFire Provides access to Intelligent Run-time Memory Analysis, a cloud-based, advanced analysis engine that complements existing static, and dynamic analysis engines, to detect and prevent evasive malware threats. Advanced Threat Prevention Leverage full-featured IPS, antimalware, and command-and-control (C2) protection
  • 15. Thank you paloaltonetworks.com ● Tightly integrated security innovations ● Effectiveness with automation and analytics ● Consistent visibility and control everywhere BENEFITS
  • 16. Thank you paloaltonetworks.com THE VALUE OF OUR NEXT-GENERATION FIREWALL Reduce Human Error Reduce Legacy Tools Reduce Cost Reduce Risk
  • 17. COMPETITIVE LANDSCAPE Check Point Software Riddled with issues - performance and complexity Cisco Firewall technology is behind Fortinet Neither a market disruptor nor a market leader
  • 18. Target Buyers Pain Points Solutions Budget Holder ● CIO ● VP of Infrastructure ● VP of IT ● Pressure to reduce costs ● Demand for services ● Privacy and security ● Skills shortage ● Simplify your security infrastructure ● Manage risk without slowing down ● Protection everywhere Influencer ● Network Security Operations ● Network Security Engineer ● Too much reactive firefighting ● Lack of automation ● Tool complexity ● Lack of tool reliability ● Consistently protect with flexible deployment ● Save time by automating tasks ● Replace disconnected tools SALES POSITIONING
  • 19. SALES PRIORITIZATION ● Prioritize organizations that value security ● Prioritize organizations that are concerned about data loss ● Prioritize organizations that have compliance requirements ● Prioritize organizations that use legacy security solutions ● De-prioritize organizations that make buying decisions based on price
  • 20. WHY DO WE WIN A Different Standard for Security ● Security posture improvement ● Powerful threat identification and threat prevention ● Ease of management ● Automated, fewer manual tasks ● Highly integrated
  • 21. WHY SELL OUR NEXT-GENERATION FIREWALL $16.7B Total Addressable Market (TAM) 12K Accounts Available for Refresh 23.52% Annual Growth Rate Palo Alto Networks was named a Leader in the Gartner Magic Quadrant® for Network Firewalls for the TENTH time in a row
  • 22. Thank you paloaltonetworks.com WHAT TO LISTEN FOR KEY TERMS USE CASES ● Next-generation firewall ● Intrusion prevention (IPS)/ Intrusion detection (IDS) ● Web proxy / Web gateway / Web security ● Malware analysis ● Sandboxing ● VPN / SD-WAN ● Cybersecurity breach ● Security consolidation ● Branches / remote locations ● Data center ● Mobile networks ● Network perimeter ● Remote / Mobile workforce
  • 23. Thank you paloaltonetworks.com WHAT TO ASK ● How many locations do you secure? ● Are you able to secure all your locations consistently? ● How many network security vendors do you use? ● How do you align your network security policies with business requirements? ● Have you had to turn off security features (like decryption) to meet the performance requirements of your organization? ● How do your security tools use automation to reduce manual tasks ● What impact have you seen by sophisticated attacks?
  • 24. Thank you paloaltonetworks.com WANT TO KNOW MORE Next-Generation Firewall (NGFW) Channel Marketing Campaigns Help Me Sell NGFW Partner Enablement Technical Learning Guide Hardware Refresh Program

Editor's Notes

  • #3: There are three key challenges that Network Security teams face: Network security teams lack the visibility into traffic in a cloud or private network. The second challenge is consistency. Organizations struggle to protect private networks, public and private clouds, virtual data centers and branch locations due to multiple products and dissimilar management interfaces. When network security does try to implement additional security tools, they struggle to find tools that can operate and scale at the rate their business does.
  • #4: A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functions, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.- Wikipedia https://en.wikipedia.org/wiki/Next-generation_firewall
  • #5: Strata is Palo Alto Networks platform to connect and secure everything. Strata has best-in-class capabilities, natively integrated, resulting in simplified and highly effective networking and security. Our PA-series Next-Generation Firewall hardware appliances are designed for simplicity, automation, and integration. Our VM-series firewalls protect your private and public cloud deployments with segmentation and threat prevention. As you are moving to the cloud, leverage Prisma Access, our secure access service edge (SASE) solution for branch offices, retail locations and mobile users. CN-Series container firewalls help network security teams safeguard developers by enabling threat prevention in Kubernetes environments. Panorama gives you a single place to manage all of your Palo Alto Networks Next-Generation Firewalls.
  • #6: Palo Alto Networks uses a prevention focused architecture. Zero Trust is a cybersecurity strategy that prevents data breaches. In Zero Trust, each step a user makes through the infrastructure must be validated and authenticated across all locations. Our Next-Generation Firewalls directly align with Zero Trust, including enabling secure access for all users irrespective of location, inspecting all traffic, enforcing policies for least-privileged access control, and detecting and preventing advanced threats. This significantly reduces the pathways for adversaries, whether they are inside or outside your organization, to access your critical assets. Our Next-Generation Firewalls inspect all traffic, including all applications, threats, and content, and tie that traffic to the user, regardless of location or device type. The user, application, and content—the elements that run your business—become integral components of your enterprise security policy. As a result, you can align security with your business policies as well as write rules that are easy to understand and maintain. Palo Alto Networks embraces machine learning to deliver the industry’s only inline malware and phishing prevention to stop unknown threats as they reach your network. Automatically reprograms your network with zero-delay signature updates for all other threats. Provides accurate signatureless identification of all unmanaged internet-of-things (IoT) devices. Uses telemetry to optimize security policy and eliminate breaches due to misconfiguration. Adopts a consistent, integrated, and best-in-class network security platform.
  • #7: The Palo Alto Networks Single-Pass Architecture addresses performance and flexibility challenges with a unique single-pass approach to packet processing. The single-pass architecture eliminates many redundant functions. As packets are processed, networking, policy lookup, application and decoding, and signature matching for any and all threats and content are performed only once. This significantly reduces the amount of processing overhead required to perform multiple functions in one security device.
  • #8: Palo Alto Networks Next-Generation Firewalls are available in physical, virtual and cloud-delivered form-factors. Physical firewalls are the PA-Series firewalls. Virtual firewalls are the VM-Series firewalls. To protect branches and mobile users, we deliver security capabilities from the cloud. Prisma Access is our Secure Access Security Edge (SASE) offering. Our security subscriptions coordinate intelligence and provide protections across all attack vectors, eliminating the coverage gaps generated by disparate network security tools. Deploy our security subscriptions where and when you need them. They work seamlessly with our family of firewalls. Palo Alto networks offers easy-to-implement and centralized management features to gain insight into network-wide traffic, logs and threats. Reduce complexity by simplifying configuration, deployment, and management of your PaloAlto Networks security products. With Panorama, you get deployment flexibility: on-premise hardware, virtualized appliances, public cloud environments.
  • #9: Our full range of physical ML-Powered Next-Generation Firewalls are easy to deploy into your organization’s network and purposefully designed for simplicity, automation, and integration. Physical firewalls are the PA-Series firewalls that include: PA-220 and PA-800 Series, typically used at branch offices PA-220R, a ruggedized appliance suitable for harsh environments PA-3200 Series, typically used at the internet edge / network perimeter deployments PA-5200 Series and PA-7000 Series, typically used to protect datacenters
  • #10: Our full range of physical ML-Powered Next-Generation Firewalls are easy to deploy into your organization’s network and purposefully designed for simplicity, automation, and integration. Physical firewalls are the PA-Series firewalls that include: PA-220 and PA-800 Series, typically used at branch offices PA-220R, a ruggedized appliance suitable for harsh environments PA-3200 Series, typically used at the internet edge / network perimeter deployments PA-5200 Series and PA-7000 Series, typically used to protect datacenters
  • #11: All Palo Alto Networks next-generation firewalls run the PAN-OS operating system. By leveraging the three key technologies that are built into PAN‑OS natively—App‑ID, Content‑ID, and User‑ID—you can have complete visibility and control of the applications in use across all users in all locations all the time. PAN-OS includes many additional built-in capabilities, including SSL decryption, site-to-site IPSec VPN, External Dynamic Lists (EDLs), file blocking, logging, reporting, APIs and others.
  • #12: Palo Alto Networks subscriptions unlock certain firewall features or enable the firewall to leverage a Palo Alto Networks cloud-delivered service (or both). To enable a subscription, you must first activate subscription licenses; once active, most subscription services can use dynamic content updates to provide new and updated functionality to the firewall.
  • #13: Palo Alto Networks subscriptions unlock certain firewall features or enable the firewall to leverage a Palo Alto Networks cloud-delivered service (or both). To enable a subscription, you must first activate subscription licenses; once active, most subscription services can use dynamic content updates to provide new and updated functionality to the firewall. DNS Security Provides enhanced DNS sinkholing capabilities by querying DNS Security, an extensible cloud-based service capable of generating DNS signatures using advanced predictive analytics and machine learning. This service provides full access to the continuously expanding DNS-based threat intelligence produced by Palo Alto Networks. Enterprise Data Loss Prevention Palo Alto Networks Enterprise DLP solution discovers, monitors and protects an organization’s sensitive data, such as PII and intellectual property, minimizing the risk of data breaches and enhancing data privacy and compliance. IoT Security Delivering a machine learning based approach to discover all unmanaged devices, detect behavioral anomalies, recommend policy based on risk, and automate enforcement without the need for additional sensors or infrastructure. This unique combination of IoT visibility and the NGFW enables context-aware network segmentation to reduce risk exposure and applies our leading security subscriptions to keep IoT and IT devices secure from all threats. GlobalProtect Provides mobility solutions and/or large-scale VPN capabilities. By default, you can deploy GlobalProtect portals and gateways (without HIP checks) without a license. If you want to use advanced GlobalProtect features (HIP checks and related content updates, the GlobalProtect Mobile App, IPv6 connections, or a GlobalProtect Clientless VPN) you will need a GlobalProtect license (subscription) for each gateway.
  • #14: SD-WAN Provides intelligent and dynamic path selection on top of the industry-leading security that PAN-OS software already delivers. Managed by Panorama, the SD-WAN implementation includes centralized configuration management, automatic VPN topology creation, traffic distribution, monitoring and troubleshooting. Threat Prevention Inspect all traffic for threats, regardless of port, protocol or encryption and automatically blocks known vulnerabilities, malware, exploits, spyware, and command-and-control. Customers can import, sanitize, manage and completely automate workflows to rapidly apply IPS signatures in popular formats such as SNORT and Suricata, adding to our existing leading threat coverage. URL Filtering Provides the ability to not only control web-access, but how users interact with online content based on dynamic URL categories. You can also prevent credential theft by controlling the sites to which users can submit their corporate credentials. WildFire Cloud-based malware detection and multiple analysis techniques to identify and protect against unknown file-based threats, while resisting attacker evasion techniques. WildFire’s unique real-time signature streaming capability ensures your organization is protected against previously unknown threats in seconds after they are first discovered. Advanced Threat Prevention Leverage full-featured IPS, antimalware, and command-and-control (C2) protection (per-device subscription for unlimited users). Find more information here. Cortex Data Lake Cortex Data Lake is a cloud delivered, scalable and secure log storage service that enables NetSec administrators to ingest, store, forward, and stream logs from select PANW solutions AIOps for NGFW Take advantage of the industry’s first domain-centric AIOps for NGFW that redefines firewall operational experience by interpreting, predicting, and resolving problems before they become businessimpacting. AIOps for NGFW can be used on all PA-Series firewalls, VM-Series firewalls, and Panorama consoles that run on PAN‑OS 10.0 and above. AIOps is available in two versions: a Free version and a Premium (paid) version (subscription based on the number of firewalls managed). Check out the feature set in both versions here
  • #15: SD-WAN Provides intelligent and dynamic path selection on top of the industry-leading security that PAN-OS software already delivers. Managed by Panorama, the SD-WAN implementation includes centralized configuration management, automatic VPN topology creation, traffic distribution, monitoring and troubleshooting. Threat Prevention Inspect all traffic for threats, regardless of port, protocol or encryption and automatically blocks known vulnerabilities, malware, exploits, spyware, and command-and-control. Customers can import, sanitize, manage and completely automate workflows to rapidly apply IPS signatures in popular formats such as SNORT and Suricata, adding to our existing leading threat coverage. URL Filtering Provides the ability to not only control web-access, but how users interact with online content based on dynamic URL categories. You can also prevent credential theft by controlling the sites to which users can submit their corporate credentials. WildFire Cloud-based malware detection and multiple analysis techniques to identify and protect against unknown file-based threats, while resisting attacker evasion techniques. WildFire’s unique real-time signature streaming capability ensures your organization is protected against previously unknown threats in seconds after they are first discovered. Advanced Threat Prevention Leverage full-featured IPS, antimalware, and command-and-control (C2) protection (per-device subscription for unlimited users). Find more information here. Cortex Data Lake Cortex Data Lake is a cloud delivered, scalable and secure log storage service that enables NetSec administrators to ingest, store, forward, and stream logs from select PANW solutions AIOps for NGFW Take advantage of the industry’s first domain-centric AIOps for NGFW that redefines firewall operational experience by interpreting, predicting, and resolving problems before they become businessimpacting. AIOps for NGFW can be used on all PA-Series firewalls, VM-Series firewalls, and Panorama consoles that run on PAN‑OS 10.0 and above. AIOps is available in two versions: a Free version and a Premium (paid) version (subscription based on the number of firewalls managed). Check out the feature set in both versions here
  • #16: Top Benefits Tightly integrated innovations continually replaces disconnected tools Simplify security by replacing disconnected tools with innovations (Threat Prevention, URL Filtering, WildFire, DNS Security, SD-WAN) that are tightly integrated into our next-generation firewall Reduce the chances of human error, the leading cause of breaches Reduce your risk of attack by easily implementing best practices Automation and analytics drive immediate, effective actions Prevent known and previously unknown threats, including in encrypted traffic, using intelligence generated across more than 30,000 customers Use machine learning and automated enforcement actions to improve security effectiveness with faster response to attacks Save time by automating manual and repetitive tasks Consistent visibility and control everywhere: datacenter, campus, branch, mobile Classify all traffic, including encrypted traffic, based on application, user and content, enabling deep visibility Create easily understood, precise security policies to safely enable applications and close dangerous policy gaps Consistently protect your data and apps everywhere using the PA-Series NGFW appliance that meets your performance needs. Extend the same protection to your mobile users with GlobalProtect.
  • #17: Value of the Next Generation Firewall Reduce legacy tools Customers are still using thousands to tens of thousands of legacy rules that rely on ports and IP addresses. The result is an extremely porous ruleset which leaves big security holes and is difficult to manage. Often, even after they buy NGFWs, they continue using these legacy rules. This means customers are not fully utilizing their security investments. Palo Alto Networks introduced an architecture that enabled natively integrated innovations. Instead of buying standalone IPSes, web proxies and sandboxing solutions, our customers benefited immensely from simply enabling these capabilities on the Palo Alto Networks Next-Generation Firewall. Reduce cost Deployment, maintenance, management and troubleshooting is manual. Tools don’t easily talk to each other, so following a workflow requires manually following each step. This means security teams spend a vast majority of their time in tactical items and in firefighting, instead of strategic projects. Palo Alto Networks believes in automating manual and repetitive tasks, so that our customers can focus on what matters. Examples of automation in our NGFW are: (1) security automation - Automatically reprogramming firewalls to protect against new threats, (2) policy automation - Our NGFWs can ingest new threat indicators from third-party sources and automatically protect against these sources (3) workflow automation - our NGFWs and Panorama centralized manager can integrate into your security workflows Reduce risk of attack As the perimeter evolves, the sources of threats are no longer confined to outside attackers. There is a need to detect and stop attacks from inside the organization. Our PA-Series NGFWs are available in different sizes, from desktop-sized form factor for your small offices, to large chasses for your datacenters, and run the exact same operating system (PAN-OS). This provides consistent security for your data centers, campus, and branches. Reduce human error Enterprises often use 100+ security tools, resulting in complexity and increased risk of human error, the leading cause of breaches. Using a simpler product like ours removes complexity and reduces the chances of human error, the leading cause of breaches.
  • #19: For the buyer: CIO / VP of infrastructure and operations / VP of IT Simplify your security infrastructure by replacing multiple disconnected tools Manage risk without slowing down your business Protect your assets everywhere For the user: Network Security Operations/Engineer Simplify security by replacing disconnected tools with innovations that are tightly integrated into the next-generation firewall Save time by automating manual and repetitive tasks Consistently protect your data and apps everywhere using flexible deployment options: physical, virtual and delivered-from-the-cloud
  • #20: A next-generation firewall is generally applicable to a vast majority of organizations, in addition to the target company profile, it is useful to prioritize opportunities. This is especially helpful to sellers who have a large number of accounts. Here are some guidelines: Prioritize organizations that value security (rather than buying a firewall to simply check a box to comply with internal guidelines). Find out if the organization has dedicated security personnel. Find out whether they hold the firewall budget, or have a good amount of influence over firewall buying decisions. Prioritize organizations that are concerned about data loss. Several types of data can be protected or sensitive, e.g., patient health records, student records, intellectual property, source code, employee data, customer data, financial records, credit card data, and so on. The best way to find this out is to ask the security team. Prioritize organizations that have compliance requirements. Prioritize organizations that have a legacy firewall, an IPS device, a proxy and/or a sandboxing solution. These organizations are paying for multiple different network security devices that can all be replaced by the next-generation firewall. These organizations are higher priority targets compared to those that have already consolidated these functions to a next-generation firewall. De-prioritize organizations that make buying decisions mainly based on price. These types of organizations are likely to buy cheap firewalls rather than look for industry-leading security.
  • #22: https://www.businesswire.com/news/home/20220609005791/en/Network-Security-Firewall-Market-Report-2022---Global-Forecast-to-2027---Opportunities-in-the-Expansion-of-Network-Function-Virtualization---ResearchAndMarkets.com
  • #23: Deal triggers to listen for Existing firewalls up for refresh: 4 years or older (start engaging with the customer when the firewalls are 3 years old) IPS renewal Web proxy / secure web gateway renewal Need to buy advance malware analysis system / sandboxing solution Recent cybersecurity breach Mandate to consolidate security devices / security capabilities Acquisitions, especially if an existing customer uses us but the acquired organization uses a different security vendor Use Cases Secure the Branch Use the next-generation firewall at the branch for the full networking and security capabilities available on perimeter and data center firewalls, including threat prevention and network segmentation. Palo Alto Networks next-generation firewalls can be used as SD-WAN edge devices with the security built-in, thus making it easier to deploy both networking and security at the branch with a single device. Secure the Data Center Palo Alto Networks reduces complexity and delivers robust protection of your data and application workloads everywhere to enable the business to move faster. Palo Alto Networks has the simplest integration into your software defined environments. By removing complex security management we can deploy consistent security across the hybrid cloud. With Palo Alto Networks, you see everything across your hybrid environment, minimize opportunities for attack across north-south and east-west traffic, and deliver unparalleled threat prevention and response to mitigate risk and reduce operational complexity. Secure the Mobile Networks The evolution to 5G opens the door to exciting new services – but it also increases the number of potential intrusion points, amplifying the security impact. The Palo Alto Networks next-generation firewall prevents successful cyberattacks targeting mobile network services, IoT devices and subscribers. It simplifies operations by providing robust, prevention-oriented security to build resilient and high-value mobile networks for a secure 5G digital economy. Secure the Perimeter Deliver world-class security to your organization’s evolving perimeter. Protect your campus locations with simple-to-use and natively integrated innovations like Threat Prevention, URL Filtering, WildFire Malware Analysis and DNS Security. As perimeters change and systems get more interconnected, the way you approach data protection and risk must also change. Palo Alto Networks can help your organization safely enable internet access with prevention-focused firewalls. Secure the Remote and Mobile users Palo Alto Networks GlobalProtect extends protection to mobile workers, regardless of their location. We provide greater visibility into all traffic, users, devices and applications. You can extend consistent security policies to all users, while eliminating remote access blindspots and strengthening security. Extend protection to mobile workers, no matter where they are Implement a zero-trust architecture for both internal and external access Apply customized access control for corporate, BYOD, and third-party devices