1 Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer
2 Agenda The Palo Alto Networks story Today s Threat Landscape The Kill Chain An enterprise security platform Next-generation firewall Next-generation threat cloud Closing
3 Palo Alto Networks at a glance Corporate highlights Founded in 2005; first customer shipment in 2007 Safely enabling applications and preventing cyber threats $600 $400 $200 $0 REVENUES $598 $MM $396 $255 $119 $13 $49 FY09 FY10 FY11 FY12 FY13 FY14 Able to address all network security and cyber-security needs Exceptional ability to support global customers ENTERPRISE CUSTOMERS 20,000 19,000 Experienced technology and management team 1,800+ employees globally 16,000 12,000 8,000 4, ,500 9,000 4,700 Jul-11 Jul-12 Jul-13 Jul , Palo Alto Networks. Confidential and Proprietary.
4 A clear market leader again Palo Alto Networks is assessed as a leader, mostly because of its NGFW focus, because it sets the direction of the market along the Analyst Perspectives NGFW path, and because of its consistent visibility in shortlists, increasing revenue and market share, and its proven ability to disrupt the marker. Gartner, April 2014 Gartner magic quadrant for enterprise network firewalls , Palo Alto Networks. Confidential and Proprietary.
5 Many Third Parties Reach Same Conclusion Gartner Enterprise Network Firewall Magic Quadrant - Palo Alto Networks leading the market Forrester IPS Market Overview - Strong IPS solution; demonstrates effective consolidation NetworkWorld Test - Most stringent NGFW test to date; validated sustained performance and key differences NSS Tests - IPS: Palo Alto Networks NGFW tested against competitors standalone IPS devices; NSS Recommended - Firewall: traditional port-based firewall test; Palo Alto Networks most efficient by a wide margin; NSS Recommended - NGFW: Palo Alto Networks best combination of protection, performance, and value; NSS Recommended (1 of only 3) , Palo Alto Networks. Confidential and Proprietary.
6 Over 17,000 Organizations Trust Palo Alto Networks Health Care Financial Services Government Media / Entertainment / Retail Service Providers / Services Mfg / High Tech / Energy Education Page 6
7 Western Canada Page 7
8 Agenda The Palo Alto Networks story Today s Threat Landscape The Kill Chain An enterprise security platform Next-generation firewall Next-generation threat cloud Closing
9 Today s Threat Landscape Organized Attackers Remediation is broken Must prevent attacks across perimeter, cloud and mobile Increasing Volume Sophisticated Limited correlation across disjointed security technologies. Limited security expertise CSO challenges
10 Tectonic Shifts Create the Perfect Storm SaaS ENCRYPTION SOCIAL + CONSUMERIZATION MOBILITY + BYOD CLOUD + VIRTUALIZATION Massive opportunity for cyber attackers COMMODIZATION OF THREATS
11 Current Approaches Are Failing Detection-focused Alert Overload Manual Response Required Enterprise Network UTM/ Blades Anti-APT for port 25 APTs DNS protection for outbound DNS Anti-APT for port 80 APTs DNS protection cloud Internet Anti-APT cloud Endpoint AV Network AV DNS Alert Endpoint Alert Web Alert SMTP Alert SMTP Alert SMTP Alert SMTP Alert Web Alert DNS Alert DNS Alert SMTP Alert APT Web Alert Web Alert AV Alert AV Alert Web Alert DNS Alert SMTP Alert Endpoint Alert Vendor 1 Vendor 2 Internet Connection Vendor 3 Vendor 4 Malware Intelligence
12 Agenda The Palo Alto Networks story Today s Threat Landscape The Kill Chain An enterprise security platform Next-generation firewall Next-generation threat cloud Closing
13 Understanding the Attack Kill-chain Attack kill-chain BREACH PERIMETER DELIVER MALWARE ENDPOINT OPERATIONS EXFILTRATE DATA Initial compromise Deliver malware and communicate with attacker Move laterally and infect additional hosts Steal intellectual property Prevent attacks by stopping one step in the kill-chain
14 Agenda The Palo Alto Networks story Today s Threat Landscape The Kill Chain An enterprise security platform Next-generation firewall Next-generation threat cloud Closing
15 A True Platform Approach Identify, control & decrypt Detect & prevent known & unknown threats Automated closed-loop protections & forensics Network Endpoint Traditional infrastructure Cloud Mobile devices SaaS Public Cloud Private Cloud Threat Cloud
16 Next-Generation Security Platform Palo Alto Networks Next-Generation Threat Cloud Next-Generation Firewall Inspects all traffic Safely enables applications Sends unknown threats to cloud Blocks network based threats Next-Generation Threat Cloud Gathers potential threats from network and endpoints Analyses and correlates threat intelligence Disseminates threat intelligence to network and endpoints Palo Alto Networks Next-Generation Firewall Next-Generation Endpoint Inspects all processes and files Prevents both known and unknown exploits Protects fixed, virtual, and mobile endpoints Lightweight client and cloud based Palo Alto Networks Next-Generation Endpoint
17 Palo Alto Networks and the Kill-Chain Attack kill-chain BREACH PERIMETER DELIVER MALWARE ENDPOINT OPERATIONS EXFILTRATE DATA Next-generation Firewall Visibility into all traffic and selectively decrypt SSL Whitelist applications, block high-risk Apps Block commonly exploited file types Segment sensitive resources Threat Prevention (IPS/IDS) WildFire Detect unknown malware Detect unknown exploits Detect unknown commandand-control Threat Prevention (Network anti-malware) Next-generation Endpoint & GlobalProtect Prevent zero-day exploits without prior knowledge Extend policy & protection to all endpoints, including mobile Cover all processes on OSs and third-party software Threat Prevention Block outbound command-and-control communications Block file and data pattern uploads DNS monitoring and sinkholing URL Filtering Block known: Exploits Malware Command-and-control Command-and-Control (URL, DNS, custom) Lateral movement Block outbound communication to known malicious URLs and IP addresses == URL Filtering Block bad URLs, Domains, IPs
18 Agenda The Palo Alto Networks story Today s Threat Landscape The Kill Chain An enterprise security platform Next-generation firewall Next-generation threat cloud Closing
19 What do these have in common? , Palo Alto Networks. Confidential and Proprietary.
20 Stateful Inspection: When the world was simple When stateful inspection worked: Applications based on specific port# Predictable application behavior Evasive applications did not exist Zero-day malware did not exist , Palo Alto Networks. Confidential and Proprietary.
21 The stateful inspection firewall is broken Cannot address: Many thousands of applications Changing application behavior Exponential Data Growth Millions of advanced threats , Palo Alto Networks. Confidential and Proprietary.
22 Technology Sprawl and Creep Aren t the Answer More stuff doesn t solve the problem Firewall helpers have limited view of traffic Complex and costly to buy and maintain Doesn t address application control challenges UTM Internet IPS DLP IM AV URL Proxy Enterprise Network , Palo Alto Networks. Confidential and Proprietary.
23 Do you recognize this person? CTO and Founder of Palo Alto Networks , Palo Alto Networks. Confidential and Proprietary.
24 The Answer? Make the Firewall Do Its Job 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify and control users regardless of IP address, location, or device 3. Protect against known and unknown application-borne threats 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, low latency, in-line deployment , Palo Alto Networks. Confidential and Proprietary.
25 Powered by our Single-Pass, Parallel Processing (SP3) Architecture Single-pass SW Performs operations once per packet Application identification User/group mapping Content scanning One policy that integrates apps, user and content Support for HA/Redundancy QoS feature to shape traffic based on application Parallel processing hardware Function-specific parallel processing HW engines Separate data plane and control plane Our firewalls are powered by our single-pass, parallel processing architecture which delivers high performance and promotes high availability
26 PAN-OS Core Firewall Features Visibility and control of applications, users and content complement core firewall features Strong networking foundation VPN Dynamic routing (BGP, OSPF, RIPv2) Tap mode connect to SPAN port Virtual wire ( Layer 1 ) for true transparent in-line deployment L2/L3 switching foundation Policy-based forwarding Site-to-site IPSec VPN SSL VPN QoS traffic shaping Max/guaranteed and priority By user, app, interface, zone, & more Real-time bandwidth monitor , Palo Alto Networks. Confidential and Proprietary. Zone-based architecture All interfaces assigned to security zones for policy enforcement High Availability Active/active, active/passive Configuration and session synchronization Path, link, and HA monitoring Virtual Systems Establish multiple virtual firewalls in a single device (PA-5000 and PA-3000 Series) Simple, flexible management CLI, Web, Panorama, SNMP, Syslog VM 100 VM 200 VM 300
28 Agenda The Palo Alto Networks story Today s Threat Landscape The Kill Chain An enterprise security platform Next-generation firewall Next-generation threat cloud Closing
29 Next Generation Threat Cloud SSL encryption Endpoint SMB SMTP 7,000+ All ports FTP Data center All commonly exploited file types users All traffic Web Perimeter WildFire Protections developed with in-line enforcement across the kill-chain Intelligence correlated across: WildFire 17,500 Customers protected Threat Prevention URL Filtering 3 rd party data Malware Exploits Malicious URLs DNS queries Commandand-control Intelligence
30 WildFire Cloud-based Architecture Scales WildFire Approach WildFire TM WildFire cloud or appliance Easy to manage and operationalize Scalable Cost effective APT Add-on Approach Web Sandbox Hard to manage Doesn t scale Expensive Manual analysis Central manager Sandbox File share Sandbox Requires multiple devices at each ingress, egress, and point of segmentation
31 Page Palo Alto Networks. Proprietary and Confidential.
32 Introducing Traps The right way to deal with advanced cyber threats Prevent Exploits Including zero-day exploits Prevent Malware Including advanced & unknown malware Collect Attempted-Attack Forensics For further analysis Scalable & Lightweight Must be user-friendly and cover complete enterprise Integrate with Network and Cloud Security For data exchange and crossed-organization protection
33 Exploit prevention how it works Reported to ESM CPU <0.1% Forensic data is collected Process is terminated Safe! User\admin is notified Document is opened by user Traps seamlessly injected into processes Process is protected as exploit attempt is trapped Traps triggers immediate actions Attack is blocked before any successful malicious activity When an exploitation attempt is made, the exploit hits a trap and fails before any malicious activity is initiated.
34 Malware prevention how it works File is allowed to execute User tries to open executable file Policy-based Restrictions Applied HASH checked against WildFire Malware technique prevention employed Safe! Reported to ESM
35 , Palo Alto Networks. Confidential and Proprietary.
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013 Technology Sprawl and Creep Aren t the Answer More stuff doesn t solve the problem Firewall helpers have limited view of traffic
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview October 2010 Matias Cuba - Regional Sales Manager Northern Europe About Palo Alto Networks Palo Alto Networks is the Network
FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really
Next Generation Security Strategies Marc Sarrias Regional Sales Manager email@example.com IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy firstname.lastname@example.org About Palo Alto Networks We are the network security company World-class
Palo Alto Networks Overview campu[s]³ Christian Etzold Sr. System Engineer About Palo Alto Networks Palo Alto Networks is the Network Security Company World-class team with strong security and networking
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Palo Alto Networks October 6 Agenda Malware Trends by the numbers Protect Locally Share Globally Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2%
Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Moving Beyond Proxies A Better Approach to Web Security January 2015 Executive Summary Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security
Advanced Security and Risk Management for Cloud and Premise environments Owen Cheng Practice Lead SIEM/SOC/MSS 2014 NTT Com Security NTT Com Security Global Information Security & Risk Management Provider
Next-generation enterprise security platform Walter Doria Why do you need network, endpoint, and cloud working together? The network is best for identifying and controlling all traffic, preventing known
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
A Modern Framework for Network Security in Government 3 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Government: Securing Your Data, However and Wherever Accessed Governments around
VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Palo Alto Networks Next-Generation Firewall Overview The firewall is the most strategic network security infrastructure component, it sees all traffic, and as such, is in the most effective location to
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 email@example.com Our Customers Biggest Security Challenges Maintaining security posture
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
High Performance NGFW Extended Enrique Millán Country Manager Colombia firstname.lastname@example.org 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material
Next Generation Firewalls and Sandboxing Joe Hughes, Director www.servicetech.co.uk Summary What is a Next Generation Firewall (NGFW)? Threat evolution Features Deployment Best practices What is Sandboxing?
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
Enterprise Security Platform for Government Today s Cybersecurity Challenges in Government Governments are seeking greater efficiency and lower costs, adopting Shared Services models, consolidating data
A Modern Framework for Network Security in the Federal Government 1 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Trends in Federal Requirements for Network Security In recent years,
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
Critical application visibility and control with Palo Alto Networks Zion Ezra InnoCom LTD Zion Ezra VP Security InnoCom LTD Select InnoCom Vendors NETWORK SECURITY Next Generation Firewall Next Generation
How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies Table of Contents Introduction 3 Executive Summary 3 A Systematic Approach to Network Application Whitelisting 4 Positive
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
Network Security Security is a top priority. The reasons for reliable network security keep growing. Convergence of voice and data networks Changing compliance regulations Explosion of Web 2.0 business
UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY VISION FUTURE-READY SECURITY Because a security solution represents
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Palo Alto Networks Re-Inventing Network Security It s Time To Fix The Firewall?! Christian Etzold Senior System Engineer Security v1.0 Response: Rip Holes in Firewall Traditional Applications DNS Gopher
CASE STUDY AUSTRIAN AIRLINES PAGE 1 PA-5020 (2) Austrian Airlines is Austria s largest carrier and operates a global network of routes to around 130 destinations. The company s hub at Vienna International
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information
The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and
WHITE PAPER Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Table of Contents Summary
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
WHITE PAPER Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Table of Contents Summary
White Paper Network Security: A Buyers Guide What You Will Learn This buyer s guide provides an in-depth explanation of the factors that impel organizations to look at nextgeneration security solutions.
THREAT INTELLIGENCE CLOUD Leveraging the Global Threat Community to Prevent Known and Unknown Threats Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com Executive
Why it's time to upgrade to a Next Generation Firewall Dickens Lee Technical Manager Dell History 2 Confidential Dell s legacy Became leading provider of subscription services on optimized appliances Shipped
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Palo Alto Networks Cyber Security Platform for the Software Defined Data center Zekeriya Eskiocak Security Consultant Palo Alto Networks Evolution towards a software defined data center Server Virtualiza-on
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
A Modern Framework for Network Security in Government Palo Alto Networks A Modern Framework for Network Security in Government 1 Government: Securing Your Data, However and Wherever Accessed Governments
Next-Generation Firewall Overview Fundamental shifts in the application and threat landscape, user behavior, and network infrastructure have steadily eroded the security that traditional port-based firewalls
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses Patrick Bedwell VP, Product Marketing 1 Copyright 2014 Fortinet Inc. All rights reserved. Today s Agenda Security
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
WHITE PAPER Protecting Your Network From the Inside-Out Internal Segmentation Firewall (ISFW) Table of Contents Summary...2 Advanced Threats Take Advantage of the Flat Internal Network...3 The Answer is
TRANSFORMING YOUR SECURITY A NEW ERA IN ENTERPRISE FIREWALLS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: FIREWALL TECHNOLOGY EVOLVES WITH BORDERLESS ENTERPRISE 2 SECTION 2: ENTERPRISE
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
Networking Hardware SkyNet can provide you with whatever type of networking equipment you may need for your network. We can sell you new equipment or for more budget minded customer we sell used or refurbished
How to Dramatically Reduce the Cost and Complexity of PCI Compliance Using Network Segmentation and Policy-Based Control Over Applications, Users And Content to Protect Cardholder Data December 2008 Palo
Network World and Robin Layland present The 2014 Next Generation Firewall Challenge Guide to Understanding and Choosing a Next Generation Firewall to Combat Today's Threats 2014 The 2014 Next Generation
Streamline PCI Compliance With Next-generation Security How Palo Alto Networks Enterprise Security Platform Enables Unparalleled Network Segmentation and Protection of Cardholder Data Executive Summary
Sponsored by VSS Monitoring Blind as a Bat? Supporting Packet Decryption for Security Scanning November 2012 A SANS Whitepaper Written by: Dave Shackleford Options for SSL Inspection Page 2 Implementing
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
_Firewall Palo Alto Networks is the next-generation firewalls that enhance your network security and enable any enterprises to look beyond IP addresses and packets. These innovative firewalls let you see
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
Application Visibility and Control: In the Firewall vs. Next to the Firewall How Next-Generation Firewalls are Different From UTM and IPS-based Products May 2010 Palo Alto Networks 232 E. Java Drive Sunnyvale,
2012 2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Market Penetration Leadership Award Enterprise Firewalls North America, 2012
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats