PALO ALTO SAFE APPLICATION ENABLEMENT



Similar documents
Next Generation Enterprise Network Security Platform

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Palo Alto Networks Overview

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

Securing the Virtualized Data Center With Next-Generation Firewalls

Critical application visibility and control with Palo Alto Networks

Firewall Feature Overview

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

FROM PRODUCT TO PLATFORM

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Palo Alto Networks Next-Generation Firewall Overview

Agenda , Palo Alto Networks. Confidential and Proprietary.

Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network

Palo Alto Networks. Re-Inventing Network Security. It s Time To Fix The Firewall?! Christian Etzold Senior System Engineer

Advanced Security and Risk Management for Cloud and Premise environments

Hillstone Intelligent Next Generation Firewall

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

A Modern Framework for Network Security in the Federal Government

How to Dramatically Reduce the Cost and Complexity of PCI Compliance

Secure Cloud-Ready Data Centers Juniper Networks

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

REPORT & ENFORCE POLICY

Content-ID. Content-ID URLS THREATS DATA

Using Palo Alto Networks to Protect the Datacenter

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Reinventing Network Security, One Firewall at a Time. Chris King Director, Product Marketing

Next-Generation Firewall Overview

Next-Generation Firewall Overview

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

Moving Beyond Proxies

Next-Generation Firewall Overview

Palo Alto Networks - Next Generation Firewall. Contents

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Modernizing Network Security in SCADA and Industrial Control Systems

SourceFireNext-Generation IPS

USG6600 Next-Generation Firewall

Palo Alto Networks In The Data Center: Eliminating Compromise. May 2011

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Cyberoam Next-Generation Security. 11 de Setembro de 2015

SonicWALL Unified Threat Management. Alvin Mann April 2009

SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*

Still Using Proxies for URL Filtering? There s a Better Way

Networking for Caribbean Development

High Performance NGFW Extended

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses

Network Security Solution. Arktos Lam

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Palo Alto Networks. October 6

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Palo Alto Networks Certified Network Security Engineer (PCNSE6) Study Guide

About the VM-Series Firewall

Fail-Safe IPS Integration with Bypass Technology

NGFWs will be most effective when working in conjunction with other layers of security controls.

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

How Network Virtualization can improve your Data Center Security

Network Security Platform 7.5

USG6300 Next-Generation Firewall

Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 Colin_Wu1@dell.com

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project

Next-Generation Firewalls: Critical to SMB Network Security

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

Breaking the Cyber Attack Lifecycle

Next Gen Firewall and UTM Buyers Guide

Network protection and UTM Buyers Guide

What would you like to protect?

HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Next Generation Firewalls and Sandboxing

Unified Threat Management, Managed Security, and the Cloud Services Model

Designing Networks with Palo Alto Networks Firewalls

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Internal Network Firewall (INFW) Protecting your network from the inside out

/Endpoint Security and More Rondi Jamison

The Hillstone and Trend Micro Joint Solution

Premier Partner Technology Dinner

Enterprise QoS. Tim Chung Google Corporate Netops Architecture Nanog 49 June 15th, 2010

Palo Alto Networks. September 2014

Technical Note. ForeScout CounterACT: Virtual Firewall

PAN-OS Syslog Integration

On and off premises technologies Which is best for you?

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

How to Configure and Test QoS in PANOS 3.0

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX64 MX64W MX84 MX100 MX400 MX600

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Implementing Cisco IOS Network Security

Next-Generation Datacenter Security Implementation Guidelines

Transcription:

PALO ALTO SAFE APPLICATION ENABLEMENT 1

Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa jsherlow@paloaltonetworks.com @jsherlow

Palo Alto Networks at a Glance Corporate Highlights Disruptive Network Security Platform Safely Enabling Applications Able to Address All Network Security Needs Exceptional Growth and Global Presence $MM $300 $250 $200 $150 $100 $50 $0 FYE July 10,000 8,000 Revenue $119 FY09 FY10 FY11 FY12 Enterprise Customers 9,000 Experienced Technology and Management Team 6,000 4,700 800+ Employees 4,000 2,000 0 1,800 Jul-10 Jul-11 Jul-12 3 2012, Palo Alto Networks.

Applica]ons Get Through the Firewall Network security policy is enforced at the firewall Sees all traffic Defines boundary Enables access Traditional firewalls don t work any more 4 2012, Palo Alto Networks. Confiden]al and Proprietary.

Applica]ons Get Through the Firewall: Threats Threats target applications Used as a threat vector Application specific exploits 5 2012, Palo Alto Networks. Confiden]al and Proprietary.

Applica]ons Get Through the Firewall: Threats Applications provide exfiltration Threat communication Confidential data 6 2012, Palo Alto Networks.

Applica]ons Get Through the Firewall: Threats What happens traffic is encrypted? SSL Proprietary encryption 7 2012, Palo Alto Networks.

Applica]ons Get Through the Firewall: Threats More stuff doesn t solve the problem Firewall helpers have limited view of traffic Complex and costly to buy and maintain Doesn t address application control challenges UTM Internet IPS DLP IM AV URL Proxy Technology Sprawl and Creep Aren t 8 2012, Palo Alto Networks. the Answer Enterprise Network

The Answer? Make the Firewall Do Its Job 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify and control users regardless of IP address, location, or device 3. Protect against known and unknown application-borne threats 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, low latency, in-line deployment 9 2012, Palo Alto Networks.

Why Visibility & Control Must Be In The Firewall Application Control as an Add-on Traffic Firewall Port IPS Port-based FW + App Ctrl (IPS) = two policies Applications are threats; only block what you expressly look for Applica]ons Implications Port Policy Decision App Ctrl Policy Decision Network access decision is made with no information Cannot safely enable applications NGFW Application Control Application control is in the firewall = single policy Visibility across all ports, for all traffic, all the time Implications Network access decision is made based on application identity Safely enable application usage Traffic Firewall Applica]ons App Ctrl Policy Decision Applica]on IPS Scan Applica=on for Threats 10 2012, Palo Alto Networks.

Enabling Applica]ons, Users and Content 11 2012, Palo Alto Networks.

Enabling Applica]ons, Users and Content Applica=ons: Safe enablement begins with applica]on classifica]on by App- ID. Users: Tying users and devices, regardless of loca]on, to applica]ons with User- ID and GlobalProtect. Content: Scanning content and protec]ng against all threats both known and unknown; with Content- ID and WildFire. 12 2012, Palo Alto Networks.

Single- Pass Parallel Processing (SP3) Architecture Up to 20Gbps, Low Latency Single Pass Opera]ons once per packet Traffic classifica]on (app iden]fica]on) User/group mapping Content scanning threats, URLs, confiden]al data One policy Parallel Processing Func]on- specific parallel processing hardware engines Separate data/ control planes 13 2012, Palo Alto Networks. Confiden]al and Proprietary.

PAN- OS Core Firewall Features Visibility and control of applica=ons, users and content complement core firewall features Strong networking founda]on Dynamic rou]ng (BGP, OSPF, RIPv2) Tap mode connect to SPAN port Virtual wire ( Layer 1 ) for true transparent in- line deployment L2/L3 switching founda]on Policy- based forwarding VPN Site- to- site IPSec VPN SSL VPN QoS traffic shaping Max/guaranteed and priority By user, app, interface, zone, & more Real- ]me bandwidth monitor 14 2012, Palo Alto Networks. Zone- based architecture All interfaces assigned to security zones for policy enforcement High Availability Ac]ve/ac]ve, ac]ve/passive Configura]on and session synchroniza]on Path, link, and HA monitoring Virtual Systems Establish mul]ple virtual firewalls in a single device (PA- 5000, PA- 4000, and PA- 2000 Series) Simple, flexible management CLI, Web, Panorama, SNMP, Syslog

Palo Alto Networks NGFW Hardware Plavorms Firewall Firewall Throughput Threat Preven]on Throughput Ports Session Capacity PA- 5060 20 Gbps 10 Gbps PA- 5050 10 Gbps 5 Gbps PA- 5020 5 Gbps 2 Gbps PA- 4060 10 Gbps 5 Gbps PA- 4050 10 Gbps 5 Gbps PA- 4020 2 Gbps 2 Gbps PA- 3050 4 Gbps 2 Gbps PA- 3020 2 Gbps 1 Gbps PA- 2050 1 Gbps 500 Mbps 4 SFP+ (10 Gig) 8 SFP (1 Gig) 12 copper gigabit 4 SFP+ (10 Gig) 8 SFP (1 Gig) 12 copper gigabit 8 SFP 12 copper gigabit 4 XFP (10 Gig) 4 SFP (1 Gig) 8 SFP 16 copper gigabit 8 SFP 16 copper gigabit 8 SFP 12 copper gigabit 8 SFP 12 copper gigabit 4 SFP 16 copper gigabit 4,000,000 2,000,000 1,000,000 2,000,000 2,000,000 500,000 500,000 250,000 250,000 PA- 2020 500 Mbps 250 Mbps 8 copper gigabit 125,000 PA- 500 250 Mbps 100 Mbps 8 copper gigabit 64,000 PA- 200 100 Mbps 50 Mbps 4 copper gigabit 64,000 15 2012, Palo Alto Networks. Confiden]al and Proprietary.

Palo Alto Networks NGFW Virtualized Plavorms Delivers the same next- genera]on firewall features available in our hardware plavorms in a virtualized form- factor Capaci=es Model Sessions Rules Security Zones Address Objects IPSec VPN Tunnels SSL VPN Tunnels VM- 100 50,000 250 10 2,500 25 25 VM- 200 100,000 2,000 20 4,000 500 200 VM- 300 250,000 5,000 40 10,000 2,000 500 Performance Cores Allocated Firewall (App- ID) Threat Preven]on VPN Sessions per Second 2 Core 500 Mbps 200 Mbps 100 Mbps 8,000 4 Core 1 Gbps 600 Mbps 250 Mbps 8,000 8 Core 1 Gbps 1 Gbps 400 Mbps 8,000 Supported on VMware ESX/ESXi 4.0 or later Minimum of 2 dedicated CPU cores, 4GB dedicated RAM, 40GB HD, 2 interfaces Supports ac]ve/passive HA without state synchroniza]on. Does not support 802.3ad, virtual systems, jumbo frames 16 2012, Palo Alto Networks. Confiden]al and Proprietary.

NGFW in The Enterprise Network Perimeter App visibility and control in the firewall All apps, all ports, all the ]me Prevent threats Known threats Unknown/ targeted malware Simplify security infrastructure Data Center Network segmenta=on Based on applica]on and user, not port/ip Simple, flexible network security Integra]on into all DC designs Highly available, high performance Prevent threats Distributed Enterprise Consistent network security everywhere HQ/branch offices/remote and mobile users Logical perimeter Policy follows applica]ons and users, not physical loca]on Centrally managed 17 2012, Palo Alto Networks.

Addresses Three Key Business Problems Iden]fy and Control Applica]ons Iden]fies over 1,500 applica]ons, regardless of port, protocol, encryp]on, or evasive tac]c Fine- grained control over applica]ons (allow, deny, limit, scan, shape) Addresses the key deficiencies of legacy firewall infrastructure Prevent Threats Stop a variety of known threats exploits (by vulnerability), viruses, spyware Detect and stop unknown threats with WildFire Stop leaks of confiden]al data (e.g., credit card #, social security #, file/type) Enforce acceptable use policies on users for general web site browsing Simplify Security Infrastructure Put the firewall at the center of the network security infrastructure Reduce complexity in architecture and opera]ons 18 2012, Palo Alto Networks.

Gartner Enterprise Network Firewall Magic Quadrant - Palo Alto Networks leading the market Forrester IPS Market Overview - Strong IPS solu]on; demonstrates effec]ve consolida]on NetworkWorld Test - Most stringent NGFW test to date; validated sustained performance and key differences NSS Tests Many Third Par]es Reach Same Conclusion - IPS: Palo Alto Networks NGFW tested against compe]tors standalone IPS devices; NSS Recommended - Firewall: tradi]onal port- based firewall test; Palo Alto Networks most efficient by a wide margin; NSS Recommended - NGFW: Palo Alto Networks best combina]on of protec]on, performance, and value; NSS Recommended (1 of only 3) 19 2012, Palo Alto Networks.

20 2012, Palo Alto Networks. Confiden]al and Proprietary.