Palo Alto Networks. Re-Inventing Network Security. It s Time To Fix The Firewall?! Christian Etzold Senior System Engineer



Similar documents
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

Palo Alto Networks Overview

Firewall Feature Overview

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

PALO ALTO SAFE APPLICATION ENABLEMENT

Palo Alto Networks Next-Generation Firewall Overview

Critical application visibility and control with Palo Alto Networks

Content-ID. Content-ID URLS THREATS DATA

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Reinventing Network Security, One Firewall at a Time. Chris King Director, Product Marketing

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

Next Generation Enterprise Network Security Platform

Using Palo Alto Networks to Protect the Datacenter

REPORT & ENFORCE POLICY

Next-Generation Firewall Overview

Next-Generation Firewall Overview

June Palo Alto Networks 3300 Olcott Street Santa Clara, CA

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Next-Generation Firewall Overview

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

How to Dramatically Reduce the Cost and Complexity of PCI Compliance

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Networking for Caribbean Development

Palo Alto Networks Certified Network Security Engineer (PCNSE6) Study Guide

Palo Alto Networks - Next Generation Firewall. Contents

Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Securing the Virtualized Data Center With Next-Generation Firewalls

The Application Usage and Threat Report

Cisco IOS Advanced Firewall

PassGuide.PCNSE6 (48Q)

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

Deployment Guide for Microsoft Lync 2010

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

INTRODUCTION TO FIREWALL SECURITY

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Astaro Gateway Software Applications

Moving Beyond Proxies

SonicWALL Unified Threat Management. Alvin Mann April 2009

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

Cyberoam Next-Generation Security. 11 de Setembro de 2015

SVN5800 Secure Access Gateway

Simple security is better security Or: How complexity became the biggest security threat

Palo Alto Networks Next-generation Firewall Overview

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Cisco Small Business ISA500 Series Integrated Security Appliances

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

USG6600 Next-Generation Firewall

Secure Cloud-Ready Data Centers Juniper Networks

Load Balance Router R258V

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Agenda , Palo Alto Networks. Confidential and Proprietary.

Move over, TMG! Replacing TMG with Sophos UTM

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Next-Generation Firewalls: Critical to SMB Network Security

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project

Configuring PA Firewalls for a Layer 3 Deployment

Web Interface Reference Guide Version 6.1

Unified Threat Management, Managed Security, and the Cloud Services Model

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

White Paper. ZyWALL USG Trade-In Program

Assuring Your Business Continuity

Network Security Solution. Arktos Lam

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

The PA-4000 Series can add visibility and control into your network for webmail applications to stop incoming threats and limit uploaded data.

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Boston Area Windows Server User Group April 2010

USG6300 Next-Generation Firewall

CMPT 471 Networking II

Modular Network Security. Tyler Carter, McAfee Network Security

Cisco ASA 5500 Series Business Edition

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Fortigate Features & Demo

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

Superior protection from Internet threats and control over unsafe web usage

Cisco SR 520-T1 Secure Router

Defending Against Cyber Attacks with SessionLevel Network Security

How To Choose A Network Firewall

Palo Alto Networks Next-Generation Firewall Overview

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Deploying Firewalls Throughout Your Organization

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

The Cisco ASA 5500 as a Superior Firewall Solution

FROM PRODUCT TO PLATFORM

Set Up a VM-Series Firewall on the Citrix SDX Server

Palo Alto Networks. October 6

Applications erode the secure network How can malware be stopped?

Gigabit SSL VPN Security Router

Endpoint protection for physical and virtual desktops

Deployment Guide for Citrix XenDesktop

WHITE PAPER. Understanding How File Size Affects Malware Detection

Transcription:

Palo Alto Networks Re-Inventing Network Security It s Time To Fix The Firewall?! Christian Etzold Senior System Engineer

Security v1.0 Response: Rip Holes in Firewall Traditional Applications DNS Gopher SMTP HTTP Dynamic Applications FTP RPC Java/RMI Multimedia Background Appeared mid 1980 s Typically embedded in routers Classify individual packets based on port numbers Internet Challenge Could not support dynamic applications Flawed solution was to open large groups of ports Opened the entire network to attack

Security v2.0: Stateful Inspection Traditional Applications DNS Gopher SMTP HTTP Internet Dynamic Applications FTP RPC Java/RMI Multimedia Evasive Applications Encrypted Web 2.0 P2P Instant Messenger Skype Music Games Desktop Applications Spyware Crimeware Background Innovation created Check Point in 1994 Used state table to fix packet filter shortcomings Classified traffic based on port numbers but in the context of a flow Challenge Cannot identify Evasive Applications Embedded throughout existing security products

Applications Have Changed; Firewalls Have Not The gateway at the trust border is the right place to enforce policy control Sees all traffic Defines trust boundary BUT applications have changed Ports Applications IP Addresses Users Packets Content Need to restore visibility and control in the firewall Page 5 2010 Palo Alto Networks. Proprietary and Confidential.

Application Usage and Risk Report 6 th Edition, October 2010

Methodology and Demographics Methodology - Analysis is based on live customer traffic not a survey - How are networks being used? - What applications are running on enterprise networks? - What are the risks associated with the existing application mix? Demographics - 723 organizations worldwide, up from 347-931 applications found, up from 741 Participating Organizations 37-1.3 petabyes of bandwidth 64 750 500 250 0 Mar. 2008 (21) Oct. 2008 (25) Demographics Mar. 2009 (60) 113 Oct. 2009 (214) 149 95 103 Mar. 2010 (347) 275 207 241 Oct. 2010 (723) Americas Asia Pacific, Japan Europe Page 7 2010 Palo Alto Networks. Proprietary and Confidential.

Geographically and Historically: Usage is Universal 100% Geographical View: Frequency that Saying, Socializing and Sharing Applications were Detected 90% 80% 70% 60% Worldwide Americas Europe Asia Pacific, Japan Webmail Instant Messaging Social Networking Browser-based Filesharing P2P Filesharing Saying Social Networking Sharing 100% Historical View: Frequency that Saying, Socializing and Sharing Applications were Detected 90% 80% 70% 60% Oct. 2008 Mar. 2009 Oct. 2009 Mar. 2010 Oct. 2010 Webmail Instant Messaging Social Networking Browser-based Filesharing P2P Filesharing Saying Social Network ing Sharing Page 8 2010 Palo Alto Networks. Proprietary and Confidential.

Saying: Heavily Used, A Common Threat Vector Google Talk Gadget Most Frequently Found Saying (Webmail and IM) Applications Gmail Hotmail Yahoo Mail Facebook Mail SquirrelMail Yahoo IM Facebook Chat MSN Meebo 57% 79% 79% 78% 77% 76% 90% 88% 87% 93% 20% 40% 60% 80% 100% IM: 66 applications: 6 P2P, 27 C/S, 33 browser-based, 0.3% of the bandwidth Webmail: 33 applications, 1% of the bandwidth Business benefits: faster communication, collaboration, productivity Outbound risks: compliance, minor data loss Inbound risks: popular vector for malware, many of these applications have known vulnerabilities Malware Log Instances Per Organization (in 1,000s) Conficker.C.p2p (Worm) GGDoor.22 (Trojan) Mariposa C&C (Bot) Zeus (Bot) 2 43 84 114 0 60 120 Page 9 2010 Palo Alto Networks. Proprietary and Confidential.

Socializing: Facebook Dominates Social Networking Application Bandwidth Consumption Facebook 69% All other SN 15% Myspace 1% Stumbleupon 1% LinkedIn 2% Twitter 3% Facebook Posting 1% Facebook Apps 4% Facebook consumes 78% of the total social networking bandwidth Other top SN applications consume 7% 43 remaining social networking applications vie for the remaining table scraps (15%) Facebook Social Plugin 4% Business benefits: faster time to market, rich research, sales, marketing environment Outbound risks: internal and external compliance, branding and image (what should be said), industry (should it be used) Inbound risks: a common vector to deliver malware (Zeus and Conficker), next-gen social engineering Page 10 2010 Palo Alto Networks. Proprietary and Confidential.

Sharing: Browser-based Sharing Grows File Sharing Trends Over Time Fileshareing Trend: Frequency of use and number of applications shifts towards browser-based Use of other filesharing applications (like FTP) remains steady 100% 75% 50% 25% Mar. 2008 Oct. 2008 Mar. 2009 Oct. 2009 Mar. 2010 Oct. 2010 Browser-Based File Sharing Peer-to-peer File Sharing FTP All Other Applications 998 TB Bandwidth Consumption Comparison Other Filesharing 49 TB Browser-based Filesharing 22 TB Other P2P Filesharing 48 TB Xunlei (P2P) 203 TB 80 filesharing applications (23 P2P, 49 BB, 9 other) consuming 323 TB (24%) Xunlei, 5 th most popular P2P consumed 203 TB 15% of overall BW Business benefits: easier to move large files, central source of Linux binaries Outbound risks: Data loss is the primary business risk Inbound risks: Mariposa is propagated across P2P (and MSN) Page 11 2010 Palo Alto Networks. Proprietary and Confidential.

Summary Application usage has become homogenous - Minor country by country variances exist - Larger players extend their dominance Saying, socializing and sharing: streamlining business, increasing business and security risks - IT continues to struggle with block/allow balance Cloud based applications in use now, driven by users and by IT - 10% of the applications are enterprise cloud - Microsoft and Google have a significant presence Page 14 2010 Palo Alto Networks. Proprietary and Confidential.

Summary Application usage has become homogenous - Little geographic or industry variance - Risks across industries are heterogeneous Enterprise 2.0 application usage intensity increases - Frequency remain high, resource consumption up indicating greater intensity These are not your father s applications - 2/3 of the have accessibility features many hop ports - SSL, SSH and VPN are not the only applications that tunnel Page 15 2010 Palo Alto Networks. Proprietary and Confidential.

Firewalls

Application Based Firewall stateful inspection legacy firewalls tcp/443 tcp/443 What s really going on Page 17 2009 Palo Alto Networks. Proprietary and Confidential 2.1-b

Applications Carry Risk Applications can be threats P2P file sharing, tunneling applications, anonymizers, media/video Applications carry threats SANS Top 20 Threats majority are application-level threats Applications & application-level threats result in major breaches Pfizer, VA, US Army Page 18 2010 Palo Alto Networks. Proprietary and Confidential.

The Traditional Approach to Network Security Corporate Assets Web App Attacks (2002) Security Perimeter Worms (2005) WAN XML/W.S. Attacks (2004) Info Leakage (2005) Eavesdropping (1994) IM Attacks (2002) Content Access (1998) Resource Access (1992) Viruses (1997) Denial of Service (2000) XML Security Spyware (2006) Exploits (1996) IM Security Anti-Virus DLP/ILP Anti-Spyware Content Filtering IPS IDS IPSEC VPN DoS Protection Internet Worm Mitigation WebApp Security

About Palo Alto Networks Palo Alto Networks is the Network Security Company World-class team with strong security and networking experience - Founded in 2005 by security visionary Nir Zuk - Top-tier investors Builds next-generation firewalls that identify / control 1000+ applications - Restores the firewall as the core of the enterprise network security infrastructure - Innovations: App-ID, User-ID, Content-ID Global footprint: 2,000+ customers in 50+ countries, 24/7 support

The Right Answer: Make the Firewall Do Its Job New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Protect in real-time against threats embedded across applications 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, in-line deployment with no performance degradation Page 21 2010 Palo Alto Networks. Proprietary and Confidential.

Identification Technologies Transform the Firewall App-ID Identify the application User-ID Identify the user Content-ID Scan the content Page 22 2010 Palo Alto Networks. Proprietary and Confidential.

App-ID: Comprehensive Application Visibility Policy-based control more than 1000 applications distributed across five categories and 25 sub-categories Balanced mix of business, internet and networking applications and networking protocols 3-5 new applications added weekly App override and custom HTTP/SSL applications address internal applications

Application Based Firewall stateful inspection tcp/443 tcp/443 Page 24 2009 Palo Alto Networks. Proprietary and Confidential 2.1-b

Application Identification - Signatures SSL Forward proxy HTTP webex Protocol Decoders Decryption Application Signatures Mode shift Webex desktop sharing Page 25 2009 Palo Alto Networks. Proprietary and Confidential 2.1-b

User-ID: Enterprise Directory Integration Users no longer defined solely by IP address - Leverage existing enterprise directory services (Active Directory, LDAP, edirectory) without desktop agent rollout - Identify Citrix users and tie policies to user and group, not just the IP address Manage and enforce policy based on user and/or group Understand user application and threat behavior based on username, not just IP Investigate security incidents, generate custom reports

Content-ID: Real-Time Content Scanning Detect and block a wide range of threats, limit unauthorized data transfer and control non-work related web surfing Stream-based, not file-based, for real-time performance - Uniform signature engine scans for broad range of threats in single pass - Vulnerability exploits (IPS), viruses, and spyware (both downloads and phone-home) Block transfer of sensitive data and file transfers by type - Looks for CC # and SSN patterns - Looks into file to determine type not extension based Web filtering enabled via fully integrated URL database - Local 20M URL database (78 categories) maximizes performance (1,000 s URLs/sec) - Dynamic DB and customizable categories adapts to local, regional, or industry

Comprehensive View of Applications, Users & Content Application Command Center (ACC) - View applications, URLs, threats, data filtering activity Add/remove filters to achieve desired result Page 28 Filter on Facebook-base 2010 Palo Alto Networks. Proprietary and Confidential. Filter on Facebook-base and user cook Remove Facebook to expand view of cook

Gartner: Palo Alto Networks is a Visionary Enterprises need next-generation firewalls - In 2009, Gartner saw market pressures accelerate the demand for nextgeneration firewall platforms that provide the capability to detect and block sophisticated attacks, as well as enforce granular security policy at the application (versus port and protocol) level. Palo Alto Networks next generation firewalls are leading the market - Gartner notes: Palo Alto Networks is highly disruptive within the firewall market because the product has been designed as a next-generation firewall and has competitors being forced to change road maps and sell defensively. Palo Alto Networks generated the most firewall inquiries among Gartner customers in 2009. Page 29 2010 Palo Alto Networks. Proprietary and Confidential.

2010 Magic Quadrant for Enterprise Network Firewalls Cisco Juniper Networks ability to execute McAfee Stonesoft WatchGuard Fortinet Check Point Software Technologies Palo Alto Networks SonicWALL NETASQ 3Com/H3C phion Astaro Source: Gartner niche players visionaries completeness of vision As of March 2010 Page 31 2010 Palo Alto Networks. Proprietary and Confidential.

F1000 Organizations Trust Palo Alto Networks Page 32 2010 Palo Alto Networks. Proprietary and Confidential.

Addresses Three Key Business Problems Identify and Control Applications - Visibility of 1000+ applications, regardless of port, protocol, encryption, or evasive tactic - Fine-grained control over applications (allow, deny, limit, scan, shape) - Addresses the key deficiencies of legacy firewall infrastructure Prevent Threats - Stop a variety of threats exploits (by vulnerability), viruses, spyware - Stop leaks of confidential data (e.g., credit card #, social security #) - Stream-based engine ensures high performance - Enforce acceptable use policies on users for general web site browsing Simplify Security Infrastructure - Put the firewall at the center of the network security infrastructure - Reduce complexity in architecture and operations Page 33 2010 Palo Alto Networks. Proprietary and Confidential.

Design and Implementation of the Palo Alto Networks Firewall Version 4.0

PAN-OS Core Firewall Features Visibility and control of applications, users and content complement core firewall features Strong networking foundation - Dynamic routing (BGP, OSPF, RIPv2) - Tap mode connect to SPAN port - Virtual wire ( Layer 1 ) for true transparent in-line deployment - L2/L3 switching foundation - Policy-based forwarding VPN - Site-to-site IPSec VPN - SSL VPN / GlobalProtect QoS traffic shaping - Max/guaranteed and priority - By user, app, interface, zone, & more - Real-time bandwidth monitor Zone-based architecture - All interfaces assigned to security zones for policy enforcement High Availability - Active / active - Configuration and session synchronization - Path, link, and HA monitoring Virtual Systems - Establish multiple virtual firewalls in a single device (PA-4000 and PA-2000 Series only) Simple, flexible management - CLI, Web, Panorama, SNMP, Syslog PA-4060 PA-4050 PA-4020 PA-2050 PA-2020 PA-500 Page 35 2010 Palo Alto Networks. Proprietary and Confidential.

Flexible Deployment Options Visibility Transparent In-Line Firewall Replacement Application, user and content visibility without inline deployment IPS with app visibility & control Consolidation of IPS & URL filtering Firewall replacement with app visibility & control Firewall + IPS Firewall + IPS + URL filtering Page 36 2010 Palo Alto Networks. Proprietary and Confidential.

PA-4000 Series Specifications PA-4060 10 Gbps FW 5 Gbps threat prevention 2,000,000 sessions 4 XFP (10 Gig) I/O 4 SFP (1 Gig) I/O PA-4050 10 Gbps FW 5 Gbps threat prevention 2,000,000 sessions 16 copper gigabit 8 SFP interfaces PA-4020 2 Gbps FW 2 Gbps threat prevention 500,000 sessions 16 copper gigabit 8 SFP interfaces - 2U, 19 rack-mountable chassis - Dual hot swappable AC power supplies - Dedicated out-of-band management port - 2 dedicated HA ports - DB9 console port Page 37 2009 Palo Alto Networks. Proprietary and Confidential 2.1-b

4000 Series Architecture RAM Dedicated Control Plane Highly available mgmt High speed logging and route updates Flash Matching Engine RAM RAM RAM Flash Matching HW Engine Palo Alto Networks uniform signatures Multiple memory banks memory bandwidth scales performance Dual-core CPU RAM RAM HDD CPU 1 SSL CPU 2 CPU 3 IPSec.. CPU 16 RAM RAM De- Compression Multi-Core Security Processor High density processing for flexible security functionality Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression) QoS Route, ARP, MAC lookup NAT 10 Gig Network Processor Front-end network processing offloads security processors Hardware accelerated QoS, route lookup, MAC lookup and NAT Control Plane Data Plane Page 38 2009 Palo Alto Networks. Proprietary and Confidential 2.1-b

PA-2000 Series Specifications PA-2050 1 Gbps FW 500 Mbps threat prevention 250,000 sessions 16 copper gigabit 4 SFP interfaces PA-2020 500 Mbps FW 200 Mbps threat prevention 125,000 sessions 12 copper gigabit 2 SFP interfaces - 1U rack-mountable chassis - Single non-modular power supply - 80GB hard drive (cold swappable) - Dedicated out-of-band management port - RJ-45 console port, user definable HA port Page 39 2009 Palo Alto Networks. Proprietary and Confidential 2.1-b

2000 Series Architecture RAM Dedicated Control Plane Highly available mgmt High speed logging and route updates Flash Matching Engine RAM RAM RAM Flash Matching HW Engine Palo Alto Networks uniform signatures Multiple memory banks memory bandwidth scales performance 1Gbps Dual-core CPU RAM RAM HDD CPU 1 SSL CPU 2 CPU 3 CPU 4 IPSec RAM RAM Multi-Core Security Processor High density processing for flexible security functionality Hardware-acceleration for standardized complex functions (SSL, IPSec) 1Gbps Route, ARP, MAC lookup NAT Network Processor Front-end network processing offloads security processors Hardware accelerated route lookup, MAC lookup and NAT Control Plane Data Plane Page 40 2009 Palo Alto Networks. Proprietary and Confidential 2.1-b

Purpose-Built Architecture: PA-4000 Series RAM Dedicated Control Plane Highly available mgmt High speed logging and route updates Signature Match RAM RAM RAM 10Gbps Signature Match HW Engine Palo Alto Networks uniform signatures Vulnerability exploits (IPS), virus, spyware, CC#, SSN, and other signatures Dual-core CPU RAM RAM HDD CPU 1 SSL CPU 2 CPU 3 IPSec.. CPU 16 De- Compression 10Gbps RAM RAM Multi-Core Security Processor High density processing for flexible security functionality Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression) Control Plane QoS Route, ARP, MAC lookup NAT 10 Gig Network Processor Front-end network processing offloads security processors Hardware accelerated QoS, route lookup, MAC lookup and NAT Data Plane

Site-to-Site and Remote Access VPN Site-to-site VPN connectivity Remote user connectivity Secure connectivity - Standards-based site-to-site IPSec VPN - SSL VPN for remote access Policy-based visibility and control over applications, users and content for all VPN traffic Included as features in PAN-OS at no extra charge

GlobalProtect Securing Users and Data in an Always Connected World

The Need to Secure Remote Users How do you secure your applications and your users when they are both moving off the controlled network? Apps DATA Users Headquarters Branch Office Hotel Home Enterprise Secured Open to threats, app usage, & more

Two Existing Approaches Fall Well Short Software on the PC Install point security products on the PC Security apps run on the PC and perform specific function Examples include antivirus, antispyware, host IPS, software control, USB port control, DLP, etc. Cloud-based Services Install an agent on the PC Agent forces web traffic to cloudbased proxy for scanning and policy enforcement Examples include ScanSafe, Purewire, etc. Expensive to purchase, deploy, and manage Limited coverage and awareness of different applications and threats (very silo oriented) Policies are inconsistent with network security policies Limited (if any) coordination between user, application, and content Page 45 2010 Palo Alto Networks. Proprietary and Confidential.

Overview of Off-Network Security OFF the Enterprise network: Small agent on PC detects off-network - Finds closest gateway and forces traffic through gateway connection Performs host profile check - Is software updated? - Is host running req. software? Enforces enterprise policy Headquarters Branch Office - Application, user, and content-based policies enforced Enterprise for Secured roaming users Hotel Home Off Network Secured Page 46 2010 Palo Alto Networks. Proprietary and Confidential.

Overview of On-Network Security Headquarters Branch Office On Network Secured ON the Enterprise network: Small agent on PC detects on-network Agent performs host profile check - Is software updated? - Is host running req. software? Palo Alto Networks firewalls enforce policy augmented by host profile - Unpatched systems, unknown users, noncompliant software config receive limited network access Hotel Home Cloud Service Secured Page 47 2010 Palo Alto Networks. Proprietary and Confidential.

GlobalProtect Topology Portal Gateway 1 Gateway Client 4 23 Gateway 1. Client attempts SSL connection to Portal to retrieve latest configuration 2. Client does reverse DNS lookup per configuration to determine whether on or off network (e.g. lookup 10.10.10.10 and see if it resolves to internal.paloalto.local) 3. If external, client attempts to connect to all external gateways via SSL and then uses one with quickest response 4. SSL or IPSec tunnel is established and default routes inserted to direct all traffic through the tunnel for policy control and threat scanning Gateway 48 2010 Palo Alto Networks. Proprietary and Confidential. 48

Complete Security Coverage Solution Consistent policy applied to all enterprise traffic: Users protected from threats off-network, plus application and content usage controlled to prevent data leakage User profile incorporated into consistent enterprise security enforcement Enterprises gain same level of control of SaaS applications as when previously hosted internally Apps Headquarters Branch Office Hotel Home Consistent Security Users

Traffic Shaping / QoS Application Based!

Traffic Shaping Extends Policy Control Options Traffic shaping policies ensure business applications are not bandwidth starved - Guaranteed, prioritized and maximum bandwidth settings - Apply traffic shaping policies by application, user, source, destination, interface, IPSec VPN tunnel and more Enables more effective deployment of appropriate application usage policies Included as a feature in PAN-OS at no extra charge

Real-time Bandwidth Monitor Real-time view of bandwidth and session consumption for applications, users, and rules