FROM PRODUCT TO PLATFORM



Similar documents
Next Generation Enterprise Network Security Platform

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Palo Alto Networks. October 6

Agenda , Palo Alto Networks. Confidential and Proprietary.

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

The Hillstone and Trend Micro Joint Solution

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Advanced Security and Risk Management for Cloud and Premise environments

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

WildFire. Preparing for Modern Network Attacks

Enterprise Security Platform for Government

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

PALO ALTO SAFE APPLICATION ENABLEMENT

Content-ID. Content-ID URLS THREATS DATA

Reinventing Network Security, One Firewall at a Time. Chris King Director, Product Marketing

Achieve Deeper Network Security

How Attackers are Targeting Your Mobile Devices. Wade Williamson

REVOLUTIONIZING ADVANCED THREAT PROTECTION

A Modern Framework for Network Security in Government

Moving Beyond Proxies

Breaking the Cyber Attack Lifecycle

Achieve Deeper Network Security and Application Control

Unified Security, ATP and more

A Modern Framework for Network Security in the Federal Government

APERTURE. Safely enable your SaaS applications.

THREAT INTELLIGENCE CLOUD

SourceFireNext-Generation IPS

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Braindumps QA

Integrating MSS, SEP and NGFW to catch targeted APTs

NGFWs will be most effective when working in conjunction with other layers of security controls.

Carbon Black and Palo Alto Networks

ENABLING FAST RESPONSES THREAT MONITORING

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Cisco Advanced Malware Protection for Endpoints

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Fortinet Advanced Threat Protection- Part 3

AppGuard. Defeats Malware

Advanced Threats: The New World Order

Hillstone Intelligent Next Generation Firewall

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies

Defending Against Cyber Attacks with SessionLevel Network Security

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Network Security Solution. Arktos Lam

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network

You ll learn about our roadmap across the Symantec and gateway security offerings.

Breach Found. Did It Hurt?

McAfee Network Security Platform

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Networking for Caribbean Development

Palo Alto Networks. September 2014

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Comprehensive Advanced Threat Defense

Market Guide for Network Sandboxing

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Next-Generation Firewalls: Critical to SMB Network Security

MEETING CSIP OBJECTIVES WITH AN AUTOMATED AND PREVENTIVE SECURITY APPROACH

On and off premises technologies Which is best for you?

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Cisco Advanced Malware Protection

Next-generation Security Architecture for the Enterprise

Next Generation Firewalls and Sandboxing

Database Security in Virtualization and Cloud Computing Environments

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

BeyondInsight Version 5.6 New and Updated Features

The Evolution of the Enterprise And Enterprise Security

Comprehensive real-time protection against Advanced Threats and data theft

Cisco Advanced Malware Protection for Endpoints

How To Sell Security Products To A Network Security Company

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Advanced Threat Protection with Dell SecureWorks Security Services

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Next-Generation Firewall Overview

Streamline PCI Compliance With Next-generation Security

High Performance NGFW Extended

SANS Top 20 Critical Controls for Effective Cyber Defense

Content Security: Protect Your Network with Five Must-Haves

Security Analytics for Smart Grid

On-Premises DDoS Mitigation for the Enterprise

Transcription:

FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen

Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really the answer Security Requirement and the NEED for a Platform Approach

Today s Challenges Nir Zuk knew this +10 years ago and he wanted to change the Status Quo of Security

Challenge Data Growth

Challenge SSL/TLS encryption of Data

Challenge - Application Growth

Challenge SaaS SANCTIONED vs. UNSANCTIONED

What s hiding under the surface..

What s hiding under the surface.. Ports Applications IPs Users Application Growth SSL encrypted traffic Tunneling applications Evasive applications Malware Vulnerabilities Software Exploits Unknown applications Unknown users

Legacy Security Not going to cut it anymore

Failure of legacy security architectures Kill Chain & Point Products Limited visibility Lacks correlation Manual response DNS protection for outbound DNS DNS protection cloud Endpoint AV Enterprise Network UTM/Blades Anti-APT for port 25 APTs Anti-APT for port 80 APTs Internet Anti-APT cloud Network AV DNS Alert SMTP Alert Web Alert AV Alert Endpoint Alert DNS Alert SMTP Alert AV Alert Endpoint Alert Web Alert AV Alert DNS Alert Web Alert Vendor 1 Vendor 2 Vendor 3 Vendor 4 Internet Connection Malware Intelligence

Attacks have changed EXE Executable PDF Document Known signature? NO Known strings? NO Previously seen behavior? NO Legacy Endpoint Protection Malware direct execution Exploit vulnerability to run any code Targeted Evasive Evolving

Security Requirement and the NEED for a Platform Approach

Requirement Reduce and Control Risk Cloud FACILITATE ACCESS REDUCE AND CONTROL RISK Remove threats from wanted traffic Allow desired applications by user, limit high-risk features Visibility into all applications & users on the network

Core Security Concept of Palo Alto Networks Attacks should be PREVENTED BEFORE causing harm and not DETECTED AFTER causing harm

Delivering the next-generation security platform

Palo Alto Networks NextGen Firewall Disruptive Technology in 2005/2007 1. Identify and control applications regardless of port, protocol, evasive tactic or SSL 2. Identify and control users regardless of IP address, location, or device 3. Protect against known and unknown application-borne threats 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, low latency, in-line deployment

Threat Intelligence Cloud - 2011 THE UNKNOWN REMEDIATION Automatically identified Automatically prevented 15,000 Anti-malware protections per day 24,000 URL protections per day 13,500 DNS protections per day Threat Prevention WildFire THREAT INTELLIGENCE CLOUD URL Filtering Forensics & Reporting Protections updated automatically every 5 minutes forensics reporting Rich and for quick, detailed investigation

Endpoint Protection

Introducing Traps - 2013/2014 Disruptive Endpoint Protection Prevent Exploits Including zero-day Exploits Prevent Advanced Malware Including unknown malware Collect Attempted-Attack Forensics For further analysis Lightweight, Scalable, User Friendly Must cover complete enterprise Integrate with Network and Cloud Security For data exchange and crossed-organization protection Traps Advanced Endpoint Protection

Introducing Aperture SaaS Security - 2015 DETAILED CONTENT INSPECTION AND ANALYTICS CONTEXTUAL CONTROL OF DATA EXPOSURE PROGRAMABLE DOCUMENT CLASSIFICATION MALWARE DETECTION AND REMOVAL

AutoFocus: Actionable threat intelligence - 2015 Highlight unique, targeted attacks and take action Find the important events Tags & statistical analysis highlight critical events Who is behind the attack Identify the actor and attack techniques Respond to the incident Block relevant indicators Empower Security Operations and Research Teams

The Center of our Platform - Threat Intelligence Cloud Network-based sandboxing and signature updates Actionable threat intelligence Traps endpoint anti-malware THREAT INTELLIGENCE CLOUD Vendor threat intelligence sharing SaaS security 3 rd party integrations 23 2016, Palo Alto Networks. Confidential and Proprietary.

True Platform Integration an Example WildFire analyzes the unknown, renders a verdict, and shares its threat intelligence WildFire WildFire analyzes the unknown, renders a verdict, and shares its threat intelligence to NGFW automatically sends unknowns prevent the or suspicious unknown files on the and links NGFW to WildFire from that moment on Next-Gen Firewall to Traps automatically sends unknowns prevent the and suspicious unknown threat programs on all to endpoints WildFire from that moment on Traps

Palo Alto Networks is positioned as a Leader in the Gartner Magic Quadrant for enterprise network firewalls.* Palo Alto Networks is highest in execution and a visionary within the Leaders Quadrant. *Gartner Magic Quadrant for Enterprise Network Firewalls, Adam Hils, Greg Young, Jeremy D Hoinne, and Rajpreet Kaur, May 2016. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Thank You