Premier Partner Technology Dinner



Similar documents
Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Whitepaper Unified Visibility Fabric A New Approach to Visibility

Next Generation Enterprise Network Security Platform

PALO ALTO SAFE APPLICATION ENABLEMENT

Intelligent Data Access Networking TM

Agenda , Palo Alto Networks. Confidential and Proprietary.

Visibility in the Modern Data Center // Solution Overview

Secure Access Complete Visibility

In-Band Security Solution // Solutions Overview

Enhancing Cisco Networks with Gigamon // White Paper

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

Whitepaper Active Visibility into SSL Traffic for Multi-tiered Security

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Securing the Virtualized Data Center With Next-Generation Firewalls

Out-of-Band Security Solution // Solutions Overview

FROM PRODUCT TO PLATFORM

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Deploying Firewalls Throughout Your Organization

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

The Cisco ASA 5500 as a Superior Firewall Solution

How Network Virtualization can improve your Data Center Security

Palo Alto Networks. October 6

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Solution Brief Network Design Considerations to Enable the Benefits of Flash Storage

Next-Generation Firewalls: Critical to SMB Network Security

(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure

Moving Beyond Proxies

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Whitepaper SSL Decryption: Uncovering The New Infrastructure Blind Spot

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

VSS - Game Changing Technology

VMware vcloud Networking and Security Overview

Netzwerkvirtualisierung? Aber mit Sicherheit!

Secure Cloud-Ready Data Centers Juniper Networks

Network Security Solution. Arktos Lam

Using Palo Alto Networks to Protect the Datacenter

A Modern Framework for Network Security in the Federal Government

VMware vcloud Networking and Security

Firewall Feature Overview

Threat-Centric Security for Service Providers

Solutions Guide End-to-End Visibility for Your Cisco Infrastructure

WildFire. Preparing for Modern Network Attacks

About the VM-Series Firewall

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

QRadar Security Intelligence Platform Appliances

Visibility into the Cloud and Virtualized Data Center // White Paper

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Cisco Unified Access Technology Overview: Converged Access

Next-Generation Datacenter Security Implementation Guidelines

SANS Top 20 Critical Controls for Effective Cyber Defense

Enterprise Security Platform for Government

Pervasive Security Enabled by Next Generation Monitoring Fabric

Networking for Caribbean Development

New Hitachi Virtual Storage Platform Family. Name Date

Dell SonicWALL Portfolio

Cloud Managed Security with Meraki MX

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Zscaler Internet Security Frequently Asked Questions

End-to-End Visibility

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Unified Threat Management, Managed Security, and the Cloud Services Model

Open SDN for Network Visibility

Cyberoam Next-Generation Security. 11 de Setembro de 2015

A Modern Framework for Network Security in Government

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

Brocade One Data Center Cloud-Optimized Networks

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

High Performance Server SAN using Micron M500DC SSDs and Sanbolic Software

Cisco Small Business ISA500 Series Integrated Security Appliances

Monitoring & Measuring: Wi-Fi as a Service

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Breaking the Cyber Attack Lifecycle

Applications erode the secure network How can malware be stopped?

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

Enabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon

Delivering Managed Services Using Next Generation Branch Architectures

EVOLVED DATA CENTER ARCHITECTURE

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

How To Build An Ip Storage Network For A Data Center

Next Gen Firewall and UTM Buyers Guide

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Network Virtualization Solutions - A Practical Solution

Transcription:

Premier Partner Technology Dinner Aruba Networks, Gigamon, NetApp, & Palo Alto Networks Fogo De Chao, Baltimore, MD September 25 th, 2014

Key Take Away s Headquartered in Malvern, PA with offices in NYC & MD Technical Staff includes 20 Engineers and Consultants Average industry tenure of 10-15 years Continuous training and education, multi-vendor Partner with Best in Class technology vendors Technology practices include: Security, Wireless, Storage, Virtualization, WAN Optimization All vertical and client sizes

GigaVUE-HC2 Visibility Fabric Node 2014 Gigamon, Inc. All rights reserved. 3

The Gigamon Traffic Visibility Fabric A Revolutionary Way to Securely Access Critical Data at a Fraction of the Cost Enhances the Visibility of all Full Packet Based Data Anywhere on the Network Lowers the Total Cost of Network Monitoring, Security and Compliance 2014 Gigamon, Inc. All rights reserved. 4

Top 10 Reasons for Gigamon Problems we Solve 1 Eliminate Span Port Contention 6 Enable Centralized Monitoring Prevent span port shortages from hindering troubleshooting & diagnostics or forcing choices between which tool can be used. Provide a centralized pool of monitoring tools with access to traffic from a large number of network links. 2 3 4 5 Monitor 10 Gbps Network with 1 Gbps Tools up to 100 Gbps / 40 Gbps Enable 1 Gbps tools to support 10 Gbps links, and 10 Gbps tools to monitor traffic aggregated from multiple 1 Gbps links. Maximize Network Tool Utilization Ensure tools are fully utilized by mapping data from many network access points to the tools Increase Network Visibility Points Gain access to many network access points (taps/spans) allow the entire network to be mapped to all tools Prevent Tool Oversubscription Ensure only the data that matters is mapped to the tools by prefiltering and mapping the appropriate traffic flows to the tools. 7 8 9 10 Reduce Management Complexity Complete data access through patented flow mapping simplifying change control, security burden, and IT group contention. Increase Operational Agility Simplify sharing of network access points, data, and tools among IT groups. Reduce Operational Costs Eliminate or delay tools upgrades, expedite troubleshooting and diagnostics, simplify data access burden, and enable infrastructure upgrades. Completely Open Architecture Our solution is agnostic to all tools, infrastructure, and vendors with the market leading scalability, density, and reliability. 2014 Gigamon, Inc. All rights reserved. 2013 Gigamon, Inc. Company Confidential 5

The GigaVUE-HC2 Node Flexible Visibility Addressing IT Needs 2014 Gigamon, Inc. All rights reserved. 6

GigaVUE-HC2 Modular & Flexible, Multi-Functional GigaVUE HC Series Visibility Node TAPs TAPs TAPs TAPs Aggregation Packet Slicing NetFlow Generation Replication Future Modules & Software Future Possibilities Load Balancing/ Streaming The GigaVUE H Series already enjoys high-density and scalability Out-of-Band De-duplication Multi-purpose capabilities are required for optimized visibility 2014 Gigamon, Inc. All rights reserved. 7

Introducing GigaVUE H Series GigaVUE (High Capacity) Node Product Family: Product: Target markets: Specifications: Fully-capable GigaVUE H Series node 2RU medium-sized chassis exceeding 1Tb throughput Highly modular (4 Bays in front / 1 GigaSMART Bay in rear) GigaSMART capable (Rear) Modules for: 10Gb, 40Gb, TAPs 2014 Gigamon, Inc. All rights reserved. 8

GigaVUE-HC2 Overview Front to Back Airflow Mgmt and Control ports Four Modular Bays for Front Ports, TAPs, etc. Redundant, Load-sharing Power Supplies Rear Fan Tray (blowing out) Removable Control Card Tray (behind Fans) Rear GigaSMART 2014 Gigamon, Inc. All rights reserved. 9

GigaVUE HC2 Bypass Modules: Key Capabilities Physical and Logical Bypass Protection for inline tool deployments Simultaneous inline and out-of-band tool support Bypass Options: One-to-One: Sending traffic to a single inline tool One-to-Many: Distributing inline traffic across multiple inline tools Bi-directional customizable heartbeats for monitoring health of inline tool Network link status propagation: allows failover to redundant path Selectable actions on inline tool failure: Forward traffic into network, bypassing the inline tool Bring network links down, allowing failover to redundant network path Drop traffic 2014 Gigamon, Inc. All rights reserved. 10

Active Visibility for Multi-Tiered Security A Better Approach to Integrated Security NetFlow Collector Intrusion Detection System GigaSMART Edge Router GigaStream Out-of-Band Malware Intrusion Prevention Systems Core Switch Saves Time Saves Money Improved Reliability Protects Traffic Throughput Integrates Best-of-Breed Solutions 2014 Gigamon, Inc. All rights reserved. Page 11

Introducing GigaVUE HC Series GigaSMART Module Introducing Target Market Benefits Details: 40Gb GigaSMART front processing per module Includes 16 fully functional 10Gb cages Up to 200 Gbps compute and 64 x 10Gb per GigaVUE-HC2 2014 Gigamon, Inc. All rights reserved. 12

GigaVUE HC Series Modules - Rear GigaSMART A Key Component of the Product 40Gb Rear GigaSMART Offering everything from De-Duplication to NetFlow Generation 2014 Gigamon, Inc. All rights reserved. 13

Unified Visibility Fabric Architecture Applications Write Read Management Flexible GUI and central provisioning of Fabric Nodes across physical, virtual, and future SDN islands Write Read Orchestration Write Read Services Slicing Masking Tunnel Time Stamp Load Balance Header Stripping Adaptive Packet Filtering Write Read API/SDK Visibility Fabric Nodes Pervasive visibility across physical (corporate to remote) virtual, and future SDN production networks GigaVUE-2404 GigaVUE-420 GigaVUE-212 G-SECURE-0216 GigaVUE-HD8 GigaVUE-HD4 GigaVUE-HC2 GigaVUE-HB1 TAPs & Aggregators G-TAP G-TAP A Series GigaVUE-TA1 Read Write Applications & Tools Infrastructure, User Community 2014 Gigamon, Inc. All rights reserved. 14 = Future Availability

Active Visibility for Multi-Tiered Security Internet GigaVUE-HB1 Server/ Virtual Farm Regional Centers Core Switches Distribution Switches VISIBILITY FABRIC ARCHITECTURE OUT-OF-BAND INLINE GigaVUE-HC2 with Bypass Module GigaVUE-HD8 IPS ANTI- MALWARE FILE ACTIVITY MONITORING SECURITY ANALYTICS SIEM DLP IDS Access Switches APM 2014 Gigamon, Inc. All rights reserved. 15

Secure Enterprise Mobility Aruba ClearPass Presenter Name and Title CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

Todays Secure Mobility Challenges Lack of Policy Solution, Access from Anywhere Unmanaged BYOD use Open Guest Wi-Fi CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

The ClearPass Platform Expandable Applications Guest Onboard OnGuard ClearPass Baseline Hardware or VM Appliances (500, 5,000 or 25,000) Remote Location CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

What s Needed: Policy Management as Foundation Policy with built-in AAA Services Better decisions based on context - access method, user, device status or location Comprehensive Feature Set Manage all security services from a single platform Granular Authentication Methods Leverage multiple identity stores and auth methods to fit any use case Login/password, certificates CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

AAA to Policy Examples Employees receive access to resources from anywhere based on ClearPass defined policy Staff no longer uses preshared keys for Wi-Fi as ClearPass delivers secure login services per user 14K+ Personnel in 100+ Offices Multi-site Magnet Hospital, Northeast U.S. CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

Personal devices create IT burden and security gaps CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

Solution: Secure Automated Workflows Employee Self-Service Configuration Users self-configure network settings and certificates without IT involvement Built-in Certificate Authority Automatically create and distribute device certificates without using internal PKI. Simple for users Integrate with Device Management Use MDM/EMM data to enforce wireless and wired privileges no jailbroken devices CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

Secure Onboarding Examples Physicians self-configure personal devices using ClearPass Onboard for secure Wi-Fi access Over 20 Facilities, 2600 Physicians Simplified certificate distribution for close to 50K BYOD user via ClearPass Onboard ~50000 Endpoints, Multinational Financial CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

Open guest networks leave security gaps and provide no visibility CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

Solution: Captive Portals, Per User Registration Guest Login Portal Workflows Each guest receives their own credentials or acknowledge acceptance of use Self or Sponsor Approved Registration Authorized access with full reporting and session controls for Wi-Fi / Wired Complete Customization IT can capture visitor information, cache MAC addresses, display ads, alter access privileges CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

Guest Access Services Standard and High Capacity Guest (HCG) Sponsor privileges with access verification Self-service Per session controls Automated SMS/email credential delivery Little IT involvement No more wide-open SSIDs and shared keys! CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

Recognized as an Industry Leader Leader: 2013 Wireless LAN MarketScape Leader: 2013 Network Access Control Magic Quadrant Leader: 2014 Wired & Wireless Magic Quadrant CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

Key Takeaways Security for wired and wireless access Single point of management for multivendor networks Simplified IT and user experience CONFIDENTIAL Copyright 2014. Aruba Networks, Inc. All rights reserved

THANK YOU

Product & Solutions Portfolio Overview NetApp Confidential - Internal Use Only

Industry Trends Flash Cloud Software Defined Data Center Converged Infrastructure Mobility NetApp Confidential - Internal Use Only 31

GK The Changing Role of IT NetApp Confidential Limited Use 32

GK NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 33

Clustered Data ONTAP & FAS Unified Scale-out Storage NetApp Confidential - Internal Use Only 34

Clustered Data ONTAP FAS System Highlights Unified architecture optimizes storage utilization Same hardware supports both SAN and NAS Single operating system Single management infrastructure Scale to 69PB and 2.6M IOPS 99.999% availability, zero planned downtime FAS2500 FAS8000 Comprehensive flash integration, server to array Investment protection and compatibility NetApp Confidential - Internal Use Only 35

Scalable Performance for SAN and NAS Scale Out by Adding Controllers (Maximum 24 Controllers) Scale Up Individual Controllers All-Flash FAS All-Flash FAS All-Flash FAS All-Flash FAS All-Flash FAS Hybrid FAS All-Flash FAS Hybrid FAS >2 million sub-millisecond IOPS and nearly 5PB of all-flash capacity NetApp all-flash FAS: Scalable high performance for dedicated workloads Mixed all-flash and hybrid FAS: One storage repository for all workloads 36

MW FlexArray Virtualization Software New V-Series delivery model Now a software feature that can be enabled from ONTAP Can be purchased and activated at any time One controller type supports both FAS & 3 rd party storage Native SAN & NAS support Available with all FAS8000 systems Delivers a guaranteed 9- month payback Value proposition of FlexArray Unify and simplify IT management under a single framework Enable SDS, decoupling storage from data management Improve the return on existing IT assets Deliver ONTAP value to more IT operations at a lower cost NetApp Confidential Limited Use 37

Clustered Data ONTAP Extending the Reach of Data ONTAP Data ONTAP Edge Remote Office Storage Solution NetApp Private Storage For AWS FlexArray (V-Series) Third-party Array Virtualization NetApp Connect Secure Mobile Access Data ONTAP On Command Management Software NetApp Confidential Limited Use 38

Clustered Data ONTAP Comprehensive Flash Integration Server Controller Disk Flash Accel Flash Cache Flash Pool All Flash FAS Best for specific applications 90% better latency; 80% better throughput Best for file services 34% lower $/TB; 40% lower $/IOPs Best for OLTP 46% lower $/TB; 18% lower $/IOPs Low-latency performance coupled with best-in-class data management NetApp Confidential - Internal Use Only 39

Flash Arrays Flash Technology Leadership Flash for FAS Flash Pool, Flash Cache, Flash Accel Flash for E-Series 75PB SSD Cache Flash Arrays EF-Series, FlashRay NetApp Confidential - Internal Use Only 40

NetApp Confidential - Internal Use Only 41

Palo Alto Networks Next Generation Enterprise Security Platform Raazi Zain Regional Sales Manager State of Maryland

Palo Alto Networks Company Overview Corporate Highlights Founded in 2005; first customer shipment in 2007 Safely Enabling Applications Able to address all enterprise cybersecurity needs $MM $400 $350 $300 $250 $200 $150 $100 $50 $0 Revenue $396 $255 $119 $13 $49 FY09 FY10 FY11 FY12 FY13 Enterprise customers Exceptional ability to support global customers 14,000 13,500 12,000 Experienced Technology and Management Team 10,000 8,000 6,000 4,000 4,700 9,000 1300+ Employees / 16,000+ Customers Globally 2,000 0 Jul-11 Jul-12 Jul-13 Page 43 2012 Palo Alto Networks. Proprietary and Confidential.

2014 Magic Quadrant for Enterprise Network Firewalls Palo Alto Networks is assessed as a Leader, mostly because of its NGFW focus, because it set the direction of the market along the NGFW path, and because of its consistent visibility in shortlists, increasing revenue and market share, and its proven ability to disrupt the market. --Gartner Magic Quadrant for Enterprise Network Firewalls 44 2014, Palo Alto Networks. Confidential and Proprietary.

Cyber Security in the News

Common Security Challenges Sophisticated user base Disperse environment multiple locations Mobile / multiple devices difficult to identify users Unable to identify many of the newer / custom applications Lots of evasive applications (Ultrasurf, Tor, Hamachi) Many new, sophisticated malware / attacks Need to protect data (financial/proprietary/employee) Lot s untrusted zones (wlan/mobile devices/partners) Shrinking budgets, limited staff and increased malware cleanup costs The list goes on

The Gaps in Legacy Network Security Based on legacy stateful inspection port / protocol Limited visibility into network traffic Point products focusing on single area Bolt on solutions not integrated Signature based need an exact match Simple Allow/Block rules Basic url static web pages Difficult to manage / aggregate data Expensive Page 47 2011 Palo Alto Networks. Proprietary and Confidential.

Palo Alto Networks Next-Generation Platform 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify and control users regardless of IP address, location, or device 3. Protect against known and unknown application-borne threats 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, low latency, in-line deployment Page 48 2012 Palo Alto Networks. Proprietary and Confidential.

The Next Generation Firewall Not just a firewall An Integrated Enterprise Security Platform Also includes: - Application identification - User Identification - SSL decryption Quality of Service Firewall VPN Threat Prevention IPS/APT Web/URL

Granular Enablement of Applications. Allow for specific users Allow only certain functions Allow & shape (QoS) Allow & scan for confidential data Allow & scan for threats Allow & limit access time Allow All Block All

Prevention Against Unknown (Zero Day) Threats 3 SIGNATURE CREATION Anti-malware signatures DNS intelligence Malware URL database Anti-C2 signatures 2 Command-and-control Staged malware downloads Host ID and data exfil SANDBOX TESTING WildFire TM Soak sites, sinkholes, 3 rd party sources 4 Global intelligence and protection delivered to all users 1 SUSPICIOUS TRAFFIC Palo Alto Networks Customers

Virtual Firewall - Safely Enabling Private Clouds Segment traffic in virtual data center (Vmware ESXi) Visibility into east-west traffic Track adds, moves and changes (vmotion) Integrate into automated workflows (vcenter, etc) VLAN VLAN Page 52 2011 Palo Alto Networks. Proprietary and Confidential.

Pillars of An Effective Network Security Traffic Visibility Segmentation Threat Prevention Know what s on your network apps, users, devices, content Identify what shouldn t be on your network Centralize management: policies, logging and reporting Establish zones of similar security levels Control security policies based on apps, users, content Tier administrative tasks for better flexibility Stop known threats w/ native IPS, URL filtering Analyze all unknown/unidentified traffic Stop zero-day malware w/ sandbox analysis 53 2013, Palo Alto Networks. Confidential and Proprietary.

Security Best Practices Zero Trust Architecture WAN / Internet WildFire Analysis Center Branch IPSec VPN Perimeter Global Protect VPN Branch Cyvera Headquarters DR Central Management Data Center Mobile Users Hotels Wi-fi Home Page 54 2011 Palo Alto Networks. Proprietary and Confidential.

Upcoming Event Ultimate Test Drive Nov 18 th Baltimore, MD Page 55 2011 Palo Alto Networks. Proprietary and Confidential.

What you can do Today: Learn Which Apps Are On Your Network? Which User is Accessing What? Proof of Concept (PoC) - Our firewall in tap more or inline (w/o control) in your network - Gain visibility into Apps/Users/Content/Threats/URL/Countries - Application Visibility Report (AVR) provided with PoC PoC findings at enterprise accounts - Only 25% of port 80 traffic was from legitimate apps; the other 75% was not from authorized apps - Majority of bandwidth consumed by unauthorized apps: Skype, games, P2P - Inadequate segmentation to protect critical data Our security platform provides the visibility you need to improve your network security immediately 56 2013, Palo Alto Networks. Confidential and Proprietary.

Summary Identify and Control Applications - Visibility of applications, regardless of port, protocol, encryption, or evasive tactic - Fine-grained control over applications (allow, deny, limit, scan, shape) - Identify users regardless of ip address, location or device Prevent Threats - Stop a variety of known threats exploits (by vulnerability), viruses, spyware - Detect and stop unknown threats with WildFire - Integrated solution versus point products - Provide security throughout the network (trusted/untrusted zones) Simplify Security Infrastructure - Put the firewall at the center of the network security infrastructure - Reduce complexity in architecture and operations Page 57 2012 Palo Alto Networks. Proprietary and Confidential.

Thank You Thank you Page 58 2010 Palo Alto Networks. Proprietary and Confidential.