SlideShare uma empresa Scribd logo
1 de 16
Next generation Firewalls from Palo
Alto
              VFM Systems & Services (P) Ltd.
About Palo Alto Networks



• Palo Alto Networks is the Network Security Company
• World-class team with strong security and networking experience
    - Founded in 2005 by security visionary Nir Zuk
    - Top-tier investors

• Builds next-generation firewalls that identify / control 1100+ applications
    - Restores the firewall as the core of the enterprise network security
      infrastructure
    - Innovations: App-ID™, User-ID™, Content-ID™

• Global footprint: 2,200+ customers in 50+ countries, 24/7 support
Applications Have Changed; Firewalls Have Not

 The gateway at the trust
 border is the right place to
 enforce policy control
 • Sees all traffic
 • Defines trust boundary




                                        BUT…applications have changed
                                        • Ports ≠ Applications
                                        • IP Addresses ≠ Users
                                        • Packets ≠ Content

          Need to restore visibility and control in the firewall
Applications Carry Risk

 Applications can be “threats”              Applications carry threats
    • P2P file sharing, tunneling               • SANS Top 20 Threats – majority are
      applications, anonymizers,                  application-level threats
      media/video




Applications & application-level threats result in major breaches – Pfizer, VA, US Army
Enterprise 2.0 Applications and Risks Widespread

 Palo Alto Networks’ latest Application Usage & Risk Report
   highlights actual behavior of 1M+ users in 723 organizations
    -   Enterprise 2.0 applications continue to rise for both personal and       Top 5 Applications
        business use.                                                           That Can Hop Ports
    -   Tunneling and port hopping are common
                                                                               100%
    -   Bottom line: all had firewalls, most had IPS, proxies, & URL
        filtering – but none of these organizations could control what          80%
        applications ran on their networks
                                                                                60%
           Frequency of Enterprise 2.0 Applications
            96%     93%      92%                                                40%
   100%                              79%     85%      79%
    80%
    60%                                                       47%               20%
    40%
    20%                                                                  12%     0%
     0%
Technology Sprawl & Creep Are Not The Answer




                                                      Internet




  “More stuff” doesn’t solve the problem
  Firewall “helpers” have limited view of traffic
  Complex and costly to buy and maintain
 • Putting all of this in the same box is just slow
The Right Answer: Make the Firewall Do Its Job



  New Requirements for the Firewall


  1. Identify applications regardless of port,
     protocol, evasive tactic or SSL

  2. Identify users regardless of IP address


  3. Protect in real-time against threats
     embedded across applications

  4. Fine-grained visibility and policy control
     over application access / functionality

  5. Multi-gigabit, in-line deployment with no
     performance degradation
Identification Technologies Transform the Firewall

   •App-ID™
   •Identify the application



   •User-ID™
   •Identify the user



   •Content-ID™
   •Scan the content
Single-Pass Parallel Processing™ (SP3) Architecture

                                        Single Pass
                                        • Operations once per
                                          packet
                                             -   Traffic classification (app
                                                 identification)
                                             -   User/group mapping
                                             -   Content scanning –
                                                 threats, URLs, confidential
                                                 data

                                        • One policy

                                        Parallel Processing
                                        • Function-specific parallel
                                          processing hardware
                                          engines
                                        • Separate data/control
                                          planes


                 Up to 20Gbps, Low Latency
Transforming The Perimeter and Datacenter




Perimeter                                                 Internet
                                                         Datacenter


                         Enterprise Datacenter
  Page |   Same Next-Generation Firewall, Different Benefits…
Comprehensive View of Applications, Users & Content

                                                                      Application Command
                                                                       Center (ACC)
                                                                                View
                                                                                 applications, URLs, thr
                                                                                 eats, data filtering
                                                                                 activity
                                                                      Add/remove filters to
                                                                       achieve desired result




Filter on Facebook-base   Filter on Facebook-base      Remove Facebook to
                                and user cookPage 11 | expand view of cook
Enables Visibility Into Applications, Users, and Content
PAN-OS Core Firewall Features

                                                                                                          PA-5060
  Visibility and control of applications, users and content
              complement core firewall features
                                                                                                          PA-5050


Strong networking foundation                          Zone-based architecture
                                                                                                          PA-5020
      Dynamic routing (BGP, OSPF, RIPv2)                    All interfaces assigned to security
      Tap mode – connect to SPAN port                        zones for policy enforcement
      Virtual wire (“Layer 1”) for true transparent
       in-line deployment
                                                       High Availability
                                                             Active/active, active/passive               PA-4060
      L2/L3 switching foundation
      Policy-based forwarding                               Configuration and session
                                                              synchronization
VPN                                                         Path, link, and HA monitoring               PA-4050
   

   
       Site-to-site IPSec VPN
       SSL VPN
                                                       Virtual Systems
                                                              Establish multiple virtual firewalls in a
QoS traffic shaping
                                                          
                                                              single device (PA-5000, PA-4000, and        PA-4020
      Max/guaranteed and priority                            PA-2000 Series)
      By user, app, interface, zone, & more           Simple, flexible management
      Real-time bandwidth monitor                           CLI, Web, Panorama, SNMP, Syslog            PA-2050


                                                                                                          PA-2020


                                                                                                          PA-500
Next-Generation Firewalls Are Network Security
Summary

  Identify and Control Applications
       Visibility of 1200+ applications, regardless of
        port, protocol, encryption, or evasive tactic
       Fine-grained control over applications (allow, deny, limit, scan, shape)
       Addresses the key deficiencies of legacy firewall infrastructure
  Prevent Threats
       Stop a variety of threats – exploits (by vulnerability), viruses, spyware
       Stop leaks of confidential data (e.g., credit card #, social security #)
       Stream-based engine ensures high performance
       Enforce acceptable use policies on users for general web site browsing
  Simplify Security Infrastructure
       Put the firewall at the center of the network security infrastructure
       Reduce complexity in architecture and operations
For your attention and time.
Questions?
Write to : solutions@vfmindia.biz
Response Guaranteed

Mais conteúdo relacionado

Mais procurados

Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
 
Vfm corporate presentation v1
Vfm corporate presentation v1Vfm corporate presentation v1
Vfm corporate presentation v1vfmindia
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...F5 Networks
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
S5068 Presentation Live
S5068 Presentation LiveS5068 Presentation Live
S5068 Presentation LiveInsight24
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayCisco Canada
 

Mais procurados (20)

Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
Vfm corporate presentation v1
Vfm corporate presentation v1Vfm corporate presentation v1
Vfm corporate presentation v1
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
S5068 Presentation Live
S5068 Presentation LiveS5068 Presentation Live
S5068 Presentation Live
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 

Destaque

Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from cachingvfmindia
 
3 Nir Zuk Modern Malware Jun 2011
3 Nir Zuk Modern Malware Jun 20113 Nir Zuk Modern Malware Jun 2011
3 Nir Zuk Modern Malware Jun 2011davidmaciaalcaide
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate wayvfmindia
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfmvfmindia
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate wayvfmindia
 
Vfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkVfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkvfmindia
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wirelessvfmindia
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
 
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networksdtimal
 
Vsphere 4-partner-training180
Vsphere 4-partner-training180Vsphere 4-partner-training180
Vsphere 4-partner-training180Suresh Kumar
 
Vfm website-projects
Vfm website-projectsVfm website-projects
Vfm website-projectsvfmindia
 
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...Netgear Italia
 
Concepts: Management VLAN
Concepts: Management VLANConcepts: Management VLAN
Concepts: Management VLANJelmer de Reus
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configurationAlberto Rivai
 
TechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerTechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerRobb Boyd
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-idAlberto Rivai
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewallpillardata
 

Destaque (20)

Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from caching
 
3 Nir Zuk Modern Malware Jun 2011
3 Nir Zuk Modern Malware Jun 20113 Nir Zuk Modern Malware Jun 2011
3 Nir Zuk Modern Malware Jun 2011
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate way
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
 
Vfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkVfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi framework
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
PAN Platform Summary
PAN Platform SummaryPAN Platform Summary
PAN Platform Summary
 
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto NetworksModern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networks
 
NATE-Central-Log
NATE-Central-LogNATE-Central-Log
NATE-Central-Log
 
FlexPod_for_HondaTH
FlexPod_for_HondaTHFlexPod_for_HondaTH
FlexPod_for_HondaTH
 
Vsphere 4-partner-training180
Vsphere 4-partner-training180Vsphere 4-partner-training180
Vsphere 4-partner-training180
 
Vfm website-projects
Vfm website-projectsVfm website-projects
Vfm website-projects
 
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...Webinar NETGEAR -  ProsSafe Switch gestibili e supporto della configurazione ...
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
 
Concepts: Management VLAN
Concepts: Management VLANConcepts: Management VLAN
Concepts: Management VLAN
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
 
TechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data BrokerTechWiseTV Workshop: Nexus Data Broker
TechWiseTV Workshop: Nexus Data Broker
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewall
 

Semelhante a Vfm palo alto next generation firewall

Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Pro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsPro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsBelsoft
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Companydtimal
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...BAKOTECH
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOpenStorageSummit
 
DSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF TechDSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF TechAndris Soroka
 
Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablementresponsedatacomms
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceGen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADFF5 Networks
 
Vfm packetshaper presentation
Vfm packetshaper presentationVfm packetshaper presentation
Vfm packetshaper presentationvfmindia
 
Magpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering OfferingMagpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering Offeringimpodgirl
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 

Semelhante a Vfm palo alto next generation firewall (20)

Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Pro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsPro& Contra Next Generation Firewalls
Pro& Contra Next Generation Firewalls
 
PAN PA500
PAN PA500PAN PA500
PAN PA500
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
PAN PA2000 series
PAN PA2000 seriesPAN PA2000 series
PAN PA2000 series
 
PAN PA2000 series
PAN PA2000 seriesPAN PA2000 series
PAN PA2000 series
 
PAN PA4000
PAN PA4000PAN PA4000
PAN PA4000
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
DSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF TechDSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF Tech
 
Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablement
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
Vfm packetshaper presentation
Vfm packetshaper presentationVfm packetshaper presentation
Vfm packetshaper presentation
 
Magpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering OfferingMagpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering Offering
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 

Vfm palo alto next generation firewall

  • 1. Next generation Firewalls from Palo Alto VFM Systems & Services (P) Ltd.
  • 2. About Palo Alto Networks • Palo Alto Networks is the Network Security Company • World-class team with strong security and networking experience - Founded in 2005 by security visionary Nir Zuk - Top-tier investors • Builds next-generation firewalls that identify / control 1100+ applications - Restores the firewall as the core of the enterprise network security infrastructure - Innovations: App-ID™, User-ID™, Content-ID™ • Global footprint: 2,200+ customers in 50+ countries, 24/7 support
  • 3. Applications Have Changed; Firewalls Have Not The gateway at the trust border is the right place to enforce policy control • Sees all traffic • Defines trust boundary BUT…applications have changed • Ports ≠ Applications • IP Addresses ≠ Users • Packets ≠ Content Need to restore visibility and control in the firewall
  • 4. Applications Carry Risk Applications can be “threats” Applications carry threats • P2P file sharing, tunneling • SANS Top 20 Threats – majority are applications, anonymizers, application-level threats media/video Applications & application-level threats result in major breaches – Pfizer, VA, US Army
  • 5. Enterprise 2.0 Applications and Risks Widespread Palo Alto Networks’ latest Application Usage & Risk Report highlights actual behavior of 1M+ users in 723 organizations - Enterprise 2.0 applications continue to rise for both personal and Top 5 Applications business use. That Can Hop Ports - Tunneling and port hopping are common 100% - Bottom line: all had firewalls, most had IPS, proxies, & URL filtering – but none of these organizations could control what 80% applications ran on their networks 60% Frequency of Enterprise 2.0 Applications 96% 93% 92% 40% 100% 79% 85% 79% 80% 60% 47% 20% 40% 20% 12% 0% 0%
  • 6. Technology Sprawl & Creep Are Not The Answer Internet  “More stuff” doesn’t solve the problem  Firewall “helpers” have limited view of traffic  Complex and costly to buy and maintain • Putting all of this in the same box is just slow
  • 7. The Right Answer: Make the Firewall Do Its Job New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Protect in real-time against threats embedded across applications 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, in-line deployment with no performance degradation
  • 8. Identification Technologies Transform the Firewall •App-ID™ •Identify the application •User-ID™ •Identify the user •Content-ID™ •Scan the content
  • 9. Single-Pass Parallel Processing™ (SP3) Architecture Single Pass • Operations once per packet - Traffic classification (app identification) - User/group mapping - Content scanning – threats, URLs, confidential data • One policy Parallel Processing • Function-specific parallel processing hardware engines • Separate data/control planes Up to 20Gbps, Low Latency
  • 10. Transforming The Perimeter and Datacenter Perimeter Internet Datacenter Enterprise Datacenter Page | Same Next-Generation Firewall, Different Benefits…
  • 11. Comprehensive View of Applications, Users & Content  Application Command Center (ACC)  View applications, URLs, thr eats, data filtering activity  Add/remove filters to achieve desired result Filter on Facebook-base Filter on Facebook-base Remove Facebook to and user cookPage 11 | expand view of cook
  • 12. Enables Visibility Into Applications, Users, and Content
  • 13. PAN-OS Core Firewall Features PA-5060 Visibility and control of applications, users and content complement core firewall features PA-5050 Strong networking foundation Zone-based architecture PA-5020  Dynamic routing (BGP, OSPF, RIPv2)  All interfaces assigned to security  Tap mode – connect to SPAN port zones for policy enforcement  Virtual wire (“Layer 1”) for true transparent in-line deployment High Availability  Active/active, active/passive PA-4060  L2/L3 switching foundation  Policy-based forwarding  Configuration and session synchronization VPN  Path, link, and HA monitoring PA-4050   Site-to-site IPSec VPN SSL VPN Virtual Systems Establish multiple virtual firewalls in a QoS traffic shaping  single device (PA-5000, PA-4000, and PA-4020  Max/guaranteed and priority PA-2000 Series)  By user, app, interface, zone, & more Simple, flexible management  Real-time bandwidth monitor  CLI, Web, Panorama, SNMP, Syslog PA-2050 PA-2020 PA-500
  • 14. Next-Generation Firewalls Are Network Security
  • 15. Summary  Identify and Control Applications  Visibility of 1200+ applications, regardless of port, protocol, encryption, or evasive tactic  Fine-grained control over applications (allow, deny, limit, scan, shape)  Addresses the key deficiencies of legacy firewall infrastructure  Prevent Threats  Stop a variety of threats – exploits (by vulnerability), viruses, spyware  Stop leaks of confidential data (e.g., credit card #, social security #)  Stream-based engine ensures high performance  Enforce acceptable use policies on users for general web site browsing  Simplify Security Infrastructure  Put the firewall at the center of the network security infrastructure  Reduce complexity in architecture and operations
  • 16. For your attention and time. Questions? Write to : solutions@vfmindia.biz Response Guaranteed

Notas do Editor

  1. Google Docs and Calendar resource consumption* is up significantly Google Talk Gadget shot up by 56% while Google Talk dropped 76% Bandwidth consumed by Facebook, per organization, is a staggering 4.9 GBBandwidth consumed by Sharepoint and LinkedIn is up 14% and 48% respectively67% of the applications use port 80, port 443, or hop portsMany (190) are client–server 177 can tunnel other applications, a feature no longer reserved for SSL or SSH
  2. Perimeter:Application visibility and controlThreat prevention for allowed application trafficUnified policy based on applications, users, and contentDatacenterHigh-performance firewalling and threat prevention; simple deploymentSegmentation by application and userIdentification/control of rogue applications