We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJolie Horsley
Modified over 2 years ago
Palo Alto Networks Jay Flanyak Channel Business Manager
Palo Alto Networks at a glance Corporate highlights Founded in 2005; first customer shipment in 2007 Safely enabling applications and preventing cyber threats Able to address all enterprise cybersecurity needs Exceptional ability to support global customers Experienced team of 1,300+ employees Q1FY14: $128.2M revenue; 14,500 customers Jul-11Jul-12 Revenues Enterprise customers $MM FYE July Jul-13 2 | ©2013, Palo Alto Networks. Confidential and Proprietary.
Our Market Opportunity
Magic Quadrant for Enterprise Network Firewalls Palo Alto Networks continues to both drive competitors to react in the firewall market and to move the overall firewall market forward. It is assessed as a Leader, mostly because of its NGFW design, direction of the market along the NGFW path, consistent displacement of competitors, rapidly increasing revenue and market share, and market disruption that forces competitors in all quadrants to react. Gartner, February | ©2012 Palo Alto Networks. Confidential and Proprietary.
Many Third Parties Reach Same Conclusion Gartner Enterprise Network Firewall Magic Quadrant - Palo Alto Networks leading the market Forrester IPS Market Overview - Strong IPS solution; demonstrates effective consolidation NetworkWorld Test - Most stringent NGFW test to date; validated sustained performance and key differences NSS Tests - IPS: Palo Alto Networks NGFW tested against competitors standalone IPS devices; NSS Recommended - Firewall: traditional port-based firewall test; Palo Alto Networks most efficient by a wide margin; NSS Recommended - NGFW: Palo Alto Networks best combination of protection, performance, and value; NSS Recommended (1 of only 3) 5 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Applications Get Through the Firewall 6 | ©2012, Palo Alto Networks. Confidential and Proprietary. Network security policy is enforced at the firewall Sees all traffic Defines boundary Enables access Traditional firewalls dont work any more
Applications Get Through the Firewall: Threats 7 | ©2012, Palo Alto Networks. Confidential and Proprietary. Threats target applications Used as a threat vector Application specific exploits
Applications Get Through the Firewall: Exfiltration Applications provide exfiltration Threat communication Confidential data 8 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Applications Get Through the Firewall: Encryption What happens traffic is encrypted? SSL Proprietary encryption 9 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Technology Sprawl and Creep Arent the Answer Enterprise Network More stuff doesnt solve the problem Firewall helpers have limited view of traffic Complex and costly to buy and maintain Doesnt address application control challenges 10 | ©2012, Palo Alto Networks. Confidential and Proprietary. IM DLP IPS Proxy URL AV UTM Internet
The Answer? Make the Firewall Do Its Job 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify and control users regardless of IP address, location, or device 3. Protect against known and unknown application-borne threats 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, low latency, in-line deployment 11 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Zero-day discovery with WildFire 10Gbps advanced threat visibility and prevention on all traffic, all ports (web, , SMB, etc.) Malware run in the cloud with open internet access to discover C2 protocols, domains, URLs and staged malware downloads Malware, DNS, URL, and C2 signatures automatically created based on WildFire intelligence and delivered to customers globally Stream-based malware engine performs true in- line enforcement On-premises WildFire appliance available for additional data privacy 12 | ©2012, Palo Alto Networks. Confidential and Proprietary. WildFire TM WildFire Appliance (optional) Anti-malware signatures DNS intelligence Malware URL database Anti-C2 signatures Soak sites, sinkholes, 3 rd party sources WildFire Users Global intelligence and protection delivered to all users Command-and-control Staged malware downloads Host ID and data exfil
Enabling Applications, Users and Content 13 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Enabling Applications, Users and Content Applications: Safe enablement begins with application classification by App-ID. Users: Tying users and devices, regardless of location, to applications with User-ID and GlobalProtect. Content: Scanning content and protecting against all threats – both known and unknown; with Content-ID and WildFire. 14 | ©2012, Palo Alto Networks. Confidential and Proprietary.
15 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Palo Alto Networks Product Overview Data Connectors March 7, 2013.
1 | © 2016, Palo Alto Networks. Confidential and Proprietary. P ALO A LTO N ETWORKS - N EXT G ENERATION S ECURITY P LATFORM Mikko Kuljukka Janne Volotinen.
What Did You Do At School Today Junior? Ethan West – Palo Alto Networks Systems Engineer.
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Next Generation FWs Against Modern Malware and Threads Hakan Unsal – Technical Security Consultant Tunc Cokkeser – Regional Sales Manager.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
NEXT GENERATION FIREWALLS Why NGFWs are Next-Generation FWs?
Dynamic Computing & Dynamic Threats Requires Dynamic Security.
What Are We Missing? Practical Use of the Next-Generation Firewall: Controlling Modern Malware and Threats Jason Wessel – Solutions Architect.
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Application Usage and Risk Report 7 th Edition, May 2011.
“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Breaking the Lifecycle of the Modern Threat Santiago Polo Sr. Systems Engineer Palo Alto Networks, Inc.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Expose The Underground Advanced Persistent Threats Jeff Baker.
Modern Malware Mixer. Jul-10Jul-11 Palo Alto Networks at a Glance Corporate Highlights Disruptive Network Security Platform Safely Enabling Applications.
Copyright © 2012 Accenture & Symantec. All rights reserved. This Sales Accelerator presentation is intended to provide sales teams fast facts on solutions.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
True Unified Threat Management Fortigate Technology Positioning.
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 1 FireEye Overview Nathan Labadie Systems Engineer, US-Central FireEye.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Juniper Networks CONFIDENTIAL 1 MIGRATION FROM SCREENOS TO JUNOS BASED FIREWALL PRESENTER NAME JULY 2014.
Next Generation Network Security Carlos Heller System Engineering.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Security as an Enabler for Data Centers and Cloud Networks Adam Geller Vice President, Product Management July 16 th, 2013.
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the.
1 Effective, secure and reliable hosted security and continuity solution.
Palo Alto Networks Overview March 2012 Data Connectors Micah Richardson, Account Manager.
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
How to protect your Virtual Datacenter Michiel van den Bos.
| © 2013 Axway | All rights reserved. 1 Govern the Flow of Data: Moving from Chaos to Control Steve Jordan Director, Industry Marketing.
Barracuda Networks Steve Scheidegger Commercial Account Manager
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
1 | © 2012 V-Key.com – Proprietary and Confidential Bugatti Veyron Super SportBugatti Veyron Super Sport: 267 mph (429 km/h), 0-60 in 2.4 secs.
CIO Perspectives on Security Marcos Alves Regional Sales Manager Protegendo seu Ambiente em tempo de Ameaças modernas.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Lisa Farmer, Cedo Vicente, Eric Ahlm 09/16/08 MULTI-LAYER DEFENSE. BEST-OF-BREED OPTIONS. Messaging Security.
Palo Alto Networks SLO WUG NG Silvester Drobnič, CHS d.o.o.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Ultimate Test Drive A Partner Led Program. The Ultimate Palo Alto Networks Experience 2 | ©2014, Palo Alto Networks. Confidential and Proprietary. The.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
© 2017 SlidePlayer.com Inc. All rights reserved.