Presentation is loading. Please wait.

Presentation is loading. Please wait.

Palo Alto Networks Jay Flanyak Channel Business Manager

Similar presentations


Presentation on theme: "Palo Alto Networks Jay Flanyak Channel Business Manager"— Presentation transcript:

1 Palo Alto Networks Jay Flanyak Channel Business Manager

2 Palo Alto Networks at a glance Corporate highlights Founded in 2005; first customer shipment in 2007 Safely enabling applications and preventing cyber threats Able to address all enterprise cybersecurity needs Exceptional ability to support global customers Experienced team of 1,300+ employees Q1FY14: $128.2M revenue; 14,500 customers Jul-11Jul-12 Revenues Enterprise customers $MM FYE July Jul-13 2 | ©2013, Palo Alto Networks. Confidential and Proprietary.

3 Our Market Opportunity

4 Magic Quadrant for Enterprise Network Firewalls Palo Alto Networks continues to both drive competitors to react in the firewall market and to move the overall firewall market forward. It is assessed as a Leader, mostly because of its NGFW design, direction of the market along the NGFW path, consistent displacement of competitors, rapidly increasing revenue and market share, and market disruption that forces competitors in all quadrants to react. Gartner, February | ©2012 Palo Alto Networks. Confidential and Proprietary.

5 Many Third Parties Reach Same Conclusion Gartner Enterprise Network Firewall Magic Quadrant - Palo Alto Networks leading the market Forrester IPS Market Overview - Strong IPS solution; demonstrates effective consolidation NetworkWorld Test - Most stringent NGFW test to date; validated sustained performance and key differences NSS Tests - IPS: Palo Alto Networks NGFW tested against competitors standalone IPS devices; NSS Recommended - Firewall: traditional port-based firewall test; Palo Alto Networks most efficient by a wide margin; NSS Recommended - NGFW: Palo Alto Networks best combination of protection, performance, and value; NSS Recommended (1 of only 3) 5 | ©2012, Palo Alto Networks. Confidential and Proprietary.

6 Applications Get Through the Firewall 6 | ©2012, Palo Alto Networks. Confidential and Proprietary. Network security policy is enforced at the firewall Sees all traffic Defines boundary Enables access Traditional firewalls dont work any more

7 Applications Get Through the Firewall: Threats 7 | ©2012, Palo Alto Networks. Confidential and Proprietary. Threats target applications Used as a threat vector Application specific exploits

8 Applications Get Through the Firewall: Exfiltration Applications provide exfiltration Threat communication Confidential data 8 | ©2012, Palo Alto Networks. Confidential and Proprietary.

9 Applications Get Through the Firewall: Encryption What happens traffic is encrypted? SSL Proprietary encryption 9 | ©2012, Palo Alto Networks. Confidential and Proprietary.

10 Technology Sprawl and Creep Arent the Answer Enterprise Network More stuff doesnt solve the problem Firewall helpers have limited view of traffic Complex and costly to buy and maintain Doesnt address application control challenges 10 | ©2012, Palo Alto Networks. Confidential and Proprietary. IM DLP IPS Proxy URL AV UTM Internet

11 The Answer? Make the Firewall Do Its Job 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify and control users regardless of IP address, location, or device 3. Protect against known and unknown application-borne threats 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, low latency, in-line deployment 11 | ©2012, Palo Alto Networks. Confidential and Proprietary.

12 Zero-day discovery with WildFire 10Gbps advanced threat visibility and prevention on all traffic, all ports (web, , SMB, etc.) Malware run in the cloud with open internet access to discover C2 protocols, domains, URLs and staged malware downloads Malware, DNS, URL, and C2 signatures automatically created based on WildFire intelligence and delivered to customers globally Stream-based malware engine performs true in- line enforcement On-premises WildFire appliance available for additional data privacy 12 | ©2012, Palo Alto Networks. Confidential and Proprietary. WildFire TM WildFire Appliance (optional) Anti-malware signatures DNS intelligence Malware URL database Anti-C2 signatures Soak sites, sinkholes, 3 rd party sources WildFire Users Global intelligence and protection delivered to all users Command-and-control Staged malware downloads Host ID and data exfil

13 Enabling Applications, Users and Content 13 | ©2012, Palo Alto Networks. Confidential and Proprietary.

14 Enabling Applications, Users and Content Applications: Safe enablement begins with application classification by App-ID. Users: Tying users and devices, regardless of location, to applications with User-ID and GlobalProtect. Content: Scanning content and protecting against all threats – both known and unknown; with Content-ID and WildFire. 14 | ©2012, Palo Alto Networks. Confidential and Proprietary.

15 15 | ©2012, Palo Alto Networks. Confidential and Proprietary.


Download ppt "Palo Alto Networks Jay Flanyak Channel Business Manager"

Similar presentations


Ads by Google