Palo Alto Networks SLO WUG NG 15.2.2012 Silvester Drobnič, CHS d.o.o.

Slides:



Advertisements
Similar presentations
Application Usage and Risk Report 7 th Edition, May 2011.
Advertisements

Next Generation FWs Against Modern Malware and Threads Hakan Unsal – Technical Security Consultant Tunc Cokkeser – Regional Sales Manager.
Palo Alto Networks Jay Flanyak Channel Business Manager
Palo Alto Networks Overview
Enabling business beyond the corporate network.
Palo Alto Networks Product Overview
Security as an Enabler for Data Centers and Cloud Networks Adam Geller Vice President, Product Management July 16 th, 2013.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Next Generation Network Security Carlos Heller System Engineering.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Palo Alto Networks Solution Overview May 2010 Denis Pechnov Sales, EMEA.
Blue Coat: Your partner to sales success Nigel Hawthorn VP EMEA Marketing
© 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Next Generation Firewalls Nir Zuk Founder and CTO.
Citrix Partner Update The Citrix Delivery Centre.
Palo Alto Networks Customer Presentation
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.
Meet the Next Generation Firewall (NGFW)
Barracuda Networks Steve Scheidegger Commercial Account Manager
Palo Alto Networks Product Overview Karsten Dindorp, Computerlinks.
Next-Generation Firewall Palo Alto Networks. Page 2 | Applications Have Changed, firewalls have not The gateway at the trust border is the right place.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
How to protect your Virtual Datacenter Michiel van den Bos.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
© 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Visibility & Control – Identity, Application & Content Awareness.
1 MICHAEL BANIC VP ENTERPRISE MAKETING. THE NEW DATA CENTER NETWORK.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
What Did You Do At School Today Junior?
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
NEXT GENERATION FIREWALLS Why NGFWs are Next-Generation FWs?
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
Ultimate Test Drive A Partner Led Program. The Ultimate Palo Alto Networks Experience 2 | ©2014, Palo Alto Networks. Confidential and Proprietary. The.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
FUTURE OF NETWORKING SAJAN PAUL JUNIPER NETWORKS.
Network security Product Group 2 McAfee Network Security Platform.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING. 2 NEW ATTACK SURFACES DATACENTER CONSOLIDATIONNEW DEVICESBRANCH LOCATIONS.
About Palo Alto Networks
APPLICATION PERFORMANCE MANAGEMENT The Next Generation.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Palo Alto Networks - Next Generation Security Platform
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
Firewall requirements to secure IPv6 networks – finished playing! LANCom seminar, Maribor Ides Vanneuville, Palo Alto Networks – Next-Generation firewall.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Barracuda NG Firewall ™
Palo Alto Networks Certified Network Security Engineer
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Filtering Service
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Introducing ProxyClient
Firewalls Routers, Switches, Hubs VPNs
AT&T Firewall Battlecard
Presentation transcript:

Palo Alto Networks SLO WUG NG Silvester Drobnič, CHS d.o.o.

About Palo Alto Networks Palo Alto Networks is the Network Security Company World-class team with strong security and networking experience Founded in 2005, first customer July 2007, top-tier investors Builds next-generation firewalls that identify / control 1,300+ applications Restores the firewall as the core of enterprise network security infrastructure Innovations: App-ID™, User-ID™, Content-ID™ Global momentum: 5,300+ customers August 2011: Annual bookings run rate is over US$200 million*, cash-flow positive last five consecutive quarters

2011 Magic Quadrant for Enterprise Network Firewalls Source: Gartner

Gartner: Firewalls Are Not Commoditized Next-generation firewalls are evolving the enterprise network firewall market Running on general purpose server hardware won’t perform next-generation firewall features well for the enterprise Established vendors are milking their installed base – raising prices without delivering new features UTM is for SMB. SMB ≠ enterprise branch office.

Applications Have Changed – Firewalls Have Not The gateway at the trust border is the right place to enforce policy control - Sees all traffic - Defines trust boundary BUT…Applications Have Changed - Ports ≠ Applications - IP Addresses ≠ Users - Packets ≠ Content Problem: IT Can’t Safely Enable Internet Applications Leaving IT blind to apps, users & content Collaboration / Media SaaS Personal

New generation of addicted Internet users – smarter than you?

the attacker is not a bored geek

nation states and organized crime

New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Scan content in real-time for threats and sensitive data embedded across applications 4. Granular visibility and policy control over applications, users and content 5. Multi-gigabit, in-line deployment with no performance degradation Requirements – The Next Generation Firewall

Unique ID Technologies Transform the Firewall App-ID Identify the application User-ID Identify the user Content-ID Scan the content

Single-Pass Parallel Processing (SP3) Architecture Single Pass Single processes for: - Traffic classification (app identification) - User/group mapping - Content scanning – threats, URLs, confidential data One policy Parallel Processing Function-specific hardware engines Multi-core security processing Separate data/control planes Up to 20Gbps, Low Latency

NSS Labs test – PAN as IPS The highest IPS block rate in recent history (93.4%) 100% resistance to IPS evasion techniques Simple IPS configuration and tuning. Provided all the above while exceeding the datasheet performance metrics

PAN Hardware & Licenses Hardware Enota se izbira glede na zahtevano propustnost Možna je HA postavitev enot v A-P in A-A načinu Licence Support licenca je obvezna Opcijski licenci: - Thread licenca (IPS, AV, AS) - URL filtering Ostale licence: - Virtual Firewall - Global Protect POMEMBNO Ni omejitve na uporabnike Ni dodatnih licenc za VPN PA-500 PA-2020 PA-2050 PA-4020 PA-4050 PA-4060 PA-5060 PA-5050 PA-5020

Kako naprej Zahtevajte test PANa Po testu zahtevajte AVR poročilo V vmesnem času: - PAN AUR poročilo - Gartnerjeva NGF definicija - Gartnerjevo zadnje poročilo o požarnih pregradah - NSS Labs poročilo o PAN IPS zmogljivosti - PAN Research center na WEBu:

DEMO - Flexible Deployment Options Visibility Transparent In-Line Firewall Replacement Application, user and content visibility without inline deployment IPS with app visibility & control Consolidation of IPS & URL filtering Firewall replacement with app visibility & control Firewall + IPS Firewall + IPS + URL filtering

Research Center

Application Visibility and Risk Report Tells the budget holder what we are going to review Presents findings in clear, business oriented manner Introduces business risks associated with the application traffic

Kako naprej Distributer: CHS d.o.o. - Kontaktna oseba: Silvester Drobnič - - gsm: Dokumenti na ftp://ftp2.chs.si/PAN/NG/ V vmesnem času: - PAN AUR poročilo - Gartnerjeva NGF definicija - Gartnerjevo zadnje poročilo o požarnih pregradah - NSS Labs poročilo o PAN IPS zmogljivosti - PAN Research center na WEBu - Ocenite CAPEX in OPEX vaše trenutne opreme - Ali veste kaj spušča vaš obstoječi FW v omrežje