Palo Alto Networks Solution Overview May 2010 Denis Pechnov Sales, EMEA.

Slides:



Advertisements
Similar presentations
Next Generation FWs Against Modern Malware and Threads Hakan Unsal – Technical Security Consultant Tunc Cokkeser – Regional Sales Manager.
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Next Generation Network Security Carlos Heller System Engineering.
Guide to Network Defense and Countermeasures Second Edition
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
Module 5: Configuring Access for Remote Clients and Networks.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Chapter 12 Network Security.
MSIT 458: Information Security & Assurance By Curtis Pethley.
© 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Next Generation Firewalls Nir Zuk Founder and CTO.
Palo Alto Networks Customer Presentation
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Palo Alto Networks Product Overview Karsten Dindorp, Computerlinks.
Next-Generation Firewall Palo Alto Networks. Page 2 | Applications Have Changed, firewalls have not The gateway at the trust border is the right place.
Palo Alto Networks security solution - protection against new cyber-criminal threats focused on client-side vulnerabilities Mariusz Stawowski, Ph.D., CISSP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Course 201 – Administration, Content Inspection and SSL VPN
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
© 2007 Palo Alto Networks. Proprietary and Confidential Page 1 | Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov.
Barracuda Load Balancer Server Availability and Scalability.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
What Did You Do At School Today Junior?
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
NEXT GENERATION FIREWALLS Why NGFWs are Next-Generation FWs?
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Chapter 5: Implementing Intrusion Prevention
Network security Product Group 2 McAfee Network Security Platform.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
High Performance Web Accelerator WEB INSIGHT AG Product Introduction March – 2007 MONITORAPP Co.,Ltd.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
About Palo Alto Networks
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Palo Alto Networks - Next Generation Security Platform
Palo Alto Networks SLO WUG NG Silvester Drobnič, CHS d.o.o.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Secure WAN Acceleration Michael Favinsky Senior Systems Engineer
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Firewall requirements to secure IPv6 networks – finished playing! LANCom seminar, Maribor Ides Vanneuville, Palo Alto Networks – Next-Generation firewall.
Palo Alto Networks Certified Network Security Engineer
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Filtering Service
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Securing the Network Perimeter with ISA 2004
Basic Policy Overview Palo Alto.
Threat Management Gateway
Prevent Costly Data Leaks from Microsoft Office 365
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Presentation transcript:

Palo Alto Networks Solution Overview May 2010 Denis Pechnov Sales, EMEA

About Palo Alto Networks Founded in 2005 by security visionaries and engineers from NetScreen, Juniper Networks, McAfee, Blue Coat, Cisco, … Build innovative Next Generation Firewalls that control more than 900 applications, users & data carried by them Backed by $65 Million in venture capital from leading Silicon Valley investors including Sequoia Capital, Greylock Partners, Globespan Capital Partners, … Global footprint with over 1000 customers, we are passionate about customer satisfaction and deliver 24/7 global support and have presence in 50+ countries Independent recognition from analysts like Gartner © 2009 Palo Alto Networks. Proprietary and Confidential. Page 2 |

Why is there a need for a NGFW? The Social Enterprise 2.0 © 2009 Palo Alto Networks. Proprietary and Confidential. Page 3 |

Enterprise 2.0 Applications Take Many Forms

5 Things You Need To Know About Enterprise Driven by new generation of addicted Internet users – smarter than you? 2. Full, unrestricted access to everything on the Internet is a right 3. They’re creating a giant social system - collaboration, group knowledge 4. Not waiting around for IT support or endorsement – IT is irrelevant 5. Result - a Social Enterprise full of potential risks … and rewards Rewards Risks Internet Enterprise Work Life Home Life

What the 2010 User’s Expectation

How Will You Respond To This Challenge? How can you regain control of enterprise 2.0? What value do these applications provide to your business? What is your organization’s risk tolerance for these applications? How can you “safely enable” the right applications? Where do you start?

Start by Understanding What’s Really Happening Application Usage and Risk Report - Findings  347 large enterprises worldwide  750+ different Internet applications  Employees have created Enterprise Rewards  Enterprises are embracing social networking apps  Proven to deliver measurable value to business - Risks  Incoming threats are increasing  Potential for data leakage is increasing  Existing security infrastructure ineffective Page 8 |

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 9 | © 2009 Palo Alto Networks. Proprietary and Confidential. Page 9 | Application Control Efforts are Failing Palo Alto Networks’ Application Usage & Risk Report highlights actual behavior of 900,000 users across more than 60 organizations - Applications are built for accessibility - Tools that enable users to circumvent security are common - File sharing usage – P2P and browser-based – is rampant - Controls are failing – All had Firewalls, many had IPS, proxies, & URL filtering Applications carry risks: business continuity, data loss, compliance, productivity, and operations costs

What’s the Problem? The Application Usage & Risk Report from Palo Alto Networks highlights actual behavior of millions of users across hunderds of organizations: - Applications are designed for accessibility.  More than half (57%) of the 700+ applications found can bypass security infrastructure – hopping from port to port, using port 80 or port Applications that enable users to circumvent security controls are common.  Proxies Bypass Tools that are typically not endorsed by corporate IT (CGIProxy, PHProxy, Hopster) and remote desktop access applications (LogMeIn!, RDP, PCAnywhere) were found 81% and 95% of time, respectively. Encrypted tunnel applications such as SSH, TOR, GPass, and Gbridge were also found. - File sharing usage is rampant.  P2P was found 92% of the time, with BitTorrent and Gnutella as the most common of 21 variants found. Browser-based file sharing was found 76% of the time with YouSendit! and MediaFire among the most common of the 22 variants. Enterprises are spending heavily to protect their networks – yet they cannot control the applications on the network. - Collectively, enterprises spend more than $6 billion annually on firewall, IPS, proxy and URL filtering products. The analysis showed that 100% of the organizations had firewalls and 87% also had one or more of these firewall helpers (a proxy, an IPS, URL filtering) – yet they were unable to exercise control over the application traffic traversing the network. Business Risks: Productivity, Compliance, Operational Cost, Business Continuity and Data Loss © 2009 Palo Alto Networks. Proprietary and Confidential. Page 10 | Enterprise End Users Do What They Want!

Seeing is Believing © 2009 Palo Alto Networks. Proprietary and Confidential. Page 11 | Request a free 30- day evaluation Request a free Application Visibility and Risk report Take back control of your social enterprise

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 12 | The Cause: Applications Have Changed – Firewalls nor Firewall Helpers Have Need to Restore Visibility and Control in the Firewall Firewalls should see and control applications, users, and threats but they only show you ports, protocols, and IP addresses –all meaningless!

Internet Sprawl Is Not The Answer “More stuff” doesn’t solve the problem Firewall “helpers” have limited view of traffic Complex and costly to buy and maintain © 2009 Palo Alto Networks. Proprietary and Confidential. Page 13 | Putting all of this in the same box is just slow

SO WHAT IS THE SOLUTION? © 2009 Palo Alto Networks. Proprietary and Confidential. Page 14 |

Gartner, Forrester, … Forrester - If you do not have IPS you deserve to be hacked. Gartner - John Pescatore and Grey Young publish a note on October 12 th Key Findings  The stateful protocol filtering and limited application awareness offered by first generation firewalls are not effective in dealing with current and emerging threats.  Next-generation firewalls (NGFWs) are emerging that can detect application- specific attacks and enforce application-specific granular security policy, both inbound and outbound. - Recommendations  If you have not yet deployed network intrusion prevention, require NGFW capabilities of all vendors at your next firewall refresh point.  If you have deployed both network firewalls and network intrusion prevention, synchronize the refresh cycle for both technologies and migrate to NGFW capabilities.

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 16 | Palo Alto Networks Exceeds NGFW Requirements Application Awareness and Full Stack Visibility App-ID Identifies and controls 900+ applications Integrated Rather Than Co-Located IPS Content-ID includes full IPS, without compromising performance Extra-Firewall Intelligence to Identify Users User-ID brings AD users and groups into firewall policy Standard First-Generation Firewall Capabilities Packet filtering, state, flexible NAT, IPSec, SSL VPNs, etc. Support “bump in the wire” Deployments Multiple options for transparent deployment behind existing firewalls In “Defining the Next-Generation Firewall,” Gartner describes what Palo Alto Networks already delivers

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 17 | UTM devices are not next-generation firewalls DLP devices are not next-generation firewalls Secure web gateways are not next-generation firewalls security gateways are not next-generation firewalls Gartner’s Recommendations Move to next-generation firewalls at the next refresh opportunity – whether for firewall, IPS, or the combination of the two. In “Defining the Next-Generation Firewall,” Gartner Also Describes What an NGFW is NOT! Palo Alto Networks Exceeds NGFW Requirements

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 18 | New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Fine-grained visibility and policy control over application access / functionality 4. Protect in real-time against threats embedded across applications 5. Multi-gigabit, in-line deployment with no performance degradation Palo Alto Networks Next-Generation Firewall

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 19 | Unique Technologies Transform the Firewall App-ID Identify the application User-ID Identify the user Content-ID Scan the content

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 20 | Single-Pass Parallel Processing (SP3) Architecture Single Pass Operations once per packet - Traffic classification (app identification) - User/group mapping - Content scanning – threats, URLs, confidential data One policy Parallel Processing Function-specific hardware engines Separate data/control planes Up to 10Gbps, Low Latency

© 2008 Palo Alto Networks. Proprietary and Confidential. Page 21 | Purpose-Built Architecture: PA-4000 Series Flash Matching HW Engine Palo Alto Networks’ uniform signatures Multiple memory banks – memory bandwidth scales performance Multi-Core Security Processor High density processing for flexible security functionality Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression) Dedicated Control Plane Highly available mgmt High speed logging and route updates 10Gbps Flash Matching Engine RAM Dual-core CPU RAM HDD 10 Gig Network Processor Front-end network processing offloads security processors Hardware accelerated QoS, route lookup, MAC lookup and NAT CPU 16. SSLIPSec De- Compression CPU 1 CPU 2 10Gbps Control Plane Data Plane RAM CPU 3 QoS Route, ARP, MAC lookup NAT

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 22 | Visibility into Application, Users & Content Application Command Center (ACC) - View applications, URLs, threats, data filtering activity Mine ACC data, adding/removing filters as needed to achieve desired result Filter on Skype Remove Skype to expand view of harris Filter on Skype and user harris

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 23 | © 2008 Palo Alto Networks. Proprietary and Confidential. Page 23 | © 2008 Palo Alto Networks. Proprietary and Confidential. Page 23 | Enables Visibility Into Applications, Users, and Content

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 24 | PAN-OS Features Strong networking foundation - Dynamic routing (OSPF, RIPv2) - Site-to-site IPSec VPN - SSL VPN for remote access - Tap mode – connect to SPAN port - Virtual wire (“Layer 1”) for true transparent in-line deployment - L2/L3 switching foundation QoS traffic shaping - Max/guaranteed and priority - By user, app, interface, zone, and more Zone-based architecture - All interfaces assigned to security zones for policy enforcement High Availability - Active / passive - Configuration and session synchronization - Path, link, and HA monitoring Virtual Systems - Establish multiple virtual firewalls in a single device (PA-4000 Series only) Simple, flexible management - CLI, Web, Panorama, SNMP, Syslog Visibility and control of applications, users and content are complemented by core firewall features PA-500 PA-2020 PA-2050 PA-4020 PA-4050 PA-4060

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 25 | Our Platform Family… Performance Remote Office/ Medium Enterprise Large Enterprise PA-2000 Series 1Gbps; 500Mbps threat prevention PA-4000 Series 500Mbps; 200Mbps threat prevention 2Gbps; 2Gbps threat prevention 10Gbps; 5Gbps threat prevention 10Gbps; 5Gbps threat prevention (XFP interfaces) PA Mbps; 100Mbps threat prevention

© 2009 Palo Alto Networks. Proprietary and Confidential Page 26 | Palo Alto Networks Next-Gen Firewalls PA Gbps FW 5 Gbps threat prevention 2,000,000 sessions 16 copper gigabit 8 SFP interfaces PA Gbps FW 2 Gbps threat prevention 500,000 sessions 16 copper gigabit 8 SFP interfaces PA Gbps FW 5 Gbps threat prevention 2,000,000 sessions 4 XFP (10 Gig) I/O 4 SFP (1 Gig) I/O PA Gbps FW 500 Mbps threat prevention 250,000 sessions 16 copper gigabit 4 SFP interfaces PA Mbps FW 200 Mbps threat prevention 125,000 sessions 12 copper gigabit 2 SFP interfaces PA Mbps FW 100 Mbps threat prevention 50,000 sessions 8 copper gigabit

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 27 | Flexible Deployment Options Visibility Transparent In-Line Firewall Replacement Application, user and content visibility without inline deployment IPS with app visibility & control Consolidation of IPS & URL filtering Firewall replacement with app visibility & control Firewall + IPS Firewall + IPS + URL filtering

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 28 | Fix The Firewall – and Save Money! Capital cost – replace multiple devices - Legacy firewall, IPS, URL filtering device (e.g., proxy, secure web gateway) Cut by as much as 80% Cut by as much as 65% “Hard” operational expenses - Support contracts - Subscriptions - Power and HVAC Save on “soft” costs too - Rack space, deployment/integration, headcount, training, help desk calls

Now We Fixed The Firewall… What’s Next? Global Protect!

Solved the “Inside” Problem - But Users Leave… HeadquartersBranch Office HotelHome Enterprise Secured Open to threats, app usage, & more How do you secure your applications and your users when they are both moving off the “controlled” network? DATA Apps Users

Get the Same Visibility and Control for All Users HeadquartersBranch Office HotelHome Enterprise Secured Palo Alto Networks GlobalProtect TM will enable organizations to safely enable applications, regardless of user location Apps Users

Palo Alto Networks Continuing to Innovate Enterprises basing network security on Palo Alto Networks next-generation firewalls GlobalProtect TM will bring roaming users into next- generation firewall-based control - Applications/Users/Content GlobalProtect TM will support Windows-based machines initially - Windows 7 (32 & 64-bit) - Windows Vista (32 & 64-bit) - Windows XP Pricing: subscription (per firewall, not user-based) Available end of 2010 © 2010 Palo Alto Networks. Proprietary and Confidential. Page 32 |

Next-Generation Firewalls Are Network Security © 2010 Palo Alto Networks. Proprietary and Confidential. Page 33 |

What about the Middle East? Higher College of Technology in Abu Dhabi American University of Sharjah Abu Dhabi Government Services Cairo Aman Bank in Jordan Dubai World … © 2009 Palo Alto Networks. Proprietary and Confidential. Page 34 |

Thank You

Additional Information

Next-Generation Firewall Solutions © 2009 Palo Alto Networks. Proprietary and Confidential. Page 37 |

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 38 | Legendary Customer Support Experience Strong TSE team with deep network security and infrastructure knowledge - Experience with every major firewall - TSEs average over 15 years of experience TSEs co-located with engineering – in Sunnyvale, CA Premium and Standard offerings Rave reviews from customers © 2007 Palo Alto Networks. Proprietary and Confidential Page 38 | Customer support has always been amazing. Whenever I call, I always get someone knowledgeable right away, and never have to wait. They give me the answer I need quickly and completely. Every support rep I have spoken with knows his stuff. -Mark Kimball, Hewlett-Packard Customer support has been extraordinarily helpful – which is not the norm when dealing with technology companies. Their level of knowledge, their willingness to participate – it’s night and day compared to other companies. It’s an incredible strength of Palo Alto Networks. -James Jones, UPMC

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 39 | Site-to-Site and Remote Access VPN Secure connectivity - Standards-based site-to-site IPSec VPN - SSL VPN for remote access Policy-based visibility and control over applications, users and content for all VPN traffic Included as features in PAN-OS at no extra charge Site-to-site VPN connectivity Remote user connectivity

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 40 | Traffic Shaping Expands Policy Control Options Traffic shaping policies ensure business applications are not bandwidth starved - Guaranteed and maximum bandwidth settings - Flexible priority assignments, hardware accelerated queuing - Apply traffic shaping policies by application, user, source, destination, interface, IPSec VPN tunnel and more Enables more effective deployment of appropriate application usage policies Included as a feature in PAN-OS at no extra charge

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 41 | Flexible Policy Control Responses Intuitive policy editor enables appropriate usage policies with flexible policy responses Allow or deny individual application usageAllow but apply IPS, scan for viruses, spyware Control applications by category, subcategory, technology or characteristic Apply traffic shaping (guaranteed, priority, maximum) Decrypt and inspect SSLAllow for certain users or groups within AD Allow or block certain application functionsControl excessive web surfing Allow based on scheduleLook for and alert or block file or data transfer

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 42 | App-ID: Comprehensive Application Visibility Policy-based control more than 800 applications distributed across five categories and 25 sub-categories Balanced mix of business, internet and networking applications and networking protocols new applications added weekly App override and custom HTTP applications help address internal applications

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 43 | User-ID: Enterprise Directory Integration Users no longer defined solely by IP address - Leverage existing Active Directory infrastructure without complex agent rollout - Identify Citrix users and tie policies to user and group, not just the IP address Understand user application and threat behavior based on actual AD username, not just IP Manage and enforce policy based on user and/or AD group Investigate security incidents, generate custom reports

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 44 | Content-ID: Real-Time Content Scanning Stream-based, not file-based, for real-time performance - Uniform signature engine scans for broad range of threats in single pass - Vulnerability exploits (IPS), viruses, and spyware (both downloads and phone-home) Block transfer of sensitive data and file transfers by type - Looks for CC # and SSN patterns - Looks into file to determine type – not extension based Web filtering enabled via fully integrated URL database - Local 20M URL database (76 categories) maximizes performance (1,000’s URLs/sec) - Dynamic DB adapts to local, regional, or industry focused surfing patterns Detect and block a wide range of threats, limit unauthorized data transfer and control non-work related web surfing

Internet Sprawl Is Not The Answer Doesn’t solve the problem Firewall “helpers” have limited view of traffic Complex and costly to buy and maintain © 2009 Palo Alto Networks. Proprietary and Confidential. Page 45 |

Internet UTM Is Still Sprawl…Just Slower Doesn’t solve the problem Firewall “helper” functions have limited view of traffic Turning on functions kills performance © 2009 Palo Alto Networks. Proprietary and Confidential. Page 46 |

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 47 | Traditional Multi-Pass Architectures are Slow Port/Protocol-based ID L2/L3 Networking, HA, Config Management, Reporting Port/Protocol-based ID HTTP Decoder L2/L3 Networking, HA, Config Management, Reporting URL Filtering Policy Port/Protocol-based ID IPS Signatures L2/L3 Networking, HA, Config Management, Reporting IPS Policy Port/Protocol-based ID AV Signatures L2/L3 Networking, HA, Config Management, Reporting AV Policy Firewall Policy IPS Decoder AV Decoder & Proxy

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 48 | Single-Pass Parallel Processing (SP3) Architecture Single Pass Operations once per packet - Traffic classification (app identification) - User/group mapping - Content scanning – threats, URLs, confidential data One policy Parallel Processing Function-specific hardware engines Separate data/control planes Up to 10Gbps, Low Latency

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 49 | Enterprise Device and Policy Management Intuitive and flexible management - CLI, Web, Panorama, SNMP, Syslog - Role-based administration enables delegation of tasks to appropriate person Panorama central management application - Shared policies enable consistent application control policies - Consolidated management, logging, and monitoring of Palo Alto Networks devices - Consistent web interface between Panorama and device UI - Network-wide ACC/monitoring views, log collection, and reporting All interfaces work on current configuration, avoiding sync issues

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 50 | PA-4000 Series Specifications - 2U, 19” rack-mountable chassis - Dual hot swappable AC power supplies - Dedicated out-of-band management port - 2 dedicated HA ports - DB9 console port PA Gbps FW 5 Gbps threat prevention 2,000,000 sessions 16 copper gigabit 8 SFP interfaces PA Gbps FW 2 Gbps threat prevention 500,000 sessions 16 copper gigabit 8 SFP interfaces PA Gbps FW 5 Gbps threat prevention 2,000,000 sessions 4 XFP (10 Gig) I/O 4 SFP (1 Gig) I/O

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 51 | Purpose-Built Architecture: PA-4000 Series Content Scanning HW Engine Palo Alto Networks’ uniform signatures Multiple memory banks – memory bandwidth scales performance Multi-Core Security Processor High density processing for flexible security functionality Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression) Dedicated Control Plane Highly available mgmt High speed logging and route updates 10Gbps Content Scanning Engine RAM Dual-core CPU RAM HDD 10 Gig Network Processor Front-end network processing offloads security processors Hardware accelerated QoS, route lookup, MAC lookup and NAT CPU 16. SSLIPSec De- Compression CPU 1 CPU 2 10Gbps Control Plane Data Plane RAM CPU 3 QoS Route, ARP, MAC lookup NAT

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 52 | PA-2000 Series Specifications - 1U rack-mountable chassis - Single non-modular power supply - 80GB hard drive (cold swappable) - Dedicated out-of-band management port - RJ-45 console port, user definable HA port PA Gbps FW 500 Mbps threat prevention 250,000 sessions 16 copper gigabit 4 SFP interfaces PA Mbps FW 200 Mbps threat prevention 125,000 sessions 12 copper gigabit 2 SFP interfaces

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 53 | Purpose-Built Architecture: PA-2000 Series Route, ARP, MAC lookup NAT Flash Matching HW Engine Palo Alto Networks’ uniform signatures Multiple memory banks – memory bandwidth scales performance Multi-Core Security Processor High density processing for flexible security functionality Hardware-acceleration for standardized complex functions (SSL, IPSec) Dedicated Control Plane Highly available mgmt High speed logging and route updates 1Gbps Flash Matching Engine RAM Dual-core CPU RAM HDD Network Processor Front-end network processing offloads security processors Hardware accelerated route lookup, MAC lookup and NAT CPU 4 SSLIPSec CPU 1 CPU 2 1Gbps Control Plane Data Plane RAM CPU 3

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 54 | PA-500 Specifications Specs 250 Mbps FW 100 Mbps IPSec VPN 100 Mbps threat prevention 50,000 sessions 250 VPN tunnels 8 copper gigabit interfaces Runs PAN-OS 3.0 and later General hardware 1U rack mountable Single non-modular power supply 80GB hard drive Dedicated mgmt port RJ-45 console port

© 2009 Palo Alto Networks. Proprietary and Confidential. Page 55 | PA-500 Purpose-Built Architecture Common dedicated data plane and control plane architecture Network processing and signature matching engine virtualized into the multi-core security processor Same software architecture as all Palo Alto Networks platforms Multi-Core Security Processor High density processing for networking and security functions Hardware-acceleration for standardized complex functions (SSL, IPSec) Signature match virtual software engine Dedicated Control Plane Highly available mgmt High speed logging and route updates Dual-core CPU RAM HDD CPU 4 SSLIPSec CPU 1 CPU 2 Control Plane Data Plane RAM CPU 3