Search This Blog

Monday, February 07, 2011

February 2011 Firewall 2.0 Newsletter

Free "Next-Generation Firewalls for Dummies" Book

This book provides an in-depth overview of next-generation firewalls. It examines the evolution of network security, the rise of Enterprise 2.0 applications and their associated threats, the shortcomings of traditional firewalls, and the advanced capabilities found in next-generation firewalls. Get your copy of "Next-Generation Firewalls for Dummies book to find out:

  • How Enterprise 2.0 applications create new risks for your organization
  • Why traditional firewalls can't protect your network
  • How next-generation firewalls stand apart from other security solutions
  • What features and capabilities you need in your firewall

Download the e-book now!


What the Enterprise Can Learn From WikiLeaks

The WikiLeaks saga has captured attention world-wide, with the majority of analysis focused on the actual leaked content. Yet while WikiLeaks is certainly the most high-profile breach in recent memory, the techniques used to exfiltrate and hide information are directly applicable to enterprises today. In this session we will summarize the key lessons of WikiLeaks and how security managers can protect their networks today, including:

Featured Event:
RSA Conference 2011

Network Security Champions Reception at the RSA Conference 2011

Date: February 15
Location: Jillian's, 101 4th Street
San Francisco, CA 94103

Join Palo Alto Networks and leading IT security professionals for an exclusive reception featuring Ronnie Lott, Harris Barton and Brent Jones three iconic San Francisco 49ers players who led their teams to multiple NFL championships. Ronnie, Harris and Brent will sign autographs and share stories about what it took to build a championship-caliber NFL team. More Info


Free Expo Hall Pass to RSA Conference 2011

Date: February 14-17
Location: San Francisco, CA

To register for a free expo hall pass for the RSA Conference 2011 on behalf of Palo Alto Networks:

  1. Visit RSA Registration
  2. Input this code during registration: EC11PLN
  • The techniques used to secretly move sensitive information out of networks
  • The limitations of URL filtering to control WikiLeaks and how you can reliably block access today
  • Investigate the aftermath of WikiLeaks, the rise of public "hacktivism" and how it can be controlled

Register for this live webinar on Wednesday, March 9th, at 9AM Pacific/12Noon Eastern.

Register Now!


SANS: Enabling Social Networking Applications for Enterprise Usage

This whitepaper, written by a SANS analyst, provides the latest research regarding social networking applications, explains the benefits and risks that they bring to corporate networks, and provides a recommendation for defining a secure social networking policy.

Click here to download the full report!

Social networks are pervasive among most of today's Internet users. They are also important tools used by employees and organizations for outreach. Unfortunately, social networks are also rife with risk that can lead to exploitation of accounts, end points and loss of reputation. In this webcast, learn the risks social networking brings to enterprises, then learn how to enable valuable social networking tools securely.

Watch the SANS Webinar!


If you missed…60 Minutes: Choosing an Enterprise Firewall for 2011 and Beyond

Firewalls are evolving. For an enterprise, the difficulty is understanding the different approaches and how they fulfill the organization's requirements. The upside for most organizations is that there are real differences among the choices that enterprises have for firewalls – making the choice critical to get right, and potentially, strategically important to the safe enablement of enterprise-critical applications. For that reason, we dedicated this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall.

Watch the Webinar now!


Myth vs Reality: Analyzing Check Point's Application Blade

Check Point has come out with their new Application Control Blade. While Palo Alto Networks applauds Check Point's recognition of the importance of application visibility and control on enterprise networks, there are substantial functional differences between a port-based firewall with an add-on blade, and a next-generation firewall. As the only company with thousands of next-generation firewalls in production, Palo Alto Networks has a unique perspective on what it takes to build, deploy, and support next-generation firewalls in the enterprise.

Watch the Webinar now!


Meet with Palo Alto Networks at an Upcoming Industry Event


Palo Alto Networks in the News


Want a Quick Introduction to Palo Alto Networks?
No problem. We have three very simple, very effective ways to learn more about us.

If you're in a hurry, and just want to understand why our next generation firewalls are the most innovative security solutions in the industry, then check out our 3-minute flash video. Just click here and turn up your volume!

If you want to go beyond the introduction and learn more about specific features and functions – and see a live demo of the firewall – then join us for one of our weekly 30-minute webinars. The demonstration is followed by a Q&A session to answer any specific questions you have. To join us at your convenience, please register here.

Not available to join the weekly live webinar? We have an on-demand product overview that highlights the application visibility and policy control elements of our product.


About Palo Alto Networks
Palo Alto Networks was founded in 2005 with a mission to create a family of next generation firewalls that allow IT organizations to regain visibility and control of Internet applications and traffic on their network. The firewalls were designed to meet five important requirements:

  • Visibility into all applications, regardless of port, protocol, evasive tactic – or even SSL encryption
  • Identification of application users by name – not just by IP address
  • Granular control of application access, by user or groups of users
  • Real-time threat prevention, content control, and URL filtering
  • In-line throughput up to 10gbps, with no performance degradation

To address these requirements, Palo Alto Networks firewalls combine innovative new identification technologies, such as App-ID, User-ID, and Content-ID, all leveraging an underlying Single-Pass Parallel Processing Architecture (SP3), which ensures maximum throughput with minimum latency.

For more information, visit us at http://www.paloaltonetworks.com/.

Copyright © 2011 Palo Alto Networks. All Rights Reserved.
Palo Alto Networks | 232 E. Java Drive | Sunnyvale CA 94089 | 408-738-7703


No comments: