Search This Blog

Monday, April 04, 2011

April 2011 Firewall 2.0 Newsletter

New Product Release

Palo Alto Networks continues to expand the definition of next-generation firewall functionality with new products, platforms and features. GlobalProtect will enable enterprises to employ and enforce consistent policies to all users, on and off the network, while the new PA-5000 Series will extend next-generation firewall features further into the datacenter. New, innovative next-generation firewall features such as SSH decryption, behavioral botnet detection, and drive-by download prevention make up just a few of the more than 50 new features now available on every Palo Alto Networks device.


How to Balance Internet Freedom with Protection for 30,000 Users

The University of Liege is one of the largest and most complex university networks in Belgium. Like most universities, the IT staff had to find a way to balance Internet freedom with strong network security for 30,000 students, faculty, staff and hospital employees. For the IT staff to solve this problem, the first step was to get complete visibility into what was happening on the network. Simon Francois, Network Team Leader at University of Liege, will describe the challenges they faced, the solution strategy they implemented, and the benefits they gained, in this important live webcast. Please join us and submit your own questions during a live interview Mr. Francois, hosted by Rene Bonvanie, VP of Marketing at Palo Alto Networks. The webcast will be done entirely in French.

Register for the Webinar Now

Featured Event & WEbinars

Live Webinar

60 Minutes:
NGFW in the Real World

Date: April 27, 2011

Join Nir Zuk, Founder and CTO of Palo Alto Networks, and Mark Bouchard of AimPoint Group as they share candid interviews with Palo Alto Networks' customers about lessons learned, benefits gained, and advice they have for their peers in the industry. Nir and Mark will debate the impacts and implications of these customer experiences, and incorporate your questions and comments over the course of the conversation.

Register Now


On-Demand Webinar

What the Enterprise Can Learn
From WikiLeaks

The WikiLeaks saga has captured attention world-wide, with the majority of analysis focused on the actual leaked content. Yet while WikiLeaks is certainly the most high-profile breach in recent memory, the techniques used to exfiltrate and hide information are directly applicable to enterprises today.

Watch the Webinar Now


10 Things Your Next Firewall Must Do

While many vendors are beginning to market next-generation firewalls, their initial offerings do not address enterprise requirements for granular application visibility and control, high-speed integrated threat prevention, and roaming users and devices. As the leader and pioneer of the category, Palo Alto Networks would like to share what we have learned from securing over 3,500 enterprise networks in the past few years. View our slideshow that depicts the top 10 requirements you should demand in your next firewall purchase.

Download Your Copy


"Imagine" by Palo Alto Networks

The "Imagine" video is dedicated to Palo Alto Networks' 3,500+ customers and hundreds of partners worldwide. Thank you for making Palo Alto Networks the most innovative, disruptive, and trusted network security vendor in the market. We wrote this song to share our passion and dedication for building the best next-generation firewall in the world.

Enjoy!


Controlling Browser-based Filesharing on University Networks

Browser-based filesharing applications have the potential to become the next P2P application category in terms of illegal copyrighted information. Learn how Palo Alto Networks provides universities with the ability to identify, monitor and analyze the use of browser-based filesharing applications traversing the network.

Download the Solution Note


Free "Next-Generation Firewalls for Dummies" Book

This book provides an in-depth overview of next-generation firewalls. It examines the evolution of network security, the rise of Enterprise 2.0 applications and their associated threats, the shortcomings of traditional firewalls, and the advanced capabilities found in next-generation firewalls. Get your copy of "Next-Generation Firewalls for Dummies book to find out:

  • How Enterprise 2.0 applications create new risks for your organization
  • Why traditional firewalls can't protect your network
  • How next-generation firewalls stand apart from other security solutions
  • What features and capabilities you need in your firewall

Download the e-book Now


On-Demand Webinar & Demo: Next-Generation Firewall Management from Tufin

Organizations are looking to cost-effectively manage their network security policy, optimize performance, comply with regulatory standards and minimize IT risk. This webinar will illustrate Tufin's robust and comprehensive firewall management and auditing solution - specifically tailored to next-generation firewalls.

Watch Now


Meet with Palo Alto Networks at an Upcoming Industry Event


Palo Alto Networks in the News


Want a Quick Introduction to Palo Alto Networks?

No problem. We have two very simple, very effective ways to learn more about us.

  1. To get a quick overview of Palo Alto Networks next-generation firewall technology, learn more about specific features and functions, and see a live demo, join us for one of our weekly 30-minute webinars. The demonstration is followed by a Q&A session to answer any specific questions you have. To join us at your convenience, please register here.
  2. Not available to join the weekly live webinar? We have an on-demand product overview that highlights the application visibility and policy control elements of our product.

About Palo Alto Networks
Palo Alto Networks was founded in 2005 with a mission to create a family of next generation firewalls that allow IT organizations to regain visibility and control of Internet applications and traffic on their network. The firewalls were designed to meet five important requirements:

  • Visibility into all applications, regardless of port, protocol, evasive tactic – or even SSL encryption
  • Identification of application users by name – not just by IP address
  • Granular control of application access, by user or groups of users
  • Real-time threat prevention, content control, and URL filtering
  • In-line throughput up to 20gbps, with no performance degradation

To address these requirements, Palo Alto Networks firewalls combine innovative new identification technologies, such as App-ID, User-ID, and Content-ID, all leveraging an underlying Single-Pass Parallel Processing Architecture (SP3), which ensures maximum throughput with minimum latency.

For more information, visit us at http://www.paloaltonetworks.com/.

Copyright © 2011 Palo Alto Networks. All Rights Reserved.
Palo Alto Networks | 232 E. Java Drive | Sunnyvale, CA 94089 | 408-738-7703


No comments: