PALO ALTO NETWORKS
Palo Alto Networks' Next-Generation Firewalls
Palo Alto Networks’ next-generation firewalls enable enterprises to identify and control applications, users, and content
Approach to Application Visibility & Application Control
With the ability to control applications, users, and content at the enterprise firewall, customers realize improvements in security, performance, and cost
Solutions Provider
Technical, maintenance, help-desk and customer support services to ensure that the security devices operate reliably and effectively.
Palo Alto Networks' Next-Generation Firewalls
Palo Alto Networks’ next-generation firewalls enable enterprises to identify and control applications, users, and content—not just ports, IP addresses, and packets—using three unique identification technologies: App-ID, User-ID, and Content-ID. These identification technologies allow enterprises to securely enable application usage using business-relevant concepts, instead of following the traditional “all- or-nothing” approach offered by traditional port-blocking firewalls used in many security infrastructures.
Features
Palo Alto Networks has built a next-generation firewall with several innovative technologies—enabling organizations to fix the firewall. These technologies bring business-relevant elements(applications, users, and content) under policy control on a high performance firewall architecture. This technology runs on a high-performance, purpose-built platform based on Palo Alto Networks’ Single-Pass Parallel Processing (SP3) Architecture. Unique to the SP3 Architecture, traffic is only examined once, using hardware with dedicated processing resources for security, networking, content scanning and management to provide line-rate, low-latency performance under load.
- Application Visibility
- Decryption
- Policy Control
- Device Management
- GlobalProtect
- App-ID
- User-ID
- Content-ID
- IPS
- Antivirus
- Botnet Protection
- Data Filtering
- URL Filtering
- Networking & VPN
- Redundancy & Resiliency
- Centralized Management
Palo Alto Traps
Endpoints secured, everywhere
Traps™ advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks.
Stop endpoint attacks before they get started
An attacker must complete a sequence of events to steal information or run ransomware. And nearly every attack relies on compromising an endpoint. Traps disrupts an attack before it can infect an endpoint. By combining multiple methods of prevention, Traps stands apart in its ability to protect endpoints. It blocks security breaches and successful ransomware attacks that leverage malware and exploits, known or unknown, before they can compromise endpoints.
Comprehensive endpoint security
Unique in the breadth and depth of its endpoint protections, Traps:
- Stops malware, exploits and ransomware before they can compromise endpoints.
- Provides protection while endpoints are online and offline, on network and off.
- Coordinates enforcement with network and cloud security to prevent successful attacks.
- Detects threats and automates containment to minimize impact.
- Includes WildFire® cloud-based threat analysis service with your Traps subscription.
- Integrates with the Palo Alto Networks® Security Operating Platform.
Effective prevention from malware, exploits and ransomware requires an approach that protects against all three. Traps puts multiple methods of protection at critical phases of an attack lifecycle to prevent the execution of malicious programs and stop the exploitation of legitimate applications.
As an integral part of the Palo Alto Networks Security Operating Platform, Traps continuously exchanges data with WildFire and other Palo Alto Networks products using the Logging Service. This automation mitigates the risk from the millions of new threats identified daily and helps meet compliance requirements by coordinating enforcement across your entire ecosystem – including endpoints, networks and clouds.
The integration of Secdo will minimize the time required to stop sophisticated attacks across every stage of the threat life cycle. Combining unrestricted endpoint visibility with an ability to automatically visualize the activity chain and root cause of any attack, analysts of any skill level will be able to hunt for unseen threats, investigate and respond faster than ever before.
Visit us
Unit C1-3-1, Block C1, Solaris Dutamas, No.1, Jalan Dutamas 1, Hartamas Heights, 50480 Kuala Lumpur, Malaysia.
MSP Systems Sdn Bhd
Call us
Ask one of our helpfully friendly sales support team members with any of your enquiries.
Tel : 603 6205 3800
Fax : 603 6205 3900
Contact us
Drop us a line at our email.
sales@mspsys.com
support@mspsys.com
YOUR TRUSTED MANAGED SECURITY PROVIDER FOR SECURE, OPTIMIZED AND COST EFFICIENT NETWORK SECURITY
BOOK YOUR WINDOW TO STRESS FREE DIGITAL INTEGRITY NOW