Palo Alto Networks

PALO ALTO NETWORKS

Palo Alto Networks' Next-Generation Firewalls

Palo Alto Networks’ next-generation firewalls enable enterprises to identify and control applications, users, and content

Approach to Application Visibility & Application Control

With the ability to control applications, users, and content at the enterprise firewall, customers realize improvements in security, performance, and cost

Solutions Provider

Technical, maintenance, help-desk and customer support services to ensure that the security devices operate reliably and effectively.

Rookie Of The Year Award 2012 by The APAC PARTNER CONFERENCE 

Palo Alto Fiscal Year 2017 Award 
for Largest Single Order

1
Palo Alto Networks Certified Network Security Engineer (PCNSE)
1
Palo Alto Accredited Configuration Engineer (ACE)

Palo Alto Networks' Next-Generation Firewalls

Palo Alto Networks’ next-generation firewalls enable enterprises to identify and control applications, users, and content—not just ports, IP addresses, and packets—using three unique identification technologies: App-ID, User-ID, and Content-ID. These identification technologies allow enterprises to securely enable application usage using business-relevant concepts, instead of following the traditional “all- or-nothing” approach offered by traditional port-blocking firewalls used in many security infrastructures.

Features

Palo Alto Networks has built a next-generation firewall with several innovative technologies—enabling organizations to fix the firewall. These technologies bring business-relevant elements(applications, users, and content) under policy control on a high performance firewall architecture. This technology runs on a high-performance, purpose-built platform based on Palo Alto Networks’ Single-Pass Parallel Processing (SP3) Architecture. Unique to the SP3 Architecture, traffic is only examined once, using hardware with dedicated processing resources for security, networking, content scanning and management to provide line-rate, low-latency performance under load.

  • Application Visibility
  • Decryption
  • Policy Control
  • Device Management
  • GlobalProtect
  • App-ID
  • User-ID
  • Content-ID
  • IPS
  • Antivirus
  • Botnet Protection
  • Data Filtering
  • URL Filtering
  • Networking & VPN
  • Redundancy & Resiliency
  • Centralized Management

Palo Alto Traps

Endpoints secured, everywhere

Traps™ advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks.

Stop endpoint attacks before they get started

An attacker must complete a sequence of events to steal information or run ransomware. And nearly every attack relies on compromising an endpoint. Traps disrupts an attack before it can infect an endpoint. By combining multiple methods of prevention, Traps stands apart in its ability to protect endpoints. It blocks security breaches and successful ransomware attacks that leverage malware and exploits, known or unknown, before they can compromise endpoints.

Comprehensive endpoint security

Unique in the breadth and depth of its endpoint protections, Traps:

  • Stops malware, exploits and ransomware before they can compromise endpoints.
  • Provides protection while endpoints are online and offline, on network and off.
  • Coordinates enforcement with network and cloud security to prevent successful attacks.
  • Detects threats and automates containment to minimize impact.
  • Includes WildFire® cloud-based threat analysis service with your Traps subscription.
  • Integrates with the Palo Alto Networks® Security Operating Platform.

Effective prevention from malware, exploits and ransomware requires an approach that protects against all three. Traps puts multiple methods of protection at critical phases of an attack lifecycle to prevent the execution of malicious programs and stop the exploitation of legitimate applications.

As an integral part of the Palo Alto Networks Security Operating Platform, Traps continuously exchanges data with WildFire and other Palo Alto Networks products using the Logging Service. This automation mitigates the risk from the millions of new threats identified daily and helps meet compliance requirements by coordinating enforcement across your entire ecosystem – including endpoints, networks and clouds.

The integration of Secdo will minimize the time required to stop sophisticated attacks across every stage of the threat life cycle. Combining unrestricted endpoint visibility with an ability to automatically visualize the activity chain and root cause of any attack, analysts of any skill level will be able to hunt for unseen threats, investigate and respond faster than ever before.

Visit us

Unit C1-3-1, Block C1, Solaris Dutamas, No.1, Jalan Dutamas 1, Hartamas Heights, 50480 Kuala Lumpur, Malaysia.

MSP Systems Sdn Bhd

Call us

Ask one of our helpfully friendly sales support team members with any of your enquiries.

Tel : 603 6205 3800
Fax : 603 6205 3900

Contact us


Drop us a line at our email.


sales@mspsys.com
support@mspsys.com

YOUR TRUSTED MANAGED SERVICE PROVIDER FOR SECURE, OPTIMIZED AND COST EFFICIENT SD-WAN

BOOK YOUR WINDOW TO STRESS FREE DIGITAL INTEGRITY NOW