295.pptx

  • Uploaded by: Madhu Thamatam
  • 0
  • 0
  • December 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View 295.pptx as PDF for free.

More details

  • Words: 1,400
  • Pages: 20
Palo Alto Networks Customer Presentation November 2009 Ozan Ozkara

About Palo Alto Networks

• Founded in 2005 by a world-class team with strong security and

networking experience • Innovations: App-ID, User-ID, Content-ID

• Builds next-generation firewalls that identify and control more

than 850 applications; makes firewall strategic again • Global footprint: presence in 50+ countries, 24/7 support

Page 2 |

© 2009 Palo Alto Networks. Proprietary and Confidential.

Applications Have Changed – Firewalls Have Not • The gateway at the trust

border is the right place to enforce policy control -

Sees all traffic

-

Defines trust boundary

• BUT…Applications Have Changed -

Ports ≠Applications

-

IP Addresses ≠Users

-

Packets ≠Content

Need to Restore Visibility and Control in the Firewall Page 3 |

© 2009 Palo Alto Networks. Proprietary and Confidential.

Application Control Efforts are Failing • Palo Alto Networks’ Application Usage & Risk Report highlights actual behavior of

900,000 users across more than 60 organizations -

Bottom line: despite all having firewalls, and most having IPS, proxies, & URL filtering – none of these organizations could control what applications ran on their networks

• Applications evade, transfer files, tunnel other applications, carry threats, consume

bandwidth, and can be misused.

Applications carry risks: business continuity, data loss, compliance, productivity, and operations costs

Page 5 |

© 2009 Palo Alto Networks. Proprietary and Confidential.

The Right Answer: Make the Firewall Do Its Job

New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address

3. Protect in real-time against threats embedded across applications 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, in-line deployment with no performance degradation

Page 7 |

© 2009 Palo Alto Networks. Proprietary and Confidential.

Identification Technologies Transform the Firewall

App-ID Identify the application

User-ID Identify the user

Content-ID Scan the content Page 8 |

© 2009 Palo Alto Networks. Proprietary and Confidential.

Purpose-Built Architecture: PA-4000 Series RAM

Content Scanning Engine

Dedicated Control Plane • Highly available mgmt • High speed logging and route updates

RAM

RAM RAM

Content Scanning HW Engine • Palo Alto Networks’ uniform signatures • Multiple memory banks – memory bandwidth scales performance

10Gbps

RAM Dual-core CPU

CPU 1

CPU 2

CPU 3

..

RAM

CPU 16

RAM

RAM HDD

SSL

IPSec

DeCompression

Multi-Core Security Processor • High density processing for flexible security functionality • Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression)

10Gbps

QoS

Control Plane Page 9 |

© 2009 Palo Alto Networks. Proprietary and Confidential.

Route, ARP, MAC lookup

NAT

10 Gig Network Processor • Front-end network processing offloads security processors • Hardware accelerated QoS, route lookup, MAC lookup and NAT

Data Plane

Enables Visibility Into Applications, Users, and Content

Page 10 |

© 2008 2009 Palo Alto Networks. Proprietary and Confidential.

PAN-OS Core Firewall Features Visibility and control of applications, users and content complement core firewall features • Strong networking

foundation -

Dynamic routing (OSPF, RIPv2) Tap mode – connect to SPAN port Virtual wire (“Layer 1”) for true transparent in-line deployment L2/L3 switching foundation

• VPN -

-

Site-to-site IPSec VPN SSL VPN

Max/guaranteed and priority By user, app, interface, zone, IP and scheduled

Page 11 |

-

All interfaces assigned to security zones for policy enforcement

PA-4060

• High Availability -

-

Active / passive Configuration and session synchronization Path, link, and HA monitoring

PA-4050

PA-4020

• Virtual Systems

• QoS traffic shaping -

• Zone-based architecture

-

Establish multiple virtual firewalls in a single device (PA-4000 & PA-2000 Series only)

• Simple, flexible

management -

CLI, Web, Panorama, SNMP, Syslog, XML API

© 2009 Palo Alto Networks. Proprietary and Confidential.

PA-2050

PA-2020

PA-500

Flexible Deployment Options Visibility

• Application, user and content visibility without inline deployment

Page 12 |

Transparent In-Line

• IPS with app visibility & control • Consolidation of IPS & URL filtering

© 2009 Palo Alto Networks. Proprietary and Confidential.

Firewall Replacement

• Firewall replacement with app visibility & control • Firewall + IPS • Firewall + IPS + URL filtering

Enterprise Device and Policy Management • Intuitive and flexible management

CLI, Web, Panorama, SNMP, Syslog - Role-based administration enables delegation of tasks to appropriate person -

• Panorama central management application

Shared policies enable consistent application control policies - Consolidated management, logging, and monitoring of Palo Alto Networks devices - Consistent web interface between Panorama and device UI - Network-wide ACC/monitoring views, log collection, and reporting -

• All interfaces work on current configuration, avoiding sync issues

Page 13 |

© 2009 Palo Alto Networks. Proprietary and Confidential.

Addresses Three Key Business Problems • Identify and Control Applications -

Visibility of over 850 applications, regardless of port, protocol, encryption, or evasive tactic

-

Fine-grained control over applications (allow, deny, limit, scan, shape)

-

Fixes the firewall

• Prevent Threats -

Stop a variety of threats – exploits (by vulnerability), viruses, spyware

-

Stop leaks of confidential data (e.g., credit card #, social security #)

-

Stream-based engine ensures high performance

• Simplify Security Infrastructure -

Fix the firewall, rationalize security infrastructure

-

Reduce complexity in architecture and operations

Page 14 |

© 2009 Palo Alto Networks. Proprietary and Confidential.

Thank You

Additional Information Speeds and Feeds, Deployment, Customers, TCO, Support, and Management

Palo Alto Networks Next-Gen Firewalls

PA-4060

PA-4050

PA-4020

• • • • •

• • • • •

• • • • •

10 Gbps FW 5 Gbps threat prevention 2,000,000 sessions 4 XFP (10 Gig) I/O 4 SFP (1 Gig) I/O

10 Gbps FW 5 Gbps threat prevention 2,000,000 sessions 16 copper gigabit 8 SFP interfaces

2 Gbps FW 2 Gbps threat prevention 500,000 sessions 16 copper gigabit 8 SFP interfaces

PA-2050

PA-2020

PA-500

• • • • •

• • • • •

• • • •

1 Gbps FW 500 Mbps threat prevention 250,000 sessions 16 copper gigabit 4 SFP interfaces Page 17 |

500 Mbps FW 200 Mbps threat prevention 125,000 sessions 12 copper gigabit 2 SFP interfaces

© 2009 Palo Alto Networks. Proprietary and Confidential

250 Mbps FW 100 Mbps threat prevention 50,000 sessions 8 copper gigabit

Leading Organizations Trust Palo Alto Networks Health Care

Financial Services

Government

Media / Entertainment / Retail

Service Providers / Services

Page 18 |

Mfg / High Tech / Energy

© 2009 Palo Alto Networks. Proprietary and Confidential

Education

Fix The Firewall – and Save Money! Capital cost – replace multiple devices



Legacy firewall, IPS, URL filtering device (e.g., proxy, secure web gateway)

-

Cut by as much as 80%

“Hard” operational expenses



Support contracts Subscriptions Power and HVAC

-

Save on “soft” costs too

• -

Page 19 |

Rack space, deployment/integration, headcount, training, help desk calls

© 2009 Palo Alto Networks. Proprietary and Confidential.

Cut by as much as 65%

Legendary Customer Support Experience • Strong TSE team with deep

network security and infrastructure knowledge -

Experience with every major firewall

-

TSEs average over 15 years of experience

• TSEs co-located with

engineering – in Sunnyvale, CA

• Premium and Standard

offerings • Rave reviews from

customers Page 20 |

© 2007 2009 Palo Alto Networks. Proprietary and Confidential Confidential.

Customer support has always been amazing. Whenever I call, I always get someone knowledgeable right away, and never have to wait. They give me the answer I need quickly and completely. Every support rep I have spoken with knows his stuff. -Mark Kimball, Hewlett-Packard

Customer support has been extraordinarily helpful – which is not the norm when dealing with technology companies. Their level of knowledge, their willingness to participate – it’s night and day compared to other companies. It’s an incredible strength of Palo Alto Networks. -James Jones, UPMC

Single-Pass Parallel Processing (SP3) Architecture Single Pass • Operations once per

packet -

Traffic classification (app identification)

-

User/group mapping

-

Content scanning – threats, URLs, confidential data

• One policy

Parallel Processing • Function-specific

parallel processing hardware engines • Separate data/control

planes

Up to 10Gbps, Low Latency Page 21 |

© 2009 Palo Alto Networks. Proprietary and Confidential.

Comprehensive View of Applications, Users & Content • Application Command Center (ACC) -

View applications, URLs, threats, data filtering activity

• Mine ACC data, adding/removing filters as

needed to achieve desired result

Filter on Skype

Page 22 |

Filter on Skype and user oharris

© 2009 Palo Alto Networks. Proprietary and Confidential.

Remove Skype to expand view of oharris

More Documents from "Madhu Thamatam"

Vpn.docx
December 2019 8
Brksec-2028.pdf
December 2019 9
295.pptx
December 2019 17
Project Document.svce.docx
November 2019 33
Seminar Doc Iv.docx
November 2019 31