Palo Alto Networks next page in firewalling Its

  • Slides: 20
Download presentation
Palo Alto Networks – next page in firewalling It’s time to fix the firewall!

Palo Alto Networks – next page in firewalling It’s time to fix the firewall! Tiit Sokolov AS Stallion Page 1 | © 2007 Palo Alto Networks. Proprietary and Confidential

About Palo Alto Networks • Founded in 2005 by security visionary Nir Zuk •

About Palo Alto Networks • Founded in 2005 by security visionary Nir Zuk • World-class team with strong security and networking experience • Innovations: App-ID, User-ID, Content-ID • Builds next-generation firewalls that identify and control more than 900 applications; makes firewall strategic again • Global footprint: presence in 50+ countries, 24/7 support • Named Gartner Cool Vendor in 2008

Application Control Efforts are Failing • Palo Alto Networks’ Application Usage & Risk Report

Application Control Efforts are Failing • Palo Alto Networks’ Application Usage & Risk Report highlights actual behavior of 900, 000 users across more than 60 organizations - Bottom line: despite all having firewalls, and most having IPS, proxies, & URL filtering – none of these organizations could control what applications ran on their networks • Applications evade, transfer files, tunnel other applications, carry threats, consume bandwidth, and can be misused. Applications carry risks: business continuity, data loss, compliance, productivity, and operations costs

Trends

Trends

Applications Have Changed – Firewalls Have Not • The gateway at the trust border

Applications Have Changed – Firewalls Have Not • The gateway at the trust border is the right place to enforce policy control - Sees all traffic - Defines trust boundary Need to Restore Visibility and Control in the Firewall

Sprawl Is Not The Answer Internet • “More stuff” doesn’t solve the problem •

Sprawl Is Not The Answer Internet • “More stuff” doesn’t solve the problem • Firewall “helpers” have limited view of traffic • Complex and costly to buy and maintain • Putting all of this in the same box is just slow

Traditional Multi-Pass Architectures are Slow Application inspection in common UTM is performed on many

Traditional Multi-Pass Architectures are Slow Application inspection in common UTM is performed on many inspection modules (IPS, AV, WF, etc. ) based on products from different vendors. • It makes huge performance degradation. IPS Policy AV Signatures URL Filtering Policy IPS Signatures HTTP Decoder IPS Decoder AV Decoder & Proxy Port/Protocol-based ID L 2/L 3 Networking, HA, Config Management, Reporting Firewall Policy Port/Protocol-based ID L 2/L 3 Networking, HA, Config Management, Reporting

Palo Alto Networks – unique features Performs accurate application inspection (IPS, AV, etc. )

Palo Alto Networks – unique features Performs accurate application inspection (IPS, AV, etc. ) without performance degradation (one inspection path - shared database of universal signatures, purpose-built hardware architecture). Policy Engine Data Filtering Content-ID URL Filtering Threat Prevention Application Protocol Decoding Application Protocol Detection and Decryption App-ID Application Signatures Heuristics User-ID L 2/L 3 Networking, HA, Config Management, Reporting

Single-Pass Parallel Processing (SP 3) Architecture Single Pass • Operations once per packet -

Single-Pass Parallel Processing (SP 3) Architecture Single Pass • Operations once per packet - Traffic classification (app identification) - User/group mapping - Content scanning – threats, URLs, confidential data • One policy Parallel Processing • Function-specific parallel processing hardware engines • Separate data/control planes Up to 10 Gbps, Low Latency

The Right Answer: Make the Firewall Do Its Job New Requirements for the Firewall

The Right Answer: Make the Firewall Do Its Job New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Protect in real-time against threats embedded across applications 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, in-line deployment with no performance degradation

Identification Technologies Transform the Firewall App-ID Identify the application User-ID Identify the user Content-ID

Identification Technologies Transform the Firewall App-ID Identify the application User-ID Identify the user Content-ID Scan the content

Enables Visibility Into Applications, Users, and Content Page 15 | © 2008 2009 Palo

Enables Visibility Into Applications, Users, and Content Page 15 | © 2008 2009 Palo Alto Networks. Proprietary and Confidential.

PAN-OS Core Firewall Features Visibility and control of applications, users and content complement core

PAN-OS Core Firewall Features Visibility and control of applications, users and content complement core firewall features • Strong networking foundation - Dynamic routing (OSPF, RIPv 2) - Tap mode – connect to SPAN port - Virtual wire (“Layer 1”) for true transparent in-line deployment - L 2/L 3 switching foundation • VPN - Site-to-site IPSec VPN - SSL VPN • Qo. S traffic shaping - Max/guaranteed and priority - By user, app, interface, zone, and more • Zone-based architecture - All interfaces assigned to security zones for policy enforcement PA-4060 • High Availability - Active / passive PA-4050 - Configuration and session synchronization - Path, link, and HA monitoring • Virtual Systems - Establish multiple virtual firewalls in a single device (starting from PA-2000 Series) • Simple, flexible management PA-4020 PA-2050 PA-2020 - CLI, Web, Panorama, SNMP, Syslog PA-500

Flexible Deployment Options Visibility • Application, user and content visibility without inline deployment Transparent

Flexible Deployment Options Visibility • Application, user and content visibility without inline deployment Transparent In-Line • IPS with app visibility & control • Consolidation of IPS & URL filtering Firewall Replacement • Firewall replacement with app visibility & control • Firewall + IPS + URL filtering

Site-to-Site and Remote Access VPN Site-to-site VPN connectivity Remote user connectivity • Secure connectivity

Site-to-Site and Remote Access VPN Site-to-site VPN connectivity Remote user connectivity • Secure connectivity - Standards-based site-to-site IPSec VPN - SSL VPN for remote access • Policy-based visibility and control over applications, users and content for all VPN traffic • Included as features in PAN-OS at no extra charge

Traffic Shaping Expands Policy Control Options • Traffic shaping policies ensure business applications are

Traffic Shaping Expands Policy Control Options • Traffic shaping policies ensure business applications are not bandwidth starved - Guaranteed and maximum bandwidth settings - Flexible priority assignments, hardware accelerated queuing - Apply traffic shaping policies by application, user, source, destination, interface, IPSec VPN tunnel and more • Enables more effective deployment of appropriate application usage policies • Included as a feature in PAN-OS at no extra charge

Flexible Policy Control Responses • Intuitive policy editor enables appropriate usage policies with flexible

Flexible Policy Control Responses • Intuitive policy editor enables appropriate usage policies with flexible policy responses • Allow or deny individual application usage • Allow but apply IPS, scan for viruses, spyware • Control applications by category, subcategory, technology or characteristic • Apply traffic shaping (guaranteed, priority, maximum) • Decrypt and inspect SSL • Allow for certain users or groups within AD • Allow or block certain application functions • Control excessive web surfing • Allow based on schedule • Look for and alert or block file or data transfer

Enterprise Device and Policy Management • Intuitive and flexible management - CLI, Web, Panorama,

Enterprise Device and Policy Management • Intuitive and flexible management - CLI, Web, Panorama, SNMP, Syslog - Role-based administration enables delegation of tasks to appropriate person • Panorama central management application - Shared policies enable consistent application control policies - Consolidated management, logging, and monitoring of Palo Alto Networks devices - Consistent web interface between Panorama and device UI - Network-wide ACC/monitoring views, log collection, and reporting • All interfaces work on current configuration, avoiding sync issues

Our Platform Family… 10 Gbps; 5 Gbps threat prevention (XFP interfaces) Performance 10 Gbps;

Our Platform Family… 10 Gbps; 5 Gbps threat prevention (XFP interfaces) Performance 10 Gbps; 5 Gbps threat prevention 2 Gbps; 2 Gbps threat prevention • PA-4000 Series • 1 Gbps; 500 Mbps threat prevention • 500 Mbps; 200 Mbps threat prevention • 250 Mbps; 100 Mbps threat prevention Remote Office/ Medium Enterprise • PA-2000 Series • PA-500 Large Enterprise

Leading Organizations Trust Palo Alto Networks Health Care Financial Services Government Media / Entertainment

Leading Organizations Trust Palo Alto Networks Health Care Financial Services Government Media / Entertainment / Retail Service Providers / Services Mfg / High Tech / Energy Education