SlideShare a Scribd company logo
1 of 17
Download to read offline
the network security company
tm
Palo Alto Networks Overview
Carlos Alberto Pérez
Systems Engineer Manager LATAM
cperez@paloaltonetworks.com
Palo Alto Networks at a Glance
Corporate highlights
Founded in 2005; first customer shipment in 2007
Safely enabling applications
Able to address all network security needs
Exceptional ability to support global customers
Experienced technology and management team
1,000+ employees globally
1,800
4,700
11,000
0
2,000
4,000
6,000
8,000
10,000
12,000
Jul-10 Jul-11
$13
$49
$255
$119
$0
$50
$100
$150
$200
$250
$300
FY09 FY10 FY11 FY12
Revenue
Enterprise customers
$MM
FYE July
Feb-13
2 | ©2013, Palo Alto Networks. Confidential and
Proprietary.
Applications Have Changed, Firewalls Haven’t
3 | ©2012, Palo Alto Networks. Confidential and
Proprietary.
• Network security policy is
enforced at the firewall
•  Sees all traffic
•  Defines boundary
•  Enables access
• Traditional firewalls don’t work any
more
The Right Answer: Make the Firewall Do Its Job
© 2011 Palo Alto Networks. Proprietary and Confidential.Page 4 |
New Requirements for the Firewall
1. Identify applications regardless of port,
protocol, evasive tactic or SSL
2. Identify users regardless of IP address
3. Protect in real-time against threats
embedded across applications
4. Fine-grained visibility and policy control
over application access / functionality
5. Multi-gigabit, in-line deployment with no
performance degradation
Enabling Applications, Users and Content
5 | ©2012, Palo Alto Networks. Confidential and
Proprietary.
Single-Pass Parallel Processing™ (SP3) Architecture
© 2011 Palo Alto Networks. Proprietary and Confidential.Page 6 |
Single Pass
•  Operations once per
packet
-  Traffic classification (app
identification)
-  User/group mapping
-  Content scanning –
threats, URLs,
confidential data
•  One policy
Parallel Processing
•  Function-specific parallel
processing hardware
engines
•  Separate data/control
planes
• Up to 20Gbps, Low Latency
Application Control Belongs in the Firewall
• Port Policy
Decision
• App Ctrl Policy
Decision
Application Control as an Add-on
•  Port-based decision first, apps second
•  Applications treated as threats; only block what
you expressly look for
Ramifications
•  Two policies/log databases, no reconciliation
•  Unable to effectively manage unknowns
IPS
Applications
Firewall
PortTraffic
Firewall IPS
• App Ctrl Policy
Decision
• Scan Application
for Threats
Applications
ApplicationTraffic
Application Control in the Firewall
•  Firewall determines application identity; across all
ports, for all traffic, all the time
•  All policy decisions made based on application
Ramifications
•  Single policy/log database – all context is shared
•  Policy decisions made based on shared context
•  Unknowns systematically managed
7 | ©2012, Palo Alto Networks. Confidential and
Proprietary.
NGFW in The Enterprise NetworkPerimeter
• App visibility and
control in the
firewall
• All apps, all ports,
all the time
• Prevent threats
• Known threats
• Unknown/
targeted malware
• Simplify security
infrastructure
DataCenter
• Network
segmentation
• Based on
application and
user, not port/IP
• Simple, flexible
network security
• Integration into all
DC designs
• Highly available,
high performance
• Prevent threats
DistributedEnterprise
• Consistent
network security
everywhere
• HQ/branch
offices/remote
and mobile users
• Logical perimeter
• Policy follows
applications and
users, not
physical location
• Centrally
managed
8 | ©2012, Palo Alto Networks. Confidential and
Proprietary.
Flexible Deployment Options
Visibility Transparent In-Line Firewall Replacement
•  Application, user and content
visibility without inline
deployment
•  IPS with app visibility & control
•  Consolidation of IPS & URL
filtering
•  Firewall replacement with app
visibility & control
•  Firewall + IPS
•  Firewall + IPS + URL filtering
© 2011 Palo Alto Networks. Proprietary and Confidential.Page 9 |
WildFire Architecture
© 2011 Palo Alto Networks. Proprietary and Confidential.Page 10 |
✓ ✓
✓
• WildFire Analysis Center!
• Potentially malicious
files from Internet
• Protection delivered to
all customer firewalls
• Policy-based forwarding to
WildFire for analysis
•  Sandbox-based analysis looks for over
80 malicious behaviors
•  Generates detailed forensics report
•  Creates antivirus and C&C signatures
0	
  
1,000	
  
2,000	
  
3,000	
  
4,000	
  
5,000	
  
6,000	
  
7,000	
  
8,000	
  
9,000	
  
1	
   3	
   5	
   7	
   9	
   11	
   13	
   15	
   17	
   19	
   21	
   23	
   25	
   27	
   29	
   31	
   33	
   35	
  
Hours	
  
The First 24 Hours is Critical
• 11 | ©2012, Palo Alto Networks. Confidential and Proprietary.
* Sample size = 50 malware files
What is the WF-500?
§  Appliance-based version of the WildFire
sandbox for on-premises, private cloud
deployments
§  Ideal for customers that want to avoid sending
all files to the public cloud
§  All files analyzed locally on the WF-500
§  Identical detection as the public cloud
§  Optionally sends confirmed malware to the WildFire
public cloud for signature generation
§  Provides a private cloud where all firewalls can
integrate with the WF-500
• WildFire Cloud
• All unknown files
• Confirmed
Malware
• (optional)
• Signatures
• Customer
Firewalls
• Local Customer Network
• 12 | ©2013 Palo Alto Networks. Confidential and Proprietary.
© 2011 Palo Alto Networks. Proprietary and ConfidentialPage 13 |
PA-­‐3050	
  
•  4 Gbps FW
•  2 Gbps Threat Prevention
•  500,000 sessions
•  8 SFP, 12 copper gigabit
PA-­‐3020	
  
•  2 Gbps FW
•  1 Gbps Threat Prevention
•  250,000 sessions
•  8 SFP, 12 copper gigabit
PA-­‐500	
  
•  250 Mbps FW
•  100 Mbps Threat Prevention
•  64,000 sessions
•  8 copper gigabit
PA-­‐200	
  
•  100 Mbps FW
•  50 Mbps Threat
Prevention
•  64,000 sessions
•  4 copper gigabit
Palo Alto Networks Next-Gen Firewalls
PA-­‐5050	
  
•  10	
  Gbps	
  FW	
  
•  5	
  Gbps	
  threat	
  preven:on	
  
•  2,000,000	
  sessions	
  
•  4	
  SFP+	
  (10	
  Gig),	
  8	
  SFP	
  (1	
  Gig),	
  
12	
  copper	
  gigabit	
  
PA-­‐5020	
  
•  5	
  Gbps	
  FW	
  
•  2	
  Gbps	
  threat	
  preven:on	
  
•  1,000,000	
  sessions	
  
•  8	
  SFP,	
  12	
  copper	
  gigabit	
  
PA-­‐5060	
  
•  20	
  Gbps	
  FW	
  
•  10	
  Gbps	
  threat	
  preven:on	
  
•  4,000,000	
  sessions	
  
•  4	
  SFP+	
  (10	
  Gig),	
  8	
  SFP	
  (1	
  Gig),	
  
12	
  copper	
  gigabit	
  
Segmenting Traffic in the Virtual Datacenter
•  Hardware firewalls will continue to be deployed to secure and segment
datacenters at the edge and for legacy servers
•  VM-Series introduces the ability for secure segmentation to be done within
VMware ESXi
14 | ©2012, Palo Alto Networks. Confidential and Proprietary.
• VLAN	
   • VLAN	
  
Panorama Distributed Architecture
§  With M-100, manager and log collector functions can be split
§  Deploy multiple log collectors to scale collection infrastructure
• 15 | ©2012, Palo Alto Networks. Confidential and Proprietary.
© 2009 Palo Alto Networks. Proprietary and Confidential.Page 16 |
New Threats Require a Different Model for IPS Functions
•  Stand-alone IPS has a negative security
model – can only “find it and kill it”
•  Stand-alone IPS can’t see into growing
volumes of SSL-encrypted traffic, nor
into compressed content
•  Next-generation firewalls enable “allow
application, but scan for threats” policy
response
•  Gartner’s Recommendations:
-  Move to next-generation firewalls at
the next refresh opportunity – whether
for firewall, IPS, or the combination of
the two.
• 17 | ©2012, Palo Alto Networks. Confidential and Proprietary.

More Related Content

What's hot

McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMIftikhar Ali Iqbal
 
Big ip f5 ltm load balancing methods
Big ip f5 ltm load balancing methodsBig ip f5 ltm load balancing methods
Big ip f5 ltm load balancing methodsUtpal Sinha
 
Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancerxKinAnx
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering conceptMostafa El Lathy
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?Haris Chughtai
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces conceptsMostafa El Lathy
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authenticationAlberto Rivai
 
Palo alto NGfw2023.pptx
Palo alto  NGfw2023.pptxPalo alto  NGfw2023.pptx
Palo alto NGfw2023.pptxahmad661583
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Fortinet
FortinetFortinet
FortinetABEP123
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy conceptsMostafa El Lathy
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution hashnees
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 

What's hot (20)

McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
Big ip f5 ltm load balancing methods
Big ip f5 ltm load balancing methodsBig ip f5 ltm load balancing methods
Big ip f5 ltm load balancing methods
 
Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancer
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering concept
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
Palo alto NGfw2023.pptx
Palo alto  NGfw2023.pptxPalo alto  NGfw2023.pptx
Palo alto NGfw2023.pptx
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Fortinet
FortinetFortinet
Fortinet
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy concepts
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 

Similar to Palo Alto Networks y la tecnología de Next Generation Firewall

Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablementresponsedatacomms
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 
Pangpse training q12011
Pangpse training q12011Pangpse training q12011
Pangpse training q12011Joe Palo Alto
 
Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Russia
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Decisions
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Zscaler
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overviewStef Coetzee
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteCohesive Networks
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsJay Bryant
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...TheAnfieldGroup
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 

Similar to Palo Alto Networks y la tecnología de Next Generation Firewall (20)

Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablement
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Protegendo sua cloud
Protegendo sua cloud Protegendo sua cloud
Protegendo sua cloud
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
Pangpse training q12011
Pangpse training q12011Pangpse training q12011
Pangpse training q12011
 
Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed Networking
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Security events in 2014
Security events in 2014Security events in 2014
Security events in 2014
 
2012 ah apj keynote - technology update
2012 ah apj   keynote - technology update2012 ah apj   keynote - technology update
2012 ah apj keynote - technology update
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
 

More from Mundo Contact

Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Mundo Contact
 
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Mundo Contact
 
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Mundo Contact
 
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Mundo Contact
 
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Mundo Contact
 
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Mundo Contact
 
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Mundo Contact
 
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Mundo Contact
 
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Mundo Contact
 
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Mundo Contact
 
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Mundo Contact
 
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Mundo Contact
 
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Mundo Contact
 
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Mundo Contact
 
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Mundo Contact
 
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Mundo Contact
 
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Mundo Contact
 
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Mundo Contact
 
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Mundo Contact
 
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Mundo Contact
 

More from Mundo Contact (20)

Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
 
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
 
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016
 
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016
 
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016
 
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016
 
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016
 
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015
 
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015
 
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015
 
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015
 
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015
 
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015
 
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015
 
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015
 
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015
 
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015
 
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015
 
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015
 
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Palo Alto Networks y la tecnología de Next Generation Firewall

  • 1. the network security company tm Palo Alto Networks Overview Carlos Alberto Pérez Systems Engineer Manager LATAM cperez@paloaltonetworks.com
  • 2. Palo Alto Networks at a Glance Corporate highlights Founded in 2005; first customer shipment in 2007 Safely enabling applications Able to address all network security needs Exceptional ability to support global customers Experienced technology and management team 1,000+ employees globally 1,800 4,700 11,000 0 2,000 4,000 6,000 8,000 10,000 12,000 Jul-10 Jul-11 $13 $49 $255 $119 $0 $50 $100 $150 $200 $250 $300 FY09 FY10 FY11 FY12 Revenue Enterprise customers $MM FYE July Feb-13 2 | ©2013, Palo Alto Networks. Confidential and Proprietary.
  • 3. Applications Have Changed, Firewalls Haven’t 3 | ©2012, Palo Alto Networks. Confidential and Proprietary. • Network security policy is enforced at the firewall •  Sees all traffic •  Defines boundary •  Enables access • Traditional firewalls don’t work any more
  • 4. The Right Answer: Make the Firewall Do Its Job © 2011 Palo Alto Networks. Proprietary and Confidential.Page 4 | New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Protect in real-time against threats embedded across applications 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, in-line deployment with no performance degradation
  • 5. Enabling Applications, Users and Content 5 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 6. Single-Pass Parallel Processing™ (SP3) Architecture © 2011 Palo Alto Networks. Proprietary and Confidential.Page 6 | Single Pass •  Operations once per packet -  Traffic classification (app identification) -  User/group mapping -  Content scanning – threats, URLs, confidential data •  One policy Parallel Processing •  Function-specific parallel processing hardware engines •  Separate data/control planes • Up to 20Gbps, Low Latency
  • 7. Application Control Belongs in the Firewall • Port Policy Decision • App Ctrl Policy Decision Application Control as an Add-on •  Port-based decision first, apps second •  Applications treated as threats; only block what you expressly look for Ramifications •  Two policies/log databases, no reconciliation •  Unable to effectively manage unknowns IPS Applications Firewall PortTraffic Firewall IPS • App Ctrl Policy Decision • Scan Application for Threats Applications ApplicationTraffic Application Control in the Firewall •  Firewall determines application identity; across all ports, for all traffic, all the time •  All policy decisions made based on application Ramifications •  Single policy/log database – all context is shared •  Policy decisions made based on shared context •  Unknowns systematically managed 7 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 8. NGFW in The Enterprise NetworkPerimeter • App visibility and control in the firewall • All apps, all ports, all the time • Prevent threats • Known threats • Unknown/ targeted malware • Simplify security infrastructure DataCenter • Network segmentation • Based on application and user, not port/IP • Simple, flexible network security • Integration into all DC designs • Highly available, high performance • Prevent threats DistributedEnterprise • Consistent network security everywhere • HQ/branch offices/remote and mobile users • Logical perimeter • Policy follows applications and users, not physical location • Centrally managed 8 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 9. Flexible Deployment Options Visibility Transparent In-Line Firewall Replacement •  Application, user and content visibility without inline deployment •  IPS with app visibility & control •  Consolidation of IPS & URL filtering •  Firewall replacement with app visibility & control •  Firewall + IPS •  Firewall + IPS + URL filtering © 2011 Palo Alto Networks. Proprietary and Confidential.Page 9 |
  • 10. WildFire Architecture © 2011 Palo Alto Networks. Proprietary and Confidential.Page 10 | ✓ ✓ ✓ • WildFire Analysis Center! • Potentially malicious files from Internet • Protection delivered to all customer firewalls • Policy-based forwarding to WildFire for analysis •  Sandbox-based analysis looks for over 80 malicious behaviors •  Generates detailed forensics report •  Creates antivirus and C&C signatures
  • 11. 0   1,000   2,000   3,000   4,000   5,000   6,000   7,000   8,000   9,000   1   3   5   7   9   11   13   15   17   19   21   23   25   27   29   31   33   35   Hours   The First 24 Hours is Critical • 11 | ©2012, Palo Alto Networks. Confidential and Proprietary. * Sample size = 50 malware files
  • 12. What is the WF-500? §  Appliance-based version of the WildFire sandbox for on-premises, private cloud deployments §  Ideal for customers that want to avoid sending all files to the public cloud §  All files analyzed locally on the WF-500 §  Identical detection as the public cloud §  Optionally sends confirmed malware to the WildFire public cloud for signature generation §  Provides a private cloud where all firewalls can integrate with the WF-500 • WildFire Cloud • All unknown files • Confirmed Malware • (optional) • Signatures • Customer Firewalls • Local Customer Network • 12 | ©2013 Palo Alto Networks. Confidential and Proprietary.
  • 13. © 2011 Palo Alto Networks. Proprietary and ConfidentialPage 13 | PA-­‐3050   •  4 Gbps FW •  2 Gbps Threat Prevention •  500,000 sessions •  8 SFP, 12 copper gigabit PA-­‐3020   •  2 Gbps FW •  1 Gbps Threat Prevention •  250,000 sessions •  8 SFP, 12 copper gigabit PA-­‐500   •  250 Mbps FW •  100 Mbps Threat Prevention •  64,000 sessions •  8 copper gigabit PA-­‐200   •  100 Mbps FW •  50 Mbps Threat Prevention •  64,000 sessions •  4 copper gigabit Palo Alto Networks Next-Gen Firewalls PA-­‐5050   •  10  Gbps  FW   •  5  Gbps  threat  preven:on   •  2,000,000  sessions   •  4  SFP+  (10  Gig),  8  SFP  (1  Gig),   12  copper  gigabit   PA-­‐5020   •  5  Gbps  FW   •  2  Gbps  threat  preven:on   •  1,000,000  sessions   •  8  SFP,  12  copper  gigabit   PA-­‐5060   •  20  Gbps  FW   •  10  Gbps  threat  preven:on   •  4,000,000  sessions   •  4  SFP+  (10  Gig),  8  SFP  (1  Gig),   12  copper  gigabit  
  • 14. Segmenting Traffic in the Virtual Datacenter •  Hardware firewalls will continue to be deployed to secure and segment datacenters at the edge and for legacy servers •  VM-Series introduces the ability for secure segmentation to be done within VMware ESXi 14 | ©2012, Palo Alto Networks. Confidential and Proprietary. • VLAN   • VLAN  
  • 15. Panorama Distributed Architecture §  With M-100, manager and log collector functions can be split §  Deploy multiple log collectors to scale collection infrastructure • 15 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 16. © 2009 Palo Alto Networks. Proprietary and Confidential.Page 16 | New Threats Require a Different Model for IPS Functions •  Stand-alone IPS has a negative security model – can only “find it and kill it” •  Stand-alone IPS can’t see into growing volumes of SSL-encrypted traffic, nor into compressed content •  Next-generation firewalls enable “allow application, but scan for threats” policy response •  Gartner’s Recommendations: -  Move to next-generation firewalls at the next refresh opportunity – whether for firewall, IPS, or the combination of the two.
  • 17. • 17 | ©2012, Palo Alto Networks. Confidential and Proprietary.