SlideShare a Scribd company logo
1 of 49
Palo Alto Networks: Protection for
Security & Compliance
Matt Lehwess - Partner Solutions Architect, AWS
Matt Keil – Director of Product Marketing, Palo Alto Networks
Matt McLimans – Network Security Engineer, Warren Rogers
$6.53M 56% 70%
https://www.csid.com/resources/stats/data-
breaches/
Increase in theft of hard
intellectual property
http://www.pwc.com/gx/en/issues/cyber-
security/information-security-survey.html
Of consumers indicated
they’d avoid businesses
following a security breach
https://www.csid.com/resources/stats/data-
breaches/
Average cost of a
data breach
Your Data and IPAre Your Most Valuable Assets
AWS Can Be More Secure than Your Existing
Environment
In June 2015, IDC released a report which found that most customers can be more secure
in AWS than their on-premises environment. How?
Automating logging
and monitoring
Simplifying
resource access
Making it easy to
encrypt properly
Enforcing strong
authentication
AWS Foundation Services
Compute Storage Database Networking
AWS Global Infrastructure
Regions
Availability Zones
Edge Locations
Identity &
Access Control
Network
Security
Customer applications & content
You get to
define your
controls ON
the Cloud
AWS takes
care of the
security OF
the Cloud
You
Inventory
& Config
Data
Encryption
AWS and you share responsibility for security
Constantly Monitored
The AWS infrastructure is protected by extensive network and security
monitoring systems:
 Network access is monitored by AWS
security managers daily
 AWS CloudTrail lets you monitor
and record all API calls
 Amazon Inspector automatically assesses
applications for vulnerabilities
Highly Available
The AWS infrastructure footprint protects your data from costly downtime
 38 Availability Zones in 14 regions for
multi-synchronous geographic redundancy
 Retain control of where your data resides
for compliance with regulatory requirements
 Mitigate the risk of DDoS attacks using
services like AutoScaling, Route 53
Integrated with Your Existing Resources
AWS enables you to improve your security using many of your existing
tools and practices
 Integrate your existing Active Directory
 Use dedicated connections as a secure,
low-latency extension of your data center
 Provide and manage your own encryption
keys if you choose
Key AWS Certifications and Assurance Programs
Palo Alto Networks and the
VM-Series on AWS
Matt Keil – Director of Product Marketing, Palo Alto Networks
* Non-GAAP financial measures. See appendix for reconciliation to most comparable GAAP measure.
Revenue
Customers
About Palo Alto Networks
Corporate Highlights
 Founded in 2005; first customer
shipment in 2007
 Safely enable applications and prevent
cyber threats
 Addressing all enterprise
cybersecurity needs
 Exceptional ability to support
global customers
 Experienced team of 3,800+
employees
 Q4 FY16: $401.8M revenue
Applications and Data Are the Target
The attack life cycle applies to both physical or virtualized networks in the cloud
Infect User Gain Foothold Move Laterally
Steal Data
Build Botnets
Harvest Bitcoin
Execute Goal:
On the network
or in the Cloud
Shared Security Model: Where We Can Help
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Encryption Key
Management
Client & Server
Encryption
Network Traffic
Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer content
Where
Palo Alto
Networks
Can Help
Customer Responsibility
Security on the Cloud
AWS Responsibility
Security of the Cloud
VM-Series Next-Generation Firewall on AWS
• Identifies and controls applications across all ports
• Prevents known/unknown threats targeted at your AWS deployment
• Enforces policy consistency with centralized management
• Automates deployment and policy updates
Segmentation: Separate
applications and data for
security and compliance
Deployment Use Cases
GlobalProtect: Policy
consistency for the cloud, the
network, and your devices
All use cases supported in AWS standard regions and AWS GovCloud (US)
Gateway: Protection from
Internet borne threats
Licensing Options
Consumption based licensing
 Two bundles available as annual or
hourly subscriptions
Bring your own license (BYOL)
 Pick and choose licenses,
subscriptions and support to best
suite our needs
 Supported in AWS standard
regions and AWS GovCluod (US)
Auto Scaling the VM-Series on AWS
As workload traffic
increases, security scales
independently of workloads
Note: Auto Scaling the VM-Series on AWS uses AWS Marketplace Bundle 1 or Bundle 2,
in either an annual or an hourly subscription.
Security Groups, WAF, or Next-gen Firewall?
Native AWS security includes Security Groups and Web Application Firewall
Security Groups and ACLs
 Port-based filtering only
 No visibility traffic at the
application level
 Unable to prevent threats
 Cannot control file movement
Web Application Firewalls
 Customized for each application/environment
 Focused narrowly on public facing web
applications on HTTP/HTTPs
 No visibility, control, or protection on other
applications
Customer Success Story: How
Warren Rogers Achieved PCI
Compliance on AWS
Matt McLimans – Network Security Engineer, Warren Rogers
Warren Rogers Services
Variance
reports
Tank
activity
Sales
by hour
Unexplained
removals
Delivery
reports
Dispenser/Probe
out summary
All-Point
monitoring
system that
provides the
most
accurate and
complete
information
about fueling
operations
Customer Store Network
Warren Rogers’ Network
Our Operation
Our Device
“OSP”
AWS as Level 1 Service Provider
Lowest cost PCI
complaint cloud
service.
Reduce and implify
scoped environment.
If required, provides
forensic
investigations
A B
AWS PCI Compliant Services
CloudWatch BeanStalk
SNSSES
FederationIAMCloud TrailCloud FormationOpsWork
SQS Elastic Transcoder Cloud Search SWF
Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront
Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier
Monitoring Deployment & Management Identity & Access
Application Services
Databases Analytics
Compute Storage Networking
Content Delivery
AppStream
EBS
Deployment
&Management
Application
ServicesFoundationServices
RDS
AWS PCI Compliant Services
CloudWatch BeanStalk
SNSSES
FederationIAMCloud TrailCloud FormationOpsWork
SQS Elastic Transcoder Cloud Search SWF
Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront
Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier
Monitoring Deployment & Management Identity & Access
Application Services
Databases Analytics
Compute Storage Networking
Content Delivery
AppStream
EBS
Deployment
&Management
Application
ServicesFoundationServices
RDS
AWS PCI Compliant Services
CloudWatch BeanStalk
SNSSES
FederationIAMCloud TrailCloud FormationOpsWork
SQS Elastic Transcoder Cloud Search SWF
Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront
Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier
Monitoring Deployment & Management Identity & Access
Application Services
Databases Analytics
Compute Storage Networking
Content Delivery
AppStream
EBS
Deployment
&Management
Application
ServicesFoundationServices
RDS
The PCI Challenge for Warren Rogers
How do we protect ourselfs?
Warren Rogers’ Network
Customer Store Network
The PCI Challenge for Warren Rogers
How do we protect ourself?
Warren Rogers’ Network
Customer Store Network
The PCI Challenge for Warren Rogers
How do we protect ourself?
Warren Rogers’ Network
Customer Store Network
Challenges
Previously non-compliant
Questions to Answer
 How can we secure transmission to AWS?
 How do we know if we inadvertently collect cardholder data?
 How do we ensure all our boxes are running PCI required applications?
 How can we standardized access to our OSPs?
Thousands of remote devices Various deployments within
diverse customer environments
CIDR: 10.0.0.0/16 CIDR: 172.17.0.0/24 CIDR: 192.168.3.0/8
Customer A Network Customer B Network Customer n Network
What We Had…
Warren Rogers’ Network
WR Custom IP Range 1 WR Custom IP Range 1 WR Custom IP Range 1
Customer A Network Customer B Network Customer n Network
What We Wanted…
Secure Comm. Secure Comm.
One Access Method
Warren Rogers’ Network
Using Palo Alto Networks to Achieve Our Goal
GlobalProtect
 Encryption
 HIP Profiles
LSVPN
 Reducing latency
 Increasing redundancy
 Increasing global presence
Access Policies
 Data filtering
 Removing uncertainty
 Jump server
GlobalProtect: Use Case
HIP Check
A Unique Deployment
 Installed on OSP
 Pre-Log On
Benefits
 User-ID
 Exceeding PCI requirements.
 Complete insight into data transmission
 Centrally managed & IP Assignment
 HIP Checks & LDAP Segregation Control
Host Information in Policy Enforcement (HIP)
Stages
1. GlobalProtect agent collects information.
2. Agent submits host information.
3. Gateway matches host information against HIP
objects and HIP profiles.
Key Advantages
 Centrally managed from Palo Alto Networks.
 Easy configuration changes & granular policies.
 Custom application IDs.
 Allow box to connect, but notify personnel of
compliance mismatch.
 Routine checks on all OSPs, removes worry.
Firewall Status Data Encryption
Patch Management Anti-Virus
Data Filtering for CHD
CHD Filtering
 Predefined data pattern
 Looks for 16 digit card numbers
through hash algorithm (less false
positives)
 Scan all data or only certain file
types (.pdf .txt .csv ….)
Alerting on CHD Detected
 Contact customer immediately
that their network is passing CHD
to our OSP
Out of
Scope for
Compliance
LSVPN
1. Amazon Data Centers
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
LSVPN
1. Amazon Data Centers
2. Geo-located OSPs
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
LSVPN
1. Amazon Data Centers
2. Geo-located OSPs
3. Palo Alto Networks VM-300 Portal
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
PORTAL
LSVPN
1. Amazon Data Centers
2. Geo-located OSPs
3. Palo Alto Networks VM-300 Portal
4. Palo Alto Networks VM-300 Satellites
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
CA.SAT02
OR.SAT01
PORTAL
VA.SAT01
CA.SAT01
LSVPN
1. Amazon Data Centers
2. Geo-located OSPs
3. Palo Alto Networks VM-300 Portal
4. Palo Alto Networks VM-300 Satellites
5. Connecting LSVPN
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
CA.SAT02
OR.SAT01
PORTAL
VA.SAT01
CA.SAT01
LSVPN
1. Amazon Data Centers
2. Geo-located OSPs
3. Palo Alto Networks VM-300 Portal
4. Palo Alto Networks VM-300 Satellites
5. Connecting LSVPN
6. GlobalProtect to WR defined satellites
Key
LSVPN Tunnel
GlobalProtect
AWS Data Center
OSPs
Palo Alto
Networks
VM-Series
CA.SAT02
OR.SAT01
PORTAL
VA.SAT01
CA.SAT01
ADDS & Group Policy
LSVPN
Portal Private Network
Oregon
Satellite 1
Virginia
Portal
Satellite Private Network
Active Directory Servers
Break devices into
organizational units
 Geography
 Customer type
 …really anything
Advantages of ADDS
 Sync with Palo Alto Networks Firewalls
 Addressable remote devices by DNS
 Powerful tools available
Group Policy
 “Touch one, configure many”
 Floor to ceiling security model
Active Directory Servers
OSP Default PCI Policy
Customer A
Policy
Site 1 Policy
Group Policy Hierarchy
Private Subnet
Ec2
Public Subnet
Easy Deployment
Infrastructure:
 An AWS VPC.
 A public and private subnet.
 EC2 instances to protect.
Private Subnet
Ec2
Public Subnet
Easy Deployment
Infrastructure:
 An AWS VPC
 A public and private subnet
 EC2 instances to protect
Deployment:
 Launch Palo Alto Networks VM-
Series from the AWS Marketplace.
Private Subnet
Ec2
Tune VM-Series
Public Subnet
Easy Deployment
Infrastructure:
 An AWS VPC.
 A public and private subnet.
 EC2 instances to protect.
Deployment:
 Launch Palo Alto Networks VM-
Series from the AWS Marketplace.
 Tune VM-Series to protect from
network threats.
Private Subnet
Ec2
Simplify
Security
Groups
Tune VM-Series
Public Subnet
Easy Deployment
Infrastructure:
 An AWS VPC
 A public and private subnet
 EC2 instances to protect
Deployment:
 Launch Palo Alto Networks VM-
Series from the AWS Marketplace.
 Tune VM-Series to protect from
network threats.
 Simplify EC2 Security Groups
Making Compliance Easy with Palo Alto Networks
Least Access Control Logging & Flexibility Segmentation
 Reduced Scope
 Reduced Cost
 Reduced Threat
 Changes are
unavoidable for
productive organizations
 Active Directory
 Proof of policy controls
Making Compliance Easy with Palo Alto Networks
CHD
Network
Non-CHD Network
Flat Network Segmented Network
Whole Network
Cardholder servers
4
4
Flat Network
Segmented Network
Total servers
100
100
Open audit scope
100
4
Reduction of audit scope
0%
96%
Some Tips Before I Go…
Reach beyond PCI requirements for security.
 If you don’t have a security plan, use PCI as a base line.
Avoid expensive mistakes!
 Involve a QSA, a Palo Alto Networks Engineer, and your team on all major design decisions.
Remember, a single credit card number is a liability.
 Cost of CHD Compromise > Cost of PCI Compliance
Evaluate whether or not you can eliminate the reasons for necessary compliance.
 Ensure the benefit of touching CHD is greater than the liability.
Compliance with and without is Palo Alto Networks
 “Uncertainty in Compliance” v. “Certainty in Compliance”
Q&A
Matt Lehwess - Partner Solutions Architect, AWS
Matt Keil – Director of Product Marketing, Palo Alto Networks
Matt McLimans – Network Security Engineer, Warren Rogers

More Related Content

What's hot

Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall conceptsMostafa El Lathy
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma AccessHaris Chughtai
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityOry Segal
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio updateAtanas Gergiminov
 
AWS Direct Connect: Deep Dive (NET403) - AWS re:Invent 2018
AWS Direct Connect: Deep Dive (NET403) - AWS re:Invent 2018AWS Direct Connect: Deep Dive (NET403) - AWS re:Invent 2018
AWS Direct Connect: Deep Dive (NET403) - AWS re:Invent 2018Amazon Web Services
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 

What's hot (20)

Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall concepts
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application Security
 
SD WAN
SD WANSD WAN
SD WAN
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 
AWS Direct Connect: Deep Dive (NET403) - AWS re:Invent 2018
AWS Direct Connect: Deep Dive (NET403) - AWS re:Invent 2018AWS Direct Connect: Deep Dive (NET403) - AWS re:Invent 2018
AWS Direct Connect: Deep Dive (NET403) - AWS re:Invent 2018
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 

Viewers also liked

End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...BAKOTECH
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...SWITCHPOINT NV/SA
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authenticationAlberto Rivai
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logicAlberto Rivai
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configurationAlberto Rivai
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewallpillardata
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
certificate VSP - SV (Server Virtualization 2016)
certificate VSP - SV (Server Virtualization 2016)certificate VSP - SV (Server Virtualization 2016)
certificate VSP - SV (Server Virtualization 2016)Enrique Del Villar
 
2016 Wake of Fame Induction Ceremony Fact Sheet
2016 Wake of Fame Induction Ceremony Fact Sheet2016 Wake of Fame Induction Ceremony Fact Sheet
2016 Wake of Fame Induction Ceremony Fact SheetK 38
 
Ronald ortiz web 2.0 ventajas y desventajas
Ronald ortiz web 2.0 ventajas y desventajasRonald ortiz web 2.0 ventajas y desventajas
Ronald ortiz web 2.0 ventajas y desventajasronaldyfz
 
Paloalto Networks ACE
Paloalto Networks ACEPaloalto Networks ACE
Paloalto Networks ACEadam_jhon
 

Viewers also liked (20)

End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configuration
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewall
 
Accredited Sales Expert
Accredited Sales ExpertAccredited Sales Expert
Accredited Sales Expert
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Palo alto networks
Palo alto networksPalo alto networks
Palo alto networks
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
certificate VSP 2016
certificate VSP 2016certificate VSP 2016
certificate VSP 2016
 
certificate VSP - SV (Server Virtualization 2016)
certificate VSP - SV (Server Virtualization 2016)certificate VSP - SV (Server Virtualization 2016)
certificate VSP - SV (Server Virtualization 2016)
 
2016 Wake of Fame Induction Ceremony Fact Sheet
2016 Wake of Fame Induction Ceremony Fact Sheet2016 Wake of Fame Induction Ceremony Fact Sheet
2016 Wake of Fame Induction Ceremony Fact Sheet
 
Ronald ortiz web 2.0 ventajas y desventajas
Ronald ortiz web 2.0 ventajas y desventajasRonald ortiz web 2.0 ventajas y desventajas
Ronald ortiz web 2.0 ventajas y desventajas
 
Paloalto Networks ACE
Paloalto Networks ACEPaloalto Networks ACE
Paloalto Networks ACE
 

Similar to Palo Alto Networks: Protection for Security & Compliance

Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSAmazon Web Services
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionAmazon Web Services
 
Fortinet Automates Migration onto Layered Secure Workloads
Fortinet Automates Migration onto Layered Secure WorkloadsFortinet Automates Migration onto Layered Secure Workloads
Fortinet Automates Migration onto Layered Secure WorkloadsAmazon Web Services
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAmazon Web Services
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
 
Modernizing Technology Governance
Modernizing Technology GovernanceModernizing Technology Governance
Modernizing Technology GovernanceAlert Logic
 
Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?AWS Germany
 
Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Kemp
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...Amazon Web Services
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPTAmazon Web Services
 
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdfATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdfAmazon Web Services
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
 

Similar to Palo Alto Networks: Protection for Security & Compliance (20)

Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWS
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud Adoption
 
Fortinet Automates Migration onto Layered Secure Workloads
Fortinet Automates Migration onto Layered Secure WorkloadsFortinet Automates Migration onto Layered Secure Workloads
Fortinet Automates Migration onto Layered Secure Workloads
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Modernizing Technology Governance
Modernizing Technology GovernanceModernizing Technology Governance
Modernizing Technology Governance
 
Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?
 
Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdfATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
ATLO Software Delivers Secure Training Programs with Sophos UTM on AWS.pdf
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Palo Alto Networks: Protection for Security & Compliance

  • 1. Palo Alto Networks: Protection for Security & Compliance Matt Lehwess - Partner Solutions Architect, AWS Matt Keil – Director of Product Marketing, Palo Alto Networks Matt McLimans – Network Security Engineer, Warren Rogers
  • 2. $6.53M 56% 70% https://www.csid.com/resources/stats/data- breaches/ Increase in theft of hard intellectual property http://www.pwc.com/gx/en/issues/cyber- security/information-security-survey.html Of consumers indicated they’d avoid businesses following a security breach https://www.csid.com/resources/stats/data- breaches/ Average cost of a data breach Your Data and IPAre Your Most Valuable Assets
  • 3. AWS Can Be More Secure than Your Existing Environment In June 2015, IDC released a report which found that most customers can be more secure in AWS than their on-premises environment. How? Automating logging and monitoring Simplifying resource access Making it easy to encrypt properly Enforcing strong authentication
  • 4. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Identity & Access Control Network Security Customer applications & content You get to define your controls ON the Cloud AWS takes care of the security OF the Cloud You Inventory & Config Data Encryption AWS and you share responsibility for security
  • 5. Constantly Monitored The AWS infrastructure is protected by extensive network and security monitoring systems:  Network access is monitored by AWS security managers daily  AWS CloudTrail lets you monitor and record all API calls  Amazon Inspector automatically assesses applications for vulnerabilities
  • 6. Highly Available The AWS infrastructure footprint protects your data from costly downtime  38 Availability Zones in 14 regions for multi-synchronous geographic redundancy  Retain control of where your data resides for compliance with regulatory requirements  Mitigate the risk of DDoS attacks using services like AutoScaling, Route 53
  • 7. Integrated with Your Existing Resources AWS enables you to improve your security using many of your existing tools and practices  Integrate your existing Active Directory  Use dedicated connections as a secure, low-latency extension of your data center  Provide and manage your own encryption keys if you choose
  • 8. Key AWS Certifications and Assurance Programs
  • 9. Palo Alto Networks and the VM-Series on AWS Matt Keil – Director of Product Marketing, Palo Alto Networks
  • 10. * Non-GAAP financial measures. See appendix for reconciliation to most comparable GAAP measure. Revenue Customers About Palo Alto Networks Corporate Highlights  Founded in 2005; first customer shipment in 2007  Safely enable applications and prevent cyber threats  Addressing all enterprise cybersecurity needs  Exceptional ability to support global customers  Experienced team of 3,800+ employees  Q4 FY16: $401.8M revenue
  • 11. Applications and Data Are the Target The attack life cycle applies to both physical or virtualized networks in the cloud Infect User Gain Foothold Move Laterally Steal Data Build Botnets Harvest Bitcoin Execute Goal: On the network or in the Cloud
  • 12. Shared Security Model: Where We Can Help AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Encryption Key Management Client & Server Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer content Where Palo Alto Networks Can Help Customer Responsibility Security on the Cloud AWS Responsibility Security of the Cloud
  • 13. VM-Series Next-Generation Firewall on AWS • Identifies and controls applications across all ports • Prevents known/unknown threats targeted at your AWS deployment • Enforces policy consistency with centralized management • Automates deployment and policy updates
  • 14. Segmentation: Separate applications and data for security and compliance Deployment Use Cases GlobalProtect: Policy consistency for the cloud, the network, and your devices All use cases supported in AWS standard regions and AWS GovCloud (US) Gateway: Protection from Internet borne threats
  • 15. Licensing Options Consumption based licensing  Two bundles available as annual or hourly subscriptions Bring your own license (BYOL)  Pick and choose licenses, subscriptions and support to best suite our needs  Supported in AWS standard regions and AWS GovCluod (US)
  • 16. Auto Scaling the VM-Series on AWS As workload traffic increases, security scales independently of workloads Note: Auto Scaling the VM-Series on AWS uses AWS Marketplace Bundle 1 or Bundle 2, in either an annual or an hourly subscription.
  • 17. Security Groups, WAF, or Next-gen Firewall? Native AWS security includes Security Groups and Web Application Firewall Security Groups and ACLs  Port-based filtering only  No visibility traffic at the application level  Unable to prevent threats  Cannot control file movement Web Application Firewalls  Customized for each application/environment  Focused narrowly on public facing web applications on HTTP/HTTPs  No visibility, control, or protection on other applications
  • 18. Customer Success Story: How Warren Rogers Achieved PCI Compliance on AWS Matt McLimans – Network Security Engineer, Warren Rogers
  • 19. Warren Rogers Services Variance reports Tank activity Sales by hour Unexplained removals Delivery reports Dispenser/Probe out summary All-Point monitoring system that provides the most accurate and complete information about fueling operations
  • 20. Customer Store Network Warren Rogers’ Network Our Operation Our Device “OSP”
  • 21. AWS as Level 1 Service Provider Lowest cost PCI complaint cloud service. Reduce and implify scoped environment. If required, provides forensic investigations A B
  • 22. AWS PCI Compliant Services CloudWatch BeanStalk SNSSES FederationIAMCloud TrailCloud FormationOpsWork SQS Elastic Transcoder Cloud Search SWF Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier Monitoring Deployment & Management Identity & Access Application Services Databases Analytics Compute Storage Networking Content Delivery AppStream EBS Deployment &Management Application ServicesFoundationServices RDS
  • 23. AWS PCI Compliant Services CloudWatch BeanStalk SNSSES FederationIAMCloud TrailCloud FormationOpsWork SQS Elastic Transcoder Cloud Search SWF Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier Monitoring Deployment & Management Identity & Access Application Services Databases Analytics Compute Storage Networking Content Delivery AppStream EBS Deployment &Management Application ServicesFoundationServices RDS
  • 24. AWS PCI Compliant Services CloudWatch BeanStalk SNSSES FederationIAMCloud TrailCloud FormationOpsWork SQS Elastic Transcoder Cloud Search SWF Dynamo ElastiCache RedShift EMR DataPipeline Kinesis CloudFront Ec2 WorkSpaces S3 Route53ELBDirect ConnectStorage Gateway VPCGlacier Monitoring Deployment & Management Identity & Access Application Services Databases Analytics Compute Storage Networking Content Delivery AppStream EBS Deployment &Management Application ServicesFoundationServices RDS
  • 25. The PCI Challenge for Warren Rogers How do we protect ourselfs? Warren Rogers’ Network Customer Store Network
  • 26. The PCI Challenge for Warren Rogers How do we protect ourself? Warren Rogers’ Network Customer Store Network
  • 27. The PCI Challenge for Warren Rogers How do we protect ourself? Warren Rogers’ Network Customer Store Network
  • 28. Challenges Previously non-compliant Questions to Answer  How can we secure transmission to AWS?  How do we know if we inadvertently collect cardholder data?  How do we ensure all our boxes are running PCI required applications?  How can we standardized access to our OSPs? Thousands of remote devices Various deployments within diverse customer environments
  • 29. CIDR: 10.0.0.0/16 CIDR: 172.17.0.0/24 CIDR: 192.168.3.0/8 Customer A Network Customer B Network Customer n Network What We Had… Warren Rogers’ Network
  • 30. WR Custom IP Range 1 WR Custom IP Range 1 WR Custom IP Range 1 Customer A Network Customer B Network Customer n Network What We Wanted… Secure Comm. Secure Comm. One Access Method Warren Rogers’ Network
  • 31. Using Palo Alto Networks to Achieve Our Goal GlobalProtect  Encryption  HIP Profiles LSVPN  Reducing latency  Increasing redundancy  Increasing global presence Access Policies  Data filtering  Removing uncertainty  Jump server
  • 32. GlobalProtect: Use Case HIP Check A Unique Deployment  Installed on OSP  Pre-Log On Benefits  User-ID  Exceeding PCI requirements.  Complete insight into data transmission  Centrally managed & IP Assignment  HIP Checks & LDAP Segregation Control
  • 33. Host Information in Policy Enforcement (HIP) Stages 1. GlobalProtect agent collects information. 2. Agent submits host information. 3. Gateway matches host information against HIP objects and HIP profiles. Key Advantages  Centrally managed from Palo Alto Networks.  Easy configuration changes & granular policies.  Custom application IDs.  Allow box to connect, but notify personnel of compliance mismatch.  Routine checks on all OSPs, removes worry. Firewall Status Data Encryption Patch Management Anti-Virus
  • 34. Data Filtering for CHD CHD Filtering  Predefined data pattern  Looks for 16 digit card numbers through hash algorithm (less false positives)  Scan all data or only certain file types (.pdf .txt .csv ….) Alerting on CHD Detected  Contact customer immediately that their network is passing CHD to our OSP Out of Scope for Compliance
  • 35. LSVPN 1. Amazon Data Centers Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series
  • 36. LSVPN 1. Amazon Data Centers 2. Geo-located OSPs Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series
  • 37. LSVPN 1. Amazon Data Centers 2. Geo-located OSPs 3. Palo Alto Networks VM-300 Portal Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series PORTAL
  • 38. LSVPN 1. Amazon Data Centers 2. Geo-located OSPs 3. Palo Alto Networks VM-300 Portal 4. Palo Alto Networks VM-300 Satellites Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series CA.SAT02 OR.SAT01 PORTAL VA.SAT01 CA.SAT01
  • 39. LSVPN 1. Amazon Data Centers 2. Geo-located OSPs 3. Palo Alto Networks VM-300 Portal 4. Palo Alto Networks VM-300 Satellites 5. Connecting LSVPN Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series CA.SAT02 OR.SAT01 PORTAL VA.SAT01 CA.SAT01
  • 40. LSVPN 1. Amazon Data Centers 2. Geo-located OSPs 3. Palo Alto Networks VM-300 Portal 4. Palo Alto Networks VM-300 Satellites 5. Connecting LSVPN 6. GlobalProtect to WR defined satellites Key LSVPN Tunnel GlobalProtect AWS Data Center OSPs Palo Alto Networks VM-Series CA.SAT02 OR.SAT01 PORTAL VA.SAT01 CA.SAT01
  • 41. ADDS & Group Policy LSVPN Portal Private Network Oregon Satellite 1 Virginia Portal Satellite Private Network Active Directory Servers Break devices into organizational units  Geography  Customer type  …really anything Advantages of ADDS  Sync with Palo Alto Networks Firewalls  Addressable remote devices by DNS  Powerful tools available Group Policy  “Touch one, configure many”  Floor to ceiling security model Active Directory Servers OSP Default PCI Policy Customer A Policy Site 1 Policy Group Policy Hierarchy
  • 42. Private Subnet Ec2 Public Subnet Easy Deployment Infrastructure:  An AWS VPC.  A public and private subnet.  EC2 instances to protect.
  • 43. Private Subnet Ec2 Public Subnet Easy Deployment Infrastructure:  An AWS VPC  A public and private subnet  EC2 instances to protect Deployment:  Launch Palo Alto Networks VM- Series from the AWS Marketplace.
  • 44. Private Subnet Ec2 Tune VM-Series Public Subnet Easy Deployment Infrastructure:  An AWS VPC.  A public and private subnet.  EC2 instances to protect. Deployment:  Launch Palo Alto Networks VM- Series from the AWS Marketplace.  Tune VM-Series to protect from network threats.
  • 45. Private Subnet Ec2 Simplify Security Groups Tune VM-Series Public Subnet Easy Deployment Infrastructure:  An AWS VPC  A public and private subnet  EC2 instances to protect Deployment:  Launch Palo Alto Networks VM- Series from the AWS Marketplace.  Tune VM-Series to protect from network threats.  Simplify EC2 Security Groups
  • 46. Making Compliance Easy with Palo Alto Networks Least Access Control Logging & Flexibility Segmentation  Reduced Scope  Reduced Cost  Reduced Threat  Changes are unavoidable for productive organizations  Active Directory  Proof of policy controls
  • 47. Making Compliance Easy with Palo Alto Networks CHD Network Non-CHD Network Flat Network Segmented Network Whole Network Cardholder servers 4 4 Flat Network Segmented Network Total servers 100 100 Open audit scope 100 4 Reduction of audit scope 0% 96%
  • 48. Some Tips Before I Go… Reach beyond PCI requirements for security.  If you don’t have a security plan, use PCI as a base line. Avoid expensive mistakes!  Involve a QSA, a Palo Alto Networks Engineer, and your team on all major design decisions. Remember, a single credit card number is a liability.  Cost of CHD Compromise > Cost of PCI Compliance Evaluate whether or not you can eliminate the reasons for necessary compliance.  Ensure the benefit of touching CHD is greater than the liability. Compliance with and without is Palo Alto Networks  “Uncertainty in Compliance” v. “Certainty in Compliance”
  • 49. Q&A Matt Lehwess - Partner Solutions Architect, AWS Matt Keil – Director of Product Marketing, Palo Alto Networks Matt McLimans – Network Security Engineer, Warren Rogers