SlideShare a Scribd company logo
Application Visibility and Control For K-12
         When URL Filtering is Insufficient to Control Student Activities




            Technologies Students Use to Circumvent                  The Problem: Students Are Actively Bypassing
            IT Controls                                              Security Controls
            A few examples of the different types of
            applications that students can use to bypass             Students are using a new class of Internet application that is
            traditional security detection mechanisms.               capable of circumventing existing security mechanisms such
                                                                     as firewalls, URL filtering and proxy servers. As a result, K-
            Proxy Services – online services that enable
                                                                     12 IT departments are placed in a difficult position. State and
            students to bypass detection and control.
                      KProxy                                         Federal regulations, school board policies, community
                      Avoidr                                         standards, and common sense dictate that schools filter
                      PingFu                                         applications and Internet traffic that can make its way to
            Proxy applications – installable on home                 students’ eyes and ears. But this new class of applications
            computers, enabling students to bypass
            detection mechanisms.                                    which includes proxies and anonymizers that facilitate
                      CGI-Proxy                                      evading detection are readily available and students are
                      PHProxy                                        incredibly adept at using them in K-12 environments. The
                      ASProxy                                        conventional approach to solving this problem includes
            Tunneling Applications – encrypted
                                                                     deploying a URL database in conjunction with a traditional
            applications that are designed to bypass
            security.                                                network firewall, but this approach simply can’t keep pace
                      TOR                                            with these nimble, network-savvy applications.
                      Hopster
                      UltraSurf
                                                                     The Solution: Application Visibility and Control
                      Hamachi
                                                                     The solution is to regain visibility and control of all application
            Palo Alto Networks identifies more than 600
            applications including 20 different proxies and
                                                                     traffic going out to the Internet with a Palo Alto Networks next
            anonymizers, 12 encrypted tunneling                      generation firewall. Whether it be browsers going to
            applications and more than 40 applications               websites, browsers going to encrypted proxies, students
            that use evasive P2P technology. For a                   using tunneling applications, or a variety of anonymizers,
            complete list, please browse the Applipedia at
            http://ww2.paloaltonetworks.com/applipedia/.             Palo Alto Networks can help K-12 IT departments regain
                                                                     visibility into, and control over the applications traversing
                                                                     their networks.

         At the heart of the Palo Alto Networks next-generation firewall is App-IDTM, a patent-pending traffic
         classification technology that uses four different techniques to identify and classify applications, going well
         beyond any other network security technology available. App-ID inspects all of the traffic passing through the
         firewall, using one or more of these techniques – including application protocol detection and decryption,
         application decoding, application signatures, and heuristic analysis – to quickly identify the specific
         application associated with each packet stream.




Your Palo Alto Networks Reseller
        www.altaware.com
       sales@altaware.com
         (866) 833-4070


         Copyright 2008, Palo Alto Networks, Inc. All rights reserved.
Application Visibility and Control For K-12
When URL Filtering is Insufficient to Control Student Activities


With increased visibility into the actual identity of the application, administrators can deploy comprehensive,
policy-based application usage control policies for both inbound and outbound network traffic. With App-ID,
IT can now:
    Improve network visibility by accurately identifying application traffic irrespective of port and protocol.
    Enhance security by dictating access rights based upon the actual application traffic as opposed to
    simply the port and protocol.
    Enable deployment and enforcement of appropriate application usage policies.
    Increase malware threat detection and prevention effectiveness
Whereas traditional port-based solutions use a single classification technique to identify traffic, App-ID goes
well beyond any other network security technology available, to accurately identify the application--even
those that use evasive tactics such as SSL encryption, port hopping and emulation.

More About Palo Alto Networks
Starting with a blank slate, Palo Alto Networks produced a next-generation firewall that brings visibility and
control over applications, users and content back to the IT department using three unique technologies: App-
ID, User-ID and Content-ID. Delivered as a purpose-built platform, Palo Alto Networks next generation
firewalls differentiates itself from traditional firewall vendors in the following ways:
     The only firewall that delivers policy-based application visibility and control over more than 600
     applications irrespective of port, protocol, SSL encryption or evasive tactic employed.
     The only firewall that enables policy enforcement based on the application, the category or subcategory,
     the underlying technology and the behavioral characteristic (file transfer capabilities, whether it has had
     any known vulnerabilities, its ability to evade network security detection, the propensity to consume
     bandwidth, and capacity to transmit/propagate malware).
     The only firewall that ties policy control seamlessly to user and group information within Microsoft Active
     Directory (AD).
     The only firewall that melds stream-based scanning, a uniform threat signature format, and a
     comprehensive URL database with elements of application visibility to limit unauthorized file transfers,
     detect and block a wide range of threats and control non-work related web surfing.
     The only firewall with function-specific processing for networking, security, content inspection and
     management, resulting in line-rate, low-latency performance for all services, even under load.
Get the control you need, without slowing down the network – or your instructional technology. Contact your
local Palo Alto Networks representative now.

Education Customer Examples




Copyright 2008, Palo Alto Networks, Inc. All rights reserved.

More Related Content

What's hot

Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
aap3 IT Recruitment
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
IJNSA Journal
 
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
guestbda3307
 
XSS Finder for Web Application Security
XSS Finder for Web Application SecurityXSS Finder for Web Application Security
XSS Finder for Web Application Security
ijtsrd
 
Ceis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperCeis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paper
Alexander Decker
 
ACCESS_WP_Security-web
ACCESS_WP_Security-webACCESS_WP_Security-web
ACCESS_WP_Security-web
Paul Plaquette
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
Ankita Jain
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKW
Sounil Yu
 
End end-security
End end-securityEnd end-security
End end-security
Patatino Melis
 
Reconnex
ReconnexReconnex
Reconnex
gigamon
 
200
200200
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
Dr. Amarjeet Singh
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
Konstantinos Demertzis
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
IJCSIS Research Publications
 
Idps
IdpsIdps
Idps
iskrena
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
segughana
 

What's hot (16)

Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...Sip Intrusion Detection And Prevention  Recommendations And Prototype Impleme...
Sip Intrusion Detection And Prevention Recommendations And Prototype Impleme...
 
XSS Finder for Web Application Security
XSS Finder for Web Application SecurityXSS Finder for Web Application Security
XSS Finder for Web Application Security
 
Ceis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperCeis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paper
 
ACCESS_WP_Security-web
ACCESS_WP_Security-webACCESS_WP_Security-web
ACCESS_WP_Security-web
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 
How I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKWHow I Learned to Stop Information Sharing and Love the DIKW
How I Learned to Stop Information Sharing and Love the DIKW
 
End end-security
End end-securityEnd end-security
End end-security
 
Reconnex
ReconnexReconnex
Reconnex
 
200
200200
200
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
Idps
IdpsIdps
Idps
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 

Similar to Palo Alto Networks K-12

Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
Zernike College
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
SFScon22 - Lucas Lasota - Device Neutrality.pdf
SFScon22 - Lucas Lasota - Device Neutrality.pdfSFScon22 - Lucas Lasota - Device Neutrality.pdf
SFScon22 - Lucas Lasota - Device Neutrality.pdf
South Tyrol Free Software Conference
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
Vijay Karan
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
Anthony Daniel
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
Andy Kwong
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
dtimal
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
Vijay Karan
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
SBGC
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
Module 4 CIS 595
Module 4 CIS 595Module 4 CIS 595
Module 4 CIS 595
Derick Peterson
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
Dana Gardner
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
Tom Kopko
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
Yury Chemerkin
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
LiveAction Next Generation Network Management Software
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
SBGC
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Mandy Sidana
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
Karla Sasser, CPA CITP, CIA, CGMA
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
Belsoft
 

Similar to Palo Alto Networks K-12 (20)

Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
SFScon22 - Lucas Lasota - Device Neutrality.pdf
SFScon22 - Lucas Lasota - Device Neutrality.pdfSFScon22 - Lucas Lasota - Device Neutrality.pdf
SFScon22 - Lucas Lasota - Device Neutrality.pdf
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Module 4 CIS 595
Module 4 CIS 595Module 4 CIS 595
Module 4 CIS 595
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptx
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 

More from Altaware, Inc.

Netgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonNetgear ReadyNAS Comparison
Netgear ReadyNAS Comparison
Altaware, Inc.
 
Aerohive datasheet br200
Aerohive datasheet br200Aerohive datasheet br200
Aerohive datasheet br200
Altaware, Inc.
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest Access
Altaware, Inc.
 
Juniper MAG Series
Juniper MAG SeriesJuniper MAG Series
Juniper MAG Series
Altaware, Inc.
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
Altaware, Inc.
 
Juniper Networks Product Comparisons
Juniper Networks Product ComparisonsJuniper Networks Product Comparisons
Juniper Networks Product Comparisons
Altaware, Inc.
 
Infoblox appliances
Infoblox appliancesInfoblox appliances
Infoblox appliances
Altaware, Inc.
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution Brief
Altaware, Inc.
 
Aerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLAN
Altaware, Inc.
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
Altaware, Inc.
 
ScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & Examples
Altaware, Inc.
 
PANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuidePANOS 4.1 Administrators Guide
PANOS 4.1 Administrators Guide
Altaware, Inc.
 
SIP2 for ILS
SIP2 for ILSSIP2 for ILS
SIP2 for ILS
Altaware, Inc.
 
Aerohive AP 350
Aerohive AP 350Aerohive AP 350
Aerohive AP 350
Altaware, Inc.
 
Aerohive AP 330
Aerohive AP 330Aerohive AP 330
Aerohive AP 330
Altaware, Inc.
 
Aerohive AP 170
Aerohive AP 170Aerohive AP 170
Aerohive AP 170
Altaware, Inc.
 
Aerohive AP 120
Aerohive AP 120Aerohive AP 120
Aerohive AP 120
Altaware, Inc.
 
Aerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAerohive 802.11 Technology Primer
Aerohive 802.11 Technology Primer
Altaware, Inc.
 
Aerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student Manager
Altaware, Inc.
 
PAN PA2000 series
PAN PA2000 seriesPAN PA2000 series
PAN PA2000 series
Altaware, Inc.
 

More from Altaware, Inc. (20)

Netgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonNetgear ReadyNAS Comparison
Netgear ReadyNAS Comparison
 
Aerohive datasheet br200
Aerohive datasheet br200Aerohive datasheet br200
Aerohive datasheet br200
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest Access
 
Juniper MAG Series
Juniper MAG SeriesJuniper MAG Series
Juniper MAG Series
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
 
Juniper Networks Product Comparisons
Juniper Networks Product ComparisonsJuniper Networks Product Comparisons
Juniper Networks Product Comparisons
 
Infoblox appliances
Infoblox appliancesInfoblox appliances
Infoblox appliances
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution Brief
 
Aerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLANAerohive whitepaper-cooperative control WLAN
Aerohive whitepaper-cooperative control WLAN
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
ScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & ExamplesScreenOS 6.1 Concepts & Examples
ScreenOS 6.1 Concepts & Examples
 
PANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuidePANOS 4.1 Administrators Guide
PANOS 4.1 Administrators Guide
 
SIP2 for ILS
SIP2 for ILSSIP2 for ILS
SIP2 for ILS
 
Aerohive AP 350
Aerohive AP 350Aerohive AP 350
Aerohive AP 350
 
Aerohive AP 330
Aerohive AP 330Aerohive AP 330
Aerohive AP 330
 
Aerohive AP 170
Aerohive AP 170Aerohive AP 170
Aerohive AP 170
 
Aerohive AP 120
Aerohive AP 120Aerohive AP 120
Aerohive AP 120
 
Aerohive 802.11 Technology Primer
Aerohive 802.11 Technology PrimerAerohive 802.11 Technology Primer
Aerohive 802.11 Technology Primer
 
Aerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student ManagerAerohive - TeacherView and Student Manager
Aerohive - TeacherView and Student Manager
 
PAN PA2000 series
PAN PA2000 seriesPAN PA2000 series
PAN PA2000 series
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 

Palo Alto Networks K-12

  • 1. Application Visibility and Control For K-12 When URL Filtering is Insufficient to Control Student Activities Technologies Students Use to Circumvent The Problem: Students Are Actively Bypassing IT Controls Security Controls A few examples of the different types of applications that students can use to bypass Students are using a new class of Internet application that is traditional security detection mechanisms. capable of circumventing existing security mechanisms such as firewalls, URL filtering and proxy servers. As a result, K- Proxy Services – online services that enable 12 IT departments are placed in a difficult position. State and students to bypass detection and control. KProxy Federal regulations, school board policies, community Avoidr standards, and common sense dictate that schools filter PingFu applications and Internet traffic that can make its way to Proxy applications – installable on home students’ eyes and ears. But this new class of applications computers, enabling students to bypass detection mechanisms. which includes proxies and anonymizers that facilitate CGI-Proxy evading detection are readily available and students are PHProxy incredibly adept at using them in K-12 environments. The ASProxy conventional approach to solving this problem includes Tunneling Applications – encrypted deploying a URL database in conjunction with a traditional applications that are designed to bypass security. network firewall, but this approach simply can’t keep pace TOR with these nimble, network-savvy applications. Hopster UltraSurf The Solution: Application Visibility and Control Hamachi The solution is to regain visibility and control of all application Palo Alto Networks identifies more than 600 applications including 20 different proxies and traffic going out to the Internet with a Palo Alto Networks next anonymizers, 12 encrypted tunneling generation firewall. Whether it be browsers going to applications and more than 40 applications websites, browsers going to encrypted proxies, students that use evasive P2P technology. For a using tunneling applications, or a variety of anonymizers, complete list, please browse the Applipedia at http://ww2.paloaltonetworks.com/applipedia/. Palo Alto Networks can help K-12 IT departments regain visibility into, and control over the applications traversing their networks. At the heart of the Palo Alto Networks next-generation firewall is App-IDTM, a patent-pending traffic classification technology that uses four different techniques to identify and classify applications, going well beyond any other network security technology available. App-ID inspects all of the traffic passing through the firewall, using one or more of these techniques – including application protocol detection and decryption, application decoding, application signatures, and heuristic analysis – to quickly identify the specific application associated with each packet stream. Your Palo Alto Networks Reseller www.altaware.com sales@altaware.com (866) 833-4070 Copyright 2008, Palo Alto Networks, Inc. All rights reserved.
  • 2. Application Visibility and Control For K-12 When URL Filtering is Insufficient to Control Student Activities With increased visibility into the actual identity of the application, administrators can deploy comprehensive, policy-based application usage control policies for both inbound and outbound network traffic. With App-ID, IT can now: Improve network visibility by accurately identifying application traffic irrespective of port and protocol. Enhance security by dictating access rights based upon the actual application traffic as opposed to simply the port and protocol. Enable deployment and enforcement of appropriate application usage policies. Increase malware threat detection and prevention effectiveness Whereas traditional port-based solutions use a single classification technique to identify traffic, App-ID goes well beyond any other network security technology available, to accurately identify the application--even those that use evasive tactics such as SSL encryption, port hopping and emulation. More About Palo Alto Networks Starting with a blank slate, Palo Alto Networks produced a next-generation firewall that brings visibility and control over applications, users and content back to the IT department using three unique technologies: App- ID, User-ID and Content-ID. Delivered as a purpose-built platform, Palo Alto Networks next generation firewalls differentiates itself from traditional firewall vendors in the following ways: The only firewall that delivers policy-based application visibility and control over more than 600 applications irrespective of port, protocol, SSL encryption or evasive tactic employed. The only firewall that enables policy enforcement based on the application, the category or subcategory, the underlying technology and the behavioral characteristic (file transfer capabilities, whether it has had any known vulnerabilities, its ability to evade network security detection, the propensity to consume bandwidth, and capacity to transmit/propagate malware). The only firewall that ties policy control seamlessly to user and group information within Microsoft Active Directory (AD). The only firewall that melds stream-based scanning, a uniform threat signature format, and a comprehensive URL database with elements of application visibility to limit unauthorized file transfers, detect and block a wide range of threats and control non-work related web surfing. The only firewall with function-specific processing for networking, security, content inspection and management, resulting in line-rate, low-latency performance for all services, even under load. Get the control you need, without slowing down the network – or your instructional technology. Contact your local Palo Alto Networks representative now. Education Customer Examples Copyright 2008, Palo Alto Networks, Inc. All rights reserved.