20
Palo Alto Networks Overview November 2011

Palo alto networks_customer_overview_november2011-short

Embed Size (px)

DESCRIPTION

Palo Alto Networks ™ é a empresa de segurança de rede. Seus firewalls de próxima geração permitem visibilidade sem precedentes e controle de políticas granulares de aplicativos e conteúdo – por usuário, não apenas o endereço IP- até 20Gbps sem degradação do desempenho. Com base na tecnologia App-ID ™, os firewalls da Palo Alto Networks ™ identificam com precisão e controlam os aplicativos – independentemente da porta, protocolo, evasiva tática ou criptografia SSL – e conteúdo de varredura para bloquear ameaças e evitar o vazamento de dados. Empresas podem, pela primeira vez, abraçar a Web 2.0 e manter a visibilidade completa e controle, reduzindo significativamente o custo total de propriedade por meio da consolidação de dispositivos. Mais recentemente, os firewalls da Palo Alto Networks ™ tem permitido à empresas estenderem essa mesma segurança de rede para os usuários remotos com o lançamento do GlobalProtect ™ e para combater malwares modernos direcionados com seu serviço WildFire ™. Veja mais em www.paloaltonetworks.com.

Citation preview

Page 1: Palo alto networks_customer_overview_november2011-short

Palo Alto Networks OverviewNovember 2011

Page 2: Palo alto networks_customer_overview_november2011-short

About Palo Alto Networks

• Palo Alto Networks is the Network Security Company

• World-class team with strong security and networking experience

- Founded in 2005, first customer July 2007, top-tier investors

• Builds next-generation firewalls that identify / control 1,300+ applications

- Restores the firewall as the core of enterprise network security infrastructure

- Innovations: App-ID™, User-ID™, Content-ID™

• Global momentum: 6,000+ customers

- August 2011: Annual bookings run rate is over US$200 million*, cash-flow positive last five consecutive quarters

(*) Bookings run rate is defined as 4 (four) times the bookings amount of the most recently finished fiscal quarter. Bookings are defined as non-cancellable

orders received during the fiscal period. Palo Alto Networks’ fiscal year runs from August 1st until July 31st.

• A few of the many enterprises that have deployed more than $1M

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 2 |

Page 4: Palo alto networks_customer_overview_november2011-short

2011 Magic Quadrant for Enterprise Network Firewalls

© 2010 Palo Alto Networks. Proprietary and Confidential.Page 4 |

Page 5: Palo alto networks_customer_overview_november2011-short

Applications Have Changed; Firewalls Have Not

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 5 |

Need to restore visibility and control in the firewall

BUT…applications have changed

• Ports ≠ Applications

• IP Addresses ≠ Users

• Packets ≠ Content

The firewall is the right place to enforce policy control

• Sees all traffic

• Defines trust boundary

• Enables access via positive control

Page 6: Palo alto networks_customer_overview_november2011-short

Enterprise 2.0 Applications and Risks Widespread

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 6 |

Palo Alto Networks’ latest Application Usage & Risk Report highlights actual behavior of 1M+ users in 1253 organizations

- More enterprise 2.0 application use for personal and business reasons.

- Tunneling and port hopping are common

- Bottom line: all had firewalls, most had IPS, proxies, & URL filtering – but none of these organizations could control what applications ran on their networks

Page 7: Palo alto networks_customer_overview_november2011-short

Technology Sprawl & Creep Are Not The Answer

• “More stuff” doesn’t solve the problem

• Firewall “helpers” have limited view of traffic

• Complex and costly to buy and maintain

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 7 |

Internet

• Putting all of this in the same box is just slow

Page 8: Palo alto networks_customer_overview_november2011-short

The Right Answer: Make the Firewall Do Its Job

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 8 |

New Requirements for the Firewall

1. Identify applications regardless of port, protocol, evasive tactic or SSL

2. Identify users regardless of IP address

3. Protect in real-time against threats embedded across applications

4. Fine-grained visibility and policy control over application access / functionality

5. Multi-gigabit, in-line deployment with no performance degradation

Page 9: Palo alto networks_customer_overview_november2011-short

Why Visibility & Control Must Be In The Firewall

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 9 |

• Port PolicyDecision

• App Ctrl PolicyDecision

Application Control as an Add-on• Port-based FW + App Ctrl (IPS) = two policies • Applications are threats; only block what you

expressly look for

Implications • Network access decision is made with no

information• Cannot safely enable applications

IPS

Applications

Firewall

PortTraffic

Firewall IPS

• App Ctrl PolicyDecision

• Scan Applicationfor Threats

Applications

ApplicationTraffic

NGFW Application Control • Application control is in the firewall = single policy• Visibility across all ports, for all traffic, all the time

Implications • Network access decision is made based on

application identity • Safely enable application usage

Page 10: Palo alto networks_customer_overview_november2011-short

Your Control With a Next-Generation Firewall

»The ever-expanding universe of applications, services and threats

»Traffic limited to approved business use cases based on App and User

»Attack surface reduced by orders of magnitude

»Complete threat library with no blind spots

Bi-directional inspection

Scans inside of SSL

Scans inside compressed files

Scans inside proxies and tunnels

Only allow the apps you need

Safely enable the applications relevant

to your business

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 10 |

Page 11: Palo alto networks_customer_overview_november2011-short

Identification Technologies Transform the Firewall

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 11 |

• App-ID™

• Identify the application

• User-ID™

• Identify the user

• Content-ID™

• Scan the content

Page 12: Palo alto networks_customer_overview_november2011-short

Single-Pass Parallel Processing™ (SP3) Architecture

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 12 |

Single Pass• Operations once per

packet

- Traffic classification (app identification)

- User/group mapping

- Content scanning – threats, URLs, confidential data

• One policy

Parallel Processing• Function-specific parallel

processing hardware engines

• Separate data/control planes

• Up to 20Gbps, Low Latency

Page 13: Palo alto networks_customer_overview_november2011-short

© 2011 Palo Alto Networks. Proprietary and Confidential.

PA-5000 Series Architecture

• 80 Gbps switch fabric interconnect

• 20 Gbps QoS engine

Signature Match HW Engine• Stream-based uniform sig. match• Vulnerability exploits (IPS), virus,

spyware, CC#, SSN, and more

Security Processors• High density parallel processing

for flexible security functionality

• Hardware-acceleration for standardized complex functions

(SSL, IPSec, decompression)

• Highly available mgmt• High speed logging and

route update• Dual hard drives

20Gbps

Network Processor• 20 Gbps front-end network

processing• Hardware accelerated per-packet

route lookup, MAC lookup and NAT

10Gbps

Control Plane

Data PlaneSwitch Fabric

10Gbps

... ......

QoS

Flow

control

Route, ARP, MAC

lookup

NATSwitch

Fabric

Signature Match

Signature Match

SSL IPSec De-Compress. SSL IPSec De-

Compress.SSL IPSec De-Compress.

Quad-core

CPU CPU

12

CPU

1

CPU

2

CPU

12

CPU

1

CPU

2

CPU

12

CPU

1

CPU

2

RAM

RAM

HDD

HDD

RAM

RAM

RAM

RAM

RAM

RAM

RAM

RAM

RAM

RAM

RAM

RAM

RAM

RAM

• 40+ processors

• 30+ GB of RAM

• Separate high speed data and control planes

• 20 Gbps firewall throughput

• 10 Gbps threat prevention throughput

• 4 Million concurrent sessions

Page 13 |

Page 14: Palo alto networks_customer_overview_november2011-short

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 14 |

PAN-OS Core Firewall Features

• Strong networking foundation- Dynamic routing (BGP, OSPF,

RIPv2)- Tap mode – connect to SPAN port- Virtual wire (“Layer 1”) for true

transparent in-line deployment- L2/L3 switching foundation- Policy-based forwarding

• VPN- Site-to-site IPSec VPN - SSL VPN

• QoS traffic shaping- Max/guaranteed and priority - By user, app, interface, zone, & more- Real-time bandwidth monitor

• Zone-based architecture- All interfaces assigned to

security zones for policy enforcement

• High Availability- Active/active, active/passive - Configuration and session

synchronization- Path, link, and HA monitoring

• Virtual Systems- Establish multiple virtual

firewalls in a single device (PA-5000, PA-4000, and PA-2000 Series)

• Simple, flexible management- CLI, Web, Panorama, SNMP,

Syslog

Visibility and control of applications, users and content complement core firewall features

PA-500

PA-2020

PA-2050

PA-4020

PA-4050

PA-4060

PA-5060

PA-5050

PA-5020

PA-200

Page 15: Palo alto networks_customer_overview_november2011-short

Introducing GlobalProtect

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 15 |

• Users never go “off-network” regardless of location

• All firewalls work together to provide “cloud” of network security

• How it works:- Small agent determines network

location (on or off the enterprise network)

- If off-network, the agent automatically connects the laptop to the nearest firewall via SSL VPN

- Agent submits host information profile (patch level, asset type, disk encryption, and more) to the gateway

- Gateway enforces security policy using App-ID, User-ID, Content-ID AND host information profile

Page 16: Palo alto networks_customer_overview_november2011-short

Enterprise-Wide Next-Generation Firewall Protection

Same Next-Generation Firewall, Different Benefits…

• Perimeter

• Identify and control applications, users and content

• Positive enablement

• Data Center

• Network segmentation based on users and applications

• High performance threat prevention

• Distributed Enterprise

• BranchOffice

• RemoteUsers

• Extending consistent security to all users and locations

• Visibility and control over applications, users and content

Page 17: Palo alto networks_customer_overview_november2011-short

Comprehensive View of Applications, Users & Content

• Application Command Center (ACC)- View applications, URLs,

threats, data filtering activity

• Add/remove filters to achieve desired result

© 2010 Palo Alto Networks. Proprietary and Confidential.Page 17 | Filter on Facebook-base Filter on Facebook-base

and user cookRemove Facebook to expand view of cook

Page 18: Palo alto networks_customer_overview_november2011-short

© 2011 Palo Alto Networks. Proprietary and ConfidentialPage 18 |

Palo Alto Networks Next-Gen Firewalls

PA-4050• 10 Gbps FW/5 Gbps threat

prevention/2,000,000 sessions• 8 SFP, 16 copper gigabit

PA-4020• 2 Gbps FW/2 Gbps threat

prevention/500,000 sessions• 8 SFP, 16 copper gigabit

PA-4060• 10 Gbps FW/5 Gbps threat

prevention/2,000,000 sessions• 4 XFP (10 Gig), 4 SFP (1 Gig)

PA-2050• 1 Gbps FW/500 Mbps

threat prevention/250,000 sessions

• 4 SFP, 16 copper gigabit

PA-2020• 500 Mbps FW/200 Mbps

threat prevention/125,000 sessions

• 2 SFP, 12 copper gigabit

PA-500• 250 Mbps FW/100 Mbps

threat prevention/64,000 sessions

• 8 copper gigabit

PA-5050• 10 Gbps FW/5 Gbps threat

prevention/2,000,000 sessions• 4 SFP+ (10 Gig), 8 SFP (1 Gig), 12

copper gigabit

PA-5020• 5 Gbps FW/2 Gbps threat

prevention/1,000,000 sessions• 8 SFP, 12 copper gigabit

PA-5060• 20 Gbps FW/10 Gbps threat

prevention/4,000,000 sessions• 4 SFP+ (10 Gig), 8 SFP (1 Gig), 12

copper gigabit

PA-200• 100 Mbps FW/50 Mbps

threat prevention/64,000 sessions

• 4 copper gigabit

Page 19: Palo alto networks_customer_overview_november2011-short

Addresses Three Key Business Problems

• Identify and Control Applications- Visibility of over 1300 applications, regardless of port, protocol, encryption, or

evasive tactic

- Fine-grained control over applications (allow, deny, limit, scan, shape)

- Addresses the key deficiencies of legacy firewall infrastructure

• Prevent Threats- Stop a variety of threats – exploits (by vulnerability), viruses, spyware

- Stop leaks of confidential data (e.g., credit card #, social security #, file/type)

- Stream-based engine ensures high performance

- Enforce acceptable use policies on users for general web site browsing

• Simplify Security Infrastructure- Put the firewall at the center of the network security infrastructure

- Reduce complexity in architecture and operations

© 2011 Palo Alto Networks. Proprietary and Confidential.Page 19 |

Page 20: Palo alto networks_customer_overview_november2011-short

Thank You

© 2010 Palo Alto Networks. Proprietary and Confidential.Page 20 |