Modern cyberattacks and APTs rely on stealth, persistence, and the skilled avoidance of traditional security throughout the lifecycle of the attack. Palo Alto Networks offers an end-to-end approach to these threats that leverages the unique visibility of this high performance firewall, combined with a cloud-based malware analysis environment in which unknown malware and exploits can run and conclusively be identified. By default, you can leverage Palo Alto Networks WildFire infrastructure hosted in the public cloud, enabling any Palo Alto Networks firewall to add the ability to detect and block unknown malware and exploits. However, if you prefer not to use public cloud services, the WF-500 provides the ability to deploy WildFire as a private cloud on your own network. Multiple firewalls can leverage a single WF-500 appliance for analyzing unknown malware and exploits. This allows you to deploy one cloud-based virtual environment for the analysis of threats that is shared across all firewalls, as opposed to deploying single-use hardware at every ingress/egress point and network point of presence.
Palo Alto Networks WildFire WF-500 - Security appliance - GigE - 2U - rack-mountable (Voltage: AC 120/230 V (50/60 Hz))
Processor / Memory / Storage
Data Link Protocol:
- Ethernet, Fast Ethernet, Gigabit Ethernet
Network / Transport Protocol:
- URL filtering, anti-malware protection, web threat protection
- 4 x 1000Base-T - RJ-45
- 1 x USB
- 1 x management (RS-232)
- FCC Class A certified, CSA, UL, VCCI Class A ITE, CB
- Internal power supply - hot-plug
Power Consumption Operational:
Min Operating Temperature:
Max Operating Temperature:
- Turn the power of the cloud against unknown threats
WildFire has a unified public or private cloud-based architecture that optimizes the sharing of threat intelligence while minimizing hardware requirements. The architecture allows the service to be deployed from any Palo Alto Networks security platform, with no additional hardware.
- Automatically protect users and stop compromise
Once WildFire discovers a threat, the service automatically generates protections across the attack lifecycle, blocking malicious files and command-and-control traffic. Uniquely, these protections are content-based, not relying on easily changed attributes such as hash, filename or URL, allowing the service to block the initial malware and future variants without any additional action or analysis.
- Quick investigations with rich forensics and reporting
Quickly identify infected users and investigate potential breaches with integrated logs, analysis, and visibility of unknown threat events directly accessible in Panorama, the Palo Alto Networks management interface, or via the WildFire portal. Integration with User-ID allows security administrators to quickly identify targeted users based on corporate directory information, not IP addresses.
No Reviews are available at this time