10-14+ Days This item will be shipped directly from the manufacturer. Leadtime to shipment will be a minimum of 10-14 working days. Call for further shipping details.
-
(888) 912-3151
or
E-Mail
Next-generation firewall driven by machine learning Integrating machine learning (ML) into the firewall's DNA to provide inline, signature-free prevention against file-based attacks, while immediately identifying and blocking as-yet-unknown phishing attempts. Leveraging cloud-based ML processes to instantly send signatures and instructions back to the NGFW. Use behavioral analytics to detect IoT devices and recommend policies. This cloud service is natively integrated into the NGFW. Automate policy recommendations to save time and reduce the risk of human error.
Identify and categorize all applications, on all ports, at any time, and fully inspect Layer 7 Identification of applications traversing your network, regardless of port, protocol, bypass techniques or encryption (TLS/SSL). Automatically discover and secure new applications to keep pace with the SaaS explosion, thanks to our SaaS Security subscription service. Use the application, not the port, as the basis for all your secure activation and authorization policies. Create custom App-ID tags for proprietary applications, or ask Palo Alto Networks to develop an App-ID for new applications. Identification of all payloads in the application to block malicious files and thwart data exfiltration attempts. Creation of standard and customized application usage reports (including SaaS applications) to provide an overview of all authorized and unauthorized SaaS traffic on your network. Integrated Policy Optimizer functionality for secure migration of existing Layer 4 rules to App-ID-based rules, resulting in a more secure and manageable set of rules.
Enhanced user security, regardless of location or device, while adapting policies to user activity Visibility, security policies, reporting and forensic analysis on users and groups, not just IP addresses. Easy integration with a wide range of repositories to leverage user information. Definition of DUGs (Dynamic User Groups) on the firewall to trigger rapid security actions without waiting for changes to be made to user directories. Application of consistent policies regardless of user location or devices used. Multi-factor authentication (MFA) can be activated on the network layer, for any application and without any application modification, to prevent the entry of corporate credentials on third-party websites and the reuse of stolen credentials. Dynamic, behavior-based security actions to neutralize suspicious or malicious users. Consistent and systematic authentication and authorization of user access, regardless of login location and identity store location, to accelerate the adoption of Zero Trust policies thanks to Cloud Identity Engine, a revolutionary cloud architecture optimizing identity-based security.
Block malicious activity hidden in encrypted traffic Inspection and policy enforcement of encrypted inbound and outbound TLS/SSL traffic, as well as traffic using TLS 1.3 or HTTP/2. In-depth visibility of TLS traffic without decryption. Reduce risk by controlling the use of older TLS protocol versions, insecure cipher suites and misconfigured certificates. Simple deployment of decryption and use of integrated logs to resolve problems. Flexibly enable or disable decryption based on multiple criteria for privacy and regulatory compliance. Create a copy of decrypted traffic from the firewall and send it to traffic collection tools for forensic analysis, historical retention or data loss prevention (DLP). Intelligent transfer of all traffic to third-party security tools using Network Packet Broker functionality to optimize network performance and reduce operating expenses.
Centralized management and visibility Centralized management, configuration and visibility for a multitude of distributed Palo Alto Networks NGFWs (regardless of location and scope) within a unified Panorama user interface. Simplified configuration sharing in Panorama using templates and device groups, and scalable log collection as requirements grow. Application Command Center (ACC) for in-depth visibility and comprehensive information on network traffic and threats.
Maximize security investments and avoid disruption with AIOps Recommendations tailored to each deployment strategy to reinforce the company's security posture and maximize security investments with AIOps for NGFW. Intelligent prediction of firewall health, performance and capacity issues based on ML tools powered by advanced telemetry data. Actionable information to help resolve anticipated disruptions.
Cloud security services for advanced threat detection and prevention Cyberattacks are constantly evolving, with up to 45,000 variants identified every 30 minutes, not to mention the multitude of vectors and advanced techniques used to propagate malicious payloads within your environment. In the face of this threat, siloed security products expose vulnerabilities and increase the management burden on security teams. They also create access and visibility inconsistencies that hamper business productivity. Perfectly integrated with next-generation firewalls, cloud security services draw on the collective strength of 80,000 customers to instantly coordinate Threat Intelligence and deploy protection against all threats, whatever their vector. The result is complete coverage of all your sites, and seamless security against the most advanced and stealthy threats.