Palo Alto GlobalProtect Cloud Service


Your entire network, protected globally in hours, not months.


As the workforce and commonly used applications become more widely distributed, the operational challenges associated with protecting remote networks and mobile users often result in security policy inconsistencies. Organizations continually look for an alternative approach to secure remote networks and users that enables strong, consistent security with a lowered operational effort.






GlobalProtect cloud service reduces the operational burden associated with securing your remote networks and mobile users by leveraging a cloud-based security infrastructure managed by Palo Alto Networks. Based on our next generation security platform, administrators can manage GlobalProtect cloud service with Panorama to create and deploy consistent security policies for all remote networks and mobile users. The GlobalProtect cloud service shared ownership model allows you to move your remote networks and mobile user security expenditures to a more efficient and predictable OPEX-based model.


Download “Palo Alto GlobalProtect Cloud Service Data Sheet.pdf” Palo-Alto-GlobalProtect-Cloud-Service-Data-Sheet.pdf – Downloaded 1505 times – 1.09 MB


Aruba 7200 Series Mobility Controllers

App-aware with exceptional processing power and scale.




 

Optimized for 802.11ac, the 7200 series features a central processor with eight CPU cores to support over 32,000 devices and stateful firewall policy enforcement at 40 Gbps.

New levels of visibility offered by AppRFTM technology allow IT to see applications by user, prioritize them, and control access based on policies.

It also manages authentication, encryption, VPNs, IPv4/IPv6 services, the Policy Enforcement FirewallTM, Adaptive Radio ManagementTM, and RFProtectTM spectrum analysis and wireless intrusion protection.

 

Download “Aruba 7200 Series Mobility Controller Data Sheet.pdf” Aruba-7200-Series-Mobility-Controller-Data-Sheet.pdf – Downloaded 1349 times – 508.76 KB

Aruba 7000 Series Mobility Controllers

Extend the digital workplace in every branch office


The 7000 series optimizes cloud services and secures enterprise applications at branch offices while rightsizing the network infrastructure.

It combines wireless, wired, and hybrid WAN services, supporting up to 24 Ethernet ports and 64 APs, and features built-in stateful firewall, secure VPN, and threat management with content filtering to reduce truck-rolls and the number of appliances per location.

For the hybrid WAN, the 7000 series supports compression, health checks, zero-touch configuration, and policy-based routing to reduce truck-rolls as well as manual configuration and monitoring of single-purpose appliances.

 

Download “Aruba 7000 Series Mobility Controllers Data Sheet.pdf” Aruba-7000-Series-Mobility-Controllers-Data-Sheet.pdf – Downloaded 1359 times – 193.95 KB

ARUBA 360 SECURE FABRIC

Executive Brief


Not long ago, enterprise security teams could identify the perimeter they were protecting and work with IT operations to gain full control of the resources their employees could access and use,
from networks to systems to applications to data. Today, there’s no shortage of technology disruptions – mobile, BYOD, virtualization, cloud, big data, and IoT have now taken hold of the enterprise and rendered a perimeter-based security approach insufficient.  The problem is compounded by an era of IT disaggregation and highly organized and targeted attacks. Ensuring the security of the organization is not only mission-critical, it’s now become exponentially more difficult. Clearly a modern approach is required to deal with today’s fast-changing threat landscape.

According to Gartner, User and Entity Behavior Analytics (UEBA) is an innovative category of security technology for identifying and mitigating advanced threats. “For at least the past two years,
Gartner has witnessed many new vendors with advanced analytics appear in several security market segments. One area that has spurred a lot of innovation is UEBA, which enables broad-scope
security analytics, much like security information and event management (SIEM) enables broad scope security monitoring.  UEBA provides analytics around user behavior, but also around
other entities such as endpoints, networks and applications.  The correlation of the analyses across various entities makes the analytics’ results more accurate and threat detection more effective,
just as it does with SIEM.

 

Download “Aruba 360 Secure Fabric.pdf” Aruba-360-Secure-Fabric.pdf – Downloaded 1511 times – 400.19 KB

Aruba Policy Enforcement Firewall

Network security designed specifically for mobility


The Aruba Policy Enforcement Firewall (PEF) provides context-based controls to enforce application-layer security and prioritization.

With PEF, IT can enforce network access policies that specify who may access the network, with which mobile devices and which areas of the network they may access.

AppRF is a PEF feature that is designed to give network administrators insight into the applications that are running on their network, and who is using them. WebCC is an optional PEF subscription feature that includes URL filtering, IP reputation, and geolocation filtering.

 

Download “Aruba Policy Enforcement Firewall Data Sheet.pdf” Aruba-Policy-Enforcement-Firewall-Data-Sheet.pdf – Downloaded 1717 times – 298.46 KB

 

Aruba Clearpass Exchange

Open Third Party Integration for Endpoint controls, Policy and Threat Prevention




While billions of Wi-Fi enabled smartphones and tablets connect to enterprise networks, it’s a major challenge to ensure security while also delivering an exceptional user experience without creating a provisioning nightmare.

That challenge is complicated by the fact that IT still relies on multiple, disparate systems like network access control (NAC), enterprise mobility management (EMM), policy management, firewalls, guest management, single sign-on solutions, helpdesk and trouble-ticketing systems.

IT needs a better way to secure the mobile enterprise.  More importantly, the security products and management systems that have been deployed must be able to exchange contextual data and work together to provide increased visibility from top to bottom.

Aruba ClearPass Exchange supports a wide range of third-party IT systems, giving you the benefit of a coordinated defense where all components operate as one fully-integrated system.

 

Download “Aruba Clearpass Exchange.pdf” Aruba-Clearpass-Exchange.pdf – Downloaded 1779 times – 834.92 KB

Aruba Endpoint Visibility for Wired and Wireless

Today’s Prerequisite for Enhanced Security and Compliance


To help identify connecting endpoints, legacy practices often meant deploying comprehensive endpoint management solutions, agents, and manually updating multiple endpoint databases. None of these delivered the desired results because IT was overwhelmed by BYOD, guest access deployments, and rogue wired and wireless endpoints; many of which come and go with users.

With the billions of IoT devices expected to connect to networks in the next three years, and the well-publicized security breaches of late, there is a warranted demand among IT professionals for real-time visibility and reporting.  They need a solution that offers continuous monitoring and profiling rather than periodic updates, regardless of location, time-of-day, or endpoint type.

 

Download “Endpoint Visibility for Wired and Wireless.pdf” Endpoint-Visibility-for-Wired-and-Wireless.pdf – Downloaded 1575 times – 219.93 KB

Aruba Clearpass Network Access Control

Device Visibility, Control and Attack Response for the Enterprise


Gartner is forecasting 50 billion connected devices by 2020.  Laptops, smartphones, tablets and Internet of Things (IoT)  devices are pouring into the workplace. With every employee  now utilizing an average of three devices, the addition of IoT increases the vulnerabilities inside the business – adding to the operational burden.

Identifying what is on the network is the first step to securing your data. Control through automated policy enforcement ensures that only authorized and authenticated users and devices are allowed to connect to your network, while, at the same time, real-time attack response and threat protection is required to secure and meet the internal and external audit and compliance requirements.

The use of IoT devices on wired and wireless networks is shifting IT’s focus. Many organizations secure their wireless networks and devices, but may have neglected the wired ports in conference rooms, behind IP phones and in printer areas. Wired devices – like sensors, security cameras and medical devices force IT to think about securing the millions of wired ports that could be wide open to security threats.  Because these devices may lack security attributes and require access from external administrative resources, apps or service providers, wired access now poses as the new risk.

 

Download “Aruba Clearpass Network Access Control.pdf” Aruba-Clearpass-Network-Access-Control.pdf – Downloaded 1860 times – 595.62 KB

Palo Alto VM-Series

VM-Series: Next-Generation Security for Private and Public Clouds


The VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware®, Amazon® Web Services, Microsoft®, Citrix® and KVM.

The VM-Series natively analyzes all traffic in a single pass to determine the application identity, the content within, and the user identity. These core elements of your business can then be used as integral components of your security policy, enabling you to improve your security efficacy through a positive control model and reduce your incident response time though complete visibility into applications across all ports.

In both private and public cloud environments, the VM-Series can be deployed as a perimeter gateway, an IPsec VPN termination point, and a segmentation gateway, protecting your workloads with application enablement and threat prevention policies.

 

Download “Palo Alto VM-Series Spec Sheet.pdf” VM-Series-SpecSheet.pdf – Downloaded 1714 times – 1.15 MB

Palo Alto – A Company Overview

Why Palo Alto Networks?


Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets.

Our platform was built from the ground up for breach prevention, with threat information shared across security functions system-wide, and designed to operate in increasingly mobile, modern networks. By combining network, cloud and endpoint security with advanced threat intelligence in a natively integrated security platform, we safely enable all applications and deliver highly automated, preventive protection against cyberthreats at all stages in the attack lifecycle without compromising performance. Customers benefit from superior security to what legacy or point products provide and realize a better total cost of ownership.

 

Download “Palo Alto Networks Prevention Estory.pdf” Palo-Alto-Networks-Prevention-Estory.pdf – Downloaded 1554 times – 90.19 MB