Developers: | Palo Alto Networks (PAN) |
Technology: | Cybersecurity - Antiviruses, Firewall |
What is protected by architecture of Zero Trust (konfeption)
Detects and prevents threats at all levels of IT infrastructure
Perimeter Internet
Perimeter of DPC (traffic flows "North-South")
In DPC (traffic flows "East-West")
Remote and mobile users
Prevention of the attacks at different stages
Palo Alto Networks Platform of security
Traditional approach
- L4 firewall with add-on modules which sharply reduce performance
- Set of boxes of APT for different protocols
- Other vendor for SSL of deciphering
- Other vendor for URL of filtering and determination of users
- Other vendor of IPS
- Any blocking on hosts, only treatment and a blamestorming session!
- Insufficient visualization
- Difficult architecture
Palo Alto Networks
- Built-in functionality of determination of applications
- All functions work in parallel, but is not consecutive
- IPS
- Wildfire – APT for all protocols
- SSL and SSH deciphering
- Prevention at the level of network
- Prevention on hosts
- Maximum visualization
- The simple security circuit in network
- One producer
One pass
- Each packet is scanned only once
- When scanning at the same time is defined:
- Application
- User/group
- Content – threats, URL, etc.
Parallel processing
- The specialized hardware for each task