Palo Alto Networks Partner Program Aims to Provide Integrated Network Security

Palo Alto Networks unveiled its technology partner program, a partnership of technology vendors committed to arming mutual customers with integrated solutions that fundamentally improve network security and risk management for enterprises. The extent to which Palo Alto Networks customers have gained visibility and control over their network traffic has spawned a desire to extend this functionality into adjacent areas of security and risk management. Palo Alto Networks' initial technology partners are:  Arcsight, an HP Company; NetWitness Corporation; Q1 Labs; RSA, an EMC Company; Secure Passage; Solera Networks; Splunk; and Tufin Technologies.

"Companies are responding to technology changes at so many levels — from social media and IT consumerization to cloud-based services and new data center networks — that it's an ideal time for network security teams to be more in alignment with the business' objectives," said Punit Minocha, vice president of business and corporate development at Palo Alto Networks. "The application-based traffic that we illuminate for enterprises can now be leveraged through strategic partnerships with many of the most innovative companies in our industry."

Palo Alto Networks' next-generation firewall provides policy-based visibility and control over applications, users and content to more than 3,000 enterprises worldwide. Only Palo Alto Networks customers can safely enable applications while scanning this content for threats and potential data leakage.

Palo Alto Networks has fixed the problems associated with traditional firewalls by combining three identification technologies that provide visibility and control over applications, users and content.

  • App-ID identifies exactly which applications are running on the network, as well as the associated risks, so administrators can deploy comprehensive application usage control policies for inbound and outbound traffic.
  • User-ID integrates with enterprise directory services (e.g. Microsoft Active Directory and other LDAP directories) to link network activity to users and groups – not just IP addresses – for application visibility, policy creation, logging and reporting.
  • Content-ID combines a real-time threat prevention engine with a comprehensive URL database to detect and block a wide range of threats, limit unauthorized transfer of files and data, and control non-work related Web surfing.

"Today's threat environment requires organizations to know everything that is happening on their networks and implement effective application controls," said Brian Girardi, vice president of product management at NetWitness Corporation. "The joint solution of NetWitness and Palo Alto Networks provides our mutual customers the precision, actionable intelligence, and technical agility needed to respond proactively to any emerging threat."


Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3