Palo Alto Networks Partner Program Aims to Provide Integrated Network Security

Palo Alto Networks unveiled its technology partner program, a partnership of technology vendors committed to arming mutual customers with integrated solutions that fundamentally improve network security and risk management for enterprises. The extent to which Palo Alto Networks customers have gained visibility and control over their network traffic has spawned a desire to extend this functionality into adjacent areas of security and risk management. Palo Alto Networks' initial technology partners are:  Arcsight, an HP Company; NetWitness Corporation; Q1 Labs; RSA, an EMC Company; Secure Passage; Solera Networks; Splunk; and Tufin Technologies.

"Companies are responding to technology changes at so many levels — from social media and IT consumerization to cloud-based services and new data center networks — that it's an ideal time for network security teams to be more in alignment with the business' objectives," said Punit Minocha, vice president of business and corporate development at Palo Alto Networks. "The application-based traffic that we illuminate for enterprises can now be leveraged through strategic partnerships with many of the most innovative companies in our industry."

Palo Alto Networks' next-generation firewall provides policy-based visibility and control over applications, users and content to more than 3,000 enterprises worldwide. Only Palo Alto Networks customers can safely enable applications while scanning this content for threats and potential data leakage.

Palo Alto Networks has fixed the problems associated with traditional firewalls by combining three identification technologies that provide visibility and control over applications, users and content.

  • App-ID identifies exactly which applications are running on the network, as well as the associated risks, so administrators can deploy comprehensive application usage control policies for inbound and outbound traffic.
  • User-ID integrates with enterprise directory services (e.g. Microsoft Active Directory and other LDAP directories) to link network activity to users and groups – not just IP addresses – for application visibility, policy creation, logging and reporting.
  • Content-ID combines a real-time threat prevention engine with a comprehensive URL database to detect and block a wide range of threats, limit unauthorized transfer of files and data, and control non-work related Web surfing.

"Today's threat environment requires organizations to know everything that is happening on their networks and implement effective application controls," said Brian Girardi, vice president of product management at NetWitness Corporation. "The joint solution of NetWitness and Palo Alto Networks provides our mutual customers the precision, actionable intelligence, and technical agility needed to respond proactively to any emerging threat."


Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.