We are leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, commitment to innovation and game-changing security platform, thousands of customers have chosen us and we are the fastest growing security company in the market.
Our security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS, and URL filtering. Because these functions are natively-built into the platform and share important information across the respective disciplines, we ensure better security than legacy firewalls, UTMs, or point threat detection products.
With our platform, organizations can safely enable the use of all applications, maintain complete visibility and control, confidently pursue new technology initiatives like cloud and mobility, and protect the organization from cyber attacks - known and unknown.
Key Palo Alto Networks Stats
- Approximately 22,500 customers in over 120 countries across multiple industries.
- More than 80 of the Fortune 100 rely on us to improve their cybersecurity posture.
- Ranked an enterprise firewall market leader by Gartner in 2011, 2012 and 2013
(published April 2014).
- Fiscal year 2014 revenue was $598.2 million, a 51% year-over-year growth that significantly
outpaced the industry growth rate.
- Added more than 1,000 customers per quarter for the last 13 consecutive quarters.
- Partnered with elite IT leaders such as VMware, Citrix, Splunk, and Symantec.
- Named “best place to work” by the Silicon Valley Business Journal.
- 2,083 employees worldwide.
- Earned the TSIA STAR Award for innovation in the delivery of excellent customer support.
- Global support organization with teams in the Americas, EMEA, Asia, and Japan.
- IPO July 2012; stock symbol on the NYSE: PANW.
Using a Palo Alto Networks next-generation firewall, your security team can strike an appropriate balance between blocking all personal-use applications and allowing them. Secure application enablement begins with first knowing exactly what applications are being used and by whom.