Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT
Threat Group Assessment: Turla (aka Pensive Ursa)
Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month
  • Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Research

What We Do

Stateful inspection and port blocking are useless in today’s landscape.

Networks have become more vulnerable because of fundamental shifts in the application landscape, user behavior, cybersecurity dynamics, and infrastructure. SaaS, Web 2.0, social media, and cloud-based applications are everywhere. Mobile devices, cloud, and virtualization are fundamentally changing your network architecture. The way your users consume and your company manages IT has made you more and more susceptible to security breaches and compromised data.

Legacy firewalls and UTMs are incapable of enabling the next generation of applications, users, and infrastructures. That's because they classify traffic based only on ports and protocols. For example, traditional products identify most of your web traffic as simply HTTP coming through port 80, with no information on the specific applications associated with that port and protocol. But this problem is not limited to port 80.

These applications are increasingly using encrypted SSL tunnels on port 443, and use clever evasive tactics to disguise themselves or use port-hopping to find any entry point through your firewall. Legacy firewalls and UTMs cannot safely enable these applications. At best, they can attempt to prevent the application from entering the network, which stifles your business and restricts you from benefitting from innovation.

 

Time for a fundamentally new approach to network security: a next-generation firewall that safely enables applications – and your business.

We offer you real innovation in the firewall, enabling the unprecedented enablement of applications and control over content – by user, not just IP address – at up to 20Gbps with no performance degradation. Based on our patent-pending App-ID™ technology, our next-generation firewall enables applications – regardless of port, protocol, evasive tactic, or SSL encryption – and scans content to stop targeted threats and prevent data leakage. For the first time, you can safely enable the use of applications, maintain complete visibility and control, and significantly reduce your total cost of ownership through network security simplification.

 

Unique capabilities available only in our next-generation firewall:

The only firewall to classify traffic based on the accurate identification of the application, not just port/protocol information.

The only firewall to identify, control, and inspect your SSL encrypted traffic and applications.

The only firewall with real-time (line-rate, low-latency) content scanning to protect you against viruses, spyware, data leakage, and application vulnerabilities based on a stream-based threat prevention engine.

The only firewall to provide graphical visualization of applications on your network with detailed user, group, and network-level data categorized by sessions, bytes, ports, threats, and time.

The only firewall with line-rate, low-latency performance for all of your services, even under load.

The only firewall capable of delivering a logical perimeter for your mobile users.

The only firewall to identify unknown malicious files, often used in targeted attacks, by directly and automatically executing them in a virtual cloud-based environment.

 


Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved