Port numbers, protocols, and IP addresses are useful for network devices, but they tell you nothing about what’s on your network. Detailed information about the applications, users and content traversing your network empowers you to quickly determine any risks they pose and respond.

Leveraging the rich context provided by our firewalls, visualization, analysis and reporting tools let you quickly learn more about activity on your network and analyze incidents from a current or comparative perspective. Watch the NGFW demo on the left to see application visibility in action.

Visual and Actionable Information into Applications, Users, and Content

The fully customizable Application Command Center (ACC) is an interactive, graphical summary of the applications, users, URLs, threats and content traversing your network with intuitive drill-down capabilities.

Just a few clicks provide highly detailed views to learn more, including links to the specific policies that allowed a certain behavior, so you can tune it as needed.

A visual interface is critical because the overwhelming amount of data in today’s cybersecurity space is just too confusing. Being able to provide visuals that make the navigation and control of information easier is crucial to deliver a valuable and actionable interface for network administrators and security professionals.

Learn more about the ACC, Logging and Reporting Guide.

 

Customizable to Your Needs

Dozens of widgets provide the desired level and visual display of data. Users can choose between different display options, such as tree, line or bar graphs, and decide on the appropriate unit of measure (e.g., bytes, sessions, threats, content, or URLs) simply by clicking the radio buttons on each widget.

Not only can you customize existing tabs (network activity, threat activity, and blocked activity), you can also create new custom tabs to monitor certain employees and situations, or track applications. The user interface can adjust to your specific needs.

Interactive for Fast Answers

When you are searching for answers, you need them fast. This is where an interactive user interface, such as the ACC, can help tremendously. Find answers fast by drilling down into greater details from any part of the UI.

With the interactive capabilities of the ACC, you can learn about applications and risk levels, or click on any part of a graph to learn more details about a specific application or application group.


 

Implementing User-based Access Controls

This brief discusses key considerations when implementing user-based access controls to minimize the threat exposure unknowingly caused by the end user community.

  • 0
  • 468

University of Southampton

A research-intensive university with over 23,000 students, the University of Southampton is a leading entrepreneurial ­institution in the United Kingdom. When the University sought to significantly expand throughput to support an increase in students, improve network stability and services to users, heighten security, and lower IT management burdens, they ­selected Palo Alto Networks Nextwave Channel Program Platinum ASC CPSP Partner Khipu Networks, working with ­European ­Electronique under the NEUPC procurement framework, to partner with them to meet their long-term strategic goals.

  • 6
  • 926

4 Reasons to Leverage User-based Access Policy

This brief discusses four key reasons to employ user-based access policy in your network security infrastructure.

  • 0
  • 264

Secure Network: User-based Access Policy is a Team Effort

Read why establishing and implementing a user-based security strategy should be rooted in the business leadership team’s position on cybercrime prevention.

  • 0
  • 256

Princeton Technology Corp.

Princeton Technology Corp. is a professional IC design company headquartered in Taipei, Taiwan, with a branch in Torrance, USA, an R&D center in Hsinchu, Taiwan, and representative offices in Shenzhen and Japan to serve Asian customers. "The PA series greatly simplified the IT Department's tasks in administrating information security within each branch; they also helped us identify the kind of applications each employee is running over the network."

  • 4
  • 362

Sonic

Sonic Solutions designs and manufactures DVD publishing systems used to prepare music, video, film, graphics and entertainment software. "Our existing security solution is blind to traffic flowing across port 80. Palo Alto Networks provides us with user-based application visibility and control."

  • 1
  • 207