Advanced attackers are increasingly using targeted, stealthy, persistent methods to evade traditional security measures. One such type of attack is the advanced persistent threat (APT), which usually targets specific users and/or specific vulnerable application versions. APTs are designed to be inconspicuous, often going unnoticed for months, or even years, before a breach is identified.

We prevent APTs by identifying key components of each threat and automatically sharing the information and protection against those components between security technologies, thereby offering protection at each stage of the attack from the network to the cloud environment to the endpoint.

Prevent Threats on Multiple Fronts

Protections against new vulnerabilities, malware payloads, malicious URLs, and command and control channels are used by the platform — the natively integrated, contextual security of the firewall, Traps™ and Aperture — to prevent APTs at each stage of attack on the network, at endpoints, and within cloud environments.

APT prevention is achieved through granular policy controls that reduce the attack surface, content-based signatures and URL categorizations that block delivery and command and control channels, and signature-less exploit prevention modules that protect endpoints from zero-day threats. 

Automatically Update Protections

Our cloud-based malware analysis environment, WildFire™, analyzes the behavior of unknown files and links, by executing them across multiple versions of the targeted operation system and application simultaneously, and automatically delivers a verdict and updated protections to Aperture, Traps, and all subscribed firewalls worldwide.

We protect you and your data from APTs throughout the organization, network, data center, virtual environments, on the endpoints, and in SaaS applications. We can identify and prevent attacks that leverage a variety of applications, attack tools, and file types, such as Java®, Adobe® Reader®, Microsoft® Office, portable executables, and multimedia across different attack vectors.

Quickly Identify and Stop Infection

Sharing threat intelligence and context between security technologies is essential for detecting advanced threats and preventing their success. Indicators of compromise (IoCs) don’t necessarily present themselves in one static location on the network as APTs attempt lateral movement, so correlating IoCs becomes crucially important.

Our Automated Correlation Engine correlates threat logs within individual firewalls and across multiple firewalls on the network based on specified IoCs from both Unit 42 research and zero-day threat analysis from WildFire. Infections that would otherwise be overlooked are positively identified within minutes, helping you to stop their spread and remediate quickly. 


 

VM-Series for AWS Hybrid Cloud Deployment Guidelines

This whitepaper walks through both AWS and VM-Series deployment guidelines for building a hybrid cloud that extends your data center into AWS.

  • 0
  • 1513

Combat APTs with Palo Alto Networks

Advanced Persistent Threats (APTs) เป็นภัยคุกคามทางไซเบอร์ที่ก่ออันตรายต่อองค์กรทั่วโลก ด้วยความซับซ้อนและหลากหลายในการโจมตี เชิญร่วมงานสัมมนาผ่านทางเวปเพื่อรับข้อมูลเชิงลึกของการโจมตีประเภทนี้

  • 0
  • 129

Stop APT Webinar - Russian

Сложные постоянные угрозы (Advanced Persistent Threats или APT) используются для подрыва деятельности организаций по всему миру, и при этом изощренность, длительность воздействия и неуловимость их атак постоянно возрастает. Посетите мероприятие, организованное Palo Alto Networks® (только по приглашениям), которое даст возможность заглянуть в самое сердце кибер-андеграунда.

  • 0
  • 434

The Results of the 2014 Advanced Persistent Threats Survey Bring Home a Stark Reality

Read this report from the 2014 Advanced Persistent Threats Survey to learn where organizations are seeing the most impact from APT and where they are vulnerable.

  • 1
  • 340

Die Zwei um Zwölf: Advanced Persistent Threats und Modern Malware

Nachrichten über Malware, Cyber-Attacken und Sicherheitshinweise erscheinen mittlerweile fast täglich in den Medien. Sei es der Cyber Angriff auf das deutsche Zentrum für Luft- und Raumfahrt oder das SSL-gesicherte Server plötzlich von einer Schwachstelle betroffen sind. Als „normaler“ Anwender steht man diesen modernen Bedrohungen eher hilflos gegenüber und versucht mit einzelnen Hilfsmitteln die Sicherheit wieder herzustellen. Unser Webinar soll Ihnen einen Überblick über moderne Bedrohungen geben und Lösungsmöglichkeiten aufzeigen, wie sich ein Unternehmen gegen moderne Angriffe heutzutage schützen kann.

  • 0
  • 106

An Enterprise Security Platform Approach to Advanced Persistent Threats

Learn how the Palo Alto Networks enterprise security platform protects organizations from known threats, zero-day exploits, unknown malware, and the complete spectrum of APTs.

  • 0
  • 108