AWS promises greater agility, scale and cost-efficiency – but how can you be sure your critical deployments are protected against advanced cyberthreats? By harnessing the advanced security capabilities of the VM-Series on AWS.
Align application usage to business needs, reduce your exposure and prevent threats using application whitelisting policies that allow specific applications and deny all else. Segment applications from communicating with each other across different subnets and between VPCs for regulatory compliance, and prevent threats from moving laterally.
The AWS shared responsibility model states that protecting your applications and data on AWS is your responsibility. The VM-Series on AWS securely enables your business-critical applications, prevents threats within allowed application flows and stops data exfiltration.
Tech-savvy applications and users can easily bypass port-based security controls using SSL, sneaking across TCP/80 or using non-standard ports. The VM-Series adds an application-centric, prevention-based approach to native AWS security features, allowing you to reduce your threat footprint, prevent threats within allowed traffic flows and stop data exfiltration.
Bootstrapping allows you to create a complete VM-Series firewall configuration to store in an AWS S3 bucket for on-demand deployment using AWS CloudFormation Templates or third-party tools, such as Terraform® and Ansible®. Each bootstrap configuration can be a fully functional firewall, complete with policies, licenses and subscriptions, as well as auto-registration with Panorama™ network security management.
You can use AWS tags to dynamically drive security policy updates as workloads are added to and removed from your VPC, eliminating a potential security bottleneck. Threat feeds from third parties and external sources can be fed directly into your security policy, ensuring your AWS deployment is protected. Compromised workloads can be automatically removed from circulation for remediation.
Panorama enables you to manage your VM-Series deployments across multiple cloud deployments, along with your physical security appliances, ensuring policy consistency and cohesiveness. Rich, centralized logging and reporting capabilities provide visibility into virtualized applications, users and content.
If you're ready to take the test drive, pick the best time for you below!
All times are displayed in Pacific Standard Time