• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

EXPEDITION

A smarter, faster path to transformative prevention capabilities

Make your move to advanced protection, quickly and safely

The free Expedition tool speeds your migration to Palo Alto Networks, enabling you to keep pace with emerging security threats and industry best practices. The tool is available to customers and partners of Palo Alto Networks.

A 9-Time Gartner Magic Quadrant Leader

Don’t just take our word for it. Palo Alto Networks is recognized as a Gartner Magic Quadrant for Network Firewalls Leader.

Automate and accelerate transformation

Expedition takes firewall migration and best practice adoption to a new level of speed and efficiency. Now you can accelerate your move from legacy third-party products to the advanced capabilities of Palo Alto Networks® next-generation firewalls – with total confidence.

Expedition automatically upgrades your existing policies. It uses machine learning and analytics to generate and implement new policy and configuration recommendations, enhancing the effectiveness of your security controls while optimizing your security processes.

The tool is subject to a license agreement, which the user must accept prior to using the software.

 

Better protection through simplified policy migration



The Expedition tool makes it easy to transform Layer 3/4 security policies from third-party firewalls to Layer 7 policies, enhancing your protection. Expedition can aid in the implementation of these policies through App-ID™, User-ID™ and Content-ID™ technology from Palo Alto Networks.

 

 

Efficiently upgrade from legacy technologies

Automatically migrate policies from Cisco, Fortinet, Check Point, Forcepoint, Juniper, IBM, XGS and more. Upgrade to use best security practices with application, user and content-based policies, and apply a Zero Trust approach to minimize opportunities for attack. Read the overview

Automatically refine your controls

Enrich security policies by gaining visibility into application usage. Validate policies by fetching and analyzing logs automatically. Create reusable controls for quick deployment. Get the guides

Align with best practices

Reduce opportunities for attack with automated tuning of security policies. Update rules that do not align with best practices. Apply consistent security policies across your deployment. Ask a question

Let us assist you with your transformation

Utilize our expertise as you adopt the Palo Alto Networks Security Operating Platform, an integral part of a prevention-based architecture. Our Transformation Services provide comprehensive assistance with defining and implementing a Zero Trust security strategy that delivers measurable outcomes, and our expert consultants deliver the tools, best practices and assistance you need to simplify operations and prevent successful cyberattacks.

Consulting Services Support Services Education Services

Related products

NGFW

Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats.

Learn more

VM-Series

Virtualized form factors of our next-generation firewall can be deployed in a wide range of private and public cloud computing environments.

Learn more


Learn

RECOMMENDED
Link Visit

Link

Read Gartner Report

RECOMMENDED
Eye Read

Datasheet

VM-Series Specsheet

RECOMMENDED
Eye Read

Datasheet

Product Summary Specsheet

RECOMMENDED
Eye Read

White Paper

Traps Technical Overview

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved