The World

The term “normal business hours” no longer applies. To keep pace with the online-all-the-time world, virtualization technology allows your applications and data to be deployed across public, private, and hybrid cloud-computing environments to more easily adapt and support your business demands. 

Your World

Ongoing high-profile attacks have shown that corporate data, regardless of location (e.g., public, private, hybrid cloud), is a target. Attackers bypass controls using sophisticated attacks. Then, they use applications commonly found on your network to evade detection, navigating with little resistance to achieve their goal.

Our Approach

Our next-generation security platform lets you safely enable applications through granular visibility and policy-based control, and then prevent both known and unknown threats from moving laterally (VM to VM), thereby reducing risk and improving your security efficacy overall. Plus, centralized management and native automation features ensure that security keeps pace with your business.

VM-Series Virtualized Next-Generation Firewall

Virtualization is fueling an upheaval in today’s data centers, resulting in architectures that are oftentimes a mix of private and public cloud computing environments. The benefits of cloud computing are well-known; so too are the security challenges, exemplified by recent high-profile security incidents.

Just as an attack or compromise within your physical data center is a significant incident, the impact of a compromise in your virtualized environment is amplified because your workloads, some of which use varied trust levels, and the associated data are centralized, without any security barriers in between to keep them segmented. If your virtual environment is compromised, the attacker has access to your entire virtualized environment. 

Securing the Private Cloud

Defined as an environment in which you are responsible for the management of all aspects of the virtualization, hardware, compute, networking, security, etc., a private cloud is often considered to be an extension of your existing data center.

The VM-Series allows you to protect your private cloud infrastructure using application enablement policies while simultaneously preventing known and unknown threats. The VM-Series supports the following private cloud environments: VMware® ESXi™ and NSX™, Citrix® Netscaler® SDX™, Microsoft Hyper-V and KVM/OpenStack®.


Securing the Public Cloud

Defined as a ready-made compute, networking, and storage environment, the public cloud brings ubiquitous access to users, rapid scalability to address workload “bursts,” and infrastructure consistency. In a public cloud, ensuring your applications and data are kept safe from attackers is your responsibility, and that is where the VM-Series can help.

The VM-Series protects your public cloud infrastructure using application enablement policies while simultaneously preventing known and unknown threats. The VM-Series supports the following public cloud environments: VMware® vCloud® Air™, Amazon Web Services (AWS) and Microsoft Azure.


VM-Series Specsheet

The VM-Series has been optimized and expanded to deliver industry-leading performance of up to 16Gbps of App-ID-enabled firewall throughput across five models.
  • 5
  • 53913

VM-Series on VMware

Key features, performance capacities and specifications of VM-Series for VMWare.
  • 4
  • 24259

AWS Reference Architecture

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud.
  • 4
  • 6598

Azure Reference Architecture

This document provides architectural guidance for solution architects and engineers who are familiar with the next-generation firewall but not Azure.
  • 2
  • 5651

VM-Series On Google Cloud Deployment Guidelines

Organizations are adopting Google® Cloud Platform to take advantage of the same technologies that drive common Google services. Many business initiatives, such as big data, analytics and machine learning, deployed on GCP allow you to leverage contextual data collected from billions of search engine data points. The power behind GCP, combined with agility and a global footprint, help you quickly deploy enterprise-class applications and services.
  • 2
  • 6914

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.
  • 2
  • 2502