Identify

With knowledge comes power. Identifying applications within your virtualized environment, regardless of port, gives you unmatched visibility into your KVM-based deployment. Armed with this knowledge, you can make more-informed security policy decisions. 

Enable

Using the application as the basis for your VM-Series security policy allows you to leverage the deny-all-else premise that a firewall is based upon for both gateway and workload-to-workload protection. You can safely enable allowed applications and deny all others. 

Prevent

In order to further protect your KVM deployment, you can deploy application-specific threat prevention policies that will block both known and unknown malware.

The Palo Alto Networks VM-Series for KVM brings next-generation firewall and threat protection capabilities to protect KVM (Kernel-based Virtual Machine) hypervisor-based virtual infrastructure from advanced cyberthreats. VM-Series for KVM can be deployed and managed across a range of Linux operating systems, including Red Hat (RHEL), CentOS and Ubuntu. 

The VM-Series for KVM can be deployed to address a number of different use cases, each of which takes full advantage of our next-generation firewall and advanced threat prevention features.
 

Firewall/Perimeter Gateway

For enterprises embarking down a build-your-own cloud computing environment, the VM-Series for KVM enables you to apply all of our next-generation firewall and advanced threat prevention features to the traffic traversing your cloud computing perimeter.
 

OpenStack Orchestration

Service providers commonly use KVM and OpenStack to efficiently and cost-effectively scale their cloud computing service offerings for customers. When combined with the next-generation firewall and automation features in the VM-Series, service providers can build highly profitable cloud computing service offerings. 

 





 

No results found