To help customers address the diverse cloud and virtualization use cases and the growing need for greater performance, the VM-Series has been optimized and expanded to deliver industry-leading performance of up to 16Gbps of App-ID enabled firewall throughput across five models. Customers can protect their cloud and virtualization initiatives with a security feature set that mirrors those protecting their physical networks and delivers a consistent security posture from the network to the cloud.
This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud. For an organization with a desire to move to public cloud infrastructure, the next question is often “How do I secure my applications in a public cloud?” This guide provides an overview of AWS components and how they can be used to build a scalable and secure public cloud infrastructure on AWS using the VM-Series. The architectures begin with a single virtual private cloud suitable for organizations getting started and scales to thousands to meet any size organization’s operational requirements.
Although IaaS providers are responsible for ensuring the security and availability of their infrastructure, ultimately, organizations are still responsible for the security of the applications and data. This reference architecture describes how your organization can use the Palo Alto Networks® VM-Series firewalls to bring visibility, control, and protection to your applications built in Microsoft Azure.
This document provides architectural guidance for solution architects and engineers who are familiar with the next-generation firewall but not Azure. It links the technical aspects of the Azure and Palo Alto Networks solution together before exploring the technical design models of the architecture. Use this guide as a roadmap for architectural discussions between Palo Alto Networks and your organization.
The 2018 Cloud Security Report reveals that security concerns are on the rise, heightened by a shortage of qualified security personnel and the inability of most legacy security tools to address modern IT environments.