IP addresses are no longer an effective proxy for end users. With user-based access controls, organizations can allow access to sanctioned applications based on user identity information, rather than IP address. This brief discusses key considerations when implementing user-based access controls to minimize the threat exposure unknowingly caused by the end user community.


Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

  • 73
  • 195356

2018 Predictions & Recommendations: Automated Threat Response Technology in OT Grows Up

Automated threat response, which we’ll simply refer to as ATR, is the process of automating the action taken on detected cyber incidents, particularly those deemed malicious or anomalous. For each type of incident, there is a predefined action for containment or prevention where newer technologies, such as behavioral analytics and artificial intelligence, are utilized to bring incidents of interest to the surface.

  • 4
  • 26161

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.

  • 7
  • 56598

PA-800 Series Datasheet

Palo Alto Networks PA-800 Series next-generation firewall appliances are designed to secure enterprise branch offices and midsized businesses.

  • 10
  • 57414

PA-220 Datasheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices and retail locations.

  • 13
  • 51077

PA-3000 Series Specsheet

Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.

  • 18
  • 88079