• download

IP addresses are no longer an effective proxy for end users. With user-based access controls, organizations can allow access to sanctioned applications based on user identity information, rather than IP address. This brief discusses key considerations when implementing user-based access controls to minimize the threat exposure unknowingly caused by the end user community.


 

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

  • 56
  • 148586

PA-800 Series Datasheet

Palo Alto Networks PA-800 Series next-generation firewall appliances are designed to secure enterprise branch offices and midsized businesses.

  • 6
  • 36428

Protect Yourself From Antivirus

Traditional antivirus is not the solution to preventing endpoint breaches—it’s the problem. If you’re still using antivirus you are leaving your organization vulnerable to malicious attack.

Santa Clara, CA
  • 5
  • 18944

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.

  • 1
  • 34181

PA-220 Datasheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices and retail locations.

  • 6
  • 32109

PA-3000 Series Specsheet

Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.

  • 13
  • 71092