Testimonials

Filter Results By

Filter by Type

  • Testimonial (34)
  • Video (1)

Filter by Topic

Filter by Industry

Filter by Product

  • Traps (1)

Viewing All Results

Most Viewed

"The days when port = protocol = application are behind us. An increasing percentage of enterprise network traffic is being funneled through a few well-known ports, more port-hopping or dynamic application content, such as Web 2.0. In many cases, traffic is being encrypted."

"Most enterprise firewalls are not fully featured NGFW but, rather, early versions. This slowness to market has opened the door to competition, such as that from startups."

Greg Young, Research Vice President

673 Views
Customer Video
October 22, 2014, 12:00 PM

Organizations around the globe continue to struggle with targeted attacks on the endpoint that bypass multiple layers of traditional controls. Sebastian Goodwin, former CISO talks about how the innovative approach and technology of Traps is a paradigm shift in endpoint security, and what that really means for an organization.

Quote - Customer

"At Western & Southern, we are extremely interested in anything that can help us to manage risk.  The previous generation of security infrastructure did not provide complete visibility into the latest evasive applications and the threats they can carry. Palo Alto Networks has given us the ability to identify what’s really going on with our network at a much more granular level. We’ve been able to use that information to identify malicious software on desktops, shut down evasive applications and threats, as well as geographically pinpoint application sources and destinations."

Doug Ross, Chief Technology Officer
Read the Case Study

Quote - Customer

"With Palo Alto Networks, we are now for the first time able to identify rogue applications on the network such as P2P and Skype, and then block them accordingly."

Justin Smith, Staff Network Engineer

Quote - Analyst

"First it was ports, then protocols, and now, applications: A new generation of firewalls is slowly emerging with more sophisticated inspection and blocking features at higher speeds. These new devices will not only do intrusion prevention, but also filter by application type. The protocol inspection method used by traditional firewalls is no longer enough, as more and more applications use Port 80, or HTTP."

Quote - Customer

"We know that port 80 is used for more than just Web surfing. The PA-4000 Series gives us visibility into and control over what’s on our network at all times, allowing us to be proactive in our security."

Frank Chambers, Director, IS Management

Quote - Customer

"Like many successful organizations, we needed to ensure that our infrastructure addressed our current security and compliance needs, but also protected us against emerging threats. Not knowing what was flowing in and out of our network was a huge vulnerability. The PA-4000 Series gives us a comprehensive view of our application and Internet traffic, and as a result we’re able to set smarter, more effective policies to allow what we want and restrict what we don’t."

George Morse, Senior Network Analyst
Read the Case Study

Quote - Analyst

"With a cast of characters that represents much of the intellectual capital surrounding firewalls, it’s a pretty fair bet that its efforts to clean up the security perimeter nightmare is going to attract some big-time attention."

Customer Story

As one of the premier government research and development (R&D) organizations for national security in the world, this organization needed to secure some of the country’s most sensitive weapons information. With over 5,000 employees and a relatively small real estate footprint, they were convinced that they could consolidate their multi-vendor approach into a singular next-generation cyber security platform. Given its mission, the importance of the information to be secured could not be underestimated. Palo Alto Networks was a natural fit. This Case Study available in Japanese and German.

Resource

Being a high profile government organization, this multinational Defense Agency needed to ensure a secondary layer of defense for its network at the edge, and for both its restricted and secure networks. Serving up to 10,000 users, its current solution was costly and was not from a preferred country of origin. This Case Study available in Japanese and German.

 

Quote - Customer

"Our network carries one of the highest traffic volumes in the nation and the Palo Alto Networks firewall is the only platform that is capable of protecting our data center without falling over."

Doug Bird
Vice President of IT Operations
Cricket Communications
Read the Case Study

Quote - Customer

"I never had any idea what my users were doing on the Internet, and the pipe was getting saturated with traffic and made the Internet almost unusable for a lot of users. I just wanted to be able to see what was happening on my network and be able set policies based on users to more tightly control the traffic traversing our network. With Palo Alto Networks, I have eliminated the non-business activities and have reclaimed the Internet as a productive business tool for my users."

Chuyen Nguyen, IS Manager

State of Pennsylvania

Quote - Customer
FPI

"...the model Gartner suggests for a next generation firewall is exactly what Palo Alto Networks built."

Carl Boyer, CISSP, CISM
Director of Information Security
Farm Credit Financial Partners

Quote - Customer

"Using the PA-4000 Series' reporting tools I can solve a problem now in ten minutes that used to take me three hours to fix. Everyone is amazed by what we can do with the Palo Alto Networks firewall. It certainly gives us the tools and network granularity we need to do our jobs."

Neal Moss, Network Engineer
Garland Independent School District
Read the Case Study

Quote - Customer

The Cabinet Office Technology Transformation programme was established to replace an end-of-life outsourced IT service.

The aim of the programme is to enable modern flexible ways of working and to provide civil servants with technology at least as good as they have at home.

During user testing at the start of this project, staff told the UK Cabinet Office IT team that they wanted better connectivity; greater choice of applications; to be able to be more mobile with more portable devices and to be able to collaborate on documents in real time.


Read the Blog

 

Quote - Analyst

"In every company in the world users install and use applications that are not approved by IT, which makes it challenging to establish uniform security and compliance policies. Establishing application visibility and control based on actual user identity, not just IP address, is an important feature in next-generation firewalls."

Jeff Wilson, Research Vice President

Quote - Customer

"Ensuring business applications are available, and that customer and operational data is protected, are sometimes competing demands we must meet.  The PA-4000 Series helps us achieve this goal by enabling us to extend appropriate control over users and applications."

Jon Biskner, CISO
Read the Case Study

Quote - Customer

"Our existing infrastructure couldn’t tell us which applications were running on our network. After deploying Palo Alto Networks’ PA-4000 Series, we were able to not only see which applications were on our network, but we were also able to understand the benefits and risks associated with them, allowing the enforcement of specific policies appropriate to our needs. The result is a more secure network, focused on our mission to provide the highest quality in learning for our students."

Scott McCollum, IT Services Director
Read the Press Release

Quote - Customer

"Our existing security infrastructure was completely blind to what was tunneling over port 80. With the PA-4000 Series, we have visibility and control over all Web traffic, enabling our employees the access they need to work effectively, without compromising network bandwidth or security. And the integration with Active Directory enables us to monitor and control applications on a per-user basis, resulting in more effective application usage and security policies. This has enabled us to improve our intellectual property protection dramatically. We can consolidate our firewall infrastructure and provide better protection in doing so."

Roger Blakely, VP Information Security
Read the Case Study

Quote - Analyst

"The days when port = protocol = application are behind us. An increasing percentage of enterprise network traffic is being funneled through a few well-known ports, more port-hopping or dynamic application content, such as Web 2.0. In many cases, traffic is being encrypted."

"Most enterprise firewalls are not fully featured NGFW but, rather, early versions. This slowness to market has opened the door to competition, such as that from startups."

Greg Young, Research Vice President

Quote - Analyst

"This week, we've seen some genuine innovation—and perhaps more importantly, some new approaches to solving some very old problems…. Just when you thought firewalls had dead-ended, for example, startup Palo Alto Networks launched a new firewall, the PA-4000, which can identify—and restrict—more than 500 types of application traffic. Instead of just two settings for Port 80 ("off" or "on") this firewall enables enterprises to allow, block, or truncate the use of all sorts of applications, including those running over SSL."

Quote - Customer

"Like many large schools, we have significant IT resources to serve our faculty, staff, and students. Ensuring those resources are not overwhelmed by threats and risky applications is challenging, given the nature of university environments.  The PA-4000 Series enables us to understand and control applications on our networks to achieve that goal."

Bob Neal, Sr. Director, Network Services
Read the Press Release

Quote - Customer

"With Palo Alto Networks, we now know what we didn’t know. And it’s scary what some of our users and contractors were doing."

Mark Rein, Senior Director, IT
Read the Case Study

Quote - Customer

"Instead of using a lot of different solutions, Palo Alto Networks gives us everything we need all in one box. By consolidating devices we've reduced our operational complexity and capital costs."

John Shaffer, Director Global Systems and Technology
Read the Case Study

Quote - Analyst

"The one lone voice in the wilderness these days that seems to be questioning much of the conventional wisdom of the security industry these days is Nir Zuk, who is the founder and chief technology officer for Palo Alto Networks, a startup company that is dedicated to overhauling the firewall has we know it….After 10 years of watching security infrastructure costs spiral out of control, it’s nice to see somebody talking about not only an improved firewall design but also a more efficient approach to the whole security model."

Quote - Analyst

"[The PA-4000 Series] makes all kinds of interesting things possible…. First, it provides visibility into and control of the applications on your network. If you don't want users fooling around with P2P apps, you shut them down at the gateway. If you only want them to use a corporate-approved IM system, Palo Alto's firewall allows that one and no others."