Date

By Source

By Technology

By Services

By Audience

Displaying 10171 to 10200 of 10861

Facebook Users are Voyeuristic While at Work

There are several realities that typically fall outside of the approved enterprise communications mechanisms. These applications can enhance business responsiveness and performance – but, conversely – introduce inbound risks such as malware and vulnerability exploits, and outbound risks such as data loss and inadvertent sharing of private or proprietary data.

  • 0
  • 1686

What Happens When Licenses Expire on the Palo Alto Networks Firewall?

Question: What Happens When Licenses Expire on the Palo Alto Networks Firewall?   Answer: The following will occur when a license expires on the firewall. Support - Online Software updates will no longer be allowed Threat Prevention - Threat and Antivirus updates will no longer occur. The current database will

nrice,
  • 0
  • 3

Packet Flow Sequence in PAN-OS

This document describes the packet handling sequence in PAN-OS.   Day in the  Life  of a  Packet PAN-OS  Packet Flow Sequence.   Since PanOS 7.0.2 and 6.1.7 (PAN-48644), dos protection lookup is done prior to security policy lookup.  This DOC was updated to reflect this change in behaviour.   Contents: SECTION

jpa,
  • 0
  • 19

Global Usage of 'Saying, Socializing and Sharing' Applications Remarkably Consistent

Software applications that enable employees to communicate personally with each other, participate in social networks and share files with one another are being used in 96 percent of the organizations recently studied, and account for about one-quarter of the total bandwidth being consumed by those organizations.

  • 0
  • 1745

Study Looks At Move To Cloud-Based Applications, Facebook Usage At Work

In its latest edition of the Application Usage and Risk Report, Palo Alto Networks draws attention to several realities that typically fall outside of the approved enterprise communications mechanisms.

  • 0
  • 1691

Browser-based Filesharing: Next-Generation P2P?

Since we began tracking the use of browser-based file sharing applications in the March 2008, they have evolved to the point where there are now several distinct use cases. As described in the latest Application Usage and Risk Report, published today, the first use case are those that that enable me to be more efficient at work. Examples include DocStoc and YouSendIt!, which allow me to find a template document or send a large file that I cannot get through the email server. The second use case is a cloud-based …

Matt Keil,
  • 0
  • 0

Facebook Users are Voyeuristic While at Work, According to New Report

Study also provides data that suggests IT teams are embracing enterprise-class, cloud-based applications

San Jose, Calif.
  • 0
  • 220

What is a Shadow Rule?

When committing a configuration, a warning may appear that one rule "shadows" another rule. Rule 'rule1' shadows 'rule2' Configuration committed successfully A shadow rule warning generally indicates a more broad rule matching the criteria is configured above a more specific rule. See this example: No traffic will ever match the

nrice,
  • 0
  • 1

Introducing the Threat Review Series

Last week we held our first webinar in the Threat Review Series where we focus on new or interesting threats in the security landscape and how to protect against them. It was an interesting session as we featured three very different types of threats – a botnet, a Windows application vulnerability and the always engaging Stuxnet malware and exploit. Given the popularity of the webinar, we created short videos that detail each threat including how it works and how to stop it. See below for a quick summary of each …

  • 0
  • 0

Stuxnet – SCADA malware

Stuxnet is the first malware in recent history that attacked industrial control systems also known as SCADA (Supervisory Control and Data Acquisition) systems developed by Siemens (Siemens SIMATIC WinCC). These systems monitor and control critical industrial facilities like nuclear power plants, power grids etc. Clearly, any security breach in such systems can have far reaching consequences and as such, these are arguably the most protected IT systems so much so that it is not impossible to imagine that none of these systems are even connected to or accessible through Internet.

  • 0
  • 2

Securing Inter VLAN Traffic

VLANs are used as an alternative solution to routers for broadcast containment. A Layer 2 switch can be configured to group subsets of ports into virtual broadcast domains isolated from each other. These domains are commonly known as virtual LANs (VLANs). Using a VLAN not only offers the benefit of

jpa,
  • 0
  • 0

Next-generation firewalls not ready to replace all legacy firewalls

Next-generation firewalls, or application-aware firewalls, have enjoyed well-deserved hype from network engineers and analysts, but the technology is still evolving. Many enterprises are also holding onto their old port and protocol firewalls, at least for now.

  • 0
  • 1596

App-ID and the Rule of All

Recently, the discussion surrounding application visibility and control provided by next-generation firewalls has become deafening. Now, every stateful inspection based firewall vendor is calling themselves a next-generation firewall that can identify and control applications. A remarkable feat, given that they are all still using port and protocol as the primary traffic classification mechanism and that all application identification is being done by a bolt-on IPS engine.

Matt Keil,
  • 0
  • 9

A-Teams of IT: How to build a crack strike force

IT is a tough job, but somebody's got to do it. And these days it takes a team of talented technology professionals, each with his or her own special expertise, to carry out mission-critical assignments.

  • 0
  • 1652

Palo Alto Networks Uncovers Critical Vulnerability in Adobe Flash Player

Adobe Credits Next-Generation Firewall Provider with Identifying Vulnerability That Affects All Platforms Running Adobe Flash Player

San Jose, Calif.
  • 0
  • 295

Report: Facebook Users in the Workplace are "Voyeurs"

It's 3 p.m. Do you know where your company's employees are? Probably not, because a whole lot of them are paging through Facebook, and not for business purposes either.

  • 0
  • 1777

Top 10 Consumer Apps/Devices Infiltrating the Business

The war is over and, in case you missed it, IT lost. The once ferocious attempts to guard the corporate perimeters against unapproved devices and applications is sputtering to an end because, frankly, all but myopic IT diehards recognize this is battle that's already over.

  • 0
  • 1641

Palo Alto Networks Signs Distribution Agreements with Westcon Group and COMPUTERLINKS

Company poised for accelerated growth signs two industry-leading global value added distributors

San Jose, Calif.
  • 0
  • 803

Palo Alto Expands Into Two-Tier Distribution In North America

Network security upstart Palo Alto Networks has signed distribution agreements with Westcon Group and Computerlinks, marking the first time Palo Alto's security products will be sold through two-tier distribution in North America.

  • 0
  • 1731

Palo Alto Networks: Can VARs Assist Long-term March to IPO?

Palo Alto Networks has a concise message for channel partners: The security company was cash-flow positive in its most recent quarter, and is looking to double its business in the year ahead. To assist with that effort, Palo Alto Networks has recruited roughly 150 channel partners and is now working with two distributors: Westcon Group and Computerlinks.

  • 0
  • 1666

Network Security Vendor Palo Alto Networks Partners with Distributor Westcon

Palo Alto Networks, the three-year-old networking security vendor, has moved to two-tier distribution, signing with Westcon and Computerlinks. And Westcon has a new many to handle its security division, former Avnet executive Andrew Warren.

  • 0
  • 1609

Palo Alto Networks Uncovers Important Vulnerability Included in the September Microsoft Security Bulletin MS10-066

Microsoft Credits Next-Generation Firewall Provider with Identifying Six Vulnerabilities in the Past 12 Months

San Jose, Calif.
  • 0
  • 233

Westcon Security names new VP, inks distribution partnership

Distributor has inked a deal with Palo Alto Networks to expand its solutions offerings

  • 0
  • 1585

What’s APPening with Google Docs

Gartner’s recent forecast analysis for Software-as-a-Service observes that Web-based office suites such as Google Apps (including Google Docs) will coexist with traditional office suites as business users will find them appropriate for real-time collaboration or as secondary online tools for taking notes. Google claims that over 3000 businesses sign-up for its Google Apps daily. Moreover, Google Docs is also very popular among employees for personal use. Nevertheless, users have discovered security issues with it, and many businesses have concerns related to data leak prevention and storing data in the cloud.

  • 0
  • 0

Configuring Hub and Spoke Route based VPN

Configuring Hub and spoke VPN using OSPF owner: jparapurath

jpa,
  • 0
  • 2

Putting BitTorrent Under the Spotlight

We have added a new video that introduces the key security concerns swirling around BitTorrent and specifically how to manage the risks that this incredibly popular application brings to your networks. We will cover how BitTorrent has evolved to avoid detection by traditional firewalls and IPS, how hackers are using BitTorrent to control malware, and why in some geographies BitTorrent can account for more than half of all combined enterprise and consumer internet traffic. View the video As always, we love to hear your feedback, so take a look and …

  • 0
  • 1

What Product Blocks the Highest Percentage of Modern Threats?

As you probably know, last year Gartner recommended that enterprises migrate from stand-alone IPS to next-generation firewalls for performing IPS functions. While this advice made intuitive sense based on the tight relationship between apps and threats, there was nevertheless a lack of empirical evidence to confirm that a next-generation firewall could actually stand up to the challenge of being a true IPS – until now.

  • 0
  • 1602

Any/Any/Deny Security Rule Changes Default Behavior

Overview All Palo Alto Networks firewalls have two implicit Security Rules: Deny cross-zone traffic Allow same-zone traffic The default rules are applied unless there is a defined rule that allows traffic to pass between two zones. Traffic that hit the default rules are not logged. Some users have found that

nrice,
  • 0
  • 0

Protecting Against the New DLL Attack

Summary Microsoft released a security advisory on Aug 23 that discusses a remote attack vector that allows an attacker to remotely take control of user’s machine. The security advisory was in response to a report released by a security researcher the previous week that described how more than 40 Windows applications could be compromised due to the way Windows applications load DLLs. Palo Alto Network’s Next-Generation Firewalls can help thwart/mitigate such attacks by using App-ID and Content-ID technology (details below).

  • 0
  • 0
Displaying 10171 to 10200 of 10861