Date

By Source

By Technology

By Services

By Audience

Displaying 11041 to 11070 of 11419

Next-Generation Firewall Defined By Gartner

Greg Young and John Pescatore just authored an excellent note on next-generation firewalls (see the liner notes/background in Greg’s blog). In the note, “Defining the Next-Generation Firewall,” Greg and John do an excellent job laying out the definition, the requirements, and their recommendations for next-generation firewalls in the enterprise.  Gartner notes that due to their dependence on port and protocol, first generation firewalls are not effective in today’s application and threat environment, and recommends that enterprises should move to next-generation firewalls at their next refresh.  To help organizations understand this …
Palo Alto Networks,
  • 0
  • 7

Engineers Fix the Shortcomings of the Traditional Firewall

Sometimes, the problems we experience with computers are a result of a legacy design. Hardware or software might have been architected 10 or 20 years ago when the world of computing was vastly different from the way it is today. As a result, the product in use today isn't as effective as it could be because of aging or obsolete design.
  • 0
  • 1680

Firewalls Failing to Protect Banks, Says Security Expert

Banks are spending more than they need on technology they would not miss, according to network security pioneer Nir Zuk
  • 0
  • 1815

Texas A&M Deploys Palo Alto Networks Firewalls for Improved Network Security

Texas A&M University at Galveston (TAMUG) houses the Texas Maritime Academy, which is one of six state maritime academies in the U.S. preparing graduates as officers in the United States Merchant Marine.
  • 0
  • 2242

Troubleshooting Panorama Connectivity

Details Here are some checks that should be made when Panorama is out of sync with one of many managed firewalls, or simply cannot connect to a firewall. Check IP connectivity between the devices. Make sure port 3978 is open and available from the device to Panorama. Make sure that
swhyte,
  • 0
  • 1

Yikes – Employees Are Using Yoics!

No doubt the first question you might have is what is Yoics! Simply put, Yoics! is a remote desktop access application that has been found in many of our customer’s networks. It is a good example of the types of applications being found that are not necessarily endorsed by corporate policy. Let’s take a quick look at what Yoics! is. Yoics! is targeted at end users as a means of accessing or sharing computing resources. It is not targeted at IT or support personnel.
Matt Keil,
  • 0
  • 0

Palo Alto Networks to Present at the Computer Forensics Show 2009

Palo Alto Networks' Julie Starr to Present "What’s on Your Network? Technology Options for Application Visibility and Control"
San Jose, Calif.
  • 0
  • 328

Querying More Than 10 Domain Controllers with the User-ID Agent

Overview By default, the maximum number of domain controllers that can be queried by the User-ID Agent is set to 10. This document describes how to change this limit.   Steps Use a text editor to open the config.xml located in the install directory for the User-ID Agent Default locations:
swhyte,
  • 0
  • 0

Palo Alto Networks Names Head of Worldwide Marketing, Broadens Leadership of Next-Generation Firewall Provider

Former Serena Software Marketing Executive René Bonvanie to Accelerate Expansion of Rapidly Growing Enterprise Infrastructure Security Company
San Jose, Calif.
  • 0
  • 364

More Comments Made on Debate About the Relevancy of the Firewall

The firewall is still relevant but needs a complete overhaul for it to work efficiently. Commenting on the issue raised by the SC Studio debate on the future of the firewall, Lee Klarich, vice president of product management at Palo Alto Networks, stated that the firewall is definitely not dead, but traditional firewalls are so far behind the application and threat developers that it sometimes feels like it.
  • 0
  • 1711

Beyond Ports and Protocols

Often we talk about how destination port is not an accurate classification for controlling network traffic. At this point, hopefully that is obvious. Everyone knows that just about anything can get out of an enterprise network via port 80 or 443. Lately I have had several discussions with customers curious about protocol validation and ensuring that only “valid” traffic is being allowed. Being “valid” has become a mostly useless concept. How do you control traffic on 80 and 443? You put in a proxy, right? Hmm. That is useful if …
Mike,
  • 0
  • 0

More Control for Facebook

Mafia Wars.  FarmVille.  YoVille.  PetSociety.  Hot or Not.  Texas Hold ‘Em. Many of you will have played, or seen updates from your friends on the above games – they represent some of the most popular applications on Facebook.  Some of my friends talk about “lost weekends” with various Facebook games, where they get so involved in online play, hours or days go by without pause – and as a result, my news feed is peppered with evidence of their progress in this month’s hottest game.
Palo Alto Networks,
  • 0
  • 2

Microsoft SMB2 Vulnerability

Microsoft has announced an out-of-band release for a vulnerability (CVE-2009-3103) in the SMB2 protocol which exposes Windows Server 2008 and Windows Vista users to possible remote code execution attacks. It does not appear that Windows 2000 and Windows XP are affected because they do not have the vulnerable SMB2 driver. The vulnerability is labeled as critical and there is publically available exploit code. The vulnerability is an index error in the SMB2 protocol implementation in srv2.sys, which allows remote attackers to either cause a denial of service attack or execute …
Alfred Lee,
  • 0
  • 0

Balancing the Risks and Benefits of Evasive Applications

We often use the term evasive as a means of describing how an application can bypass a traditional stateful inspection firewall. “Applications use tactics such as port hopping, non-standard ports, SSL encryption and emulation to evade the firewall.” While wholly accurate, the term carries negative connotations, implying the application is behaving badly. In reality, the application developers are using these techniques primarily for purposes of improving user accessibility.
Matt Keil,
  • 0
  • 1

Palo Alto: Can They Revolutionize Network Security?

The emergence of Palo Alto Networks (hereby referred to as 'Palo Alto') has undoubtedly injected a lot of buzz into the network security segment that has been devoid of any epochal leap, ever since the introduction of stateful inspection and the marriage between firewall technology and IPSec VPN gateways.
  • 0
  • 1606

How to Make the Support Portal Fully Functional for All Users

Super user needs to log into the Support Portal. Go to My Devices page. Make any or all devices public. Click on Edit link next to device and put a check box in Is public box. Save changes. owner: jnguyen
jnguyen,
  • 0
  • 0

Blocking Social Networking is an Exercise in Futility

This Mashable news article talks about how companies are blocking social networking sites. I would call this an exercise in futility. I say this because users will find a way. Social networking, along with IM, Twitter and streaming music have become part of many employees’ daily fabric. When companies try to block these applications, several things will happen, all of which may be worse the allowing access to these applications.
Matt Keil,
  • 0
  • 0

Applipedia on the iPhone

As some of you may have heard, Palo Alto Networks dropped an iPhone app late last week.  We built it primarily so that our customers and partners could have an in-pocket version of our Applipedia, but there are a couple fun features in there too (e.g., access to this blog, Palo Alto Networks videos).
Palo Alto Networks,
  • 0
  • 0

How to Configure Virtual Wire (VWire)

  There is a newer version of this document here: Getting Started: Preparing the Firewall for Its First Use   See Also Getting Started: The Series
Teresa,
  • 0
  • 10

How to Configure Captive Portal

Overview The attached document gives step-by-step instructions for configuring captive portal.  Four scenarios are covered: Web form login page- Transparent mode Web form login page - Redirect mode Client certificate NTLM authentication Steps Starting with PAN-OS 5.0, the action previously named "captive-portal" is now "web-form." Only the name has changed.
Teresa,
  • 0
  • 9

How to Configure In-Band Management

Details In this example: ethernet 1/7 is used Replace 1.2.3.4/24 with the IP address of the interface Replace 1.2.3.5 with the default gateway for the Palo Alto Networks firewall # set network interface ethernet ethernet1/7 link-duplex auto link-state auto link-speed auto layer3[edit] # commit # set network profiles interface-management-profile interfaceMgt
swhyte,
  • 0
  • 1

Palo Alto Networks Discovers Critical Vulnerability Addressed in this Week's Microsoft Security Bulletin

Palo Alto Networks PA-4000 Series Next Generation Firewall Focuses on Identifying and Controlling Applications on the Network
San Jose, Calif.
  • 0
  • 307

Traffic Analysis: P2P Found 92% of the Time

The most recent discovery of the first lady’s safe house (Laura Bush) and a detailed list of the civilian nuclear complex, including precise locations of weapons grade nuclear fuel follows closely on the heals of previous P2P discoveries of Marine One blueprints and healthcare records. Should we really be surprised? No not really, given the findings form the latest Application Usage and Risk Report: * An average of six P2P variants were found in 9 out of 10 organizations. * In one extreme case, 17 P2P variants were found.
Matt Keil,
  • 0
  • 0

CRN Magazine Names Palo Alto Networks as One of the Channel's Eight Hottest Security Offerings

Palo Alto Networks PA-4000 Series Next Generation Firewall Focuses on Identifying and Controlling Applications on the Network
San Jose, Calif.
  • 0
  • 291

Best of Interop 2008 Grand Prize Winner Palo Alto Networks Selected to Present at Interop Las Vegas 2009

2008 Grand Prize Winner Exhibiting at Interop 2009 After a Year of Significant Growth; VP of Product Management to Speak on “What’s Wrong with the Firewall”
San Jose, Calif.
  • 0
  • 280

Palo Alto Networks Discovers Critical Vulnerabilities Addressed in this Week's Microsoft Security Bulletin

Palo Alto Networks PA-4000 Series Next Generation Firewall Focuses on Identifying and Controlling Applications on the Network
San Jose, Calif.
  • 0
  • 263

Palo Alto Networks Next-Generation Firewalls Enhance Network Security for Texas A&M University at Galveston

Palo Alto Networks PA-4000 Series Next Generation Firewall Focuses on Identifying and Controlling Applications on the Network
San Jose, Calif.
  • 0
  • 319

Palo Alto Networks Names Pun Kok Lim as VP of Sales for Asia Regions

Palo Alto Networks PA-4000 Series Next Generation Firewall Focuses on Identifying and Controlling Applications on the Network
San Jose, Calif.
  • 0
  • 364
Displaying 11041 to 11070 of 11419