Palo Alto Networks is making major updates to its PAN-OS, the company announced Tuesday, adding new features across its entire technology platform. The new PAN-OS 8.0 launch adds upgrades across cloud security, multi-method threat prevention, management at scale, credential threat prevention and new hardware. All in all, Palo Alto Networks added more than 70 new features across those platform categories with the operating system update.
Palo Alto Networks is aiming to thwart credential theft with the launch of its next-generation security platform.
The move, which comes amid a barrage of product announcements from the security vendor, is notable because it's looking to prevent the intrusions that typically give cyberattackers the keys to the enterprise network.
While organizations have gained operational flexibility and lowered data center costs by deploying virtualization solutions, the true promise of a secure, agile, extensible, and flexible private cloud continues to be elusive. One of the key barriers is the ability to deploy security services at the same pace as virtual machine deployments without compromising the level of protection needed. VMware and Palo Alto Networks have partnered to address these challenges.
In today’s growing data center threat landscape, an effective cybersecurity strategy is imperative for software-defined data centers. VMware® and Palo Alto Networks® have partnered on a solution that leverages NSX™ to enable provisioning and seamless insertion of VM-Series next-generation firewall and advanced threat prevention in your software-defined data centers.
Download this white paper to learn more about design considerations, recommendations and best practices for traffic steering while deploying VMware NSX and Palo Alto Networks VM-Series integrated solution.
■ Intuitive and powerful policy control with a single security rule base.
■ Enterprise-class management capabilities, hierarchical device groups, template stacks, and more.
■ Unmatched visibility into previously hidden threats with automated threat correlation.
■ Actionable insight into traffic and threats with powerful Application Command Center (ACC).
■ Scalable and flexible deployment options.