Problem

Today, wireless networks are a ubiquitous part of every large network. Nearly every office and school must have the means to provide wireless connectivity to its users and a new generation of devices. In fact, BYOD trends show that users are selecting their own devices to use at work, and bringing them on to the corporate wireless network with or without the approval of the IT security team.

With wireless networks, there is no longer any vestige of being able to control network access by physical means. As a result, the access point has to provide enterprise-class authentication methods to identify the user and the types of devices associating to the network. But what happens once the user establishes connectivity? Unfortunately, for many organizations, there’s no way to control what the user and device accesses, compounding the problem of making your wireless environment safe for BYOD devices.

 

Solution

The solution is to leverage safe application enablement principles from the Palo Alto Networks next-generation firewall. Palo Alto Networks partners with wireless network infrastructure providers to utilize the user and device information provided as the user associates to an access point. The wireless infrastructure controls the authentication, and the next-generation firewall applies policy based on the context of application, user, content, and device.

Now you can be very specific on the types of applications and content a particular user can access from a given device, and allow IT to make BYOD safe on your wireless networks.

 

Related Content


 

Firewall Feature Overview Datasheet

This datasheet provides a comprehensive overview of the critical PAN-OS features that power all next-generation firewalls from Palo Alto Networks.
  • 21
  • 84825

GlobalProtect Datasheet

GlobalProtect extends the protection of the Palo Alto Networks Next-Generation Security Platform to your mobile workforce, no matter where they may go.
  • 3
  • 47873

Comparing Palo Alto Networks With Proxy-Based Products

Comparison of Palo Alto Networks next-generation firewall technology with proxies.
  • 1
  • 25633

GlobalProtect Deployment Guide

Read how organizations can use Palo Alto Networks GlobalProtect to provide a secure environment for the increasingly mobile workforce.
  • 7
  • 14464

Comparing Palo Alto Networks with Web Application Firewalls (WAF)

Comparison of next generation firewall technology with Web Application Firewalls (WAF).
  • 0
  • 27609

Migration Tool Datasheet

The Palo Alto Networks Migration tool is a new release that helps automate and accelerate the migration from third-party firewall vendors to Palo Alto Networks next-generation firewalls.
  • 2
  • 12419