Get Visibility

As the foundational element of our enterprise security platform, App-ID is always on. It uses multiple identification techniques to determine the exact identity of applications traversing your network, including those that try to evade detection by masquerading as legitimate traffic, by hopping ports or by using encryption. Combined with information from User-ID, you always know who is using what on your network.

Safely Enable Applications

App-ID enables you to see the applications on your network and learn how they work, their behavioral characteristics, and their relative risk. Armed with this information, your security team can use positive security model rules to allow the applications or specific application functions that enable the business.

Reduce Attack Surface Area

Our next-generation firewalls support a positive enforcement model. You can allow sanctioned applications and application functions, and block or tightly control the remaining applications and unknown traffic. In addition, you can specify users and groups allowed to use the sanctioned applications. All of this allowed traffic is scanned for threats and sensitive data. This greatly reduces the surface area of cyber attacks across the organization.

App-ID enables you to see the applications on your network and learn how they work, their behavioral characteristics, and their relative risk. Applications and application functions are identified via multiple techniques, including application signatures, decryption (if needed), protocol decoding, and heuristics. This allows granular control, for example, allowing only sanctioned Office 365 accounts, or allowing Slack for instant messaging but blocking file transfer.

Broad and Deep Coverage, Yet Easy to Use

App-ID supports a comprehensive set of applications and application functions, organized by categories, technologies, risk and so on. This enables your organization to transition to a positive enforcement model and explicitly define which applications and application functions are allowed. In addition, you can create your own App-IDs for internal or custom applications.

"Unknown traffic," which is unrecognized by predefined and custom App-IDs, can be treated as its own category and explicitly managed with a variety of enforcement options based on your organization’s risk profile. This flexible handling of unknown traffic is unique to Palo Alto Networks.

Security Policies That Enable Your Business

Applications and application functions are foundational elements for policy in our next-generation firewalls. Security policies can also specify dynamic application filters that apply enforcement to groups of applications that meet a combination of criteria, for example, by blocking file-sharing peer-to-peer applications or high-risk encrypted-tunnel applications. This automatically keeps your security rules up to date with new applications that match the criteria.

Extensive Visibility and Reporting

The Application Command Center (ACC) shows a highly interactive, graphical view of application, URL, threat and data traffic. The ability to drill down from high-level information to individual log entries makes it possible to get answers to important questions fast.

Predefined and custom reports help you share insights with others. One of the predefined reports is the SaaS Application Usage report, which shows the top sanctioned and unsanctioned SaaS applications running on your network. This helps you assess risks to the security of your network, such as the delivery of malware through SaaS applications adopted by your users.


APP-ID Tech Brief

This tech brief provides an overview of our patented App-ID classification technology that determines the exact identify of applications, irrespective of port, protocol, evasive tactic, or SSL encryption.

  • 4
  • 9927

Architecting the Modern Campus Network

Learn on the promise of delivering a more secure campus network that is adaptive to threats, improves user experience, and is easier to configure and manage.

  • 0
  • 577

ACI Specialty Benefits

ACI Specialty Benefits offers best-in-class benefit solutions to engage the new workforce and drive business performance.

  • 0
  • 148

Next-Generation Security for Automotive Environments

Read this summary of our prevention-based approach to protect the automotive networks from cyberattacks.

  • 0
  • 200

Security Platform for Healthcare Providers

Palo Alto Networks® enterprise security platform is well suited for healthcare providers. Our ability to provide full visibility into all network traffic based on application (App-ID™), users (User-ID™) and content (Content-ID™) enables your security staff to rapidly assess the current state of your information and network security without any disruption to daily operations. You can discover where the organization is most at risk and make informed decisions about where to implement tighter controls. This Solution Brief available in Italian, Portuguese, and Spanish.

  • 7
  • 1508

Regio IT

IT service provider regio iT is a partner for city and district municipal authorities. With branches in Aachen and Gütersloh, regio iT helps around 320 customers and 20,500 clients from the municipal field meet challenges brought on by rapid development in the IT world and increasing cost pressures. regio iT’s current 340 employees take on the tasks of operating and supporting database and server systems as well as entire IT infrastructures for energy suppliers, waste disposal companies, schools, and non-profit organizations, and of managing the data of citizens within the region. Available in German.

  • 4
  • 1192