Palo Alto Security Operating Platform

Created for automation


Palo Alto Networks® Security Operating Platform prevents cyber attacks from getting their objectives thanks to the automation of routine tasks and the application of them.

• Prevent cyber attacks from achieving their objectives

• Focus on the important


What is Next Generation Firewall?


A Next Generation Firewall (NGFW), is a security element capable of detecting and prevent sophisticated attacks by forcing security policies at the application level (layer 7), as well as at the level of ports or communication protocols.


NGFW combine the capabilities of traditional Firewalls, including, packet filtering, translation of network addresses (NAT), URL blocking and virtual private networks (VPN) with Quality of Service (QoS) functionalities, and other capabilities not found in Firewalls traditional, such as:
1- Recognition and control of applications
2- Intrusion prevention system (IPS)
3- SSL and SSH inspection
4- Deep inspection of communication packages
5- Detection and prevention of reputation-based malware

App-ID
Identify the application

Content-ID
Scan the content

User-ID
Identify the user

One-step architecture

The architecture allows a complete and contextual classification of traffic, followed by a broad set of application options and threat prevention.

Content-ID

It is based on a one-step architecture, to analyze all traffic allowed, using multiple threat prevention technologies in an engine unified (IPS, antimalware, URL filtering, etc.).

App ID

Identify the application, regardless of port, protocol, encryption or any evasive tactic used by the application.

Traps - Advanced security for endpoint


Traps it's a prevention tool that stops threats in the endpoint and coordinates the application of policies with the security platform in the network and the cloud to prevent the Attackers achieve their objectives.


This solution adopts a unique approach for the detection of malware, exploits and ransomware, based on the understanding of the threats and not on signatures as the antivirus does traditional
By countering the techniques instead of identifying each attack in particular, Traps can protect systems without updating, incompatible obsolete systems and zero-day exploits.

Flexible, Scalable, Minimum Footprint

Footprint

• 0.1% CPU load
• 50 mb RAM
• 250 mb storage
• Does not scan

Platform

• Physical and virtual
• Most editions of your windows
• Protects systems after your End-Of-Life

Apps

• Out-of-the-box protection for common applications
• Extensible to many applications

Management

• Administration of centralized policies
• Integration with SIEM
• Access control by Roles

Multiple Exploit Prevention Methods


Recognition protection

Automatic prevention of vulnerability profiles used by Exploits

Exploit prevention based on the technique

Blocking Exploits techniques used to manipulate trusted applications

Kernel
protection

Protection against Exploits, directed or originated in the Kernel

Multiple Methods of Malware Prevention


Threat Intelligence

Prevents known threats

Local
analysis

Prevents unknown threats

Dynamic Analysis

Detects advanced unknown threats

Malicious Processes

Prevents scripted threats without files

Ransomware protection

Additional Ransomware protection