Transcript Document

Palo Alto Networks
Jay Flanyak
Channel Business Manager
[email protected]
Palo Alto Networks at a glance
Revenues
Corporate highlights
$MM
Founded in 2005; first customer shipment in 2007
Safely enabling applications and preventing cyber threats
Able to address all enterprise cybersecurity needs
$396
$400
$350
$300
$250
$200
$150
$100
$50
$0
$255
$119
$13
FYE July
$49
FY09 FY10 FY11 FY12 FY13
Enterprise customers
Exceptional ability to support global customers
13,500
14,000
12,000
9,000
10,000
Experienced team of 1,300+ employees
8,000
6,000
4,700
4,000
Q1FY14: $128.2M revenue; 14,500 customers
2,000
0
Jul-11
2 | ©2013, Palo Alto Networks. Confidential and Proprietary.
Jul-12
Jul-13
Our Market Opportunity
Magic Quadrant for Enterprise Network Firewalls
“Palo Alto Networks continues to
both drive competitors to react in the
firewall market and to move the
overall firewall market forward. It is
assessed as a Leader, mostly
because of its NGFW design,
direction of the market along the
NGFW path, consistent
displacement of competitors, rapidly
increasing revenue and market
share, and market disruption that
forces competitors in all quadrants to
react.”
Gartner, February 2013
4 | ©2012 Palo Alto Networks. Confidential and Proprietary.
Many Third Parties Reach Same Conclusion
• Gartner Enterprise Network Firewall Magic Quadrant
-
Palo Alto Networks leading the market
• Forrester IPS Market Overview
-
Strong IPS solution; demonstrates effective consolidation
• NetworkWorld Test
-
Most stringent NGFW test to date; validated sustained
performance and key differences
• NSS Tests
-
IPS: Palo Alto Networks NGFW tested against competitors’
standalone IPS devices; NSS Recommended
-
Firewall: traditional port-based firewall test; Palo Alto Networks
most efficient by a wide margin; NSS Recommended
-
NGFW: Palo Alto Networks best combination of protection,
performance, and value; NSS Recommended (1 of only 3)
5 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Applications Get Through the Firewall
Network security policy is enforced
at the firewall
•
•
•
Sees all traffic
Defines boundary
Enables access
Traditional firewalls don’t work any
more
6 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Applications Get Through the Firewall: Threats
Threats target applications
•
•
Used as a threat vector
Application specific exploits
7 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Applications Get Through the Firewall: Exfiltration
Applications provide exfiltration
•
•
Threat communication
Confidential data
8 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Applications Get Through the Firewall: Encryption
What happens traffic is encrypted?
•
•
SSL
Proprietary encryption
9 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Technology Sprawl and Creep Aren’t the Answer
•
“More stuff” doesn’t solve the problem
•
Firewall “helpers” have limited view of traffic
•
Complex and costly to buy and maintain
•
Doesn’t address application control challenges
UTM
Internet
IPS
DLP
IM
AV
URL
Proxy
Enterprise
Network
10 | ©2012, Palo Alto Networks. Confidential and Proprietary.
The Answer? Make the Firewall Do Its Job
1. Identify applications regardless of port, protocol, evasive tactic or SSL
2. Identify and control users regardless of IP address, location, or device
3. Protect against known and unknown application-borne threats
4. Fine-grained visibility and policy control over application access / functionality
5. Multi-gigabit, low latency, in-line deployment
11 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Zero-day discovery with WildFire™

10Gbps advanced threat visibility and prevention
on all traffic, all ports (web, email, SMB, etc.)

Malware run in the cloud with open internet
access to discover C2 protocols, domains, URLs
and staged malware downloads

Malware, DNS, URL, and C2 signatures
automatically created based on WildFire
intelligence and delivered to customers globally

Stream-based malware engine performs true inline enforcement

On-premises WildFire appliance available for
additional data privacy
Global intelligence
and protection
delivered to all
users
Anti-malware signatures
DNS intelligence
Malware URL database
Anti-C2 signatures
WildFire
TM
Command-and-control
Staged malware downloads
Host ID and data exfil
WildFire Appliance
(optional)
WildFire Users
12 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Soak sites, sinkholes,
3rd party sources
Enabling Applications, Users and Content
13 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Enabling Applications, Users and Content
 Applications: Safe enablement begins with
application classification by App-ID.
 Users: Tying users and devices, regardless of
location, to applications with User-ID and
GlobalProtect.
 Content: Scanning content and protecting
against all threats – both known and unknown;
with Content-ID and WildFire.
14 | ©2012, Palo Alto Networks. Confidential and Proprietary.
15 | ©2012, Palo Alto Networks. Confidential and Proprietary.