Palo Alto Networks
Palo Alto Networks is an American company founded in 2005. Its headquarters are located in Santa Clara, California. It employs over 14,000 people and operates globally, serving customers in the public and private sectors worldwide. It specializes in cybersecurity solutions, offering a broad portfolio of products including firewalls, endpoint protection platforms, intrusion detection and prevention systems, and cloud security solutions. The company focuses on integrating and automating protection within a single, unified security architecture.
-
Palo Alto Networks
Palo Alto Networks Next Generation Firewall (PA-Series, VM-Series, CN-Series)
Next Generation Firewall (NGFW) from Palo Alto Networks is an advanced network security platform that integrates traditional firewall functions with modern security mechanisms, application identification, and identity-based access control.
-
Palo Alto Networks
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access is a comprehensive Secure Service Edge (SSE) platform that integrates advanced security features with cloud-based software-defined WAN technology (Prisma SD-WAN), delivering the Secure Access Service Edge (SASE) model.
-
Palo Alto Networks
Palo Alto Networks Threat Prevention (NGFW's module)
In Palo Alto Networks solutions, IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) functionalities are an integral part of the ATP (Advanced Threat Prevention) module, which extends the functionality of Palo Alto NGFW.
-
Palo Alto Networks
Palo Alto Networks SSL Decryption (build-in within PA-Series, VM-series, Prisma Access)
Palo Alto Networks SSL Decryption is an advanced feature built into Palo Alto Networks' Next Generation Firewall that enables SSL/TLS traffic decryption for threat detection, security policy enforcement, and prevention of hidden attacks.
-
Palo Alto Networks
Palo Alto ITDR
Identity-related threats and malicious insiders are currently significant attack vectors for organizations. These threats involve unauthorized access to user accounts as a result of theft or the use of weak credentials, phishing attacks, or social engineering techniques.