Presentation that sums palo alto firewalls Models, features and licenses to use for a potential customer. very helpful.
Size: 10.02 MB
Language: en
Added: May 27, 2024
Slides: 25 pages
Slide Content
Next-Generation Firewall
NETWORK SECURITY CHALLENGES Lack of visibility and control Inconsistent tools and management Lack of automation and scalability
WHAT IS A NEXT-GENERATION FIREWALL Deep packet inspection Looks beyond basic network port and protocol activity Evaluates and filters application-level traffic Includes intrusion protection capabilities Incorporates intelligence from outside the firewall
WHAT IS OUR NEXT-GENERATION FIREWALL Prevention Focused Architecture Zero Trust Enforcement Advanced Security | |
WHAT DOES OUR NEXT-GENERATION FIREWALL PROVIDE Unmistakable Clarity Predictable Performance Streamlined Protection
WHAT COMPRISES OUR NEXT-GENERATION FIREWALL Form Factor Subscriptions Management Physical Virtual Cloud Intelligence Analysis Connectivity Physical Virtual Cloud
FORM FACTOR: PA-SERIES PA-SERIES USAGE PA-220 Branch offices, retail locations, midsize businesses PA-220R Severe environments: utility substations, manufacturing plants, oil and gas facilities, building management systems, healthcare networks PA-400 Distributed branch offices, retail locations, and midsize businesses PA-800 Branch offices, midsize businesses
PA-SERIES USAGE PA-3200 Internet gateway PA-3400 High-speed internet gateway deployments PA-5200 Data center, Internet gateway, service provider deployments PA-5400 High-speed data center, internet gateway, and service provider deployments PA-5450 Hyperscale data center, internet edge and campus segmentation deployments PA-7000 Large data centers, high-bandwidth network perimeter FORM FACTOR: PA-SERIES
PAN-OS CAPABILITIES CAPABILITY WHAT IS IT? App-ID Enables application visibility on your network to help you to create and enforce security policies Content-ID Delivers a unified approach for traffic analysis using threat and data-loss prevention techniques Decryption Decrypt traffic to prevent unseen content and activity on your network User-ID Identifies all users on your network regardless of location Virtual Private Networking (VPN) Create connections to allow users and systems to connect securely over a public network Reporting Keep a pulse on your network activity and validate your security policies
CLOUD-DELIVERED SECURITY SERVICES Natively Integrated Offering best-in-class protection consistently, everywhere 180x Faster to stop known, unknown, and zero day threats than any other solution +4.3M Unique security updates per day to ensure organizations are protected
SUBSCRIPTIONS SUBSCRIPTIONS WHAT IS IT? DNS Security Applies predictive analytics, machine learning, and automation to block attacks that use Domain Name Service Enterprise Data Loss Prevention Discovers, monitors and protects sensitive data for all traffic, applications, and users IoT Security Identifies Internet of Things (IoT) devices, assesses their risks and enforces security for them GlobalProtect Extends prevention capabilities of the Strata firewall to mobile workers, regardless of their location
SUBSCRIPTIONS SUBSCRIPTIONS WHAT IS IT? SD-WAN Secure and reliable software-defined WAN as an integrated solution Threat Prevention Blocks known malware, exploits and command-and control activity on the network URL Filtering Provides safe web access, preventing users from malicious and phishing sites WildFire Detects and prevents unknown threats, quickly sharing protections automatically AIOps for NGFW Redefine firewall operational experience by interpreting, predicting, and resolving problems before they become business impacting.
SUBSCRIPTIONS SUBSCRIPTIONS WHAT IS IT? Advanced URL Filtering Uses a cloud-based ML-powered web security engine to perform ML-based inspection of web traffic in real-time. Advanced WildFire Provides access to Intelligent Run-time Memory Analysis, a cloud-based, advanced analysis engine that complements existing static, and dynamic analysis engines, to detect and prevent evasive malware threats. Advanced Threat Prevention Leverage full-featured IPS, antimalware, and command-and-control (C2) protection
Tightly integrated security innovations Effectiveness with automation and analytics Consistent visibility and control everywhere BENEFITS
THE VALUE OF OUR NEXT-GENERATION FIREWALL Reduce Human Error Reduce Legacy Tools Reduce Cost Reduce Risk
COMPETITIVE LANDSCAPE Check Point Software Riddled with issues - performance and complexity Cisco Firewall technology is behind Fortinet Neither a market disruptor nor a market leader
Target Buyers Pain Points Solutions Budget Holder CIO VP of Infrastructure VP of IT Pressure to reduce costs Demand for services Privacy and security Skills shortage Simplify your security infrastructure Manage risk without slowing down Protection everywhere Influencer Network Security Operations Network Security Engineer Too much reactive firefighting Lack of automation Tool complexity Lack of tool reliability Consistently protect with flexible deployment Save time by automating tasks Replace disconnected tools SALES POSITIONING
SALES PRIORITIZATION Prioritize organizations that value security Prioritize organizations that are concerned about data loss Prioritize organizations that have compliance requirements Prioritize organizations that use legacy security solutions De-prioritize organizations that make buying decisions based on price
WHY DO WE WIN A Different Standard for Security Security posture improvement Powerful threat identification and threat prevention Ease of management Automated, fewer manual tasks Highly integrated
WHY SELL OUR NEXT-GENERATION FIREWALL $16.7B Total Addressable Market (TAM) 12K Accounts Available for Refresh 23.52 % Annual Growth Rate Palo Alto Networks was named a Leader in the Gartner Magic Quadrant® for Network Firewalls for the TEN TH time in a row
WHAT TO LISTEN FOR KEY TERMS USE CASES Next-generation firewall Intrusion prevention (IPS)/ Intrusion detection (IDS) Web proxy / Web gateway / Web security Malware analysis Sandboxing VPN / SD-WAN Cybersecurity breach Security consolidation Branches / remote locations Data center Mobile networks Network perimeter Remote / Mobile workforce
WHAT TO ASK How many locations do you secure? Are you able to secure all your locations consistently? How many network security vendors do you use? How do you align your network security policies with business requirements? Have you had to turn off security features (like decryption) to meet the performance requirements of your organization? How do your security tools use automation to reduce manual tasks What impact have you seen by sophisticated attacks?
WANT TO KNOW MORE Next-Generation Firewall (NGFW) Channel Marketing Campaigns Help Me Sell NGFW Partner Enablement Technical Learning Guide Hardware Refresh Program