Click here to close now.


SAP HANA Cloud Authors: Betty Zakheim, Greg O'Connor, Anders Wallgren, Pat Romanski, Jnan Dash

News Feed Item

Palo Alto Networks Continues to Disrupt Network Security with Modern Malware Prevention and Comprehensive Approach to Virtualization

The Largest Product Launch in Company's History Underscores Its Commitment to Innovation

SANTA CLARA, Calif., Nov. 13, 2012 /PRNewswire/ -- Palo Alto Networks™ (NYSE: PANW), the network security company, today announced several new products that extend its lead in next-generation network security by addressing today's mixed virtualized and physical enterprise networks and, for the first time, enabling enterprises to not only detect but also prevent modern malware.

Today's announcement marks the largest product launch in the history of Palo Alto Networks, which includes first-ever releases of four new products:

The launch of the VM-Series – a virtualized next-generation firewall platform that brings next-generation network security into the virtualized data center environment

The launch of the WildFire modern malware prevention subscription which sets the bar for the market which until now has only been focused on detection

The launch of the PA-3000 Series – a new, midrange next-generation firewall hardware platform

The launch of the M-100 appliance – a dedicated high-performance management appliance

All of these newly unveiled products are supported by the release of PAN-OS 5.0, which also introduces 60 new features focusing on solving unique network security problems in cloud environments, scaling and simplifying network security management in large enterprise environments, enhanced IPv6 capabilities and increased control for managing the growing amount of SSL traffic in the enterprise.

"Enterprises are struggling with major changes in the infrastructures they must secure, and what they must protect those infrastructures from," said Lee Klarich, vice president of product management, Palo Alto Networks. "With this release, we enable next-generation firewalls to help organizations with securing traditional and private cloud infrastructures from a growing array of threats, including unique, modern malware."

Next-Generation Security in the Virtualized Data Center and Cloud
The new Palo Alto Networks VM-Series is a key component in a comprehensive approach to network security in the virtualized data center.  Using application-, user-, and content-based next-generation firewall technology, it offers intra-host safe enablement of data center applications regardless of port or protocol. PAN-OS 5.0 adds significant management capabilities to the virtualized data center solution, such as allowing enterprises to tie user and app-based policies to virtual machine or server deployments via cloud automation or orchestration tools. Furthermore, a new feature, dynamic objects, allows security policies to follow virtual machines even when live-migration technologies move those VMs between hosts. PAN-OS 5.0 and the VM-Series enable IT to efficiently secure the infrastructure, both physical and virtual with a common policy and management approach.

Safe enablement of applications in the virtualized data center, combined with the ability to secure intra-host traffic, integration with migration technologies and orchestration and automation tools, all under one policy and management approach gives Palo Alto Networks customers a comprehensive and flexible solution to securing their virtualized data centers and private cloud infrastructures.

"We are pleased to be working with Palo Alto Networks to deliver on the vision of the software-defined data center," said Hatem Naguib, vice president, Networking and Security, VMware. "Palo Alto Networks Next-Generation Firewall VM-series integrated with VMware vSphere® helps our shared customers accelerate their adoption of virtualization while addressing their security and compliance needs."

New Threat Prevention Updates
Today, Palo Alto Networks begins offering a subscription service for WildFire, the company's cloud-based modern malware prevention service. The new service gives subscribers one-hour response times for the delivery of modern malware signatures, and integrated, on-box logging and reporting. The enhanced response time will ensure that the damage caused by "zero-day" malware and targeted attacks are mitigated for Palo Alto Networks customers.

The analysis and notification portion of WildFire will continue to be offered as a free service to all Palo Alto Networks customers.  WildFire uses the inherent advantages of Palo Alto Networks Next-Generation Firewalls to find modern, never-before-seen malware across all applications, not just web and email. To date, WildFire has discovered more than 70,000 new malware files that had not been identified by existing anti-malware solutions.

"The modern malware landscape is very challenging for legacy threat prevention solutions," said Nir Zuk, founder and chief technology officer, Palo Alto Networks. "Data collected by WildFire shows that new malware spreads fast, uses evasive techniques to hide from traditional security solutions and is often used in the early stages of a persistent attack. Providing industry-leading response times, combined with our control over applications, users, and content, is an innovative approach that gives our customers a much more comprehensive level of protection from targeted attacks."

New Midrange Next-Generation Firewall
The new PA-3000 Series Next-Generation Firewall expands the options for enterprise customers looking for a mid-range next-generation firewall that has the same level of application-, user-, and content-based control as existing data center and remote office solutions from Palo Alto Networks. The PA-3000 Series is comprised of the PA-3020 and PA-3050 Next-Generation Firewalls, and delivers full next-generation firewall capabilities at up to 4 Gbps of App-ID throughput.

New High-Performance Management Appliance
On the management front, the new M-100 management appliance offers an easy to deploy, high-performance, dedicated appliance for the Palo Alto Networks Panorama management system, which offers global, centralized control over a network of Palo Alto Networks Next-Generation Firewalls. The M-100 also introduces distributed log collection capability for large-scale enterprise deployments.

"So-called 'advanced attackers' are only as advanced as they need to be. If you leave the front door open, they don't need to sneak in through the ventilation ducts," said Mike Rothman, analyst and president, Securosis. "You need to take a different and more creative view of defensive tactics, while ensuring you execute flawlessly — because even the slightest opening provides opportunity for attackers."

Palo Alto Networks VM-Series, PA-3000 Series, M-100, and WildFire subscription are all available for order immediately. PAN-OS 5.0 is a free upgrade for customers on maintenance. For more information on pricing for Palo Alto Networks VM-Series, PA-3000 Series, M-100 and WildFire, contact your local reseller or visit

About Palo Alto Networks Next-Generation Security Solution
Palo Alto Networks has pioneered the next generation of network security with its innovative platform that allows you to secure your network and safely enable the increasingly complex and rapidly growing number of applications running on your networks. At the core of this platform is its Next-Generation Firewall (NGFW), which delivers visibility and control over application, users, and content within the firewall using a highly optimized hardware and software architecture.

This platform offers you the ability to identify, control, and safely enable applications while inspecting all content for all threats in real time. The Palo Alto Networks NGFW platform can address a broad range of your network security requirements, ranging from the data center to the network perimeter to the far edges of the enterprise, which includes branch offices and mobile devices. To find out more about the company's product portfolio, please visit

About Palo Alto Networks
Palo Alto Networks™ is the network security company.  Its innovative platform allows enterprises, service providers, and government entities to secure their networks and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The core of the Palo Alto Networks platform is its Next-Generation Firewall, which delivers application, user, and content visibility and control integrated within the firewall through its proprietary hardware and software architecture. Palo Alto Networks products and services can address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. Palo Alto Networks products are used by more than 9,000 customers in over 100 countries. For more information, visit

Palo Alto Networks, "The Network Security Company," the Palo Alto Networks Logo, App-ID, GlobalProtect, and WildFire are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

SOURCE Palo Alto Networks

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at, examined how Docker has evolved into a highly effective tool for application delivery by allowing increasingly popular Mobile Backend-as-a-Service (mBaaS) platforms to quickly crea...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true change and transformation possible.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound cha...
Internet of @ThingsExpo, taking place June 7-9, 2016 at Javits Center, New York City and Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 18th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide a basis for a successful cloud transition. A plethora of surveys from the likes of IDG and Gartner show that more than 70 percent of enterprises have deployed at least one or more cloud application or workload. Yet a closer inspection at the data reveals less than half of these cloud projects involve production...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, wil...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical to maintaining positive ROI. Raxak Protect is an automated security compliance SaaS platform and ma...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, explored the IoT cloud-based platform technologies driving this change including privacy controls, data transparency and integration of real time context with p...
There are over 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content. Join @ThingsExpo conference chair Roger Strukhoff (@IoT2040), June 7-9, 2016 in New York City, for three days of intense 'Internet of Things' discussion and focus, including Big Data's indespensable role in IoT, Smart Grids and Industrial Internet of Things, Wearables and Consumer IoT, as well as (new) IoT's use in Vertical Markets.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningful and actionable insights. In his session at @ThingsExpo, Paul Turner, Chief Marketing Officer at...
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, rich desktop and tuned mobile experiences can now be created with a single codebase – without compromising functionality, performance or usability. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, demonstrated examples of com...
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessions, I wanted to share some of my observations on emerging trends. As cyber security serves as a fou...
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, exploreed the current state of IoT connectivity and review key trends and technology requirements that will drive the Internet of Things from hype to reality.
Continuous processes around the development and deployment of applications are both impacted by -- and a benefit to -- the Internet of Things trend. To help better understand the relationship between DevOps and a plethora of new end-devices and data please welcome Gary Gruver, consultant, author and a former IT executive who has led many large-scale IT transformation projects, and John Jeremiah, Technology Evangelist at Hewlett Packard Enterprise (HPE), on Twitter at @j_jeremiah. The discussion is moderated by me, Dana Gardner, Principal Analyst at Interarbor Solutions.
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.