When we first came across Palo Alto Networks back in 2009, we were wowed by their pedigree with the legendary Nir Zuk as their founder and CTO (Nir was one of the developers of stateful inspection technology and previously had roles at Check Point, OneSecure and Juniper through the NetScreen acquisition).
Their flagship technology, the Next-Generation Firewall, bridged the perfect gap between network security, performance and safe enablement of applications for us. The software was smart and the appliance was built with a single pass architecture, which meant that we saw no degradation of network performance. So we were more than happy to share it with our customers!
Palo Alto Networks is now leading a new era in cybersecurity with their integrated Next-Generation Security Platform, which natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS, URL filtering, endpoint protection and automated behavioral analytics. They’re the fastest growing security company in the market and we’re pleased to be a Platinum partner and Authorized Support Center (ASC).DOWNLOAD THE PLATFORM DATASHEET
Request a Palo Alto Networks Next-Generation Security Platform Update for you and your team.
Palo Alto Networks’ Next-Generation Firewall platform architecture is based on the single-pass software engine and uses function-specific processing for networking, security, threat prevention, and management to deliver predictable performance.Learn more »
The VM-Series supports the exact same next-generation firewall and advanced threat prevention features available in the physical form factor appliances, allowing you to safely enable applications flowing into, and across your private, public and hybrid cloud computing environments.Learn more »
LightCyber brings award-winning Automated Behavioral Analytics to the Palo Alto Networks Next-Generation Security Platform and further enhances and extends your ability to prevent attacks at the internal reconnaissance and lateral movement stages of the attack lifecycle.Learn more »