Firewall Overview
Palo Alto Networks® next-generation firewalls inspect
all traffic (including applications, threats, and content), and
tie that traffic to the user, regardless of location or device type.
The user, application, and content—the elements that run your business—become
integral components of your enterprise security policy. This allows
you to align security with your business policies, as well as write
rules that are easy to understand and maintain.
As part of our Security Operating Platform, our next-generation
firewalls provide your organization with the ability to:
Securely enable applications (including software-as-a-service applications),
users, and content by classifying all traffic (regardless of port).
Reduce risk of an attack using a positive enforcement model,
by allowing all desired applications and blocking everything else.
Apply security policies to block known vulnerability exploits,
viruses, ransomware, spyware, botnets, and other unknown malware,
such as advanced persistent threats.
Protect your data centers (including virtualized data centers)
by segmenting data and applications, as well as enforcing the Zero
Trust principle.
Apply consistent security across your on-premises and cloud
environments.
Embrace secure mobile computing by extending the Security
Operating Platform to users and devices, no matter where they are
located.
Get centralized visibility and streamline network security,
making your data actionable so you can prevent successful cyberattacks.
Identify and prevent attempts to steal credentials by stopping
the submission of valid corporate credentials to illegitimate websites,
and neutralizing an attacker’s ability to use stolen credentials
for lateral movement or network compromise by enforcing authentication
policies at the network layer.