The Palo Alto Networks® next-generation firewall protects and defends your network from commodity threats and advanced persistent threats (APTs). The multi-pronged detection mechanisms of the firewall include a signature-based (IPS/Command and Control/Antivirus) approach, heuristics-based (bot detection) approach, sandbox-based (WildFire) approach, and Layer 7 protocol analysis-based (App-ID) approach.
Commodity threats are exploits that are less sophisticated and more easily detected and prevented using a combination of antivirus, anti-spyware, and vulnerability protection features along with URL filtering and Application identification capabilities on the firewall.
Advanced threats are perpetuated by organized cyber adversaries who use sophisticated attack vectors to target your network, most commonly for intellectual property theft and financial data theft. These threats are more evasive and require intelligent monitoring mechanisms for detailed host and network forensics on malware. The Palo Alto Networks next-generation firewall together with WildFire™ and Panorama™ provide a comprehensive solution that intercepts and breaks the attack chain and provides visibility to prevent security infringement on your network infrastructure—both mobile and virtualized.
- Set Up Antivirus, Anti-Spyware, and Vulnerability Protection
- Create Threat Exceptions
- Set Up Data Filtering
- Set Up File Blocking
- Prevent Brute Force Attacks
- Customize the Action and Trigger Conditions for a Brute Force Signature
- Best Practices for Securing Your Network from Layer 4 and Layer 7 Evasions
- Enable Evasion Signatures
- Best Practices for Application and Threat Content Updates
- Prevent Credential Phishing
- Share Threat Intelligence with Palo Alto Networks
- Use DNS Queries to Identify Infected Hosts on the Network
- Monitor Blocked IP Addresses
- Learn More About and Assess Threats
- Content Delivery Network Infrastructure for Dynamic Updates
- Threat Prevention Resources
What Is a Best Practice Internet Gateway Security Policy?
What Is a Best Practice Internet Gateway Security Policy? A best practice internet gateway security policy has two main security goals: Minimize the chance of ...
Best Practices for Completing the Firewall Deployment
Best Practices for Completing the Firewall Deployment Now that you have integrated the firewall into your network and enabled the basic security features, you can ...
Prevent Brute Force Attacks
Prevent Brute Force Attacks A brute force attack uses a large volume of requests/responses from the same source or destination IP address to break into ...
Set Up Antivirus, Anti-Spyware, and Vulnerability Protectio...
Set Up Antivirus, Anti-Spyware, and Vulnerability Protection Every Palo Alto Networks next-generation firewall comes with predefined Antivirus , Anti-Spyware , and Vulnerability Protection profiles that ...
Threat Details Monitor > Logs > Threat ACC > Threat Activity Objects > Security Profiles > Anti-Spyware/Vulnerability Protection Use the Threat Details dialog to learn ...
Security Profiles While security policy rules enable you to allow or block traffic on your network, security profiles help you define an allow but scan ...
Create Best Practice Security Profiles for the Internet Gat...
Use these File Blocking settings as a best practice at your internet gateway. ...
How to Create Data Center Best Practice Security Profiles
Use Security Profiles to protect against vulnerabilities, spyware, viruses, bad file types, and unknown threats. ...
Data Center Best Practice Methodology
Inspect all traffic, reduce the data center attack surface, and prevent known and unknown threats. Phase in protection starting with your most valuable assets. ...