Firewall Overview

Palo Alto Networks® next-generation firewalls inspect all traffic (including applications, threats, and content), and tie that traffic to the user, regardless of location or device type. The user, application, and content—the elements that run your business—become integral components of your enterprise security policy. This allows you to align security with your business policies, as well as write rules that are easy to understand and maintain.
As part of our Security Operating Platform, our next-generation firewalls provide your organization with the ability to:
  • Securely enable applications (including software-as-a-service applications), users, and content by classifying all traffic (regardless of port).
  • Reduce risk of an attack using a positive enforcement model, by allowing all desired applications and blocking everything else.
  • Apply security policies to block known vulnerability exploits, viruses, ransomware, spyware, botnets, and other unknown malware, such as advanced persistent threats.
  • Protect your data centers (including virtualized data centers) by segmenting data and applications, as well as enforcing the Zero Trust principle.
  • Apply consistent security across your on-premises and cloud environments.
  • Embrace secure mobile computing by extending the Security Operating Platform to users and devices, no matter where they are located.
  • Get centralized visibility and streamline network security, making your data actionable so you can prevent successful cyberattacks.
  • Identify and prevent attempts to steal credentials by stopping the submission of valid corporate credentials to illegitimate websites, and neutralizing an attacker’s ability to use stolen credentials for lateral movement or network compromise by enforcing authentication policies at the network layer.

Related Documentation