PA-7050: The Industry’s Fastest Next-Generation Firewall

posted by: on February 10, 2014 5:15 AM

filed in: Announcement
tagged: , , , ,

The big day has arrived! Palo Alto Networks today announced the PA-7050, the industry’s fastest, most powerful next-generation firewall. …Continue reading

Aardman Animations Illustrates Visibility Benefits of Using NGFW

posted by: on June 27, 2013 2:30 AM

filed in: Interview
tagged: ,

Aardman Animations, from Bristol, England, has a reputation as a world leader in model animation. Their award-winning work leads the field producing a unique brand of independent film, like Wallace & Gromit, alongside work for broadcast and advertising spots.

In the video below, Howard Arnault-Ham, Head of IT for Aardman Animations, talks about the switch from a traditional firewall to a Palo Alto Networks next-generation firewall, a surprisingly easy switch that provided his team with visibility into potential threats on its network.

With an open approach to IT, and in the nature of his business, Aardman is host to many freelancers and contractors that plug into their network. They needed a way to safely enable applications for them while having control over the network. With the Palo Alto Networks next-generation firewall, Howard and his team were able to gain visibility into network traffic based on applications, users and content, all the while allowing them freedom of use.

Now, hear about the experience directly from Howard:

Securing industry mobile initiatives beyond BYOD

posted by: on June 12, 2013 9:52 AM

filed in: Cybersecurity, Mobility
tagged: ,

Securing the deployment of mobile devices is often discussed in the context of employees using their personal smartphone or tablet for basic work-related activities such as email and collaborative tasks. The primary purpose is flexibility, productivity and the ability to remain connected while traveling, working from home or working after hours.

In some industries, the use of mobile devices goes much deeper and intersects with core business processes. In healthcare, clinicians use tablets to capture, review and update patient information on the bedside or at home, read vital data and make critical decisions. In banking and online retail, mobile payment is being deployed as a way to lower costs and gain market share. As the use of wireless and mobile technologies becomes more pervasive, the scope of the security needs must expand from protecting pointed interactions to covering a myriad of use cases that impact hundreds of mobile applications, and the enterprise data they access.

…Continue reading

← Newer posts Older posts →