Software Details
- 220
- 1 device
- for P/N: PAN-PA-220
- Subscription license renewal (3 years)
- prepaid
Know your gear
Your network is facing a rapidly evolving threat landscape full of modern applications, exploits, malware and attack strategies that are capable of avoiding traditional methods of detection. Threats are delivered via applications that dynamically hop ports, use non-standard ports, tunnel within other applications or hide within proxies, SSL or other types of encryption. Additionally, enterprises are exposed to targeted and customized malware, which can easily pass undetected through traditional antivirus solutions.
Palo Alto Networks address these challenges with unique threat prevention abilities not found in other security solutions. First, the firewall removes the methods that threats use to hide from security through the complete analysis of all traffic, on all ports regardless of evasion, tunneling or circumvention techniques. Then Palo Alto Networks leverages multiple threat prevention disciplines including IPS and anti-malware along with URL filtering and file and content blocking to control known threats. Finally, WildFire provides automated sandbox analysis of suspicious files to reveal unknown and targeted malware and uses the behavioral botnet report to identify the unique patterns of botnet infections in a network.
Palo Alto Networks address these challenges with unique threat prevention abilities not found in other security solutions. First, the firewall removes the methods that threats use to hide from security through the complete analysis of all traffic, on all ports regardless of evasion, tunneling or circumvention techniques. Then Palo Alto Networks leverages multiple threat prevention disciplines including IPS and anti-malware along with URL filtering and file and content blocking to control known threats. Finally, WildFire provides automated sandbox analysis of suspicious files to reveal unknown and targeted malware and uses the behavioral botnet report to identify the unique patterns of botnet infections in a network.