Palo Alto Networks training gives you the next-generation firewall knowledge you need to secure your network and safely enable applications. The training courses are delivered by Palo Alto Partner Westcon Group. We offer the following courses:
What is Palo Alto Networks?
Palo Alto Networks was founded by security visionary Nir Zuk, with a mission to re-invent the firewall so it could once again become the most strategically important security device in the network. Palo Alto Networks next-generation firewalls enable unprecedented visibility and control of applications and content – by user, not just IP address – at up to 10Gbps.
Based on patent-pending App-ID™ technology, Palo Alto Networks’ next-generation firewalls accurately identify applications – regardless of port, protocol, evasive tactic, or SSL encryption – and scan content to stop threats and prevent data leakage. With Palo Alto Networks, enterprises can, for the first time, embrace and benefit from a new generation of applications while maintaining complete visibility and control.
Why Palo Alto Networks?
The firewall is the most strategic network security infrastructure component, it sees all traffic, and as such, is in the most effective location to enforce security policy.
Unfortunately, traditional firewalls rely on port and protocol to classify traffic, allowing tech-savvy applications and users to bypass them with ease; hopping ports, using SSL, sneaking across port 80, or using non-standard ports.
The resulting loss of visibility and control places administrators at a disadvantage and exposes enterprises to network downtime, compliance violations, increased operational expenses, and possible data loss. The historical approach to restoring visibility and control required that additional “firewall helpers” be deployed individually, behind the firewall or in a combined manner through sheet-metal integration.
Neither of these approaches solves the visibility and control problem due to limited traffic visibility, cumbersome management, and multiple-latency inducing scanning processes. Restoring visibility and control requires a new, fresh, from-the-ground-up approach. What’s needed is a next-generation firewall.