Palo Alto Networks Customer Presentation November 2009 Ozan Ozkara About Palo Alto Networks • Founded in 2005 by a world-class team with strong security and networking experience • Innovations: App-ID, User-ID, Content-ID • Builds next-generation firewalls that identify and control more than 850 applications; makes firewall strategic again • Global footprint: presence in 50+ countries, 24/7 support Page 2 | © 2009 Palo Alto Networks. Proprietary and Confidential. Applications Have Changed – Firewalls Have Not • The gateway at the trust border is the right place to enforce policy control - Sees all traffic - Defines trust boundary • BUT…Applications Have Changed - Ports ≠Applications - IP Addresses ≠Users - Packets ≠Content Need to Restore Visibility and Control in the Firewall Page 3 | © 2009 Palo Alto Networks. Proprietary and Confidential. Application Control Efforts are Failing • Palo Alto Networks’ Application Usage & Risk Report highlights actual behavior of 900,000 users across more than 60 organizations - Bottom line: despite all having firewalls, and most having IPS, proxies, & URL filtering – none of these organizations could control what applications ran on their networks • Applications evade, transfer files, tunnel other applications, carry threats, consume bandwidth, and can be misused. Applications carry risks: business continuity, data loss, compliance, productivity, and operations costs Page 5 | © 2009 Palo Alto Networks. Proprietary and Confidential. The Right Answer: Make the Firewall Do Its Job New Requirements for the Firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify users regardless of IP address 3. Protect in real-time against threats embedded across applications 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, in-line deployment with no performance degradation Page 7 | © 2009 Palo Alto Networks. Proprietary and Confidential. Identification Technologies Transform the Firewall App-ID Identify the application User-ID Identify the user Content-ID Scan the content Page 8 | © 2009 Palo Alto Networks. Proprietary and Confidential. Purpose-Built Architecture: PA-4000 Series RAM Content Scanning Engine Dedicated Control Plane • Highly available mgmt • High speed logging and route updates RAM RAM RAM Content Scanning HW Engine • Palo Alto Networks’ uniform signatures • Multiple memory banks – memory bandwidth scales performance 10Gbps RAM Dual-core CPU CPU 1 CPU 2 CPU 3 .. RAM CPU 16 RAM RAM HDD SSL IPSec DeCompression Multi-Core Security Processor • High density processing for flexible security functionality • Hardware-acceleration for standardized complex functions (SSL, IPSec, decompression) 10Gbps QoS Control Plane Page 9 | © 2009 Palo Alto Networks. Proprietary and Confidential. Route, ARP, MAC lookup NAT 10 Gig Network Processor • Front-end network processing offloads security processors • Hardware accelerated QoS, route lookup, MAC lookup and NAT Data Plane Enables Visibility Into Applications, Users, and Content Page 10 | © 2008 2009 Palo Alto Networks. Proprietary and Confidential. PAN-OS Core Firewall Features Visibility and control of applications, users and content complement core firewall features • Strong networking foundation - Dynamic routing (OSPF, RIPv2) Tap mode – connect to SPAN port Virtual wire (“Layer 1”) for true transparent in-line deployment L2/L3 switching foundation • VPN - - Site-to-site IPSec VPN SSL VPN Max/guaranteed and priority By user, app, interface, zone, IP and scheduled Page 11 | - All interfaces assigned to security zones for policy enforcement PA-4060 • High Availability - - Active / passive Configuration and session synchronization Path, link, and HA monitoring PA-4050 PA-4020 • Virtual Systems • QoS traffic shaping - • Zone-based architecture - Establish multiple virtual firewalls in a single device (PA-4000 & PA-2000 Series only) • Simple, flexible management - CLI, Web, Panorama, SNMP, Syslog, XML API © 2009 Palo Alto Networks. Proprietary and Confidential. PA-2050 PA-2020 PA-500 Flexible Deployment Options Visibility • Application, user and content visibility without inline deployment Page 12 | Transparent In-Line • IPS with app visibility & control • Consolidation of IPS & URL filtering © 2009 Palo Alto Networks. Proprietary and Confidential. Firewall Replacement • Firewall replacement with app visibility & control • Firewall + IPS • Firewall + IPS + URL filtering Enterprise Device and Policy Management • Intuitive and flexible management CLI, Web, Panorama, SNMP, Syslog - Role-based administration enables delegation of tasks to appropriate person - • Panorama central management application Shared policies enable consistent application control policies - Consolidated management, logging, and monitoring of Palo Alto Networks devices - Consistent web interface between Panorama and device UI - Network-wide ACC/monitoring views, log collection, and reporting - • All interfaces work on current configuration, avoiding sync issues Page 13 | © 2009 Palo Alto Networks. Proprietary and Confidential. Addresses Three Key Business Problems • Identify and Control Applications - Visibility of over 850 applications, regardless of port, protocol, encryption, or evasive tactic - Fine-grained control over applications (allow, deny, limit, scan, shape) - Fixes the firewall • Prevent Threats - Stop a variety of threats – exploits (by vulnerability), viruses, spyware - Stop leaks of confidential data (e.g., credit card #, social security #) - Stream-based engine ensures high performance • Simplify Security Infrastructure - Fix the firewall, rationalize security infrastructure - Reduce complexity in architecture and operations Page 14 | © 2009 Palo Alto Networks. Proprietary and Confidential. Thank You Additional Information Speeds and Feeds, Deployment, Customers, TCO, Support, and Management Palo Alto Networks Next-Gen Firewalls PA-4060 PA-4050 PA-4020 • • • • • • • • • • • • • • • 10 Gbps FW 5 Gbps threat prevention 2,000,000 sessions 4 XFP (10 Gig) I/O 4 SFP (1 Gig) I/O 10 Gbps FW 5 Gbps threat prevention 2,000,000 sessions 16 copper gigabit 8 SFP interfaces 2 Gbps FW 2 Gbps threat prevention 500,000 sessions 16 copper gigabit 8 SFP interfaces PA-2050 PA-2020 PA-500 • • • • • • • • • • • • • • 1 Gbps FW 500 Mbps threat prevention 250,000 sessions 16 copper gigabit 4 SFP interfaces Page 17 | 500 Mbps FW 200 Mbps threat prevention 125,000 sessions 12 copper gigabit 2 SFP interfaces © 2009 Palo Alto Networks. Proprietary and Confidential 250 Mbps FW 100 Mbps threat prevention 50,000 sessions 8 copper gigabit Leading Organizations Trust Palo Alto Networks Health Care Financial Services Government Media / Entertainment / Retail Service Providers / Services Page 18 | Mfg / High Tech / Energy © 2009 Palo Alto Networks. Proprietary and Confidential Education Fix The Firewall – and Save Money! Capital cost – replace multiple devices • Legacy firewall, IPS, URL filtering device (e.g., proxy, secure web gateway) - Cut by as much as 80% “Hard” operational expenses • Support contracts Subscriptions Power and HVAC - Save on “soft” costs too • - Page 19 | Rack space, deployment/integration, headcount, training, help desk calls © 2009 Palo Alto Networks. Proprietary and Confidential. Cut by as much as 65% Legendary Customer Support Experience • Strong TSE team with deep network security and infrastructure knowledge - Experience with every major firewall - TSEs average over 15 years of experience • TSEs co-located with engineering – in Sunnyvale, CA • Premium and Standard offerings • Rave reviews from customers Page 20 | © 2007 2009 Palo Alto Networks. Proprietary and Confidential Confidential. Customer support has always been amazing. Whenever I call, I always get someone knowledgeable right away, and never have to wait. They give me the answer I need quickly and completely. Every support rep I have spoken with knows his stuff. -Mark Kimball, Hewlett-Packard Customer support has been extraordinarily helpful – which is not the norm when dealing with technology companies. Their level of knowledge, their willingness to participate – it’s night and day compared to other companies. It’s an incredible strength of Palo Alto Networks. -James Jones, UPMC Single-Pass Parallel Processing (SP3) Architecture Single Pass • Operations once per packet - Traffic classification (app identification) - User/group mapping - Content scanning – threats, URLs, confidential data • One policy Parallel Processing • Function-specific parallel processing hardware engines • Separate data/control planes Up to 10Gbps, Low Latency Page 21 | © 2009 Palo Alto Networks. Proprietary and Confidential. Comprehensive View of Applications, Users & Content • Application Command Center (ACC) - View applications, URLs, threats, data filtering activity • Mine ACC data, adding/removing filters as needed to achieve desired result Filter on Skype Page 22 | Filter on Skype and user oharris © 2009 Palo Alto Networks. Proprietary and Confidential. Remove Skype to expand view of oharris