palo alto networks jay flanyak channel business manager [email protected]

15
Palo Alto Networks Jay Flanyak Channel Business Manager [email protected]

Upload: jolie-horsley

Post on 30-Mar-2015

226 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Palo Alto Networks

Jay FlanyakChannel Business Manager

[email protected]

Page 2: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Palo Alto Networks at a glance

Corporate highlights

Founded in 2005; first customer shipment in 2007

Safely enabling applications and preventing cyber threats

Able to address all enterprise cybersecurity needs

Exceptional ability to support global customers

Experienced team of 1,300+ employees

Q1FY14: $128.2M revenue; 14,500 customers0

2,000

4,000

6,000

8,000

10,000

12,000

14,000

4,700

9,000

13,500

Jul-11 Jul-12

FY09 FY10 FY11 FY12 FY13$0

$50$100$150$200$250$300$350$400

$13$49

$255

$396

$119

Revenues

Enterprise customers

$MM

FYE July

Jul-13

2 | ©2013, Palo Alto Networks. Confidential and Proprietary.

Page 3: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Our Market Opportunity

Page 4: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Magic Quadrant for Enterprise Network Firewalls

“Palo Alto Networks continues to both drive competitors to react in the firewall market and to move the overall firewall market forward. It is assessed as a Leader, mostly because of its NGFW design, direction of the market along the NGFW path, consistent displacement of competitors, rapidly increasing revenue and market share, and market disruption that forces competitors in all quadrants to react.”

Gartner, February 2013

4 | ©2012 Palo Alto Networks. Confidential and Proprietary.

Page 5: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Many Third Parties Reach Same Conclusion• Gartner Enterprise Network Firewall Magic Quadrant

- Palo Alto Networks leading the market

• Forrester IPS Market Overview- Strong IPS solution; demonstrates effective consolidation

• NetworkWorld Test- Most stringent NGFW test to date; validated sustained

performance and key differences

• NSS Tests- IPS: Palo Alto Networks NGFW tested against competitors’

standalone IPS devices; NSS Recommended- Firewall: traditional port-based firewall test; Palo Alto Networks

most efficient by a wide margin; NSS Recommended- NGFW: Palo Alto Networks best combination of protection,

performance, and value; NSS Recommended (1 of only 3)

5 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 6: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Applications Get Through the Firewall

6 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Network security policy is enforced at the firewall• Sees all traffic• Defines boundary• Enables accessTraditional firewalls don’t work any more

Page 7: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Applications Get Through the Firewall: Threats

7 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Threats target applications• Used as a threat vector• Application specific exploits

Page 8: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Applications Get Through the Firewall: Exfiltration

Applications provide exfiltration• Threat communication• Confidential data

8 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 9: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Applications Get Through the Firewall: Encryption

What happens traffic is encrypted?• SSL• Proprietary encryption

9 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 10: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Technology Sprawl and Creep Aren’t the Answer

Enterprise Network

• “More stuff” doesn’t solve the problem

• Firewall “helpers” have limited view of traffic

• Complex and costly to buy and maintain

• Doesn’t address application control challenges

10 | ©2012, Palo Alto Networks. Confidential and Proprietary.

IMDLPIPS ProxyURLAV

UTM

Internet

Page 11: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

The Answer? Make the Firewall Do Its Job

1. Identify applications regardless of port, protocol, evasive tactic or SSL

2. Identify and control users regardless of IP address, location, or device

3. Protect against known and unknown application-borne threats

4. Fine-grained visibility and policy control over application access / functionality

5. Multi-gigabit, low latency, in-line deployment

11 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 12: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Zero-day discovery with WildFire™

10Gbps advanced threat visibility and prevention on all traffic, all ports (web, email, SMB, etc.)

Malware run in the cloud with open internet access to discover C2 protocols, domains, URLs and staged malware downloads

Malware, DNS, URL, and C2 signatures automatically created based on WildFire intelligence and delivered to customers globally

Stream-based malware engine performs true in-line enforcement

On-premises WildFire appliance available for additional data privacy

12 | ©2012, Palo Alto Networks. Confidential and Proprietary.

WildFireTM

WildFire Appliance(optional)

Anti-malware signatures

DNS intelligence

Malware URL database

Anti-C2 signatures

Soak sites, sinkholes, 3rd party sources

WildFire Users

Global intelligence and protection

delivered to all users

Command-and-control

Staged malware downloads

Host ID and data exfil

Page 13: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Enabling Applications, Users and Content

13 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 14: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

Enabling Applications, Users and Content

Applications: Safe enablement begins with application classification by App-ID.

Users: Tying users and devices, regardless of location, to applications with User-ID and GlobalProtect.

Content: Scanning content and protecting against all threats – both known and unknown; with Content-ID and WildFire.

14 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Page 15: Palo Alto Networks Jay Flanyak Channel Business Manager jflanyak@paloaltonetworks.com

15 | ©2012, Palo Alto Networks. Confidential and Proprietary.