It’s an exciting time to be a networking geek, with the introduction of new technologies like network virtualization and established vendors like Cisco jumping into the SDN market. But, what about network security? What happens when you move from traditional data center architectures to virtualization, cloud and SDN environments?
Palo Alto Networks builds a next-generation security platform comprising physical and virtual form factors supporting the same PAN-OSTM next-generation security features. The combination of physical and virtual next-generation security platforms segment and safely enable the ‘North-South’ and ‘East-West’ traffic in your data center. This gives you complete visibility into the applications being used in the data center, knowledge of the users accessing those applications, and protection against known and unknown threats. More importantly, dynamic, services-oriented features enable support of a variety of data center architectures and for a variety of needs (firewall, IPS, APT/zero day threat prevention and network segmentation).
In this show, we discuss the following:
- Why Palo Alto Networks next-generation security technologies like App-ID, User-ID, Content-ID and WildFire are applicable for data center environments. After all, it’s not 1999, why should you continue to be managing data center security policies with static IP address-based policies?
- Easy insertion of the next-generation security platform in virtual wire mode. Yes, Palo Alto Networks can be deployed in traditional layer 2 and layer 3 deployments, but with virtual wire mode, deployments are transparent, no IP address, no MAC address and no routing or switching changes (yes, this means the security IT admin won’t have to deal with the networking IT admin!)
- You’ll hear more about VM-Series – next-generation security platform in virtual form factor—and how it can safely enable East-West traffic. For example, when you have applications with different risk classifications communicating with each other on the same virtualized server.
- We will discuss dynamic address objects and how you can create security policies using a qualifier, or tag, representing your virtual machines, to address the dynamic nature of cloud and SDN environments.
- Finally, we’ll have an in-depth discussion of the Palo Alto Networks integration with VMware NSX. If you’re excited about network virtualization, you might want to hear how you will be able to deploy Palo Alto Networks next-generation security as a service on VMware NSX.
- Listen to Packet Pushers Show 160 – Palo Alto Networks and Everything You Always Wanted to Know About Next-Gen Firewalls.
- Visit the Palo Alto Networks Server Virtualization and Cloud page.
- In addition, find out what is really happening in your network via a network assessment.
Exclusive offer just for Packet Pushers listeners – an opportunity to gain visibility into the traffic in your network via the Palo Alto Networks Application Visibility and Risk Report. PAN will place their firewalls in your network and after a week, provide summary data of the applications and threats that they see. The first five completed AVRs will receive their very own PA-200 to keep. Listen to the podcast, and check out www.paloaltonetworks.com/packetpushers for more information.