Show 172 – Palo Alto Networks Next-Generation Security In The Data Center – Sponsored

Ethan
Banks

Greg
Ferro

Listen, Subscribe & Follow:
Apple Podcasts Spotify Overcast Pocket Casts RSS

It’s an exciting time to be a networking geek, with the introduction of new technologies like network virtualization and established vendors like Cisco jumping into the SDN market. But, what about network security? What happens when you move from traditional data center architectures to virtualization, cloud and SDN environments?

Palo Alto Networks builds a next-generation security platform comprising physical and virtual form factors supporting the same PAN-OSTM next-generation security features. The combination of physical and virtual next-generation security platforms segment and safely enable the ‘North-South’ and ‘East-West’ traffic in your data center. This gives you complete visibility into the applications being used in the data center, knowledge of the users accessing those applications, and protection against known and unknown threats. More importantly, dynamic, services-oriented features enable support of a variety of data center architectures and for a variety of needs (firewall, IPS, APT/zero day threat prevention and network segmentation).

In this show, we discuss the following:

  • Why Palo Alto Networks next-generation security technologies like App-ID, User-ID, Content-ID and WildFire are applicable for data center environments. After all, it’s not 1999, why should you continue to be managing data center security policies with static IP address-based policies?
  • Easy insertion of the next-generation security platform in virtual wire mode. Yes, Palo Alto Networks can be deployed in traditional layer 2 and layer 3 deployments, but with virtual wire mode, deployments are transparent, no IP address, no MAC address and no routing or switching changes (yes, this means the security IT admin won’t have to deal with the networking IT admin!)
  • You’ll hear more about VM-Series – next-generation security platform in virtual form factor—and how it can safely enable East-West traffic. For example, when you have applications with different risk classifications communicating with each other on the same virtualized server.
  • We will discuss dynamic address objects and how you can create security policies using a qualifier, or tag, representing your virtual machines, to address the dynamic nature of cloud and SDN environments.
  • Finally, we’ll have an in-depth discussion of the Palo Alto Networks integration with VMware NSX. If you’re excited about network virtualization, you might want to hear how you will be able to deploy Palo Alto Networks next-generation security as a service on VMware NSX.

More Information

Exclusive offer just for Packet Pushers listeners – an opportunity to gain visibility into the traffic in your network via the Palo Alto Networks Application Visibility and Risk Report. PAN will place their firewalls in your network and after a week, provide summary data of the applications and threats that they see. The first five completed AVRs will receive their very own PA-200 to keep. Listen to the podcast, and check out www.paloaltonetworks.com/packetpushers for more information.

Share this episode

A Free Newsletter That Doesn't Suck

Human Infrastructure covers IT blogs, news and vendor announcements of interest to hands-on engineers.

Subscribe

Get Our Weekly Content Summary

The free Packet Capture newsletter lists every podcast, video and blog we published that week.

Subscribe

Leave a Comment