Story image

Palo Alto releases new, feature-rich firewall

14 Feb 2019

Palo Alto Networks has released several new capabilities that predict malicious attacks and use automation to stop them in progress. 

Firewall customers who upgrade to PAN-OS version 9.0 will get access to these new security capabilities, over 60 new features and new tools for easily implementing security best practices.  

"At Palo Alto Networks, we're focused on simplifying security by using analytics and automation," says chief product officer Lee Klarich. 

"Customers choose our next-generation firewall platform because of our commitment to continuous innovation and our focus on reducing the need for standalone products. Today's announcements include our new DNS Security service, which uses machine learning to stop stealthy attacks aimed at stealing information from legitimate businesses."

Among the new capabilities are:

  • A new DNS Security service that uses machine learning to proactively block malicious domains and stop attacks in progress.

According to Palo Alto Networks Unit 42 researchers, nearly 80% of all malware uses DNS to establish command-and-control, making it difficult to spot and stop attacks. 

  • The PA-7000 Series, with new network processing cards, offers threat prevention at speeds up to twice as fast as others and delivers decryption three times faster than before.

Customers with large data centres, high volumes of encrypted traffic, and a growing ecosystem of IoT devices need performance without compromising security. 

  • The new Policy Optimiser helps security teams replace legacy rules with policies that provide better security and are easier to manage.

Taking the complexity out of managing scores of rules reduces human error, which is a leading cause of data breaches.

  • The VM-Series now provides the broadest range of public cloud and virtualised data center environments by adding support for Oracle Cloud, Alibaba Cloud, Cisco Enterprise Network Compute System (ENCS) and Nutanix.

Organisations want consistent security across multiple public clouds and virtualised data centres.  

Firewall throughput performance improvements for AWS and Azure of up to 2.5X, combined with autoscaling and transitive architectures, allow customers to automate security for dynamic and large-scale public cloud deployments.

Additionally, Palo Alto Networks announced the general availability of the K2-Series, the industry's first 5G-ready next-generation firewall, specifically developed for service providers with 5G and IoT requirements in mind. 

Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.