-
Informasjon
- Embeds machine learning (ML) in the core of the firewall to provide inline signatureless attack prevention for file-based attacks while identifying and immediately stopping never-before-seen phishing attempts
- Leverages cloud-based ML processes to push zero-delay signatures and instructions back to the NGFW
- Uses behavioral analysis to detect internet of things (IoT) devices and make policy recommendations; cloud-delivered and natively integrated service on the NGFW
- Automates policy recommendations that save time and reduce the chance of human error
- Identifies the applications traversing your network irrespective of port, protocol, evasive techniques, or encryption (TLS/SSL)
- Uses the application, not the port, as the basis for all your safe enablement policy decisions: allow, deny, schedule, inspect, and apply traffic-shaping
- Offers the ability to create custom App-IDs for proprietary applications or request App-ID development for new applications from Palo Alto Networks
- Identifies all payload data within the application, such as files and data patterns, to block malicious files and thwart data exfiltration attempts
- Creates standard and customized application usage reports, including software-as-a-service (SaaS) reports that provide insight into all SaaS traffic - sanctioned and unsanctioned - on your network
- Enables safe migration of legacy Layer 4 rule sets to App-ID-based rules with built-in Policy Optimizer, giving you a rule set that is more secure and easier to manage
- Enables visibility, security policies, reporting, and forensics based on users and groups - not just IP addresses
- Easily integrates with a wide range of repositories to leverage user information: wireless LAN controllers, VPNs, directory servers, SIEMs, proxies, and more
- Allows you to define Dynamic User Groups (DUGs) on the firewall to take time-bound security actions without waiting for changes to be applied to user directories
- Prevents corporate credentials from leaking to third-party websites, and prevents reuse of stolen credentials by enabling multi-factor authentication (MFA) at the network layer for any application, without any application changes
- Provides dynamic security actions based on user behavior to restrict suspicious or malicious users
- Inspects and applies policy to TLS/SSL-encrypted traffic, both inbound and outbound, including for traffic that uses TLS 1.3 and HTTP/2
- Offers rich visibility into TLS traffic, such as amount of encrypted traffic, TLS/SSL versions, cipher suites, and more, without decrypting
- Enables control over use of legacy TLS protocols, insecure ciphers, and incorrectly configured certs to mitigate risks
- Facilitates easy deployment of decryption and lets you use built-in logs to troubleshoot issues, such as applications with pinned certs
- Lets you enable or disable decryption flexibly based on URL category and source and destination zone, address, user, user group, device, and port, for privacy and regulatory compliance purposes
-
Spesifikasjon
-
Nedlastbare filer