Menu
Palo Alto unveils enhanced security platform

Palo Alto unveils enhanced security platform

WildFire ehhancements enable quick discovery and elimination of previously unknown malware, zero-day exploits and advanced persistent threats

Network security firm Palo Alto Networks has enhanced its security platform to increase advanced threat detection and prevention capabilities.

Most significantly, this includes enhancements to the Palo Alto Networks’ WildFire service which enables quick discovery and elimination of previously unknown malware, zero-day exploits and advanced persistent threats.

According to a company statement, Cyber criminals are employing new stealth methods to evade traditional security measures, such as stateful firewalls, intrusion prevention systems and anti-virus (AV) systems.

These legacy approaches often address only a single threat vector across a limited range of network traffic, resulting in a higher attack penetration rate and costly human incident response.

“To better detect sophisticated attacks, a highly automated and scaleable “closed loop” approach is required,” a Palo Alto statement said.

“One that begins with positive security controls to reduce the attack surface; inspects all traffic, ports, and protocols to block all known threats; rapidly detects unknown threats; then, automatically employs new protections back to the front line to ensure previously unknown threats are known to all and blocked.”

New enhancements include extended file visibility – all common file types, including PDFs, Office documents, Java, and APKs, operating systems, and applications (encrypted or not) are now seen and filtered.

Zero-day exploit detection – using behavioural analysis, this signature independent capability in the WildFire cloud quickly identifies exploits in common applications and operating systems and distributes the intelligence to subscribing customers in as little as 30 minutes to prevent future attacks.

It also includes discovery of malicious domains – blocks the critical command-and-control phase of an advanced attack by building a global database of compromised domains and infrastructure.

It provides a single “pane of glass” view into incident response.

Palo Alto Networks, senior vice-president, Lee Klarich, said quickly detecting and eliminating previously unknown threats across all applications was key to protecting an organisation from today’s advanced threats.

“Only Palo Alto Networks offers its customers the closed loop capabilities to most efficiently and effectively stop sophisticated threats,” he said.

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags network securitypalo alto networkszero-day exploits and advanced persistent threatswildfireLee Klarichsenior vice presidentmalware

Upcoming

Slideshows

IN PICTURES: VMworld 2015 Asia-Pacific and Japan party (+ 32 photos)

IN PICTURES: VMworld 2015 Asia-Pacific and Japan party (+ 32 photos)

VMware recently held an Asia-Pacific and Japan party for its partners in San Francisco following two days of keynotes and sessions. Whilst mingling and enjoying drinks and finger food, the partners were joined by VMware management who also took the opportunity to let their hair down to have some fun.

IN PICTURES: VMworld 2015 Asia-Pacific and Japan party (+ 32 photos)
IN PICTURES: VMworld 2015 sponsor and partner showcase (+41 photos)

IN PICTURES: VMworld 2015 sponsor and partner showcase (+41 photos)

VMware's sponsors and partners used the opportunity at VMworld 2015 to showcase some of their technologies. At an exhibition hall, these vendors educated those that popped by their stands on these solutions and addressed some of the issues surrounding mobility, datacentres, and the Cloud. SOme of the big names there included f5, Palo Alto Networks, HP, Intel, Samsung, and Symantec.

IN PICTURES: VMworld 2015 sponsor and partner showcase (+41 photos)

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments