ML Powered NGFW Customer Presentation PDF
ML Powered NGFW Customer Presentation PDF
ML Powered NGFW Customer Presentation PDF
PAN-OS 10.0
Your World Is Changing
Attacks are constantly and New devices are proliferating Surface areas of attack are
automatically morphing rapidly and silently increasing rapidly
But Typical Industry Response Is Manual
Mean Time To Identify: 206 Days Casino breached through fish tank 99% of firewall breaches due to misconfig, Gartner
Identifies new variants of threats Analyzes device behavior to Enables machine learning at
& new devices without relying on automatically create IoT Security cloud scale through
signatures policies, uses infrastructure continuous collection of data
changes for configuration changes and telemetry
6 | © 2020 Palo Alto Networks Confidential. Internal Use Only. Do Not Share Externally.
With Multiple Industry-Firsts...
Up to 95% of unknown file- <10 second signature delivery, 3x IoT devices detected 99% of breaches are caused
and web-based threats resulting in 99.5% reduction in by misconfiguration,
prevented inline systems infected (testing with beta customer) according to Gartner
Panorama Management
Security Subscriptions
Data Lake
Start with your
existing firewall
Data Policy
Scale linearly with multi-
tenant cloud infrastructure
NGFW
IoT OT
DEVICES DEVICES
Ordering Payments !
Container
Cluster
!
NODE NODE NODE
INTERNET
Self-Managed Cloud-Managed
Can’t keep up with the scale Accurate prevention depends Current hold, trickle and
of new attacks on on a first victim modify approaches impact
users and revenue
Cloud-delivered security
services scale prevention
DNS Security
Partner
Integrations Cyber Threat
capabilities
URL Filtering Alliance
Shared intelligence allows
WildFire
Data Lake
the fastest distribution
of protections
Infinite scale | Trillions of samples analyzed
| Fast, high fidelity updates File Protections: 5 min
URL
URL Protections : 1 min
Cloud-delivered security
services scale prevention
DNS Security
Partner
Integrations Cyber Threat
capabilities
URL Filtering Alliance
Shared intelligence allows
WildFire
Data Lake
the fastest distribution
of protections
Infinite scale | Trillions of samples analyzed
| Fast, high fidelity updates File Protections: Instant
URL
URL Protections : Instant
NEW
1. Prevent unknown file/web 2. Analyze all unknowns in cloud
threats on the NGFW ● Multiple advanced techniques for malware
● ML-based signatureless prevention ● Best-in-class URL categorization engines
● Acts at line speed ● Shared intelligence improves analysis
● No productivity delays
BEFORE
With PAN-0S 10.0
Industry-leading
Protection streams
5-minute signature
to NGFW in
generation/
single-digit seconds
distribution time
Data Lake
Total New
Threats
Polymorphic Fast Moving/
Threats Proliferation
Encrypted traffic is now the norm And attackers are taking advantage
70%
95%
of internet traffic
today is encrypted More than 70% of malware campaigns in 2020
will use some type of encryption to conceal
malicious activity, says Gartner
2016 2020
Source: Encrypted Traffic (2016) | Encrypted Traffic (2020) | Encrypted Walwave (Gartner)
Control use of legacy TLS Easily deploy and maintain Secure traffic that uses
protocols, insecure ciphers & decryption using purpose-built protocols like TLS 1.3 and
incorrectly configured certs troubleshooting & visibility HTTP/2. Now with up to 2X
performance boost
https://salesforce.com
in measurements
10.72.99.222
IP Address:
to monitor applications
From the branch to the SaaS Determine optimal path Preserve bandwidth while
application server with accurate path health ensuring great user experience
measurements
Passive Method
● Adaptive algorithm determines app’s
health by measuring latency, jitter,
packet loss through the apps’ native
application flows
Active Method
● ICMP or HTTP/S ping sends to target
IP address or specific URL
Enable always-on
availability for exceptional
user experience
● Supported on:
○ PA-3200 Series Flexible clustering with
HA Pair & individual
○ PA-5200 Series A/P members A/A
○ PA-7000 Series
(XM and 100G NPCs only)
○ VM-300, 500, 700
HA4 Session Sync over L2 VLAN
!
NGFW
C2 WildFire
ISACs Gov
Existing Prevention
Snort Rules
Controls
Snort
Suricata Customized Protection
Snort on PAN-OS
Easily add unique rules to
Delivered Upload Threat Prevention coverage
Manage
Convert
Flexible Management Sanitize Powerful API Support
Rapidly apply new coverage
GUI, CLI, or API
across environment
14
12
11
DNS requests analyzed
9
(Billions)
0
Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan
Data
Severity: Critical
Categories Policy
• Sinkhole C2 domains with a “critical” threat log
• Trigger automated containment workflow
C2 Malware
Severity: Medium
Newly Registered
Dynamic DNS
Domains Malware
DNS Visibility
● Complete visibility across all DNS traffic and
trends
● Filter based on DNS categories
and timeframes
● Abuse of DNS (malware, C2, tunneling, DGA)
DNS Hygiene
● Quickly view which firewalls in your estate
are covered by DNS Security
Protections
Unknowns
SCRIPTS
Updated within seconds, globally
ARCHIVE
BINARIES
Prevent Patient Zero with inline ML
DOCUMENTS
Data collected from a vast global Analysis techniques far beyond Automated protection against
community traditional sandboxing multiple attack variants
1 2 3
TACTICS
Crawl Each Stage Apply Cloud-Scale Recursive Generate Protections Share Protections &
Of Attack Analysis for Each Stage Visualize Campaign
14.5%
Incorporated best-in-class Improved final detection
ML engine from XDR rates for malicious files
paloaltonetworks.com