Technology Partner Solution Brief_3_

Document Sample
Technology Partner Solution Brief_3_ Powered By Docstoc
					Palo Alto Networks: Technology Partner Solution Brief




Technology Partner Solution Brief
The Palo Alto Networks Technology Partner Program is comprised of a select group of
partners that deliver solutions or products integrated with the next-generation firewall.
SOLUTION OVERVIEW
Palo Alto Networks and LogRhythm have partnered to deliver enterprise-wide threat detection and response through
advanced correlation, pattern recognition and automated remediation. The next generation firewalls from Palo Alto
Networks capture rich user and application context to enable granular control of applications and prevention of
advanced threats. LogRhythm integrates with Palo Alto Networks by collecting and analyzing data in real-time and
correlating it against relevant security information tied to user, application and host behavior. Alarms not only warn
of advanced threats, but can also be configured to initiate additional remediation by Palo Alto Networks firewalls to
actively prevent advanced threats from becoming a reality.

LogRhythm extends the industry-leading capabilities of Palo Alto Networks next-generation firewalls by delivering
powerful correlation and pattern recognition for advanced threat detection & response to critical events originating
from inside and outside the network. Fully interactive visualization tools and context-aware event management deliver
comprehensive capabilities for protecting the network and reducing mean-time-to-resolution (MTTR). Combining
Palo Alto Networks next-generation firewalls with LogRhythm’s award winning Log Management & SIEM 2.0, File
Integrity Monitoring, and Host Activity Monitoring allows customers to efficiently comply with regulations, secure
their networks and optimize the availability of their IT infrastructure.




                                                                    LOGRHYTHM’S SIEM 2.0 PLATFORM DELIVERS:
                                                                        • Fully Integrated Log & Event Management
                                                                        • Advanced Correlation and Pattern Recognition
                                                                        • Independent Host Activity Monitoring
                                                                        • File Activity Monitoring
                                                                        • Enterprise-wide Network Visibility
                                                                        • Powerful, Rapid Forensics
                                                                        • SmartRemediationTM
                                                                        • Ease-of-Use and Simplified Management
                                                 Palo Alto Networks: Technology Partner Solution Brief




PALO ALTO NETWORKS
Palo Alto Networks™ next-generation firewalls enable
unprecedented visibility and granular policy control of
applications and content – by user, not just IP address – at
up to 20 Gbps with no performance degradation. Based on
patent-pending App-ID™ technology, Palo Alto Networks
firewalls accurately identify and control applications –
regardless of port, protocol, evasive tactic or SSL encryption
– and scan content to stop threats and prevent data leakage. Enterprises can, for the first time, embrace Web 2.0
and maintain complete visibility and control, while significantly reducing total cost of ownership through device
consolidation.

LOGRHYTHM
A wealth of valuable information can be derived from log
data – originating from applications, databases, servers,
network devices or host systems. LogRhythm enables
organizations to detect and respond to advanced threats,
automate compliance assurance and intelligently optimize
IT operations by automating the collection, organization,
analysis, archiving and reporting of all log data. By fully
integrating Log Management & SIEM 2.0, with File
Integrity Monitoring and Host Activity Monitoring in one
solution LogRhythm:

           • Reduces acquisition costs
           • Simplifies ongoing management
           • Accelerates compliance
           • Increases ROI

It is cost-effective, easily deployed, and scales to fit the needs of any enterprise, and is operated and managed through
an easy-to-use, wizard-driven console. With LogRhythm, enterprises can invest in a single solution to address security,
compliance, and operations issues related to requirements and challenges throughout their IT organizations.

LEARN MORE
For more information on the Palo Alto Networks/LogRhythm solution, contact:




              Palo Alto Networks                                                  LogRhythm, Inc.
              3300 Olcott Street                                                  3195 Sterling Circle, Suite 100
              Santa Clara, CA 95054                                               Boulder, CO 80301
              Main: (408) 753-4000                                                Phone: (303) 413-8745
              www.paloaltonetworks.com                                            www.logrhythm.com

				
DOCUMENT INFO
Shared By:
Stats:
views:43
posted:4/5/2012
language:English
pages:2
Description: Gartner is introduced to deal with the current and next generation network security threats that firewall must once again to upgrade to a" next generation firewall". An example, first generation firewall has been basically cannot detect the zombie network as transmission method of threat (see" case study: computer early detection function is zombie network client threat ."). Due to the current used is based on service-oriented architecture and Web2.0popularization, more communication amount just by a few ports ( such as: HTTP and HTTPS ) and the use of a limited number of protocol, which means based on port / protocol security policy relevance and efficiency are becoming more and more low. Deep packet inspection intrusion prevention system ( IPS ) according to the known attacks on the operating system and leakage deployed patch software inspections, but not effective recognition and prevent the application of abuse, not to mention the application specific characteristic protection.