Palo Threat Prevention and URL Filtering Bundle for PA-200 - subscription l

Mfg. Part: PAN-PA-200-BND2 | CDW Part: 2844477 | UNSPSC: 43233205
Availability: Call Call for availability
Request Pricing
Product Details
  • Subscription license ( 1 year )
  • 1 device
View Full Product Details
Made For Each Other
Quick View
Total Price:

Product Overview

Main Features
  • Subscription license ( 1 year )
  • 1 device
Your network is facing a rapidly evolving threat landscape full of modern applications, exploits, malware and attack strategies that are capable of avoiding traditional methods of detection. Threats are delivered via applications that dynamically hop ports, use non-standard ports, tunnel within other applications or hide within proxies, SSL or other types of encryption. Additionally, enterprises are exposed to targeted and customized malware, which can easily pass undetected through traditional antivirus solutions. Palo Alto Networks address these challenges with unique threat prevention abilities not found in other security solutions. First, the firewall removes the methods that threats use to hide from security through the complete analysis of all traffic, on all ports regardless of evasion, tunneling or circumvention techniques. Then Palo Alto Networks leverages multiple threat prevention disciplines including IPS and anti-malware along with URL filtering and file and content blocking to control known threats. Finally, WildFire provides automated sandbox analysis of suspicious files to reveal unknown and targeted malware and uses the behavioral botnet report to identify the unique patterns of botnet infections in a network.

Stand-alone URL filtering solution is insufficient control mechanisms because it is easily bypassed with external proxies (PHproxy, CGIproxy), circumventors (Tor, UltraSurf, Hamachi) and remote desktop access tools (GoToMyPC, RDP, SSH). Controlling users' application activity requires a multi-faceted approach that implements policies to control web activity and the applications that are commonly used to bypass traditional security mechanisms. Palo Alto networks firewalls identify and control applications, irrespective of port, protocol, encryption (SSL or SSH) or evasive characteristic. Once identified, the application identity, not the port or protocol, becomes the basis of all security policies, resulting in the restoration of application control. Acting as the perfect complement to policy-based application control is a URL filtering database that securely enables web usage. By addressing the lack of visibility and control from both the application and website perspective, organizations are safeguarded from a full spectrum of legal, regulatory, productivity and resource utilization risks.

^ Back to Top