Story image

Palo Alto releases new, feature-rich firewall

14 Feb 2019

Palo Alto Networks has released several new capabilities that predict malicious attacks and use automation to stop them in progress. 

Firewall customers who upgrade to PAN-OS version 9.0 will get access to these new security capabilities, over 60 new features and new tools for easily implementing security best practices.  

"At Palo Alto Networks, we're focused on simplifying security by using analytics and automation," says chief product officer Lee Klarich. 

"Customers choose our next-generation firewall platform because of our commitment to continuous innovation and our focus on reducing the need for standalone products. Today's announcements include our new DNS Security service, which uses machine learning to stop stealthy attacks aimed at stealing information from legitimate businesses."

Among the new capabilities are:

  • A new DNS Security service that uses machine learning to proactively block malicious domains and stop attacks in progress.

According to Palo Alto Networks Unit 42 researchers, nearly 80% of all malware uses DNS to establish command-and-control, making it difficult to spot and stop attacks. 

  • The PA-7000 Series, with new network processing cards, offers threat prevention at speeds up to twice as fast as others and delivers decryption three times faster than before.

Customers with large data centres, high volumes of encrypted traffic, and a growing ecosystem of IoT devices need performance without compromising security. 

  • The new Policy Optimiser helps security teams replace legacy rules with policies that provide better security and are easier to manage.

Taking the complexity out of managing scores of rules reduces human error, which is a leading cause of data breaches.

  • The VM-Series now provides the broadest range of public cloud and virtualised data center environments by adding support for Oracle Cloud, Alibaba Cloud, Cisco Enterprise Network Compute System (ENCS) and Nutanix.

Organisations want consistent security across multiple public clouds and virtualised data centres.  

Firewall throughput performance improvements for AWS and Azure of up to 2.5X, combined with autoscaling and transitive architectures, allow customers to automate security for dynamic and large-scale public cloud deployments.

Additionally, Palo Alto Networks announced the general availability of the K2-Series, the industry's first 5G-ready next-generation firewall, specifically developed for service providers with 5G and IoT requirements in mind. 

WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.