Palo Alto Networks™, the network security company, has added Qualcomm Incorporated to its growing roster of enterprise customers. After a rigorous product evaluation process, Qualcomm chose Palo Alto Networks’ next-generation firewall to provide network security enforcement and application control.
“As Qualcomm engineers develop some of the world’s most advanced wireless technologies, the sheer volume of data generated places heavy demand on our data center’s network,” said Zeeshan Sabir, director of information technology at Qualcomm. “Palo Alto Networks helps us deliver a well-balanced combination of throughput, network security and access control mechanisms without impacting our network performance.”
Palo Alto Networks’ next-generation firewall provides policy-based visibility and control over applications, users and content. Using this technology, enterprises can accurately identify applications, scan content to stop threats, and prevent data leakage – all with a single network device. By reducing the number of security devices in their networks, companies can save both capital expenditures and operational costs.
“Palo Alto Networks has fixed the firewall by solving the root security problem: the ability to identify and control applications, users and content,” said Larry Link, vice president of worldwide sales at Palo Alto Networks. “We are pleased to be working with Qualcomm on improving their network security and application control.”
Next-Generation Firewall: How it Works
Palo Alto Networks combines three identification technologies to provide visibility and control over applications, users and content:
- App-ID identifies exactly which applications are running on the network, as well as the associated risks, so administrators can deploy comprehensive application usage control policies for inbound and outbound traffic.
- User-ID integrates with Microsoft Active Directory to link network activity to users and groups – not just IP addresses – for application visibility, policy creation, logging and reporting.
- Content-ID combines a real-time threat prevention engine with a comprehensive URL database to detect and block a wide range of threats, limit unauthorized transfer of files and data, and control non-work related Web surfing.
As a result, IT managers can accurately determine what is running on their network and make informed policy decisions that improve their overall security posture.
The Palo Alto Networks solution is based on an innovative single pass parallel processing (SP3) architecture that simplifies management, streamlines processing, and maximizes performance. The single pass software performs traffic analysis only once across each functional area, including networking, application classification, user classification and threat prevention. The software is tied directly to a parallel processing hardware platform that uses separate processors for each of these functions to maximize throughput and minimize latency.
Visit the Palo Alto Networks Application and Threat Research Center to find the latest news, commentary, and discoveries on applications and threats (http://www.paloaltonetworks.com/researchcenter/).
About Palo Alto Networks
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. For more information, visit www.paloaltonetworks.com.
Palo Alto Networks, “The Network Security Company,” the Palo Alto Networks Logo and App-ID are trademarks of Palo Alto Networks, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.