Palo Alto Networks at a glance
Corporate highlights
Founded in 2005; first customer shipment in 2007
Safely enabling applications and preventing cyber threats
Able to address all enterprise cybersecurity needs
Exceptional ability to support global customers
Experienced team of 1,300+ employees
Q1FY14: $128.2M revenue; 14,500 customers0
2,000
4,000
6,000
8,000
10,000
12,000
14,000
4,700
9,000
13,500
Jul-11 Jul-12
FY09 FY10 FY11 FY12 FY13$0
$50$100$150$200$250$300$350$400
$13$49
$255
$396
$119
Revenues
Enterprise customers
$MM
FYE July
Jul-13
2 | ©2013, Palo Alto Networks. Confidential and Proprietary.
Our Market Opportunity
Magic Quadrant for Enterprise Network Firewalls
“Palo Alto Networks continues to both drive competitors to react in the firewall market and to move the overall firewall market forward. It is assessed as a Leader, mostly because of its NGFW design, direction of the market along the NGFW path, consistent displacement of competitors, rapidly increasing revenue and market share, and market disruption that forces competitors in all quadrants to react.”
Gartner, February 2013
4 | ©2012 Palo Alto Networks. Confidential and Proprietary.
Many Third Parties Reach Same Conclusion• Gartner Enterprise Network Firewall Magic Quadrant
- Palo Alto Networks leading the market
• Forrester IPS Market Overview- Strong IPS solution; demonstrates effective consolidation
• NetworkWorld Test- Most stringent NGFW test to date; validated sustained
performance and key differences
• NSS Tests- IPS: Palo Alto Networks NGFW tested against competitors’
standalone IPS devices; NSS Recommended- Firewall: traditional port-based firewall test; Palo Alto Networks
most efficient by a wide margin; NSS Recommended- NGFW: Palo Alto Networks best combination of protection,
performance, and value; NSS Recommended (1 of only 3)
5 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Applications Get Through the Firewall
6 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Network security policy is enforced at the firewall• Sees all traffic• Defines boundary• Enables accessTraditional firewalls don’t work any more
Applications Get Through the Firewall: Threats
7 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Threats target applications• Used as a threat vector• Application specific exploits
Applications Get Through the Firewall: Exfiltration
Applications provide exfiltration• Threat communication• Confidential data
8 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Applications Get Through the Firewall: Encryption
What happens traffic is encrypted?• SSL• Proprietary encryption
9 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Technology Sprawl and Creep Aren’t the Answer
Enterprise Network
• “More stuff” doesn’t solve the problem
• Firewall “helpers” have limited view of traffic
• Complex and costly to buy and maintain
• Doesn’t address application control challenges
10 | ©2012, Palo Alto Networks. Confidential and Proprietary.
IMDLPIPS ProxyURLAV
UTM
Internet
The Answer? Make the Firewall Do Its Job
1. Identify applications regardless of port, protocol, evasive tactic or SSL
2. Identify and control users regardless of IP address, location, or device
3. Protect against known and unknown application-borne threats
4. Fine-grained visibility and policy control over application access / functionality
5. Multi-gigabit, low latency, in-line deployment
11 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Zero-day discovery with WildFire™
10Gbps advanced threat visibility and prevention on all traffic, all ports (web, email, SMB, etc.)
Malware run in the cloud with open internet access to discover C2 protocols, domains, URLs and staged malware downloads
Malware, DNS, URL, and C2 signatures automatically created based on WildFire intelligence and delivered to customers globally
Stream-based malware engine performs true in-line enforcement
On-premises WildFire appliance available for additional data privacy
12 | ©2012, Palo Alto Networks. Confidential and Proprietary.
WildFireTM
WildFire Appliance(optional)
Anti-malware signatures
DNS intelligence
Malware URL database
Anti-C2 signatures
Soak sites, sinkholes, 3rd party sources
WildFire Users
Global intelligence and protection
delivered to all users
Command-and-control
Staged malware downloads
Host ID and data exfil
Enabling Applications, Users and Content
13 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Enabling Applications, Users and Content
Applications: Safe enablement begins with application classification by App-ID.
Users: Tying users and devices, regardless of location, to applications with User-ID and GlobalProtect.
Content: Scanning content and protecting against all threats – both known and unknown; with Content-ID and WildFire.
14 | ©2012, Palo Alto Networks. Confidential and Proprietary.
15 | ©2012, Palo Alto Networks. Confidential and Proprietary.