Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Dark Reading
Dark Reading
Products and Releases

Palo Alto Networks Expands Breach Prevention Capabilities, Operational Efficiency

Santa Clara, Calif., June 9, 2015 – Palo Alto Networks (NYSE: PANW), the leader in enterprise security, today announced enhancements to its industry-leading security platform designed to safely enable applications and prevent cyber breaches.  The advancements announced today, which are included in the PAN-OS 7.0 release, expand the prevention capabilities of the platform through enhanced analysis, automation and operational efficiencies – all designed to help customers block threats from compromising their networks, endpoints and cloud-enabled data centers.

As the threat landscape grows increasingly complex, many IT security teams struggle to keep pace with advanced threats because they’re overwhelmed by the volume of alerts generated by legacy, point security and threat detection products. There is little analysis or automation that helps quickly identify and automatically prevent threats at the earliest stages of the attack lifecycle.

The Palo Alto Networks security platform and the new features introduced today help security professionals overcome the inertia caused by the overwhelming volume of alerts and manual processes associated with operating many discrete security products, and, instead, expand breach prevention capabilities and boost operational efficiency.

Key new advancements include:

·         A new Automated Correlation Engine that identifies and prevents compromised hosts in an organization’s network by correlating patterns to pinpoint malicious activity.

·         WildFire threat intelligence enhancements that enable automated analysis of files against multiple versions of applications to identify malware specifically targeting legacy versions; the enhancements also classify malware by threat level, so teams can better prioritize their threat response for quick preventative action when needed.

·         A new high-capacity Network Processing Card for the PA-7050 that provides prevention at scale for data center environments with higher 10G port density and new 40G ports.

·         Advanced policy management capabilities within Panorama that make it even easier to create security policies and device configurations that can be easily and appropriately applied to many next-generation firewall instances, physical or virtual, reducing the chances for human error and gaps in the policy or configuration.



·         "Most important among many new capabilities featured in the new PAN-OS 7.0 is the ability to quickly identify and take preventative action against threats of all kinds in various stages of the attack lifecycle and across any network segment.” 

- Scott Gainey, vice president of product marketing at Palo Alto Networks


·         “Before we had Palo Alto Networks, our security team was getting overwhelmed by the mountains of data that provided little direction for taking quick action to prevent cyber threats. The Palo Alto Networks approach and latest PAN-OS version has put an end to this madness by helping us identify the ‘needles in the haystack’ so that we can better protect our network.”  
- Dallan M. Wagner, information security engineer, Academy Mortgage Corporation

·         “As organizations grow and adopt new technologies like virtualized datacenters amidst an evolving and complex threat landscape, security teams are implementing more security devices and policies. Streamlined management capabilities like those introduced in Palo Alto Networks PAN-OS 7.0 can extend prevention capabilities and dramatically reduce the likelihood of human error that often causes a significant amount of network downtime.” 
- Jeff Wilson, research director, cybersecurity technology, Infonetics


In addition to the more than 70 feature enhancements in PAN-OS 7.0, Palo Alto Networks is introducing today a new Panorama M-500 management appliance that is ideally suited for data centers and the largest enterprise deployments. Additionally, VM-series is now available directly from Amazon’s AWS marketplace supporting usage-based pricing on a per-hour or per-year basis. Application Command Center enhancementsalso enrich the visualization of network traffic and shorten response time to threats, thanks to a highly interactive and customizable dashboard that provides easily understood, actionable information.


For more information about these updates and new features in PAN-OS 7.0, please visit: http://go.paloaltonetworks.com/panos7



PAN-OS 7.0 is now available to Palo Alto Networks customers with a current support contract. The M-500 management appliance and Network Processing Card are expected to be available by the end of June.


To learn more about the Palo Alto Networks Security Platform, visit: https://www.paloaltonetworks.com/products/platforms.html.


About Palo Alto Networks

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today's dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com.


Palo Alto Networks, the Palo Alto Networks Logo and PAN-OS are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.




Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...