PAN-OS 8.0 – Palo Alto Networks

Welcome to the largest release in Palo Alto Networks® history – a vast series of improvements significantly updating our Next-Generation Security Platform.

Major upgrades now improve organizations’ ability to embrace the cloud and prevent successful cyberattacks, achieving high performance across network, endpoint and cloud environments.

Embrace the cloud. Improve performance. Protect your environment. From unparalleled visibility and control to award-winning advanced endpoint protection to industry-leading credential theft and abuse protection, PAN-OS® 8.0 security operating system boasts truly significant enhancements and new capabilities across the platform. Prevent successful cyberattacks while enhancing performance in all locations, from the network to the cloud (and everywhere in between).

PAN-OS 8.0 includes numerous enhancements that will provide organizations with significant new capabilities to prevent successful cyberattacks and secure high- performance network, endpoint and cloud environments.

PAN-OS 8.0:
• Enhances visibility, control and scale in all major clouds
• Stops evasive malware and automates protections
• Greatly increases Panorama performance and automates tasks
• Prevents automated credential theft and abuse
• Delivers high performance SSL decryption with new hardware

Learn more:
http://paloaltonetworks.com

via Palo Alto Networks

About The Author
- Palo Alto Networks is leading a new era in security by protecting thousands of enterprise, government, and service provider networks from cyber threats. Because of our deep expertise, steadfast commitment to innovation and game-changing security platform, more than 22,500 customers have chosen Palo Alto Networks and this number grows every day. Our platform natively brings together all key network security functions, including firewall, URL filtering, IDS/IPS, and advanced threat protection. Because these functions are purposely built into the platform from the ground up and they natively share important information across the respective disciplines, we ensure better security than legacy products. As a result, organizations can safely enable the use of all applications critical to running their business, maintain complete visibility and control, confidently pursue new technology initiatives like cloud, SDN and mobility, and protect the organization from the most basic to sophisticated cyber attacks – known and unknown.

Tell us what you think...