SlideShare a Scribd company logo
BEST PRACTICES FOR
AUTOMATING NEXT GENERATION
FIREWALL CHANGE PROCESSES
Edy Almer, VP Product, AlgoSec
Moshe Itah, Product Line Manager, Palo Alto Networks
• Supporting business transformation initiatives such as cloud and SDN
• Lack of visibility into business application connectivity requirements
• Slow, manual and error-prone change management processes
• Costly outages and exposure to risk due to misconfigurations
• Time-consuming audits and reactive compliance verification
2 | Confidential
DO YOU STRUGGLE WITH?
ELIMINATE THE TRADEOFF
3 | Confidential
Security Business Agility
Avoid misconfiguration and
reduce attack surface
Proactively mitigate risk
Ensure continuous compliance
Enforce Network Segmentation
Provision network changes in
minutes, not days
Understand business requirements
and avoid application outages
Align teams to foster DevSecOps
Free up time by automating processes
5 | Confidential
THE ALGOSEC SECURITY POLICY MANAGEMENT SUITE
KEY CAPABILITIES
Secure Business Application Connectivity Management
Security Policy Change Management
Continuous Compliance and Auditing
Firewall Policy Optimization
Security Policy Risk Mitigation
NGFW and Datacenter Migration
Hybrid Cloud Security
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
18 | Confidential
ALGOSEC INTEGRATION WITH
PALO ALTO NETWORKS
APP-ID AND USER-ID SUPPORT
• Policy analysis
• Automatically and seamlessly replace ports with applications
at layer 7
• Zero-touch change management
• Proactive risk analysis
• Add/remove/modify traffic and intelligent rule design
• Policy push directly to Palo Alto Networks devices (through
Panorama)
• Mixed NGFW and non user/application-aware infrastructure, and
cloud (VMware NSX, AWS, Azure)
19 | Confidential
APP-ID AND USER ID CONNECTIVITY MANAGEMENT
• Changes include application default, app_id and user data
20 |
PANORAMA SUPPORT
• Automated policy push through Panorama to its devices, including
user-awareness, application awareness
• Support for large estates
• Automatically populate firewalls in AlgoSec
• Identify and incorporate candidate policies in the analysis (aggregated changes
not yet committed to the devices)
• Allow low risk change requests to be automatically resolved, while
security operations must approve or reject only higher risk items
21 | Confidential
PANORAMA SUPPORT
22 | Confidential
PRAGMATIC AUTOMATION
• Collate all changes related to a policy
• Allow mixed device based work orders and policy based work orders
on the same ticket
 Make single change to Panorama instead of hundreds of
individual device level changes – while still supporting device
based changes for other vendors.
23 |
ACTIVECHANGE THROUGH PANORAMA
24 | Confidential
25 |
• Support assignment of Panorama device groups to
organizational groups in AD
• Each group handles and approves changes to “its” devices
• Align with organizational structure
• Improve inter team synchronization
• Reduce errors
• Provide full results to requestors
SUPPORT ORGANIZATION STRUCTURE & DEVICE GROUPS
ASSIGN RESPONSIBILITY TO DEVICE GROUP OWNERS
26 | Confidential
Best Practics for Automating Next Generation Firewall Change Processes
Management Features
in Release 7.1
Moshe Itah
Palo Alto Networks and AlgoSec
 Palo Alto Networks and AlgoSec are close partners
 Palo Alto Networks and AlgoSec share
 early alpha/beta releases for feedback and testing
 product roadmaps
 technical discussions
 The relationship work are at multiple levels
 Business Development
 Product Management
29 | ©2016. Palo Alto Networks. Confidential and Proprietary.
Commit Enhancements
30 | ©2016, Palo Alto Networks. Confidential and Proprietary.
Commit Queue
 Once a commit is running, no other commit (user or system triggered)
is allowed, preventing …
 Commit to multiple VSYS on same device mapped to different DGs in Panorama
 Multiple admins from committing to device/Panorama simultaneously
 Tenants from committing simultaneously to their VSYS
 User commits when DAG updates, FQDN or EDL refreshes are ongoing
 New commits are queued when a commit is in progress
 All commits are queued in the order they were received
 On commit failure the next commit is processed
31 | ©2016, Palo Alto Networks. Confidential and Proprietary.
Commit Queue
 Full visibility into queue
 Which commit is being processed?
 Ability to clear the queue
 Queue capacity is platform dependent
 Queues not synched across HA peers
 CLI and API support
 Commits with following changes will fail if the commit queue is not empty
 Master key
 Mode (single to multi-VSYS)
 URL DB
 Reverts
32 | ©2016, Palo Alto Networks. Confidential and Proprietary.
How Commit Queue Works
33 | ©2016, Palo Alto Networks. Confidential and Proprietary.
Commit Task Queue
Commit Processing
Commit 1
by jamie
Commit 1
by jamie
Commit 1
by jamie
Commit 2
by saurabh
Commit 2
by saurabh
Commit 3
by moshe
Commit 3
by moshe
Commit 3
by moshe
FQDN
Refresh for
Commit 1
Commit Description
 Commit description can be up to 512 characters
 Use cases
 Describe what changes were pushed down with commit
 Ticket Numbers, Change Request Numbers, Audit Info etc.
 Compare versions based on commit description in config audit
 Type in description text into config version selector to compare
 Commit description searches available in system logs, task manager
34 | ©2016, Palo Alto Networks. Confidential and Proprietary.
Start typing description
Increased Maximum Virtual Disk
 Problem – Max size of supported virtual disk is 2TB which leads
customers to NFS for more storage
 NFS is less than ideal for throughput rates and predictability
 Virtual Disk has better performance, but 2TB is not enough storage for many
customers
 Solution – Support up to 8 TB of virtual disk for VM Panorama
 Must have ESXi 5.5+
 Will require a new virtual disk (will be covered in LAB session)
35 | ©2016, Palo Alto Networks. Confidential and Proprietary.
New ACC Widgets
36 | ©2016, Palo Alto Networks. Confidential and Proprietary.
New ACC Widgets
 Problem – Customers could not see more than top 10 URL categories
or File Types / Data Patterns
 Currently URL Filtering and Content activity is only shown in the User Activity or IP
Activity widgets at top 10 items
 Solution – Create two new widgets for URL filtering and Content
Activity
 Allows admins to view top URL domains and files/patterns in the table with the ability
to maximize for an expanded list
 The widgets must be added to a tab manually
37 | ©2016, Palo Alto Networks. Confidential and Proprietary.
New ACC Widgets
38 | ©2016, Palo Alto Networks. Confidential and Proprietary.
New ACC Widgets
 Problem – Customers wanted visibility into top data transfers and URLs
independent of IP or User
 Currently URL and Content visibility was restricted to the User Activity or IP Activity
widgets at max top 10 items
 Solution – Create two new widgets for URL filtering and Content Filtering
 Allows admins to view URL / Content at the top level and drill into details
 The widgets must be added to a tab manually
39 | ©2016, Palo Alto Networks. Confidential and Proprietary.
Unified Log Viewer
40 | ©2016, Palo Alto Networks. Confidential and Proprietary.
Unified Log Viewer
 Problem – Customers cannot see all events associated with a set of
filters across databases
 Admins can only view the related logs for any single event or re-run the same query
on each log type
 Solution – Add a unified log viewer
 All traffic and threat log types are available
 Any column that is common will return results from all of the relevant matching logs
41 | ©2016, Palo Alto Networks. Confidential and
Proprietary.
Unified Log Viewer Example
42 | ©2016, Palo Alto Networks. Confidential and Proprietary.
Unified Log Viewer: Specific Query
43 | ©2016, Palo Alto Networks. Confidential and Proprietary.
Unified Log Viewer: Specific Query
44 | ©2016, Palo Alto Networks. Confidential and Proprietary.
Unified Log Viewer: DB Selection
45 | ©2016, Palo Alto Networks. Confidential and Proprietary.
THANK YOU
For personal demo:
www.algosec.com/Demo
More information:
marketing@algosec.com
46 | Confidential

More Related Content

PDF
2021 01-27 reducing risk of ransomware webinar
PDF
Build and enforce defense in depth - an algo sec-cisco tetration webinar
PDF
best practices-managing_security_in_the hybrid cloud
PDF
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
PDF
Microsegmentation from strategy to execution
PPTX
2018 11-19 improving business agility with security policy automation final
PDF
2020 04-07 webinar slides -turning network security alerts into action change...
PPTX
SDN's managing security across the virtual network final
2021 01-27 reducing risk of ransomware webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
best practices-managing_security_in_the hybrid cloud
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
Microsegmentation from strategy to execution
2018 11-19 improving business agility with security policy automation final
2020 04-07 webinar slides -turning network security alerts into action change...
SDN's managing security across the virtual network final

What's hot (20)

PPTX
Application visibility across the security estate the value and the vision ...
PDF
compliance made easy. pass your audits stress-free webinar
PPTX
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
PPT
More Things You Can Do with the AlgoSec Security Policy Management Suite
PPT
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
PPTX
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
PDF
Managing Application Connectivity in the World of Network Security
PPTX
2019 08-13 selecting the right security policy management solution
PDF
The state of the cloud csa survey webinar
PDF
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
PPTX
2018 10-11 automating network security policy management allows financial ins...
PPT
Create and Manage a Micro-Segmented Data Center – Best Practices
PPTX
Tying cyber attacks to business processes, for faster mitigation
PDF
DevSecOps: Putting the Sec into the DevOps
PPTX
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
PDF
2021 01-13 reducing risk-of_ransomware
PDF
Migrating and Managing Security in an AWS Environment- Best Practices
PDF
Cisco aci and AlgoSec webinar
PDF
Examining the Impact of Security Management on the Business (Infographic)
PDF
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
Application visibility across the security estate the value and the vision ...
compliance made easy. pass your audits stress-free webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
More Things You Can Do with the AlgoSec Security Policy Management Suite
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Managing Application Connectivity in the World of Network Security
2019 08-13 selecting the right security policy management solution
The state of the cloud csa survey webinar
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
2018 10-11 automating network security policy management allows financial ins...
Create and Manage a Micro-Segmented Data Center – Best Practices
Tying cyber attacks to business processes, for faster mitigation
DevSecOps: Putting the Sec into the DevOps
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2021 01-13 reducing risk-of_ransomware
Migrating and Managing Security in an AWS Environment- Best Practices
Cisco aci and AlgoSec webinar
Examining the Impact of Security Management on the Business (Infographic)
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
Ad

Viewers also liked (20)

PDF
Cisco aci and AlgoSec webinar
PDF
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
PPTX
Palo Alto Networks authentication
PPT
Next Generation Security
PDF
Openstack Ops Meetup Palo Alto LT
PDF
OPNFV Use Case: VPN in the Cloud
PDF
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
PDF
Managing risk and vulnerabilities in a business context
PDF
Learn how an app-centric approach will improve security & operational efficiency
PDF
Avoid outages-from-misconfigured-devices-webinar-slides
PPTX
Shift Happens: Eliminating the Risks of Network Security Policy Changes
PPTX
Dos and Don’ts for Managing External Connectivity to/from Your Network
PPTX
AWS Security Fundamentals: Dos and Don’ts
PDF
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
PDF
NGFW Brochure 08 08
PPTX
Lecture The Search for Innovation
PDF
Taking the fire drill out of making firewall changes
PPTX
Segmenting your Network for Security - The Good, the Bad and the Ugly
PPTX
Zero Trust Networking with Palo Alto Networks Security
PDF
Whats new in neutron for open stack havana
Cisco aci and AlgoSec webinar
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
Palo Alto Networks authentication
Next Generation Security
Openstack Ops Meetup Palo Alto LT
OPNFV Use Case: VPN in the Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Managing risk and vulnerabilities in a business context
Learn how an app-centric approach will improve security & operational efficiency
Avoid outages-from-misconfigured-devices-webinar-slides
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Dos and Don’ts for Managing External Connectivity to/from Your Network
AWS Security Fundamentals: Dos and Don’ts
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
NGFW Brochure 08 08
Lecture The Search for Innovation
Taking the fire drill out of making firewall changes
Segmenting your Network for Security - The Good, the Bad and the Ugly
Zero Trust Networking with Palo Alto Networks Security
Whats new in neutron for open stack havana
Ad

Similar to Best Practics for Automating Next Generation Firewall Change Processes (20)

PDF
Feasibility Study Template for Electronic Software Distribution
PPTX
Kafka/SMM Crash Course
PPTX
Design and Deploy Secure Clouds for Financial Services Use Cases
PPTX
Yongsan presentation 3
PDF
OSMC 2023 | What’s new with Grafana Labs’s Open Source Observability stack by...
PPTX
Techcello at a glance
PPTX
Nagios Consulting Implementation and Maintenance
PPTX
Best practices for application migration to public clouds interop presentation
PPTX
IBM i Development: Increase Accuracy and Efficiency with SEQUEL's ABSTRACT a...
PPT
What’s new in Rational collaborative lifecycle management 2011?
PPTX
Understanding saa s
PDF
Partner Connect APAC - 2022 - April
PDF
Which Application Modernization Pattern Is Right For You?
PDF
Co01_panagenda_NotesDomino-Licensing-Understand-and-Optimize-DLAU-results-wit...
PPTX
Gain Insights, Make Decisions, and Take Action Across a Streamlined and Autom...
PPT
Forrester Research on Globally Distributed Development Using Subversion
PPT
Forrester Research on Optimizing Globally Distributed Software Development Us...
PDF
Adopting the Cloud
PPTX
The Top 5 Practices of a Highly Successful ChangeMan ZMF Administrator
PDF
VMworld 2013: Architecting the Software-Defined Data Center
Feasibility Study Template for Electronic Software Distribution
Kafka/SMM Crash Course
Design and Deploy Secure Clouds for Financial Services Use Cases
Yongsan presentation 3
OSMC 2023 | What’s new with Grafana Labs’s Open Source Observability stack by...
Techcello at a glance
Nagios Consulting Implementation and Maintenance
Best practices for application migration to public clouds interop presentation
IBM i Development: Increase Accuracy and Efficiency with SEQUEL's ABSTRACT a...
What’s new in Rational collaborative lifecycle management 2011?
Understanding saa s
Partner Connect APAC - 2022 - April
Which Application Modernization Pattern Is Right For You?
Co01_panagenda_NotesDomino-Licensing-Understand-and-Optimize-DLAU-results-wit...
Gain Insights, Make Decisions, and Take Action Across a Streamlined and Autom...
Forrester Research on Globally Distributed Development Using Subversion
Forrester Research on Optimizing Globally Distributed Software Development Us...
Adopting the Cloud
The Top 5 Practices of a Highly Successful ChangeMan ZMF Administrator
VMworld 2013: Architecting the Software-Defined Data Center

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Programs and apps: productivity, graphics, security and other tools
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The AUB Centre for AI in Media Proposal.docx
Unlocking AI with Model Context Protocol (MCP)
Understanding_Digital_Forensics_Presentation.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology

Best Practics for Automating Next Generation Firewall Change Processes

  • 1. BEST PRACTICES FOR AUTOMATING NEXT GENERATION FIREWALL CHANGE PROCESSES Edy Almer, VP Product, AlgoSec Moshe Itah, Product Line Manager, Palo Alto Networks
  • 2. • Supporting business transformation initiatives such as cloud and SDN • Lack of visibility into business application connectivity requirements • Slow, manual and error-prone change management processes • Costly outages and exposure to risk due to misconfigurations • Time-consuming audits and reactive compliance verification 2 | Confidential DO YOU STRUGGLE WITH?
  • 3. ELIMINATE THE TRADEOFF 3 | Confidential Security Business Agility Avoid misconfiguration and reduce attack surface Proactively mitigate risk Ensure continuous compliance Enforce Network Segmentation Provision network changes in minutes, not days Understand business requirements and avoid application outages Align teams to foster DevSecOps Free up time by automating processes
  • 4. 5 | Confidential THE ALGOSEC SECURITY POLICY MANAGEMENT SUITE
  • 5. KEY CAPABILITIES Secure Business Application Connectivity Management Security Policy Change Management Continuous Compliance and Auditing Firewall Policy Optimization Security Policy Risk Mitigation NGFW and Datacenter Migration Hybrid Cloud Security
  • 17. 18 | Confidential ALGOSEC INTEGRATION WITH PALO ALTO NETWORKS
  • 18. APP-ID AND USER-ID SUPPORT • Policy analysis • Automatically and seamlessly replace ports with applications at layer 7 • Zero-touch change management • Proactive risk analysis • Add/remove/modify traffic and intelligent rule design • Policy push directly to Palo Alto Networks devices (through Panorama) • Mixed NGFW and non user/application-aware infrastructure, and cloud (VMware NSX, AWS, Azure) 19 | Confidential
  • 19. APP-ID AND USER ID CONNECTIVITY MANAGEMENT • Changes include application default, app_id and user data 20 |
  • 20. PANORAMA SUPPORT • Automated policy push through Panorama to its devices, including user-awareness, application awareness • Support for large estates • Automatically populate firewalls in AlgoSec • Identify and incorporate candidate policies in the analysis (aggregated changes not yet committed to the devices) • Allow low risk change requests to be automatically resolved, while security operations must approve or reject only higher risk items 21 | Confidential
  • 21. PANORAMA SUPPORT 22 | Confidential
  • 22. PRAGMATIC AUTOMATION • Collate all changes related to a policy • Allow mixed device based work orders and policy based work orders on the same ticket  Make single change to Panorama instead of hundreds of individual device level changes – while still supporting device based changes for other vendors. 23 |
  • 24. 25 | • Support assignment of Panorama device groups to organizational groups in AD • Each group handles and approves changes to “its” devices • Align with organizational structure • Improve inter team synchronization • Reduce errors • Provide full results to requestors SUPPORT ORGANIZATION STRUCTURE & DEVICE GROUPS
  • 25. ASSIGN RESPONSIBILITY TO DEVICE GROUP OWNERS 26 | Confidential
  • 28. Palo Alto Networks and AlgoSec  Palo Alto Networks and AlgoSec are close partners  Palo Alto Networks and AlgoSec share  early alpha/beta releases for feedback and testing  product roadmaps  technical discussions  The relationship work are at multiple levels  Business Development  Product Management 29 | ©2016. Palo Alto Networks. Confidential and Proprietary.
  • 29. Commit Enhancements 30 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 30. Commit Queue  Once a commit is running, no other commit (user or system triggered) is allowed, preventing …  Commit to multiple VSYS on same device mapped to different DGs in Panorama  Multiple admins from committing to device/Panorama simultaneously  Tenants from committing simultaneously to their VSYS  User commits when DAG updates, FQDN or EDL refreshes are ongoing  New commits are queued when a commit is in progress  All commits are queued in the order they were received  On commit failure the next commit is processed 31 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 31. Commit Queue  Full visibility into queue  Which commit is being processed?  Ability to clear the queue  Queue capacity is platform dependent  Queues not synched across HA peers  CLI and API support  Commits with following changes will fail if the commit queue is not empty  Master key  Mode (single to multi-VSYS)  URL DB  Reverts 32 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 32. How Commit Queue Works 33 | ©2016, Palo Alto Networks. Confidential and Proprietary. Commit Task Queue Commit Processing Commit 1 by jamie Commit 1 by jamie Commit 1 by jamie Commit 2 by saurabh Commit 2 by saurabh Commit 3 by moshe Commit 3 by moshe Commit 3 by moshe FQDN Refresh for Commit 1
  • 33. Commit Description  Commit description can be up to 512 characters  Use cases  Describe what changes were pushed down with commit  Ticket Numbers, Change Request Numbers, Audit Info etc.  Compare versions based on commit description in config audit  Type in description text into config version selector to compare  Commit description searches available in system logs, task manager 34 | ©2016, Palo Alto Networks. Confidential and Proprietary. Start typing description
  • 34. Increased Maximum Virtual Disk  Problem – Max size of supported virtual disk is 2TB which leads customers to NFS for more storage  NFS is less than ideal for throughput rates and predictability  Virtual Disk has better performance, but 2TB is not enough storage for many customers  Solution – Support up to 8 TB of virtual disk for VM Panorama  Must have ESXi 5.5+  Will require a new virtual disk (will be covered in LAB session) 35 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 35. New ACC Widgets 36 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 36. New ACC Widgets  Problem – Customers could not see more than top 10 URL categories or File Types / Data Patterns  Currently URL Filtering and Content activity is only shown in the User Activity or IP Activity widgets at top 10 items  Solution – Create two new widgets for URL filtering and Content Activity  Allows admins to view top URL domains and files/patterns in the table with the ability to maximize for an expanded list  The widgets must be added to a tab manually 37 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 37. New ACC Widgets 38 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 38. New ACC Widgets  Problem – Customers wanted visibility into top data transfers and URLs independent of IP or User  Currently URL and Content visibility was restricted to the User Activity or IP Activity widgets at max top 10 items  Solution – Create two new widgets for URL filtering and Content Filtering  Allows admins to view URL / Content at the top level and drill into details  The widgets must be added to a tab manually 39 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 39. Unified Log Viewer 40 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 40. Unified Log Viewer  Problem – Customers cannot see all events associated with a set of filters across databases  Admins can only view the related logs for any single event or re-run the same query on each log type  Solution – Add a unified log viewer  All traffic and threat log types are available  Any column that is common will return results from all of the relevant matching logs 41 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 41. Unified Log Viewer Example 42 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 42. Unified Log Viewer: Specific Query 43 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 43. Unified Log Viewer: Specific Query 44 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 44. Unified Log Viewer: DB Selection 45 | ©2016, Palo Alto Networks. Confidential and Proprietary.
  • 45. THANK YOU For personal demo: www.algosec.com/Demo More information: marketing@algosec.com 46 | Confidential

Editor's Notes

  • #3: Managing network security across complex heterogeneous networks
  • #4: - Mention minutes to provision servers and storage, but weeks to provision security.
  • #5: Hidden slide: Just mention that we are the leaders in Security Policy Management Have 1500 enterprise customers including 20 of the Fortune 50
  • #22: Save lots of time in defining a large firewall estate, correctly analyze global policy for change and for optimization