Palo Alto Networks Named ‘Best Solution’ for 2010 by the Government Technology Research Alliance

Palo Alto Networks Named “Best Solution” for 2010 By the Government Technology Research Alliance

Palo Alto Networks recognized for excellence by government technology sector

SUNNYVALE, Calif., Dec. 10, 2010 – Palo Alto Networks™, the network security company, has earned the prestigious “Best Solution” award from the Government Technology Research Alliance (GTRA) during its 2010 annual security council.

The GTRA, comprised of more than 100 executive-level government technology leaders, establishes a collaborative platform and government-wide dialogue around critical technology initiatives such as cloud computing, virtualization, security, enterprise architecture, project management, health IT, green IT and leadership.

“We are very honored by this award, since it is chosen by popular vote among council attendees, and represents a high level of trust from government technology experts,” said Ken Kartsen, director of federal sales and operations for Palo Alto Networks.

“Our solutions keep their networks safe by providing IT staff and management unparalleled policy-based visibility and control over applications, users and content to help minimize organizational risk.”

Critical IT infrastructure and information face an unprecedented, constantly evolving threat landscape from both inside and outside vectors, making them attractive targets.

However, organizations cannot simply lock down their networks and information in today’s Internet-centric world. Government agencies at the national, state and municipal level are embracing social media and enterprise 2.0 technologies for efficiencies and cost savings, and these technologies require a more sophisticated security measure than traditional network solutions. Organizations using legacy security technology increasingly lack visibility into and control of application traffic.

Palo Alto Networks’ next-generation firewalls are unique in the industry in their ability to see and control applications, users and content – not just ports, IP addresses and packets. Palo Alto Networks’ next-generation firewalls enable enterprises to create granular, business-relevant security policies and safely control applications instead of the block-or-nothing approach offered by traditional port-blocking firewalls.

“We take a tremendous amount of pride in offering the first solution for government agencies at this level of security,” continued Kartsen.

Palo Alto Networks: Next-Generation Firewall
Palo Alto Networks’ next-generation firewall provides policy-based visibility and control over applications, users and content. Using this technology, enterprises can accurately identify and control applications, scan content to stop threats, and prevent data leakage – all with a single network device. By reducing the number of security devices in their networks, companies can save both capital expenditures and operational costs.

Palo Alto Networks has fixed the problems associated with traditional firewalls by combining three identification technologies that provide visibility and control over applications, users and content.

  • App-ID identifies exactly which applications are running on the network, as well as the associated risks, so administrators can deploy comprehensive application usage control policies for inbound and outbound traffic.
  • User-ID integrates with enterprise directory services (e.g. Microsoft Active Directory and other LDAP directories) to link network activity to users and groups – not just IP addresses – for application visibility, policy creation, logging and reporting.
  • Content-ID combines a real-time threat prevention engine with a comprehensive URL database to detect and block a wide range of threats, limit unauthorized transfer of files and data, and control non-work related Web surfing.

About Palo Alto Networks

Palo Alto Networks™ is the network security company.  Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. For more information, visit

PR SOURCE: Palo Alto Networks

Follow Us!


Established in 2009, is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...


Top Viral Impact

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation

Cloud Infographic: The Education Of Tomorrow

Cloud Infographic: The Education Of Tomorrow

Cloud Infographic: The Education Of Tomorrow  Online Education is a very exciting topic for many as it opens up many new doors and opportunities. We’ve touched on areas such as Massive Open Online Sources (MOOC) which provides tremendous levels of cloud based interconnectivity. We’ve taken a look into higher education,  the increased demand for online courses as well as

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery Preventing a Cloud Disaster is one thing. Recovering from a disaster is a whole other area of concern. Today’s infographic provided by CloudVelox outlines some best practices and safeguards in order to help your business make more informed decisions. About Latest Posts Follow Us!CloudTweaksEstablished in 2009,

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.