Palo Alto Networks Named ‘Best Solution’ for 2010 by the Government Technology Research Alliance

Palo Alto Networks Named “Best Solution” for 2010 By the Government Technology Research Alliance

Palo Alto Networks recognized for excellence by government technology sector

SUNNYVALE, Calif., Dec. 10, 2010 – Palo Alto Networks™, the network security company, has earned the prestigious “Best Solution” award from the Government Technology Research Alliance (GTRA) during its 2010 annual security council.

The GTRA, comprised of more than 100 executive-level government technology leaders, establishes a collaborative platform and government-wide dialogue around critical technology initiatives such as cloud computing, virtualization, security, enterprise architecture, project management, health IT, green IT and leadership.

“We are very honored by this award, since it is chosen by popular vote among council attendees, and represents a high level of trust from government technology experts,” said Ken Kartsen, director of federal sales and operations for Palo Alto Networks.

“Our solutions keep their networks safe by providing IT staff and management unparalleled policy-based visibility and control over applications, users and content to help minimize organizational risk.”

Critical IT infrastructure and information face an unprecedented, constantly evolving threat landscape from both inside and outside vectors, making them attractive targets.

However, organizations cannot simply lock down their networks and information in today’s Internet-centric world. Government agencies at the national, state and municipal level are embracing social media and enterprise 2.0 technologies for efficiencies and cost savings, and these technologies require a more sophisticated security measure than traditional network solutions. Organizations using legacy security technology increasingly lack visibility into and control of application traffic.

Palo Alto Networks’ next-generation firewalls are unique in the industry in their ability to see and control applications, users and content – not just ports, IP addresses and packets. Palo Alto Networks’ next-generation firewalls enable enterprises to create granular, business-relevant security policies and safely control applications instead of the block-or-nothing approach offered by traditional port-blocking firewalls.

“We take a tremendous amount of pride in offering the first solution for government agencies at this level of security,” continued Kartsen.

Palo Alto Networks: Next-Generation Firewall
Palo Alto Networks’ next-generation firewall provides policy-based visibility and control over applications, users and content. Using this technology, enterprises can accurately identify and control applications, scan content to stop threats, and prevent data leakage – all with a single network device. By reducing the number of security devices in their networks, companies can save both capital expenditures and operational costs.

Palo Alto Networks has fixed the problems associated with traditional firewalls by combining three identification technologies that provide visibility and control over applications, users and content.

  • App-ID identifies exactly which applications are running on the network, as well as the associated risks, so administrators can deploy comprehensive application usage control policies for inbound and outbound traffic.
  • User-ID integrates with enterprise directory services (e.g. Microsoft Active Directory and other LDAP directories) to link network activity to users and groups – not just IP addresses – for application visibility, policy creation, logging and reporting.
  • Content-ID combines a real-time threat prevention engine with a comprehensive URL database to detect and block a wide range of threats, limit unauthorized transfer of files and data, and control non-work related Web surfing.

About Palo Alto Networks

Palo Alto Networks™ is the network security company.  Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. For more information, visit www.paloaltonetworks.com.

PR SOURCE: Palo Alto Networks

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Cloud Infographic – Big Data Survey: What Are The Trends?

Cloud Infographic – Big Data Survey: What Are The Trends?

Jaspersoft Big Data Survey Shows Rise in Commitment to Projects and Decline in Confusion Nearly 1,600 Jaspersoft Community Members Participate in Second Jaspersoft Big Data Survey San Francisco, February 4, 2014 – Jaspersoft, the Intelligence Inside applications and business processes, today shared results from its Big Data Survey. Nearly 1,600 Jaspersoft community members responded to

Cloud Infographic: Cloud Computing Growth

Cloud Infographic: Cloud Computing Growth

An excellent infographic provided by AwesomeCloud which predicts a continued high level of growth in the cloud computing industry. Potentially staggering numbers for Public Cloud IT Services of $100 Billion by 2016. Infographic Source: AwesomeCloud About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery Preventing a Cloud Disaster is one thing. Recovering from a disaster is a whole other area of concern. Today’s infographic provided by CloudVelox outlines some best practices and safeguards in order to help your business make more informed decisions. About Latest Posts Follow Us!CloudTweaksEstablished in 2009,

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving