Palo Alto Networks iGaming Firewall

Accurately Identify Applications

Based on patent-pending App-ID technology, our next generation firewalls accurately identify applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage.

IGaming Operators can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device


Contact our iGaming specialists now...

Next-Generation Firewall for iGaming

  • High Performance Data Center Firewall: Provides multi-Gbps, low-latency data center firewall and threat prevention.
  • Device consolidation: Fix the firewall, regain network visibility and control, and save money.
  • Simplify PCI Compliance: Dramatically reduce the complexity and cost of PCI audits.
  • Data Leak Prevention: Stop social security and credit card numbers at the firewall.
  • Application Visibility and Control:See and control applications on your network – good, bad, and evasive – by user.
  • Threat Prevention: Stop bad applications. Scan allowed applications for all types of threats. Do it fast.

Application Visibility & Control

Applications that are capable of evading port-based firewalls are pervasive throughout enterprise networks, introducing a wide range of productivity, security and compliance issues. Attempts to regain control by bolstering the firewall with IPS, URL filtering or proxies have achieved little success. The reason is that none of these offerings are capable of seeing all the traffic on the network nor are they designed to act as the firewall, identifying and controlling all manner of applications, irrespective of port, protocol, evasive tactic or SSL encryption.

Threat Prevention

In recent years, threats to enterprise networks have evolved rapidly. Threat developers have gotten more sophisticated, both in their motivation and in their techniques. More than ever before, threats target applications. A recent SANS Top 20 Threats list indicated that of the top 20 threats enterprise IT security groups should be concerned about, 80% were application-level threats. Further compounding the issue, threats come in more and more flavors, are multi-vector, and resist traditional definitions (e.g., virus, exploit, or worm).

Consolidate Security Devices and Lower TCO

For enterprise IT security organizations, the continued evolution of applications and threats, coupled with the stagnation of traditional network security technology has resulted in a loss of visibility and control. So organizations cannot safely enable new applications effectively, and they are exposed to rising levels of risk due to increasingly evasive applications and threats.

Sprawl Is Not The Answer

Despite efforts to regain visibility and control by adding more security appliances, most organizations remain stymied – unacceptably. IT security staffs have added a variety of devices around the firewall to attempt to regain control of their networks, including:

  1. Intrusion detection systems/intrusion prevention systems
  2. Proxies
  3. URL filters
  4. DLP devices
  5. Web antivirus devices
  6. IM security devices

Not only do these devices not solve the problem, they drive up complexity and cost – which, in today’s economic climate, is simply unacceptable.

It’s Time to Fix the Firewall – And Reduce TCO

Many leading enterprises have found that investing in innovation and reducing network security appliance sprawl can result in the restoration of visibility and control, and substantial reduction in total cost of ownership of security infrastructure.

Palo Alto Networks next-generation firewalls fix the problem – giving organizations visibility and policy control of applications, users, and content in a firewall. By fixing the firewall, many organizations have been able to reduce the number of security devices in their networks substantially, saving both capital expenditures and operations costs. By fixing the firewall, Palo Alto Networks enterprise customers have reduced costs by:

  1. Up to 80% for capital expenditures
  2. Up to 65% for hard operations costs (support contracts, subscriptions, power/HVAC)
  3. "Soft” operations costs are similarly reduced

High Performance Data Center Firewall

The data center has always been the heart and soul of the enterprise
Times have changed in several respects. Data center applications must now deal with traffic from internal and external sources and the transaction size has shrunk – due to the HTTP-centric nature of most applications. Unlike ever before, the nature of the business today is online and real-time -- latency, performance degradation or unplanned outages are unacceptable.
These traffic characteristics, combined with the need to protect applications against vulnerability exploits, place an unprecedented strain on existing security infrastructure in terms of performance. Simply put, today’s port-centric, cobbled-together solution alternatives cannot keep pace.

Preventing Data Leaks at the Firewall

Numerous examples of data leaks continue to make headlines, and data leak prevention (DLP) technologies are touted as a panacea. Unfortunately, given the scope, size, and distribution of most enterprise datasets, many DLP projects are proving slow to progress. For most organizations, controlling the applications most often used to leak sensitive data and stopping unauthorized transmission of credit card and social security numbers is what they are really worried about.

Using Segmentation to Reduce the Cost and Complexity of PCI Compliance

Achieving compliance with the Payment Card Industry Data Security Standard (PCI DSS) means that a 3rd party has performed an on-site audit of the policies and procedures that are in place to protect the cardholder data. The scope of the audit includes any and all parts of the network that may touch or carry card holder data.



Copyright © Computrad (Europe) Holdings Limited - All Rights Reserved - Our Privacy Policy