AskPANW

Cybersecurity Chat
For Cybersecurity Awareness Month, Nir Zuk of Palo Alto Networks will be hosting a chat!
John Furrier
How does the investment in security within the enterprise shifting from the edge to other areas to prevent intrusion detection etc
Nir Zuk
as attackers target end users as a waypoint to the data center, enterprises are realizing that they need to spend on the border between their users and the data center together with the border to the Internet
Palo Alto Networks
Last call for questions: @nirzuk will be with us for another 10 minutes, so keep 'em coming #AskPANW
John Furrier
Nir: What did you learn from Netscreen that you brought to Palo Alto Networks. Netscreen built a great product;
Nir Zuk
I think that everything you do uses a combination of all your past experiences. I am not sure I can put my finger on specific things I have learnt at NetScreen
Palo Alto Networks
#AskPANW @nirzuk Another pre-submit Q: Many network security vendors claim signatures are dead, do u agree?
Nir Zuk
i disagree. Signatures are still the only mechanism that can scan traffic at multi gig speeds with acceptable latency. I think that the new network security architecture changes how quickly *relevant* signatures get generated and delivered
John Casaretto
@nirzuk Cagefight: WildFire vs FireEye - Winner?
Nir Zuk
the solution will win over the yet another firewall helper
John Casaretto Had to go there :) FE's Aziz said they had no real competition a while back - got to love the thrill of the sport
Paul Wasek
I have been noticing that other vendors are starting have a similar feature like wildfire. Is PANW looking to add or enhance current security features?
Nir Zuk
we have already gotten used to the other fw vendors copying everything we do. luckily we are good at staying ahead of them and increasing the gap with every release
Palo Alto Networks
#AskPANW @nirzuk Are company insiders or company outsiders a greater threat to cyber security?
Nir Zuk
there is no much difference anymore, given that the outsiders favorite attack vector is to take over an internal machine and from there jump to the data center. For the purpose of securing the enterprise they are both the same
John Casaretto
@nirzuk We hear much about APT's - how best to mitigate? Analytic security products seem own the headlines but not everyone is ready just yet - Are slow-adopters left to process/technology?
Nir Zuk
the solution will be a combination of processes and technologies all working together. enterprises are still trying to figure out what to do. a quick advise - if you think you found a killer solution - you are probably wrong
Nir Zuk
I think we'll end up with a new network security architecture to deal with modern threats
ilan
Are the enterprise really serious about BYOD?
Nir Zuk
They don't have a choice. End users are not asking them whether it's okay to BYOD. Sensitive coprorate information is making its way to personal mobile devices and something needs to be done to protect it
Pires Fábio
The best PAN appliance has an throughput of 20Gbps (firewall) and 15(threat), but hauwei has 35Gbps (firewall) and 25(threat). is nice to know that pan as GSP support but In an ISP scneario, witch one will be the best appliance to ensure the security ?
Nir Zuk
it's not about how fast you run but rather what you do at that speed. ISPs are trying to provide more than basic firewall and are turning to Palo Alto Networks for help. In any case, we have already said a 100Gbps device is in the works
Pires Fábio Thanks for the repply. So PAN can be applied not only in corporative scnearios but in ISP too, right ? And you a 100Gbps appliance to deal with it. is it? Can you tell me more about anti-spam ? i know palo alto do not support that, but in ISP...
Pires Fábio ... is impossible to have blacklists and block users.. in your opinion, what is the best solution ?
Nir Zuk
I believe anti-spam belongs in a dedicated system rather than in an inline firewall