New Zealand utility bolsters security posture, cost savings, and productivity gains with Palo Alto Networks

Paloalto LogoPalo Alto Networks® (NYSE: PANW), the next-generation security company, announced that The Lines Company Ltd, which owns and operates an electricity distribution network on the North Island of New Zealand, moved to the Palo Alto Networks Next-Generation Security Platform as part of a comprehensive revitalisation of its IT infrastructure. The Lines Company’s previous environment relied on firewalls that were complex to manage and failed to protect the utility from today’s cyberthreats. The decision to use Palo Alto Networks slashed network bandwidth consumption by 40 percent, improved IT staff productivity, and helped the company to avoid $50,000 in software upgrades.

Palo Alto Networks gives The Lines Company a completely different approach to network security. Within the previous environment, more than 100 security infections were discovered during a proof-of-concept deployment, requiring over 200 hours in staff time to remediate. URL Filtering from Palo Alto Networks reduced network bandwidth consumption by 40 percent. The Lines Company also streamlined rules management using App-ID™ and User-ID™ technologies, shaving the number of rules it manages by 30 percent.

QUOTE

  • “The visibility we have with the Palo Alto Networks Next-Generation Security Platform is amazing. We have virtually eliminated security infections. Our security risk posture is ten fold what it was before we migrated to Palo Alto Networks. A combination of a great product coupled with an effective businesss partner, Network Service Providers, has allowed TLC to realize significant security and operational gains. ” – Andy Simpson, Head of Information Technology, The Lines Company Ltd

Two Palo Alto Networks next-generation firewalls were placed in a redundant configuration in The Lines Company’s two data centres to allow for high availability services to critical 0800 phone services and user services. The company’s SCADA network is also protected by separate Palo Alto Networks next-generation firewalls. The Next-Generation Security Platform includes Threat Prevention for inspecting and stopping cyberthreats that move laterally across the networks, and Palo Alto Networks WildFire,™ a cloud-based threat analysis service. It also provides URL Filtering (PAN-DB) that keeps protections synchronized across the attack lifecycle with the latest threat intelligence on phishing and malware sites. Additionally, the technology includes GlobalProtect™ network security for endpoints that protects the mobile workforce against cyberattacks, evasive application traffic, malicious websites, command-and-control traffic, and both known and unknown threats.

About The Lines Company

The Lines Company owns and operates the electricity distribution network in the King Country region of New Zealand’s North Island. The distribution area covers 13,700 km2 and is one of the largest network areas in New Zealand with no major urban centre. This makes TLC a specialist in providing power to out of the way places, from the iron sands of the west coast to the highest points in the North Island of New Zealand (the Turoa and Whakapapa skifields on Mount Ruapehu). As well as keeping power flowing to homes and businesses in the region TLC also provide a full range of electrical contracting service. Several hydro generation schemes are also owned and operated by TLC.

About Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organisations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organisation’s most valuable assets. Find out more at www.paloaltonetworks.com.

Palo Alto Networks, WildFire, Traps, Panorama, GlobalProtect and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Palo Alto Networks research shows new twist on old cyberattack method targeting mobile devices

Paloalto LogoPalo Alto Networks® (NYSE: PANW), the next-generation security company, today revealed details of a new “BackStab” attack used to steal private information from mobile device backup files stored on a victim’s computer. A white paper from the company’s Unit 42 threat intelligence team explains how cyberattackers are using malware to remotely infiltrate computers and execute BackStab attacks in an unprecedented fashion.

Used to capture text messages, photos, geographic location data, and almost any other type of information stored on a mobile device in their possession, BackStab has been employed by law enforcement and cyberattackers alike. The Unit 42 white paper shows how BackStab attacks have evolved to leverage malware for remote access and why Apple® iOS devices have been a primary target for attacks, as the default settings in iTunes® store unencrypted backup files in fixed locations and automatically sync devices when they are connected to a user’s computer.

Quote

“Cybersecurity teams must realise, just because an attack technique is well-known, that doesn’t mean it’s no longer a threat. While conducting our research into BackStab attacks, we gathered over 600 malware samples from 30 countries around the world that were used to conduct remote BackStab attacks.”

–          Ryan Olson, director of threat intelligence, Unit 42, Palo Alto Networks

Recommendations

  • iOS users should encrypt their local backups or use the iCloud backup system and choose a secure password.
  • Users should upgrade iOS devices to the latest version, which creates encrypted backups by default.
  • When connecting an iOS device to an untrusted computer or charger via a USB cable, users should not click the “Trust” button when the dialogue box is displayed.

Download the white paper at:

https://www.paloaltonetworks.com/resources/research/unit42-backstab-mobile-backup-data-under-attack-from-malware.html

Subscribe to Unit 42 research updates at

http://researchcenter.paloaltonetworks.com/unit42/

Learn more about Unit 42, the Palo Alto Networks threat intelligence team, at   https://www.paloaltonetworks.com/threat-research.html

###

About Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide.  Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets.  Find out more at www.paloaltonetworks.com.

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Palo Alto Networks appoints Sean Duca as Vice President & Regional Chief Security Officer for Asia Pacific

June 16, 2015Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, has announced the appointment of Sean Duca as Vice President & Regional Chief Security Officer (CSO) for Asia Pacific.

Duca, who is based in Sydney, Australia, will be responsible for the development of threat intelligence security best practices and thought leadership for Palo Alto Networks in the region. This includes strengthening security initiatives and maintaining good channels of communications and support for Palo Alto Networks’ customers across Asia Pacific. Sean also will be a key addition to the Palo Alto Networks Threat Intelligence team, Unit 42, actively contributing to an APAC perspective on the latest findings of cyber threats.

With more than 17 years of experience in the IT security space, Duca is widely recognised as a thought leader in the technology industry. He has provided expert guidance and advice to the Australian government around online safety issues, and on cybersecurity matters to the public and private sector within Asia Pacific.

QUOTES:

· “I am delighted to welcome Sean to Palo Alto Networks. Sean is recognised as a trusted advisor in the IT security space and has extensive knowledge on threat intelligence and security best practices within Asia Pacific. With his wealth of experience and knowledge, Sean will be an excellent addition to the team, helping to further bolster our position in the Asia Pacific market and better serve the growing needs of enterprises across various industries in the region.”
– Rick Howard, Chief Security Officer, Palo Alto Networks

· “Palo Alto Networks is a disruptive player in the Asia Pacific enterprise security market, being acknowledged as a trailblazer by analyst houses and industry experts and owing much of its momentum to its unique and innovative next-generation security platform. I look forward to helping further strengthen Palo Alto Networks’ position as a leader in the region by engaging directly with customers and industry organisations about today’s cybersecurity challenges, threat intelligence and related topics.”
– Sean Duca, Vice President & Regional Chief Security Officer (CSO) for Asia Pacific.

Prior to joining Palo Alto Networks, Duca spent 15 years with Intel Security, most recently as the company’s Chief Technology Officer for Asia Pacific. In this role he was responsible for improving and driving the company’s solution strategy and technology vision and steered the development of Intel Security’s reference architectures in close collaboration with customers and partners across the region. Prior to this, Duca held managerial roles at the company with a focus on technology management and sales engineering. Before Intel Security, he was involved in software development, technical support and consulting services for a range of Internet security solutions.

 

About Palo Alto Networks
Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com.

Palo Alto Networks and the Palo Alto Networks Logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Palo Alto Networks reveals discovery of unprecedented iOS and OS X malware

Research spotlights new malware family distributed through trojanised and repackaged Apple OS applications

Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, has announced discovery of a new family of Apple OS X and iOS malware exhibiting characteristics unseen in any previously documented threats targeting Apple platforms. This new family, dubbed WireLurker, marks a new era in malware across Apple’s desktop and mobile platforms, representing a potential threat to businesses, governments and Apple customers worldwide.

Among its defining characteristics, WireLurker represents:

  • the first known malware family that can infect installed iOS applications similar to how a traditional virus would
  • the first in-the-wild malware family that can install third-party applications on non-jailbroken iOS devices through enterprise provisioning
  • only the second known malware family that attacks iOS devices through OS X via USB
  • the first malware family to automate generation of malicious iOS applications through binary file replacement.

WireLurker malware was discovered by Claud Xiao of Unit 42, the Palo Alto Networks threat intelligence team, and detailed in a report, “WireLurker: A New Era in OS X and iOS Malware.”

Continue reading “Palo Alto Networks reveals discovery of unprecedented iOS and OS X malware”

Palo Alto Networks expands global distribution agreement with Westcon Group

Premier value-added distribution network to provide worldwide push for industry’s fastest-growing enterprise security platform

August 29, 2014 – Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, and Westcon Group, the value-added distributor of security, unified communications, network infrastructure, and data centre solutions, has announced that the companies have expanded their global distribution agreement. The deal opens up new markets throughout the world for the industry’s fastest-growing enterprise security platform, empowering resellers using highly integrated global distribution capabilities.

Palo Alto Networks and Westcon Group have held regional distribution relationships for several years. As teams and processes align at a global level, the companies will soon do business in more than 40 countries. Over the next few years, Palo Alto Networks and Westcon Group will invest in every theatre to take advantage of shared momentum, providing resellers access to a full technology ecosystem and more efficient global business operations.

Quotes:

 · “Palo Alto Networks has been an important partner in our Security Practice,” said Dolph Westerbos, Chief Executive Officer, Westcon Group. “Unifying our relationship globally just makes sense. This provides our reseller and service provider partners with a broader and more consistent security portfolio around the world, and leverages Westcon’s technical and market expertise to drive new revenue.”

· “For years, Westcon Group has been a valuable ally to Palo Alto Networks,” said Mark McLaughlin, Chairman and Chief Executive Officer, Palo Alto Networks. “We are pleased to have now a major worldwide distribution partner committed to shared success in a global market hungry for a true next-generation enterprise security platform.”

For more:

· read about today’s announcement on the Palo Alto Networks partners blog

· visit Palo Alto Networks at www.paloaltonetworks.com

· visit Westcon Group at www.westcongroup.com

· visit Westcon Group on Facebook and LinkedIn.

 

ABOUT WESTCON GROUP
Westcon Group, Inc. is the value-added distributor of security, unified communications, network infrastructure, and data centre solutions. The company’s teams create unique programs and provide exceptional support to accelerate the business of its global partners. Strong relationships at every level of the Westcon Group organisation enable partners to receive support tailored to their needs. From global logistics and flexible customised financing solutions to pre-sales, technical and engineering assistance, the company works with partners to respond with agility and speed to changing market conditions so they can achieve the fastest time to revenue. Westcon Group’s portfolio of market-leading vendors includes: Cisco, Avaya, Polycom, Check Point, F5, Blue Coat and Palo Alto. For more information, please visit www.westcongroup.com.

ABOUT PALO ALTO NETWORKS

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com.

 

Palo Alto Networks unveils security risks in Android Internal Storage

New research shows potential for attack in more than 94 per cent of popular Android mobile applications

 August 28, 2014 – Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, has presented new research highlighting security risks in the internal storage used by applications on Google Android devices. More than 94 per cent of popular Android applications are potentially vulnerable.

Android Internal Storage is a protected area that Android-based applications use to store private information, including usernames and passwords. But as Palo Alto Networks research reveals, an attacker may be able to steal sensitive information from most of the applications on an Android device using the Android Debug Bridge (ADB) backup/restore function. In addition, most of the security enhancements added by Google to prevent this type of attack can be bypassed.

Key details:

  • anyone using a device running version 4.0 of Android – about 85 per cent of Android systems in use today – is potentially vulnerable
  • to use ADB, an attacker would need physical access to the device, whether borrowing or stealing it from the user; an attacker could also take control of a system to which the device is connected via USB
  • more than 94 per cent of popular Android applications, including pre-installed email and browser applications, use the backup system, meaning users are vulnerable
  • Many Android applications will store user passwords in plain text in Android Internal Storage, meaning almost all popular e-mail clients, FTP clients and SSH client applications are vulnerable
  • Google has set the default for applications to allow back-ups; application developers are responsible for disabling the feature or otherwise restricting backups; however, the high percentage of applications that have not disabled or restricted backups suggests many developers are unaware of the risks.

Palo Alto Networks recommends Android users disable USB debugging when not needed, and application developers protect Android users by setting android:allowBackup to false in each Android application’s AndroidManifest.xml file or restricting backups from including sensitive information using a BackupAgent.

Read full technical details regarding the announcement on the Unit 42 research blog.

Quote

  • “We encourage users to be aware and Google to take a closer look at this storage weakness in Android. Given Android’s place as the world’s most popular mobile operating system, millions of users are potentially at risk.” – Ryan Olson, Intelligence Director, Unit 42, Palo Alto Networks

 

About Palo Alto Networks

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com.

Palo Alto Networks uncovers new source of cyberthreats targeting businesses

23 July 2014 – Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, has revealed that cyber criminals in Nigeria have evolved common malware campaigns to infiltrate businesses that have not previously been their primary targets.

419 Evolution, a new report released today from Unit 42, the Palo Alto Networks threat intelligence team, explains how Nigeria-based scammers are now using the same tools more sophisticated criminal and espionage groups often deploy to steal business-critical data from enterprises.

Nigerian criminals are infamous for running easily-spotted “419” phishing scams that attempt to collect credit card details or personal information from individuals, but over the past few years have expanded their skills to target businesses using more advanced techniques. Palo Alto Networks researchers discovered these activities and techniques, code-named Silver Spaniel, using WildFire, which rapidly analyses cyberthreats in a cloud-based, virtual sandbox environment.

Key research takeaways:

  • Among other techniques, Nigerian criminals use Remote Administration Tools (RATs) available through underground forums, including commercial RATs such as NetWire, that provide complete control over infected systems
  • Attacks similar to Silver Spaniel in the past may have come from Eastern Europe or a hostile espionage group; businesses haven’t traditionally dedicated resources to these potentially impactful spammers from Nigeria
  • Traditional Antivirus programs and legacy firewalls are ineffective because Silver Spaniel attacks are specifically designed to evade those technologies.

Quote: “These Silver Spaniel malware activities originate in Nigeria and employ tactics, techniques and procedures similar to one another. The actors don’t show a high level of technical acumen, but represent a growing threat to businesses that have not previously been their primary targets.” — Ryan Olson, Unit 42 Intelligence Director, Palo Alto Networks

To protect against the NetWire RAT, Palo Alto Networks has released a free tool to decrypt and decode command and control traffic and reveal data stolen by Silver Spaniel attackers, available at https://github.com/pan-unit42/public_tools.

Palo Alto Networks launches a new era in threat intelligence Unit 42, the Palo Alto Networks threat intelligence team, is made up of accomplished cybersecurity researchers and industry experts. Unit 42 gathers, researches and analyses up-to-the-minute threat intelligence, sharing insights with Palo Alto Networks customers, partners and the broader community to better protect organisations.

Unit 42 focuses on the technical aspects of attacks, as well as the context in which they are launched, helping all members of the business community, from CEOs to security practitioners, better understand who is executing attacks and why.

To learn more:
Download 419 Evolution, the latest research report from Unit 42, visit the Unit 42 homepage and read the Unit 42 blog for additional insights from the threat intelligence team.

ENDS

ABOUT PALO ALTO NETWORKS

Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content. Find out more at www.paloaltonetworks.com

Palo Alto Networks and the Palo Alto Networks Logo are trademarks of Palo Alto Networks, Inc. throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Palo Alto Networks again positioned in the leaders quadrant of the Magic Quadrant for Enterprise Network Firewalls

April 22, 2014Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, has announced it has been positioned by Gartner Inc. in the “leaders” quadrant of the April 15, 2014 “Magic Quadrant for Enterprise Network Firewalls.” This is the third year that Palo Alto Networks has been recognised as a leader in the Magic Quadrant for Enterprise Firewalls.

According to the report, “through 2018, more than 75% of enterprises will continue to seek network security from a different vendor than their network infrastructure vendor.”  The report also states, “products must be able to support single-enterprise firewall deployments and large and/or complex deployments, including branch offices, multi-tiered demilitarised zones (DMZs) and, increasingly, the option to include virtual versions.”

QUOTE
* “We’re thrilled to once again be named a leader in Gartner’s Magic Quadrant for enterprise firewalls report.  We believe this echoes the momentum we’ve been experiencing as enterprise organisations see the value of a truly next-generation security platform – one that safely enables all applications and proactively prevents cyber threats for all users on any device across any network.”
– René Bonvanie, chief marketing officer at Palo Alto Networks

Leading the way in next-generation enterprise security
Nine years ago, Palo Alto Networks changed the network security industry with the introduction of the next-generation firewall. This breakthrough architecture brought unparalleled control through the safe enablement of applications, and exceptional levels of protection by blocking all known threats operating across a multitude of different vectors.

Two years ago, we again changed the industry with the introduction of WildFire and a next-generation threat cloud that focuses on detecting and defending against the most advanced, unknown threats. Most recently, through our acquisition of Cyvera, we added unique endpoint protection to the platform.  The combination of our next-generation endpoint technology, our next-generation firewall and our next-generation threat cloud represents the most innovative, integrated, and automated enterprise security platform in the market.

With over 16,000 customers, our momentum is a testament to our innovative approach that protects organisations based on what matters most in today’s dynamic computing environments: applications, users and content – not just ports and protocols – and protecting them from the most advanced cyber threats.

To learn more about the Palo Alto Networks approach, visit: www.paloaltonetworks.com.

To access the report, visit: http://go.paloaltonetworks.com/gartner2014pr.

About Palo Alto Networks
Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats.  Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content.  Find out more at www.paloaltonetworks.com.

Palo Alto Networks, the Palo Alto Networks Logo and WildFire are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Palo Alto Networks will continue to protect Windows XP-based systems

Paloalto LogoApril 10, 2014Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, has announced that its security platform will continue to protect Windows XP-based clients after Microsoft ended support for the operating system (OS) on April 8, 2014.

“Hackers write exploit code that leverages vulnerabilities in all kinds of systems. One traditional control used to mitigate such an attack is to keep systems patched. Microsoft has stopped supporting patch development and deployment for Microsoft’s Windows XP operating system,” said Rick Howard, CSO at Palo Alto Networks.

“Because our next-generation security platform protects networks at the application, user and content levels, it can keep malware from infecting Windows XP systems without the need for continuous software patching. In other words, if you’re using Windows XP on a network protected by Palo Alto Networks, you’re covered.”

Palo Alto Networks offers customers multiple ways of protecting against potentially unpatched vulnerabilities in the OS and the exploits used against those vulnerabilities, including:
* discovery of unknown exploits with WildFire, which will continue to run Windows XP in a cloud-based malware analysis environment to execute suspicious files delivered over the network
* blocking known vulnerability exploits via Threat Prevention, regardless of port, protocol or encryption
* disrupting outbound command-and-control communication, which can be used by attackers to deliver malware to an exploited Windows XP system.

The Palo Alto Networks enterprise security platform automatically develops protections against these known and unknown exploits, sharing them with customers around the globe. Enabling this shared intelligence can protect customers from discovered attacks against Windows XP systems.

To learn more about the Palo Alto Networks enterprise security platform visit https://www.paloaltonetworks.com/solutions.html

Read more about Palo Alto Networks protecting Windows XP systems on our Research Centre blog: researchcenter.paloaltonetworks.com

-ENDS-

About Palo Alto Networks
Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats.  Unlike fragmented legacy products, our security platform safely enables business operations and delivers protection based on what matters most in today’s dynamic computing environments: applications, users, and content.  Find out more at www.paloaltonetworks.com.

Palo Alto Networks and the Palo Alto Networks Logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Palo Alto Networks® announces agreement to acquire Cyvera

 

April 2, 2014Palo Alto Networks® (NYSE: PANW), has announced a definitive agreement to acquire Cyvera, a privately held cybersecurity company located in Tel-Aviv, Israel.  Under the terms of the agreement, Palo Alto Networks will acquire all of the outstanding capital stock of Cyvera for an aggregate purchase price of approximately $200 million (USD). The acquisition is expected to close during the second half of fiscal 2014, subject to customary closing conditions and regulatory reviews.

Named a cool vendor in security by Gartner in 2013 (“Cool Vendors in Security: Infrastructure Protection 2013”)*, Cyvera, which has 55 employees, has developed a highly innovative offering that protects enterprises from cyber threats by using a unique approach to block unknown, zero-day attacks on the endpoint.

The addition of this unique capability to the Palo Alto Networks enterprise security platform will extend customers’ ability to safely enable applications and protect users against known and unknown cyber threats on any device, across any network.

QUOTES

*        “This event marks a key milestone in our strategic enterprise security vision.  It extends our next-generation security platform with a very innovative approach to preventing attacks on the endpoint.  It enables us to accelerate the delivery of the market’s only highly integrated and automated enterprise security platform spanning network, endpoints, and the cloud.  For customers, this translates into the most sophisticated and automated threat prevention for their entire organisation.”
–        Mark McLaughlin, President and CEO of Palo Alto Networks

*        “Much like Palo Alto Networks set out to disrupt the network security market with its next-generation security platform, we founded Cyvera to revolutionise protection for the endpoint – one of the most vulnerable frontiers for cyber-attacks.  We are pleased to join the Palo Alto Networks team and together help enterprise customers tackle the advanced threats they face today.”
–        Uri Alter and Netanel Davidi, co-founders and co-CEO’s of Cyvera    

Cyvera prevents attacks at the right time and place

Zero-day cyber-attacks represent one of the greatest threats to enterprises, governments, and service provider organisations that rely on a vast array of systems, applications, and devices to run their business.  These cyber-attacks often exploit a vulnerability known only to the attacker.  While there are literally tens of thousands of vulnerabilities an attacker can potentially target, there is a significantly smaller number of exploit techniques they may use to exploit that vulnerability.

While patching software can provide an element of protection, it does little to protect organisations against vulnerabilities that have not yet been discovered by the software manufacturer. Simply detecting the presence of malware is also insufficient since malicious activity may have already been initiated and evasion tactics employed to evade detection.  In order to stop zero-day attacks in their tracks, it’s critical to understand the exploit techniques attackers employ.  Cyvera has developed a unique method of performing this real-time prevention against all core attack techniques at the endpoint during the exploitation phase, before the malware has a chance to run.

Advanced threats demand highly integrated, automated, and scalable platform approach       

Today’s sophisticated attacks increasingly rely on a combination of tactics and threat vectors to penetrate an organisation and require a new approach to security. Most organisations still rely on legacy point technologies that address only specific types of attacks, phases of an attack, certain devices, or certain network segments.  Because of the singular nature of these technologies, they are ill-equipped to detect and prevent today’s advanced cyber-attacks.

To address these challenges, Palo Alto Networks developed a new approach: one that begins with positive security controls to reduce the attack surface; blocks all known threats; rapidly detects unknown threats through analysis and correlation of abnormal behaviour; then automatically employs advanced exploit prevention mechanisms and policies back to the front line to ensure previously unknown threats are known to all and blocked.  This approach is designed to prevent threats from penetrating an organisation and greatly reduce the need for costly human remediation.

Adding the unique Cyvera capabilities extends the Palo Alto Networks enterprise security platform to perform next-generation security functions across the network, endpoint, and the cloud.

To learn more about the Palo Alto Networks security platform:

·        Visit our website   
·        Register for the Palo Alto Networks Ignite user conference, March 31 – April 2

ENDS

Safe Harbour

This press release contains “forward-looking” statements within the meaning of Section 27A of the Securities Act and Section 21E of the Exchange Act that are based on the beliefs and assumptions of Palo Alto Networks and on currently available information. Forward-looking statements include information concerning the expectations, beliefs, plans, intentions and strategies of Palo Alto Networks relating to its pending acquisition of Cyvera.  Such forward-looking statements include statements regarding expected benefits to Palo Alto Networks, Cyvera and its respective customers; the impact of the pending acquisition on Palo Alto Networks’ competitive position; and plans regarding Cyvera and Cyvera personnel. These statements reflect the current beliefs of Palo Alto Networks and are based on current information available to Palo Alto Networks as of the date hereof, and Palo Alto Networks does not assume any obligation to update the forward-looking statements to reflect events that occur or circumstances that exist after the date on which they were made. The ability of Palo Alto Networks to achieve these business objectives involves many risks and uncertainties that could cause actual outcomes and results to differ materially and adversely from those expressed in any forward-looking statements.

There are a significant number of factors that could cause actual results to differ materially from statements made in this presentation, including the failure to achieve expected synergies and efficiencies of operations between Palo Alto Networks and Cyvera; the ability of Palo Alto Networks and Cyvera to successfully integrate their respective market opportunities, technology, products, personnel and operations; the failure to timely develop and achieve market acceptance of combined products and services; the potential impact on the business of Cyvera as a result of the acquisition; the ability to coordinate strategy and resources between Palo Alto Networks and Cyvera; the ability of Palo Alto Networks and Cyvera to retain and motivate key employees of Cyvera; Palo Alto Networks’ limited operating history and experience with integrating acquired companies; risks associated with Palo Alto Networks’ rapid growth, particularly outside the United States; rapidly evolving technological developments in the market for network security products; and general market, political, economic and business conditions.  Additional risks and uncertainties are included under the captions “Risk Factors” and “Management’s Discussion and Analysis of Financial Condition and Results of Operations,” in the company’s quarterly report on Form 10-Q filed with the SEC on February 24, 2014, which is available on the company’s website at investors.paloaltonetworks.com and on the SEC’s website at www.sec.gov. Additional information will also be set forth in other filings that the company makes with the SEC from time to time. All forward-looking statements in this presentation are based on information available to the company as of the date hereof, and Palo Alto Networks does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made or to update the reasons why actual results could differ materially from those anticipated in the forward-looking statements, even if new information becomes available in the future.

Home