Palo Alto Networks Redefines Detection and Response with Cortex XDR 2.0

Cortex XDR extended to third-party data sources with a new unified platform experience for best-in-class prevention, detection, investigation and response

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, introduced Cortex XDR™ 2.0 — an advancement of the industry’s only detection and response platform that runs on fully integrated endpoint, network and cloud data. As the market’s first and leading XDR product, Cortex XDR 2.0 continues to extend the category definition with the addition of third-party data for analytics and investigations, while unifying prevention, detection, investigation and response in one platform experience for unrivaled security and operational efficiency.

“With Cortex XDR, we set out to eliminate the blind spots created by disjointed products and help organisations stop the most sophisticated attacks through deep analytics and enhanced visibility. In nine months, we’ve enabled organisations to reduce alert volumes by 50X and speed investigation time by 8X, ultimately filtering out the noise and allowing analysts to focus on the most critical threats,” said Lee Klarich, chief product officer at Palo Alto Networks. “With the addition of third-party data, a unified platform experience and new endpoint security improvements in Cortex XDR 2.0, we are further enhancing the power of the Cortex XDR platform and extending its prevention, detection, investigation and response capabilities across the customer’s entire environment.”

Palo Alto Networks unveiled significant platform advancements that help organisations defend their enterprise with unrivaled data and deep analytics:

  • Open to third-party data: Cortex XDR’s patented behavioral analytics capabilities have been extended to logs collected from third-party firewalls, enabling detection across multi-vendor environments while integrating third-party firewall alerts into a unified incident view.
  • Seamless platform experience: Prevention, detection, investigation and response capabilities have been unified into a single platform, with a complete rebuild of the Traps™ management service into Cortex XDR. The new management console has end-to-end support for all capabilities previously part of Traps and Cortex XDR, spanning endpoint policy management, security events review and endpoint log analysis melded with detection, investigation and response.
  • AI-driven malware prevention: Cortex XDR’s new machine learning-driven local analysis engine is customised for continuous learning and prevention. Powered by the world’s most expansive training set from WildFire®, the engine delivers the industry’s highest malware detection rates and includes a unique agile framework for rapid model updates to stay ahead of attackers’ evolving techniques.
  • New device control capability: The new Device Control module, the first in a series of new endpoint protection platform modules, will give organisations granular USB access management on the endpoint to prevent malware and data loss caused by unsanctioned devices.

Customer and Analyst Quotes

  • “As a small team, we desperately needed a tool that filtered through all the noise to help us scale,” said Ryan Kramer, enterprise network architect for the State of North Dakota. “What we’re seeing with Cortex XDR is exactly that. It’s helping us filter out irrelevant alerts and other noise while elevating critical alerts that give us new threat intelligence we didn’t have before.”
  • “A major contributing factor in the speed of threat detection and response is the amount of time it takes to assemble alert and activity data from endpoint, network, cloud and other security controls, which are traditionally spread across various point products,” said Dave Gruber, senior analyst for the Enterprise Strategy Group. “An XDR approach automates this process, correlating the data in one place to give analysts immediate context to understand the scope of the attack and drive faster investigation and remediation.”

Cortex™ is the industry’s most comprehensive product suite for security operations, empowering enterprises with best-in-class detection, investigation, automation and response capabilities. To learn how to move security operations forward, please join us for a live discussion on December 10, 2019.

Availability

Cortex XDR 2.0 will be available in December. Cortex XDR third-party logs and alert ingestion are available for select third-party products now. For more information, please visit https://www.paloaltonetworks.com/cortex/cortex-xdr.

About Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organisations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organisations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.

Palo Alto Networks, Cortex, Cortex XDR, Traps, WildFire and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Palo Alto Networks Delivers the Industry’s Most Comprehensive Secure Access Service Edge

Extends Prisma Access with new SD-WAN and DLP capabilities

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, has announced new cloud-delivered software-defined wide area network (SD-WAN) and data loss prevention (DLP) capabilities in Prisma™ Access, the industry’s most comprehensive secure access service edge (SASE) platform. As a complete SASE solution, Prisma Access delivers end-to-end networking and security services from a globally distributed cloud platform.

Adoption of cloud technology and increased user mobility have fundamentally changed the way that network and security infrastructure must be built. The emerging SASE model addresses limitations of traditional architectures by converging networking and security in the cloud. According to Gartner, “Enterprise demand for cloud-based SASE capabilities, and market competition and consolidation, will redefine enterprise network and network security architectures and reshape the competitive landscape”

“As applications are increasingly delivered from the cloud and users become more mobile, organisations are being forced to rethink the way they deploy networking and security,” said Lee Klarich, chief product officer at Palo Alto Networks. “To connect and secure organisations now and in the future, we believe that networking and security must converge in the cloud. Unlike traditional approaches to SD-WAN that compromise on security, add complexity and deliver unpredictable performance when users are accessing cloud applications, Prisma Access delivers a simple, secure and high-performance SD-WAN fabric from the cloud.”

Leading companies already rely on Prisma Access for its consistent delivery of comprehensive networking and security services, including IPsec VPN, SSL VPN, cloud-delivered malware analysis, DNS Security, and URL filtering capabilities. Prisma Access also provides inline SaaS application visibility and control and integrates with Prisma SaaS for API-based protection, delivering a complete multi-mode CASB.

With the introduction of new SD-WAN features and a DLP service, Palo Alto Networks is both enhancing the Prisma Access platform and extending its industry-leading SASE capabilities:

  • New Prisma Access SD-WAN service: Traditional approaches to SD-WAN expose organisations to security risks, deliver unreliable end-to-end performance and increase network complexity. With this release, Palo Alto Networks is delivering a simple, reliable and secure end-to-end SD-WAN infrastructure, with Prisma Access operating as the cloud-based SD-WAN hub and next-generation firewalls operating as the SD-WAN appliances in the branch.
  • New cloud-based management user interface: Existing Palo Alto Networks customers have enjoyed the ability to manage Prisma Access from their familiar Panorama™ management console, which enables consistent security policy to be applied across physical and virtual firewalls, as well as the cloud. For customers born in the cloud, Palo Alto Networks is introducing a reimagined workflow-based interface, delivered as a service from the cloud, to simplify the process of configuring and managing SASE.
  • New SaaS service-level agreements: As organisations adopt cloud-based services, service-level agreements are essential in defining a service provider’s commitment to critical areas like performance, availability, security and more. Prisma Access is the only cloud-delivered SASE offering that guarantees the performance of SaaS application access, extending the existing uptime and security processing performance SLAs.
  • New advanced DLP service: Ensuring comprehensive data protection and governance is an essential capability of any SASE solution. The new advanced DLP service for Prisma Access helps mitigate the risk of data exfiltration and non-compliance by discovering, monitoring and protecting sensitive data. The new DLP engine will initially support Prisma Access and Prisma SaaS to detect data in motion over the network and at rest in public cloud storage locations. The service will become available across all Palo Alto Networks products in the future, enabling consistent data protection across the enterprise.

*Gartner, The Future of Network Security Is in the Cloud, 30 August 2019

Customer quotes

  • “For the past few years, we’ve relied on Prisma Access to transform the way we connect and secure our mobile users,” said Josh Dye, senior vice president of Global Information Security at Jefferies. “We are excited to see Palo Alto Networks take Prisma Access to the next level with the introduction of SD-WAN and the other new capabilities. We believe Prisma Access is now the most complete secure access service edge offering we have seen in the market.”
  • “Palo Alto Networks has enabled Moody’s to transform into dynamic global enterprise, leveraging public cloud and SaaS-based services to accelerate our business objectives,” said George Kurian, senior vice president of Cybersecurity Services at Moody’s. “The secure access service edge delivered by Prisma Access has been key to our cloud transformation, allowing us to provide secure access to our public cloud and SaaS services to all of our users, regardless of location. With Prisma Access, we can now stand up branch locations immediately and integrate them into our corporate network overnight, at a fraction of the previous cost.”

Prisma is the industry’s most complete cloud security offering for today and tomorrow. It provides unprecedented visibility into data, assets and risks in the cloud; consistently secures access, data and applications without compromises; enables speed and agility as organisations embrace the cloud; and reduces operational complexity and cost with a radically simple architecture. For more information, please visit www.paloaltonetworks.com/prisma.

Availability
Prisma Access, SD-WAN, cloud-based management UI and new SaaS SLAs are available now. DLP is available for evaluation. For more information, please visit https://www.paloaltonetworks.com/prisma/access.

About Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organisations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organisations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.

Palo Alto Networks, Prisma, Panorama and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

More than half of Australian Enterprises Have Misplaced Confidence in their Cloud Service Providers’ Security

SYDNEY, Australia – Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, released a report that uncovers the truth about the state of cloud security among large enterprises across Asia-Pacific including Australia, with many cases where perception doesn’t match the reality when it comes to securing the cloud.

Conducted by Ovum Research, the report shows that large enterprises, defined as those with more than 200 employees, are not prepared for cloud-related cybersecurity threats, and more importantly, make the assumption that public cloud is secure by default. In fact, 56 per cent of security decision-makers in large Australian enterprises believe that security provided by their cloud service providers is sufficient to protect them from cloud-based cyber threats.

“Organisations need to recognise that cloud security is a shared responsibility,” said Sean Duca, vice president and regional chief security officer, Asia-Pacific and Japan at Palo Alto Networks. “While cloud providers are responsible for the security of their infrastructure, the onus is on companies themselves to secure their data and applications stored in that infrastructure.”

Large Organisations Have Many Security Tools, but Lack a Unified View of Security

Among the Australian companies surveyed, 52 per cent operate with more than 10 security tools to secure their cloud. However, having numerous security tools creates a fragmented security posture, adding further complexity to managing security, especially if the companies are operating in a multi-cloud environment. The multi-cloud approach creates a dangerous lack of visibility that is prevalent in 69 per cent of large organisations in Australia, according to Ovum.

The report highlights the ubiquity of multi-cloud deployments in large organisations that calls for a unified view of all cloud-native services, and recommends it is ideal for organisations to have a central console that uses technologies such as artificial intelligence to help prevent known and unknown malware threats, and quickly remediate accidental data exposure when it arises.

Large Organisations Lack Cloud Security Audits and Training

The need for automation is further underscored by the study, which revealed that large enterprises do not have enough time and resources to dedicate to cloud security audits and training.

87 per cent of organisations have either never conducted a security audit or do not do it on a yearly basis. Furthermore, more than quarter of audits do not include cloud assets and 79 per cent of organisations conduct internal audits only. Besides audits, there is also inadequate cloud security training for both IT and non-IT staff. More than two thirds (68 per cent) of Australian organisations do not provide cybersecurity training to IT security employees on a yearly basis. It is, therefore, not surprising that staff outside of IT departments receive even less training – 86 per cent of non-IT professionals do not receive cybersecurity training on a yearly basis.

Despite organisations’ inability to provide more frequent audits and security training for IT teams and employees, it is encouraging to see 37 per cent of Australian organisations surveyed use threat intelligence and analytics to identify new threats and take necessary action. A further 16 per cent of Australian organisations have also equipped themselves with real-time threat monitoring capabilities.

In order to be truly secure in cloud environments, it is pertinent for organisations in Asia-Pacific to be cognisant of cloud security best practices, which include:

  • Building security into the cloud environment from the get-go; security should be an enabler to accelerate cloud adoption.
  • Developing consistent security policies across all types of cloud deployments, which can be implemented properly through the help of tools that provide a unified view of all cloud assets and the threats they face.
  • Allowing for frictionless deployment and easy scalability in multi-cloud environments, bridging the gap between highly controlled security teams and highly agile development teams.
  • Increasing audits and training for employees, both IT and non-IT.
  • Automating threat intelligence with natively integrated, data-driven, analytics-based approaches (leveraging machine learning/artificial intelligence) to avoid human error.

Learn More

  • The Asia-Pacific Cloud Security Study’ report features analysis and best practices that can be implemented to help companies in Asia-Pacific protect themselves from cloud-based threats.

Note to Editors

The survey was conducted amongst 500 respondents from various vertical industries of large businesses with over 200 employees across five countries in Asia-Pacific. There were 100 respondents per country in Australia, China, Hong Kong, India and Singapore.

The companies surveyed needed to have 200+ employees and all had to be using public cloud as a minimum. The respondents to the survey ranged from owners to business directors and C-level executives, all of whom had to be either the final decision-maker or influencer when it came to the organisations’ cloud strategy.

For more information on Palo Alto Networks cloud security offerings, visit https://www.paloaltonetworks.com/cloud-security.

###

About Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Palo Alto Networks introduces Demisto v5.0

Reimagined features deliver customisable and scalable security enhancements

 

Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0 enables security analysts to tailor the way they visualise incident and indicator flows, allowing security teams to better manage and automate incident response.

 

Key updates to Demisto v5.0 include:

  •  Reimagined User Interface
    •  Brand new UI that streamlines global navigation while also enhancing the delivery of information within each incident
  • Enhanced Threat Intelligence
    • Access rich indicator intelligence from integrated sources and take action in a scalable manner
  • Database Scaling
    • Install the Demisto app server and databases on separate machines. Multi-tier configurations let you scale your environment and manage resources efficiently
  • SOAR on the fly
    • Introduction of chat support in the mobile application, letting you update relevant stakeholders on-the-go and ability to manage notifications from the web app, choosing to receive updates on email, Slack, Mattermost, or the mobile app

 

Rishi Bhargava, VP Product Strategy, Demisto, a Palo Alto Networks company comments: “Demisto v5.0 is packed with new features suggested to us by our community of customers, partners, and independent users. We’ve also introduced changes that facilitate improved load management and scaling of resources, ensuring that organisations are secure irrespective of the pace at which they grow.

“Back in 2015 we recognised that security teams wilt under dual pressures every day: an ever-increasing volume of security alerts, and insufficient resources to address these alerts. Over the past four years, our customers have seen us as the only platform that has combined security orchestration, incident management, and real-time collaboration to make their lives easier. Automating as much as possible hands time back to security teams to investigate, learn and improve, and sometimes just take a deep breath. Since joining forces with Palo Alto Networks, we have accelerated our go-to-market and made inroads into use cases outside of traditional security operations.”

Demisto v5.0 is available today for both enterprise customers and community users. For more information, please visit https://blog.paloaltonetworks.com/2019/10/cortex-demisto-v5-soar/.

About Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit https://www.paloaltonetworks.com

Palo Alto Networks, Demisto, and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names, or service marks used or mentioned herein belong to their respective owners.

SOURCE Palo Alto Networks, Inc.

Palo Alto Networks research shows new twist on old cyberattack method targeting mobile devices

Paloalto LogoPalo Alto Networks® (NYSE: PANW), the next-generation security company, today revealed details of a new “BackStab” attack used to steal private information from mobile device backup files stored on a victim’s computer. A white paper from the company’s Unit 42 threat intelligence team explains how cyberattackers are using malware to remotely infiltrate computers and execute BackStab attacks in an unprecedented fashion.

Used to capture text messages, photos, geographic location data, and almost any other type of information stored on a mobile device in their possession, BackStab has been employed by law enforcement and cyberattackers alike. The Unit 42 white paper shows how BackStab attacks have evolved to leverage malware for remote access and why Apple® iOS devices have been a primary target for attacks, as the default settings in iTunes® store unencrypted backup files in fixed locations and automatically sync devices when they are connected to a user’s computer.

Quote

“Cybersecurity teams must realise, just because an attack technique is well-known, that doesn’t mean it’s no longer a threat. While conducting our research into BackStab attacks, we gathered over 600 malware samples from 30 countries around the world that were used to conduct remote BackStab attacks.”

–          Ryan Olson, director of threat intelligence, Unit 42, Palo Alto Networks

Recommendations

  • iOS users should encrypt their local backups or use the iCloud backup system and choose a secure password.
  • Users should upgrade iOS devices to the latest version, which creates encrypted backups by default.
  • When connecting an iOS device to an untrusted computer or charger via a USB cable, users should not click the “Trust” button when the dialogue box is displayed.

Download the white paper at:

https://www.paloaltonetworks.com/resources/research/unit42-backstab-mobile-backup-data-under-attack-from-malware.html

Subscribe to Unit 42 research updates at

http://researchcenter.paloaltonetworks.com/unit42/

Learn more about Unit 42, the Palo Alto Networks threat intelligence team, at https://www.paloaltonetworks.com/threat-research.html

###

About Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide.  Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets.  Find out more at www.paloaltonetworks.com.

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Palo Alto Networks® announces agreement to acquire Cyvera

 

April 2, 2014Palo Alto Networks® (NYSE: PANW), has announced a definitive agreement to acquire Cyvera, a privately held cybersecurity company located in Tel-Aviv, Israel.  Under the terms of the agreement, Palo Alto Networks will acquire all of the outstanding capital stock of Cyvera for an aggregate purchase price of approximately $200 million (USD). The acquisition is expected to close during the second half of fiscal 2014, subject to customary closing conditions and regulatory reviews.

Named a cool vendor in security by Gartner in 2013 (“Cool Vendors in Security: Infrastructure Protection 2013”)*, Cyvera, which has 55 employees, has developed a highly innovative offering that protects enterprises from cyber threats by using a unique approach to block unknown, zero-day attacks on the endpoint.

The addition of this unique capability to the Palo Alto Networks enterprise security platform will extend customers’ ability to safely enable applications and protect users against known and unknown cyber threats on any device, across any network.

QUOTES

*        “This event marks a key milestone in our strategic enterprise security vision.  It extends our next-generation security platform with a very innovative approach to preventing attacks on the endpoint.  It enables us to accelerate the delivery of the market’s only highly integrated and automated enterprise security platform spanning network, endpoints, and the cloud.  For customers, this translates into the most sophisticated and automated threat prevention for their entire organisation.”
–        Mark McLaughlin, President and CEO of Palo Alto Networks

*        “Much like Palo Alto Networks set out to disrupt the network security market with its next-generation security platform, we founded Cyvera to revolutionise protection for the endpoint – one of the most vulnerable frontiers for cyber-attacks.  We are pleased to join the Palo Alto Networks team and together help enterprise customers tackle the advanced threats they face today.”
–        Uri Alter and Netanel Davidi, co-founders and co-CEO’s of Cyvera   

Cyvera prevents attacks at the right time and place

Zero-day cyber-attacks represent one of the greatest threats to enterprises, governments, and service provider organisations that rely on a vast array of systems, applications, and devices to run their business.  These cyber-attacks often exploit a vulnerability known only to the attacker.  While there are literally tens of thousands of vulnerabilities an attacker can potentially target, there is a significantly smaller number of exploit techniques they may use to exploit that vulnerability.

While patching software can provide an element of protection, it does little to protect organisations against vulnerabilities that have not yet been discovered by the software manufacturer. Simply detecting the presence of malware is also insufficient since malicious activity may have already been initiated and evasion tactics employed to evade detection.  In order to stop zero-day attacks in their tracks, it’s critical to understand the exploit techniques attackers employ.  Cyvera has developed a unique method of performing this real-time prevention against all core attack techniques at the endpoint during the exploitation phase, before the malware has a chance to run.

Advanced threats demand highly integrated, automated, and scalable platform approach 

Today’s sophisticated attacks increasingly rely on a combination of tactics and threat vectors to penetrate an organisation and require a new approach to security. Most organisations still rely on legacy point technologies that address only specific types of attacks, phases of an attack, certain devices, or certain network segments.  Because of the singular nature of these technologies, they are ill-equipped to detect and prevent today’s advanced cyber-attacks.

To address these challenges, Palo Alto Networks developed a new approach: one that begins with positive security controls to reduce the attack surface; blocks all known threats; rapidly detects unknown threats through analysis and correlation of abnormal behaviour; then automatically employs advanced exploit prevention mechanisms and policies back to the front line to ensure previously unknown threats are known to all and blocked.  This approach is designed to prevent threats from penetrating an organisation and greatly reduce the need for costly human remediation.

Adding the unique Cyvera capabilities extends the Palo Alto Networks enterprise security platform to perform next-generation security functions across the network, endpoint, and the cloud.

To learn more about the Palo Alto Networks security platform:

·        Visit our website   
·        Register for the Palo Alto Networks Ignite user conference, March 31 – April 2

ENDS

Safe Harbour

This press release contains “forward-looking” statements within the meaning of Section 27A of the Securities Act and Section 21E of the Exchange Act that are based on the beliefs and assumptions of Palo Alto Networks and on currently available information. Forward-looking statements include information concerning the expectations, beliefs, plans, intentions and strategies of Palo Alto Networks relating to its pending acquisition of Cyvera.  Such forward-looking statements include statements regarding expected benefits to Palo Alto Networks, Cyvera and its respective customers; the impact of the pending acquisition on Palo Alto Networks’ competitive position; and plans regarding Cyvera and Cyvera personnel. These statements reflect the current beliefs of Palo Alto Networks and are based on current information available to Palo Alto Networks as of the date hereof, and Palo Alto Networks does not assume any obligation to update the forward-looking statements to reflect events that occur or circumstances that exist after the date on which they were made. The ability of Palo Alto Networks to achieve these business objectives involves many risks and uncertainties that could cause actual outcomes and results to differ materially and adversely from those expressed in any forward-looking statements.

There are a significant number of factors that could cause actual results to differ materially from statements made in this presentation, including the failure to achieve expected synergies and efficiencies of operations between Palo Alto Networks and Cyvera; the ability of Palo Alto Networks and Cyvera to successfully integrate their respective market opportunities, technology, products, personnel and operations; the failure to timely develop and achieve market acceptance of combined products and services; the potential impact on the business of Cyvera as a result of the acquisition; the ability to coordinate strategy and resources between Palo Alto Networks and Cyvera; the ability of Palo Alto Networks and Cyvera to retain and motivate key employees of Cyvera; Palo Alto Networks’ limited operating history and experience with integrating acquired companies; risks associated with Palo Alto Networks’ rapid growth, particularly outside the United States; rapidly evolving technological developments in the market for network security products; and general market, political, economic and business conditions.  Additional risks and uncertainties are included under the captions “Risk Factors” and “Management’s Discussion and Analysis of Financial Condition and Results of Operations,” in the company’s quarterly report on Form 10-Q filed with the SEC on February 24, 2014, which is available on the company’s website at investors.paloaltonetworks.com and on the SEC’s website at www.sec.gov. Additional information will also be set forth in other filings that the company makes with the SEC from time to time. All forward-looking statements in this presentation are based on information available to the company as of the date hereof, and Palo Alto Networks does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made or to update the reasons why actual results could differ materially from those anticipated in the forward-looking statements, even if new information becomes available in the future.