Palo Alto PA-3200
Die ML-gestützten Next-Generation Firewalls (NGFW) der PA-3200 Series, bestehend aus der PA-3220, PA-3250 und PA-3260, werden über PAN-OS® gesteuert, das den gesamten Datenverkehr, einschließlich Anwendungen, Bedrohungen und Inhalten, nativ klassifiziert und dann diesen Datenverkehr unabhängig von Standort oder Gerätetyp dem jeweiligen Benutzer zuordnet. Die Anwendung, der Inhalt und der Benutzer – d. h. die für Ihre Betriebsabläufe wesentlichen Ressourcen – werden anschließend als Basis für Ihre Sicherheitsleitlinien genutzt, um den Sicherheitsstatus zu erhöhen und die Reaktionszeiten bei Zwischenfällen zu reduzieren.
The PA-3200 Series ML-based Next-Generation Firewalls (NGFW), consisting of the PA-3220, PA-3250 and PA-3260, are controlled by PAN-OS®, which natively classifies all traffic, including applications, threats and content, and then assigns that traffic to the appropriate user, regardless of location or device type. The application, content and user - the resources essential to your operations - are then used as the basis for your security guidance to increase security posture and reduce incident response times.
The PA-3200 Series ML-based Next-Generation Firewalls (NGFW), consisting of the PA-3220, PA-3250 and PA-3260, are controlled by PAN-OS®, which natively classifies all traffic, including applications, threats and content, and then assigns that traffic to the appropriate user, regardless of location or device type. The application, content and user - the resources essential to your operations - are then used as the basis for your security guidance to increase security posture and reduce incident response times.
The PA-3200 Series ML-based Next-Generation Firewalls (NGFW), consisting of the PA-3220, PA-3250 and PA-3260, are controlled by PAN-OS®, which natively classifies all traffic, including applications, threats and content, and then assigns that traffic to the appropriate user, regardless of location or device type. The application, content and user - the resources essential to your operations - are then used as the basis for your security guidance to increase security posture and reduce incident response times.