Palo Alto Networks helps you protect your Data Center – whether physical or Cloud Computing environment-based – with new-generation firewall synchronization solutions and threat prevention deployed either by hardware device or in virtualization form. Integrated management tools standardize and synchronize policy implementation and help reduce the time difference between application load deployment and policy update, enabling you to operate at high and responsive speed with a fast change in Cloud computing environment if you intend to use it later.

Helps to operate applications safely using the Zero Trust model

Often, the question of whether or not to administer/control applications is appropriate for an increasing Data Center environment is due to the need to limit the known applications that are being used commonly. Philosophically, if we know what applications are being used in the Data Center, it makes us easier to protect them. It can be seen from the fact of well-known data theft and loss that attackers will use common applications in the network (including Data Center networks) to attack and steal the data. Here are some examples:

According to the report by iSight Partners regarding loss of Target data, FTP, Netbios and Webdav are applications used by attackers to travel inside the network when stealing data about credit cards and users. This reflects the tendency of attackers to hide their behavior with regular applications. Based on Palo Alto Networks 2014 Application Usage and Threat Report, the applications above were found to be used on all of the 5,500 networks that we analyzed.

RDP and other remote access applications are also used by the attackers, according to Verizon’s statistics in its annual Data Breach Reports. According to the 2014 Application Usage and Threat Report, an average of about 9 remote access applications were detected to be used in 90% of the network systems that we analyzed.

Many other business applications such as Microsoft Lync, SharePoint, and Active Directory use a wide range of service portals – including 80, 443 and a range of high-index ports – making the application control necessary. For example, only Lync app have access while other apps are not allowed to use with the regular ports that are already used on Lync.

On average, 8-10% of the network is unknown throughput – it could be a custom application, an unknown commercial application, or a threat. The key function you need is the ability to manage systematically the unknown throughput by quickly analyzing it, determining what it is, where it comes from, and then managing them through policies, custom applications or threat prevention capabilities.

With each of the examples above, our new-generation firewall allows you to deploy information security policies based on the Zero Trust model, providing the greater capabilities in information security.

The Zero Trust model extends the application of network segmentation to application-specific access authorization levels, allowing users to access based on identity details and to control over what content can be sent at each point of segmentation. All are based on the philosophy: Never trust, always check.

Determines that SharePoint is allowed, forces it to use standard portals designed to be used, and prohibits all other applications from being used.

Allows access from the web server layer to SharePoint through a predefined set of service portals and applies application-specific threat prevention policies.

Limits access to Microsoft SQL databases from SharePoint application, prohibits access to databases from the web server layer.

Allows users of the Marketing team to, based on its permissions, access each of SharePoint Docs and not to perform any other function. Only allows the IT team to use SharePoint Admin permissions when analyzing throughput in depth by using the relevant application-specific threat prevention policies.

Detects and prevents the applications misused or misconfigured such as RDP or TeamViewer, and proactively stop with policy.

Systematically manages the unknown throughput by policy. Creates custom App-ID for internal applications, allowing you to control user-based access, analyze them for known and unknown malicious codes; unidentified applications or unused commercial applications may be prohibited by the policy, and submit requests for App-ID development; finally, forensics tools and reporting tools can help you get rid of unknown throughput that may be associated with a threat.

Data Center protection using Zero Trust model can be also applied to both traditional (physical) Data Center model and modern Cloud Computing model, enabling you to control application-based access or to load computing applications associated with the user’s identity while to avoid unauthorized and dangerous applications and prevent any threats from entering the Data Center and moving to approach the targets inside.

Prevents known and unknown threats from entering and traversing the Data Center

Information security threats nowadays often infiltrate the networks through actions unsuspected by system users/employees such as accessing malicious links, drive-by download or many other means. Once entering the networks, they continue to traverse the networks and find the targets. In your Data Center, information security threats can traverse and approach the targets through physical or virtual application load, placing your applications and paramount data into risky situations.

The key of protecting your Data Center is the implementation of defense and prevention techniques that enable containment and protection at each stage of the attack chain as below:

In the Data Center, applying the level of application-based monitoring among workloads helps to minimize the impact of threats at the same time of segmentation of throughput in the Data Center based on the Zero Trust model. Application-specific threat prevention policies can help prevent the known and unknown threats from entering your Data Center.

Reduces difficulties in management

The need to continue to protect the physical network in combination with protecting the Cloud Computing environment means that it is rare to encounter deployment scenarios where only a few firewall devices are used. In order to reduce difficulties and accelerate deployment, a combination of centralized management and built-in features that can help standardize and simplify the policy update process becomes more urgent than ever.

Centralized management:

Panorama allows you to centrally manage all of Palo Alto Networks new-generation firewall devices – including hardware devices and in virtualization form, thereby ensuring the consistency in policy and management. Using an interface like the administration interface on each individual device, Panorama eliminates the need to learn more when switching from one interface to another. Panorama allows you to generally administer Palo Alto Networks new-generation firewall devices including:

Implements policies including information security, NAT, QoS, policy-based forwarding, decryption, application override, captive portal, and DoS prevention.

Shared policies based on pre- and post-rules are implemented by the Panorama administrator to enforce common policies while allowing policy modifications internally below. The laws between pre- and post-rules can be modified internally or by the Panorama administrator.

Updating software and content (Applications, Threats, Antivirus, WildFire), and licenses can be managed throughout implementations from a centralized point.

Collects logs and flexibly reports from managed firewall devices. Panorama can be deployed either in virtualization form or with dedicated hardware devices. Dedicated hardware devices M-100 or M-500 can be used to build a distributed management architecture using separate M-100 or M-500 devices for respective management and logging functions.

Unifies policy implementation and update:

In both physical and virtualized network environments, you are always faced the challenge of managing the change that can occur among addition, removal, or modification of workload and how information security policy can be implemented as quickly as possible. To help reduce these challenges, our new-generation firewall devices provide a set of full management features that help unify and simplify policy implementation to help the information security policy keep up with the changes in your computing application load.

As a result, you achieve a huge reduction in latency possible between workload changes and information security policy updates. Additionally, in order to help automate and standardize future policy updates, a REST-based API system is provided to enable you to integrate with third party management solutions such as OpenStack and CloudStack.

Operates high-performance information security with dedicated hardware architecture

Palo Alto Networks offers a range of hardware products dedicated to keep the information security of the Data Center. The underlying architecture of dedicated hardware is based on a Single-Pass Parallel Processing (SP3) model, which allows to identify the applications right from the start, regardless of which service portal it is running on, while simultaneously determining whether the content is malicious or not and who the user is. Three factors that are relevant to running your business including applications, users and content become the key factors of your information security policy. The Single-Pass Parallel Processing architecture not only enhances your information security capabilities, but also eliminates redundant policy decisions, thereby reducing latency and improving the operating throughput in conjunction with network-specific processing, information security, threat prevention and management functions.

Contact Us:


  • Address: 152/32 Thanh Thai, Ward 12, District 10, HCMC
  • Telephone: (84-28) 62650735 - Fax: (84-28) 62650734

Head Office - Ho Chi Minh City

*Project Manager:
- Mr Nguyễn Quốc Khánh
- Moblie Phone: 0903.877.937
*Sales Director:
- Mr.Đỗ Hoàng Qúy
- Moblie Phone: 0983.342.000
*Sales Manager:
- Mr.Trương Nguyên Quí
- Mobile Phone: 0908.744.108
*Sales Manager:
- Mr.Phạm Công Vinh
- Mobile Phone: 0908.789.526
*Technical Director:
- Mr.Võ Quốc Đạo
- Mobile Phone: 0973.791.132

Ha Noi Branch

*Vice Director – Technical Director:
- Mr.Võ Quốc Đạo
- Mobile Phone: 0973.791.132

209 thoughts on “Palo Alto Networks Datacenter security

  1. cheap flights says:

    Simply wish to say your article is as surprising. The clearness on your publish is simply excellent and that i could suppose you are a professional in this subject.

    Fine along with your permission allow me to take hold of your RSS feed to
    keep up to date with drawing close post. Thank you a million and please carry on the rewarding work.

  2. says:

    I think what you published was very reasonable.
    However, think on this, suppose you were to create a awesome headline?
    I mean, I don’t wish to tell you how to run your website, however what if you
    added a title to maybe grab a person’s attention? I mean Palo Alto Networks
    Datacenter security – Công Ty Cổ Phần Đầu Tư
    Tin Học Đồng Lợi (DL) is kinda boring.

    You ought to glance at Yahoo’s home page and see how they create
    news headlines to grab viewers to click. You
    might try adding a video or a related picture
    or two to grab people interested about everything’ve written. In my opinion, it could
    make your blog a little livelier.

  3. says:

    I blog frequently and I really thank you for your information. This great article
    has truly peaked my interest. I’m going to book mark your site and keep
    checking for new details about once per week. I subscribed to your Feed as well.

  4. says:

    Just want to say your article is as amazing.
    The clarity in your post is simply cool and i could assume you are an expert on this subject.
    Well with your permission let me to grab your RSS feed to keep updated with forthcoming post.

    Thanks a million and please carry on the enjoyable work.

    ps4 games allenferguson ps4 games

  5. coconut oil says:

    Heya i’m for the first time here. I came across this board and I find It really useful & it helped
    me out much. I hope to give something back and help others like you
    helped me. games ps4 allenferguson games ps4

  6. w88 สล็อต says:

    W88 Casino Review
    Established in 2013, W88 has been a leading online gaming
    site in Asia for quite a while. During this time, the operator has earned a great reputation among
    players thanks to its wide range of activities, which include casino games, sports betting, lottery, live casino games and poker.

    The W88 site is well-known for its commitment to customer service, offering players the chance to
    claim generous bonuses regularly. So, it while it seems like this casino is packed with great games and customer service, let’s find
    out if there’s more to it than this.

  7. says:

    Hey there, I think your blog might be having browser compatibility issues.

    When I look at your blog site in Safari, it looks fine but when opening in Internet
    Explorer, it has some overlapping. I just wanted to give you a quick heads up!
    Other then that, great blog!

  8. 0mniartist says:

    What’s Happening i am new to this, I stumbled upon this I have discovered It absolutely helpful and it has aided me out loads.
    I am hoping to give a contribution & assist different users like its helped me.
    Great job. asmr 0mniartist

  9. says:

    Sweet blog! I found it while searching on Yahoo News.
    Do you have any tips on how to get listed in Yahoo News?
    I’ve been trying for a while but I never seem to get there!
    Thank you 0mniartist asmr

  10. Biopusio says:

    #file_links[C:\key\diflucan.txt,1,N]: {#file_links[C:\key\diflucan.txt,1,N]|diflucan|diflucan generic|diflucan without a doctor prescription|diflucan 150mg prescription|diflucan 150 price|diflucan tablet price|buy fluconazole|buy diflucan|cheap diflucan|#file_links[C:\key\diflucan.txt,1,N]} – #file_links[C:\key\diflucan.txt,1,N]
    {|}# #file_links[C:\key\diflucan.txt,1,N]
    #file_links[C:\key\diflucan.txt,1,N] [url={|}#]{#file_links[C:\key\diflucan.txt,1,N]|diflucan|diflucan generic|diflucan without a doctor prescription|diflucan 150mg prescription|diflucan 150 price|diflucan tablet price|buy fluconazole|buy diflucan|cheap diflucan|#file_links[C:\key\diflucan.txt,1,N]}[/url] #file_links[C:\key\diflucan.txt,1,N]

  11. says:

    Thanks for finally talking about > Palo Alto Networks Datacenter
    security – Công Ty Cổ Phần Đầu Tư Tin Học Đồng Lợi (DL)
    < Liked it! asmr 0mniartist

  12. paydayloans com says:

    Jᥙѕt wіsh to ѕayy your article is аs astounding.
    The clarіty tօ yohr submit is simply coοl and that
    i can think you’re knosledgeable on this subjeсt. Fіne
    together with your pеrmission аllow me to grab your RSS feеd to stay up tto date ѡith forthcoming
    post. Тhank you 1,000,000 and please keep up the gratifying work.

    Visit my blog post :: paydayloans com

  13. on gamefly says:

    I am no longer certain where you are getting your info, however good topic.

    I must spend a while learning much more or working out more.
    Thank you for great info I was on the lookout
    for this info for my mission.

  14. asmr that says:

    I do not even know how I ended up here, but I
    thought this post was good. I don’t know who you are but
    certainly you’re going to a famous blogger if you
    are not already 😉 Cheers!

  15. was asmr says:

    My brother suggested I might like this blog.
    He was totally right. This post truly made my
    day. You cann’t imagine just how much time I had spent for this
    information! Thanks!

  16. asmr is says:

    Today, I went to the beachfront with my children. I found a sea shell and gave it
    to my 4 year old daughter and said “You can hear the ocean if you put this to your ear.”
    She placed the shell to her ear and screamed.

    There was a hermit crab inside and it pinched her ear.
    She never wants to go back! LoL I know this is totally
    off topic but I had to tell someone!

  17. their asmr says:

    Wow that was unusual. I just wrote an really long comment but after I clicked submit my comment didn’t appear.
    Grrrr… well I’m not writing all that over again. Regardless, just wanted to say fantastic blog!

  18. what gamefly says:

    Greetings! Quick question that’s completely off topic.
    Do you know how to make your site mobile
    friendly? My site looks weird when viewing from my
    iphone. I’m trying to find a template or
    plugin that might be able to resolve this issue.
    If you have any recommendations, please share.
    Thank you!

  19. gamefly it says:

    Hey there would you mind sharing which blog platform you’re
    working with? I’m going to start my own blog soon but I’m having a difficult time deciding between BlogEngine/Wordpress/B2evolution and Drupal.
    The reason I ask is because your design and style seems different then most blogs and I’m looking for something completely unique.
    P.S My apologies for being off-topic but I had to ask!

  20. in asmr says:

    I used to be suggested this website through my cousin. I am
    not sure whether or not this publish is written by him as nobody else recognise such
    precise about my problem. You’re wonderful!
    Thank you!

  21. says:

    This is very fascinating, You are an excessively professional blogger.
    I’ve joined your rss feed and look forward to looking for more
    of your magnificent post. Also, I’ve shared your web site in my social

  22. your asmr says:

    Excellent post. I was checking continuously this blog and I’m impressed!
    Very helpful information specially the last part
    🙂 I care for such information a lot. I was seeking this particular information for a long time.
    Thank you and good luck.

  23. says:

    Today, I went to the beachfront with my children. I found a
    sea shell and gave it to my 4 year old daughter and said “You can hear the ocean if you put this to your ear.” She placed the shell
    to her ear and screamed. There was a hermit crab inside and it pinched her ear.
    She never wants to go back! LoL I know this is entirely off topic but I had to tell someone!

  24. says:

    When I initially left a comment I appear to have clicked on the -Notify me when new comments are added-
    checkbox and from now on each time a comment is added I recieve four emails with the same comment.
    There has to be an easy method you are able to remove me
    from that service? Kudos! scoliosis

  25. Pingback: tinder super like reddit

  26. says:

    Please let me know if you’re looking for a article writer
    for your weblog. You have some really great articles and I believe I would be a good asset.
    If you ever want to take some of the load off, I’d really like to write
    some content for your blog in exchange for a link back to mine.
    Please blast me an email if interested. Thank you! scoliosis

  27. says:

    Spot on with this write-up, I really believe this web site needs a lot more attention. I’ll probably be returning to see more, thanks for the advice!

  28. says:

    I was suggested this web site by my cousin.
    I’m now not positive whether or not this submit is written by
    means of him as no one else understand such targeted approximately my problem.

    You’re wonderful! Thank you! scoliosis

  29. our asmr says:

    I do trust all of the ideas you’ve introduced to your post.
    They’re very convincing and can certainly work. Nonetheless, the posts are too short for starters.
    Could you please lengthen them a bit from next time? Thank you for the post.

  30. asmr why says:

    Pretty nice post. I simply stumbled upon your blog and wanted
    to say that I’ve truly loved surfing around your weblog posts.
    After all I’ll be subscribing in your rss feed and I’m hoping you
    write once more very soon!

  31. Record producer says:

    hey there and thank you for your info ? I?ve certainly picked up anything new from right here. I did however expertise several technical issues using this website, as I experienced to reload the website a lot of times previous to I could get it to load correctly. I had been wondering if your hosting is OK? Not that I’m complaining, but sluggish loading instances times will sometimes affect your placement in google and can damage your high quality score if ads and marketing with Adwords. Well I am adding this RSS to my e-mail and can look out for much more of your respective exciting content. Make sure you update this again soon..

  32. Dierks Bentley Tickets says:

    Hello there, just became alert to your blog through Google, and found that it’s truly informative. I?m gonna watch out for brussels. I?ll be grateful if you continue this in future. Numerous people will be benefited from your writing. Cheers!

  33. was dating sites says:

    Hello there! This is my first visit to your blog! We are a group of volunteers and starting a new project
    in a community in the same niche. Your blog provided us useful information to work on. You
    have done a extraordinary job!

  34. our dating sites says:

    Hello! I just wanted to ask if you ever have any issues with hackers?
    My last blog (wordpress) was hacked and I ended up losing a few months of
    hard work due to no back up. Do you have
    any methods to protect against hackers?

  35. their free dating sites says:

    Hello! I could have sworn I’ve visited this website before but after browsing through
    many of the posts I realized it’s new to me. Regardless, I’m definitely delighted I stumbled upon it and I’ll be book-marking it and checking back regularly!

  36. says:

    I’ve been browsing online more than 4 hours today, yet I never found any interesting article like yours.

    It is pretty worth enough for me. In my opinion,
    if all web owners and bloggers made good content as you did, the web will be much more useful than ever

  37. Khách says:

    Thank you for every other excellent post. Where else could anybody get that kind of info in such an ideal method of writing? I have a presentation subsequent week, and I am at the look for such info.

  38. says:

    Hey, I think your site might be having browser compatibility issues.
    When I look at your blog in Ie, it looks fine but when opening in Internet Explorer, it
    has some overlapping. I just wanted to give you a quick heads
    up! Other then that, superb blog!

  39. Puppy Bandana says:

    This is the right website for everyone who wishes to find out about this topic. You understand so much its almost hard to argue with you (not that I really would want to…HaHa). You certainly put a new spin on a subject that’s been written about for a long time. Excellent stuff, just great!

  40. IEC says:

    We would like to thank you once again for the gorgeous ideas you gave Janet when preparing her own post-graduate research and also, most importantly, for providing all of the ideas in one blog post. Provided that we had been aware of your site a year ago, we may have been kept from the needless measures we were taking. Thank you very much.

Trả lời

Email của bạn sẽ không được hiển thị công khai.