Palo Alto Networks Extends "Cloud Firewall" To iOS - InformationWeek
Mobile // Mobile Devices
08:00 AM
Connect Directly

Palo Alto Networks Extends "Cloud Firewall" To iOS

Application-centric firewall allows clients to determine dynamically what the closest, fastest connection to the enterprise is and establish an encrypted tunnel to that branch office.

Sophisticated enterprise perimeter protection is now available to managed iOS devices through Palo Alto Networks' GlobalProtect.

Palo Alto Networks is known for firewalls which protect all TCP ports and look for application context on them. As computing has moved to HTTP and other Internet protocols, enterprises have found it necessary to open up certain ports, like 80 (HTTP) and 443 (SSL), in order to make management practical. In fact just about any application can run on just about any port, so Palo Alto Networks allows administrators to focus on managing users and applications, no matter what port they use.

GlobalProtect, which has been shipping since March, extends their network perimeter to any remote client. Clients can connect through an encrypted tunnel and receive the same protection as devices on the LAN. The network perimeter thus becomes a logical, rather than physical perimeter. The new release of GlobalProtect extends this protection to Macs, iPhones and iPads.

The system has a lot in common with conventional VPNs and firewalls, but allows much more flexible control over application access to IT, and policy is enforced no matter where the client is or how they connect.

Performance can be a problem when the client relies so heavily on one connection to the firewall, so GlobalProtect clients are able to determine if there is a company branch office which is a closer, better performing connection. Any Palo Alto Networks perimeter device at a branch office in the company WAN can service remote client connections. This is sometimes known as "cloud firewalling" or a "cloud of gateways."

Palo Alto Networks firewalls go beyond port management to look for application context on all ports.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll