You are on page 1of 4

THREAT

PREVENTION
Comprehensive exploit, malware, and command
and control protection for your network

Organizations face a frequent barrage of attacks by threat


actors around the world looking to make a profit. Todays
attackers are much different from the attackers of 15 years
ago. They use evasive tactics to succeed in gaining a foothold
in your network while remaining invisible to traditional
network defenses, from packet obfuscation and encryption
to multi-phased payloads and fast-flux DNS.

To make matters worse, network companies do business and, because of


Purpose-built within the security products are still using the same that, theyve made themselves increas-
next-generation security defensive strategies employed before ingly available to users by entering
the threat landscape evolved. Traffic networks using encrypted channels,
platform, Threat Prevention
is only inspected on certain ports and, through non-standard ports, and by
Services protect networks
while adding single-function devices to hopping from open port to open port
from a wide range of threats. the defensive stack may help alleviate a to guarantee users always have access.
particular problem, that results in poor
Scan all traffic in full context of Unfortunately, advanced threats take
visibility and performance. This has left a
applications and users advantage of the new way in which
dangerous situation, where gaping holes
applications make themselves available
are present in network defenses because
to users, leveraging them for a free
Prevent threats at every step of security solutions are fractured and
ride into the network undetected.
the Cyber Attack Lifecycle difficult to manage, while attackers are
They tunnel within applications, hide
increasingly adept at penetrating them.
within SSL-encrypted traffic, and take
Single-pass scanning architec- Palo Alto Networks has redefined net- advantage of unsuspecting targets to
ture allows for high throughput, work security with our Zero Trust plat- get a foothold within the network and
even when all threat prevention form approach to threat prevention. We execute malicious activity.
features are enabled safely enable applications by providing
Palo Alto Networks protects your
protection against advanced threats at
network against these threats by
Single policy table reduces every phase in the cyberattack lifecycle,
providing multiple layers of prevention,
management overhead and we do this using a multi-function
confronting threats at each phase
platform that analyzes all traffic across all
of the attack. Our Threat Prevention
ports and protocols in a single scan.
Daily, automatic updates subscription includes Intrusion
for protections against new Prevention, Network Anti-Malware,
Enable the Application, Prevent the
malware and malicious DNS and Command-and-Control (CnC)
Threat
entries protections and shields the network
Applications are an integral part of how from advanced threats by identifying

Palo Alto Networks | Datasheet 1


and scanning all traffic applications, Because there are many ways to ex- Alto Networks malware protections
users, and data, encrypted or not, ploit a single vulnerability, our intrusion block known malware and any variants,
across all ports and protocols. prevention signatures are built based including those that havent been
on the vulnerability itself, providing seen in the wild yet. The stream-based
Eliminate Threats at Every Opportunity more thorough protection against a scanning engine protects the net-
In nearly every recent breach, the wide variety of exploits. A single signa- work without introducing significant
targeted organization had a single- ture can stop multiple exploit attempts latency, which is a serious drawback
function defensive tool in place that on a known network or application of network antivirus offerings that rely
was bypassed. Palo Alto Networks vulnerability. on proxy-based scanning engines. Palo
employs natively integrated defensive Protocol anomaly-based protection Alto Networks stream-based malware
technologies to ensure that, when a scanning inspects traffic as soon as the
detects non-RFC compliant protocol
threat evades one technology, another first packets of the file are received,
usage, such as overlong URI or FTP
catches it. The key to effective protec- eliminating threats as well as the
login.
tion is to use security features that are performance issues associated with
purpose-built to share information and Heuristic-based analysis detects anom- traditional, stand-alone solutions. Key
provide context around both the traffic alous packet and traffic patterns, such anti-malware capabilities include:
theyre inspecting and the threats as port scans, host sweeps, and DoS
In-line, stream-based detection and
theyre identifying and blocking. flooding attacks.
prevention of malware hidden within
Other attack protection capabilities, compressed files and Web content.
such as blocking invalid or malformed
Protection against payloads hidden
packets, IP defragmentation, and TCP
within common file types, such as
reassembly, are utilized for protection
Microsoft Office documents and
against evasion and obfuscation meth-
PDFs.
ods employed by attackers.
Updates from WildFire, ensuring
Easy-to-configure, custom vulnerability
protection against brand-new malware
signatures allow you to tailor intrusion
used in the most recent attacks.
prevention capabilities to your net-
Security Recommended works unique needs. Signatures for all types of malware
Palo Alto Networks is the only vendor are generated directly from millions
In addition to these traditional intru-
to achieve a 100% block rate for all of live samples collected by Palo
sion prevention capabilities, Palo Alto
live drive-by exploits in NSS Labs Alto Networks, including previously
Networks provides the unique ability
2015 Next Generation Intrusion unknown samples sent to WildFire,
to detect and block threats on any and
Prevention System (NGIPS) test. a global network of honeypots, and
all ports, instead of invoking signatures
other leading third-party research
based on a limited set of predefined
organizations around the world.
ports. By leveraging App-ID within
our next-generation firewall, which
Intrusion Prevention Command-and-Control (Spyware)
identifies all traffic on all ports, the
Protection
Threat-based protections detect and threat prevention engine never loses
block exploit attempts and evasive sight of the threat, regardless of port We know theres no silver bullet when
techniques at both the network and evasion. it comes to preventing all threats from
application layers, including port entering the network. After initial
scans, buffer overflows, remote code Malware Protection infection, attackers will communicate
execution, protocol fragmentation, and with the host machine through a com-
In-line malware protection blocks
obfuscation. Protections are based mand-and-control (CnC) channel, using
malware before it ever reaches the
on signature matching and anomaly it to pull down additional malware, is-
target host, through signatures that
detection, which decodes and analyzes sue further instructions, and steal data.
are based on payload, not hash. Palo
protocols, and uses the information Our CnC protections hone in on those
learned to alert on and block malicious
traffic patterns. Stateful pattern match-
CONTENT-BASED vs. HASH-BASED S IGNATURES
ing detects attacks across multiple
packets, taking into account arrival Signatures based on content, i.e., payload, can detect patterns in the body of
order and sequence, making sure all the file that indicate what the file is supposed to do.
allowed traffic is well-intentioned and Signatures based on hash look and match on the fixed encoding of a file.
not using evasion techniques. Because a file hash is very easily changed, hash-based signatures are not
Protocol decoder-based analysis state- effective at detecting polymorphic malware or variants of the same file.
fully decodes the protocol and then in- Using hash-based signatures is like determining whether the contents of a box
telligently applies signatures to detect have spoiled based only on the box design, instead of looking at whats inside.
network and application exploits.

Palo Alto Networks | Datasheet 2


unauthorized communication channels compiled into alerts providing you with Leverage Global Threat Intelligence
and cut them off by blocking outbound a list of users who are infected and the to Prevent Attacks
requests to malicious domains and indicators of compromise that led to Detailed logs of all threats arent
from known CnC toolkits installed on the diagnosis. merely housed within the same
infected devices. management interface, but shared
Complete Visibility and Reduced Risk among all prevention mechanisms to
DNS Sinkhole provide context. We leverage global
SSL Decryption threat intelligence through WildFire
Our CnC protection goes a step further
by providing sinkhole capabilities for Nearly 40 percent of enterprise to automatically discover unknown
outbound requests to malicious DNS network traffic is encrypted with SSL, malware and deliver protections to our
entries, preventing exfiltration and ac- which leaves a gaping hole in network entire customer base, keeping them
curately identifying the victim. Config- defenses if its not decrypted and continuously secured against the latest
ure the sinkhole so that any outbound scanned for threats. Our platform has advanced threats.
request to a malicious domain or IP built-in SSL decryption, which can be
address is instead redirected to one of used selectively to decrypt inbound Passive DNS Network
your networks internal IP addresses. and outbound SSL traffic. After traffic
Protect your organization against
This effectively blocks CnC communi- is decrypted and confirmed as safe, its
rapidly evolving malware networks
cation, preventing those requests from re-encrypted and allowed through to
and malicious websites by leveraging
ever leaving the network, regardless its destination.
Palo Alto Networks DNS-based
of the frequency or time of day theyre analysis. Benefit from a vast network
made, and compiles a report of the File Blocking of intelligence by enabling passive
hosts on your network making those Around 90 percent of malicious files DNS monitoring, which feeds into our
requests. Incident response teams used in spear phishing attacks are database of malicious domains and is
have a daily list of compromised executables. That, combined with then used in generating protections
machines on which to act, without the the fact that 59 percent of security across our global customer base.
added stress of remediation crunch incidents are the result of employee
time, because the communications negligence, means that your users may World-Class Research
with the attacker are cut off. not know whats safe and what isnt.
The Palo Alto Networks threat
Reduce the likelihood of a malware
research team is a world-class research
WildFire infection by preventing dangerous
organization dedicated to the discov-
Protections against newly discovered file types known to hide malware,
ery and analysis of threats, applica-
malware and command-and-control like executables, from entering your
tions, and their respective network
domains are delivered to Threat network. File blocking functionality
behavior. The team works to provide
Prevention protection libraries daily via can be combined with User-ID to block
protections against an expansive list
WildFire, our virtual malware analysis unnecessary files based on users job
of exploits by reverse engineering
environment, keeping your protection roles, making sure all users have access
new vulnerabilities. Each year, Palo
up to date, so youre protected against to the files they need and providing
Alto Networks threat research team
the latest advanced threats and multi- you with a granular way to reduce
discovers and reports more Microsoft
ple stages in the attack lifecycle. your exposure to risk that makes sense
product vulnerabilities than any other
for the diverse requirements of your
security vendor.
Automated Correlation Objects organization. Further decrease the
number of attack opportunities by
Palo Alto Networks includes the ability
sending all allowed files to WildFire for
to identify the presence of advanced
analysis to determine if they contain
threats through the monitoring and
never-before-seen malware.
correlation of network traffic and
threat logs, so you can quickly identify
Drive-By Download Protection
infected users and analyze strange be- Palo Alto Networks is also the home of
havior patterns. The correlation objects Unsuspecting users can inadvertently Unit 42, a team of experts that analyzes
leverage threat research from Unit 42, download malware merely by visiting threat data accumulated by our global
unknown threat analysis from WildFire, their favorite Web page. Often the intelligence community to identify
combined with User-ID to correlate user or even the owner of the website and investigate cutting-edge attack
traffic anomalies and indicators of may be unaware that the site has been methods, malware, and active threat
compromise, to quickly and accurately compromised. Palo Alto Networks campaigns, and report on unfolding
identify devices on your network that identifies potentially dangerous trends within the black hat space.
are infected. Unknown or anomalous downloads and sends a warning to
TCP and UDP and a variety of poten- the user to ensure that the download Scan for All Threats in a Single Pass
tially suspicious behaviors, such as is intended and approved. Prevent
The Palo Alto Networks Threat Preven-
repeated download patterns, the use attacks from new and rapidly changing
tion engine represents an industry first
of dynamic DNS, exploit attempts, domains by tying this feature to URL
by inspecting and classifying traffic,
and other key factors are tracked and Filtering and File Blocking policies.
and detecting and blocking both

Palo Alto Networks | Datasheet 3


Threat Prevention Throughput
malware and vulnerability exploits in a
single pass. Traditional threat preven-
Model Threat Throughput
tion technologies require two or more
scanning engines, which adds significant PA-200 50 Mbps
latency and dramatically slows through- PA-500 100 Mbps
put performance. Palo Alto Networks
uses a uniform signature format for all PA-2020 200 Mbps
threats to ensure speedy processing PA-2050 500 Mbps
by performing all analysis in a single,
PA-3020 1 Gbps
integrated scan, eliminating redundant
processes common to solutions that use PA-3050 2 Gbps
multiple scanning engines. PA-3060 2 Gbps
Our Threat Prevention technology PA-5020 2 Gbps
combs through each packet as it passes
PA-5050 5 Gbps
through the platform, looking closely at
byte sequences within both the packet PA-5060 10 Gbps
header and payload. From this analysis, PA-7050 100 Gbps*
were able to identify important details
about that packet, including the applica- PA-7080 180 Gbps*
tion used, source and destination, if the *DSRI-enabled
protocol is RFC compliant, and whether
the payload contains an exploit or arrival order and sequence of multiple signature matching happens within one
malware. Beyond individual packets, we packets to catch and prevent evasive scan, so your network traffic remains as
also analyze the context provided by the techniques. All of this analysis and fast as you need it to be.

4401 Great America Parkway 2015 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark
Santa Clara, CA 95054 of Palo Alto Networks. A list of our trademarks can be found at http://www.
Main: +1.408.753.4000 paloaltonetworks.com/company/trademarks.html. All other marks mentioned
Sales: +1.866.320.4788 herein may be trademarks of their respective companies.
Support: +1.866.898.9087 pan-ds-threat-prevention-092515

www.paloaltonetworks.com

You might also like