Content-ID

Content-ID: High-Performance Threat Prevention

Content-ID gives you a real-time threat prevention engine, combined with a comprehensive URL database, and elements of application identification to:

  • Limit unauthorised data and file transfers
  • Detect and block exploits, malware and malware communications
  • Control unapproved web surfing

The application visibility and control of App-ID, coupled with the content inspection enabled by Content-ID, empowers your IT team to regain control over your application traffic and related content.

Learn more about the IPS, Antivirus, URL Filtering, and Data Filtering Features.

Integrated IPS and Anti-Malware

Content-ID provides you with fully integrated protection from vulnerability exploits, malware and malware generated command-and-control traffic. As with all Palo Alto Networks analysis, threat prevention is applied in full application and protocol context – across all your traffic and ports – to ensure that threats are detected and blocked, despite evasion attempts. Our threat prevention technologies include:

  • NSS Recommended IPS – IPS functionality blocks vulnerability exploits, buffer overflows, DoS attacks and port scans. Additional capabilities, like blocking invalid or malformed packets, IP defragmentation and TCP reassembly, protect you from the evasion and obfuscation methods used by attackers.
  • Stream-Based Network Antivirus – Palo Alto Networks maintains a database of more than 15 million samples of malware. Every day we analyse an additional 50,000 samples. Malware is detected by a stream-based engine that blocks in-line at very high speeds. Malware enforcement is available to you across a variety of protocols including HTTP, SMTP, IMAP, POP3, FTP and SMB.
  • Anti-Spyware – In addition to controlling viruses and malware, Content-ID stops spyware and malware communications including:
    • Botnet communications
    • Browser hijacks
    • Adware
    • Backdoor behavior
    • Keyloggers
    • Data theft
    • Net-worms
    • Peer-to-peer traffic

Our Anti-Spyware also passively analyses DNS queries to identify the unique patterns of botnets. This reveals infected users and prevents data from leaving your enterprise.

URL Filtering.

Our fully integrated URL filtering database lets you more easily and effectively enforce your policies for web browsing, which complements the policy-based application visibility and control delivered by our next-generation firewalls. Tie your URL filtering visibility and policy controls to specific users through transparent integration with enterprise directory services like Active Directory, LDAP and eDirectory. You can gain even more insight into your URL filtering by generating customisable reports and through log analysis.

  • Securely enable web usage with the same policy control mechanisms that you apply to applications – allow, allow and scan, apply QoS, block and more.
  • Reduce malware incidents by blocking access to known malware and phishing download sites.
  • Tailor your web filtering control efforts by creating white lists (allow), black lists (block), or through custom categories and database customisation.
  • Facilitate and hone your SSL decryption policies. For example, “don’t decrypt traffic to financial services sites,” but “decrypt traffic to blog sites.”

File and Data Filtering.

The data filtering features in Content-ID enable you to implement policies that reduce the risks associated with the transfer of unauthorised files and data.

  • File blocking by type: Control the flow of a wide range of file types by looking deep within the payload to identify the file type (as opposed to looking only at the file extension).
  • Data filtering: Control the transfer of sensitive data patterns such as credit card and social security numbers in application content or attachments.
  • File transfer function control: Control file transfer functionality within an individual application, allowing application use while preventing undesired inbound or outbound file transfers.

Resources

Palo Alto Networks Firewall Overview

Palo Alto Networks Next Generation Firewall Overview

Palo Alto Networks Panorama

Panorama provides centralised policy and device management over a network of Palo Alto Networks™ next-generation firewalls.

Palo Alto Networks VM-Series Datasheet

The Palo Alto Networks™ VM-Series extends secure application enablement into virtualised environments while addressing key virtualisation security challenges: tracking security policies to virtual machine movement with dynamic address objects and integration with orchestration systems using a powerful XML management API.

Palo Alto Networks Wildfire

WildFire automatically protects your networks from new and customised malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends the threat prevention capabilities of the next-generation firewall to tackle some of the most challenging threats in the world today, and does so with full visibility and enforcement at up to 10Gbps.

Quotation Configuration

Your Name (required)

Company (required)

Your Email (required)

Telephone (required)

Number of Users (required)

Number of Connections

Size of each connection:
Connection 1:
Connection 2:
Connection 3:
Connection 4:
Connection 5:

Security Subscriptions

WildfireGlobal ProtectURL FilteringThreat Prevention

Standard Support & Maintenance:
Premium Support & Maintenance:

Additional Comments

Please leave this field empty.

Please leave this field empty.

Book Your Palo Alto Networks Demo:

Krome Technologies can provide you with an online or onsite demonstration specifically showing you the fundamentals of Palo Alto Networks solutions, these demonstrations can be tailored to show you whatever you want to review, our consultants can give you a brief overview demonstration or deep dive technically depending on your interest, requirement or specific requests.

Alternatively we can organise for an evaluation unit to be sent to you for an agreed period to run on your own network.

Please note that required fields are highlighted with an asterisks*

Your Name*

Company Name*

Job Title*

Telephone Number*

Email Address*

Mobile Number

Company Address:

Approximate amount of users*:

Additional information or demo specific requests, please indicate if you would like an online demo, or evaluation unit for example:

Once we have received the request, we will endeavor to contact you within 24hours to discuss your demo requirements and schedule a convenient time for your Palo Alto Networks demo or evaluation to take place.


{embed_post:post_title}

Products

Products

Next-generation firewalls enforce network security policies based on applications, users, and content