GlobalProtect

GlobalProtect: Consistent Security Everywhere

Whether your users check email from home, or update corporate documents from the airport, most of them work outside of your office at times. Workforce mobility improves productivity and flexibility, but it also introduces significant network security risks. Every time a user works on their laptop outside your building, they bypass your corporate firewall and the associated policies designed to protect them and your network. GlobalProtect extends the same next-generation firewall-based policies that are enforced within your office to all of your users, regardless of their location.

Learn more about the Mobile Security and VPN Features.

GlobalProtect Datasheet

A logical perimeter protects roaming users

GlobalProtect expands the boundaries of your physical network, effectively establishing a logical secure perimeter that protects remote laptop and mobile device users. When a remote user logs into your network with their device, GlobalProtect automatically determines the best gateway available and establishes a secure connection. Laptop and mobile devices stay connected to your network at all times, and are protected as if they never left your office.

Standardised control over users and devices

GlobalProtect ensures that the same secure application enablement policies that protect users at your corporate site are enforced for all of your users, no matter where they are located. This eliminates the operational challenges associated with creating and managing separate policies for corporate firewalls and remote users. In addition to your policy criteria for applications, users and content, GlobalProtect enables you to set security policies based on the health or status of the device in use. For example, you can require a specific security level for a Microsoft Windows-based or Apple Mac OS X device, such as having the latest operating system patches installed, before being allowed to access sensitive applications.

VPN secure remote access

GlobalProtect lets remote users access your network by automatically establishing either an SSL-or IPSec-based VPN connection, depending on location and configuration. This remote access connection is authenticated through one of several mechanisms: local DB, RADIUS, LDAP, Active Directory, Kerberos or Smart cards. Once a secure connection is established, users are protected by the same security policies as your on-site users.

Built-in intelligence delivers superior user experience

Designed to be as non-intrusive as possible, GlobalProtect automatically discovers the optimal gateway for a given location, confirms the security policy and establishes a connection to your network using single sign-on. The result is a superior and transparent experience for your user that is consistent, regardless of location.

Platform support

  • Windows XP, Vista, Windows 7, Windows 8, Windows 8.1
  • Android 4.0.3 and later
  • Mac OS X 10.6 and later
  • Apple iOS 6.0 and later
  • Linux (using vpnc)

Resources

Palo Alto Networks Firewall Overview

Palo Alto Networks Next Generation Firewall Overview

Palo Alto Networks Panorama

Panorama provides centralised policy and device management over a network of Palo Alto Networks™ next-generation firewalls.

Palo Alto Networks VM-Series Datasheet

The Palo Alto Networks™ VM-Series extends secure application enablement into virtualised environments while addressing key virtualisation security challenges: tracking security policies to virtual machine movement with dynamic address objects and integration with orchestration systems using a powerful XML management API.

Palo Alto Networks Wildfire

WildFire automatically protects your networks from new and customised malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends the threat prevention capabilities of the next-generation firewall to tackle some of the most challenging threats in the world today, and does so with full visibility and enforcement at up to 10Gbps.

Quotation Configuration

Your Name (required)

Company (required)

Your Email (required)

Telephone (required)

Number of Users (required)

Number of Connections

Size of each connection:
Connection 1:
Connection 2:
Connection 3:
Connection 4:
Connection 5:

Security Subscriptions

WildfireGlobal ProtectURL FilteringThreat Prevention

Standard Support & Maintenance:
Premium Support & Maintenance:

Additional Comments

Please leave this field empty.

Please leave this field empty.

Book Your Palo Alto Networks Demo:

Krome Technologies can provide you with an online or onsite demonstration specifically showing you the fundamentals of Palo Alto Networks solutions, these demonstrations can be tailored to show you whatever you want to review, our consultants can give you a brief overview demonstration or deep dive technically depending on your interest, requirement or specific requests.

Alternatively we can organise for an evaluation unit to be sent to you for an agreed period to run on your own network.

Please note that required fields are highlighted with an asterisks*

Your Name*

Company Name*

Job Title*

Telephone Number*

Email Address*

Mobile Number

Company Address:

Approximate amount of users*:

Additional information or demo specific requests, please indicate if you would like an online demo, or evaluation unit for example:

Once we have received the request, we will endeavor to contact you within 24hours to discuss your demo requirements and schedule a convenient time for your Palo Alto Networks demo or evaluation to take place.


{embed_post:post_title}

Products

Products

Next-generation firewalls enforce network security policies based on applications, users, and content