Wednesday, July 31, 2019

NextWave Enhancements Drive Record-Breaking Quarter for Partners

It's a wonderful time to become a NextWave partner. Together, we still seize new growth possibilities. Our disruptive technologies differentiate us in the competition, and our recently enhanced partner program is fueling mutual success.

Whenever we launched our NextWave enhancements in Feb, we highlighted our objectives to improve program versatility, fuel lengthy-term partner growth, and accelerate the transition to partner-delivered services. We delivered eight (8) new profitability initiatives and three (3) new possibilities to help you build or expand the services you provide-brought business, so we automated three (3) significant business systems to optimize partner productivity.

This month, we shown the program’s versatility and our dedication to assisting you maximize profitability by having an additional three incentives that reward you for incorporating our latest innovations to your customer choices.



Your adoption from the NextWave enhancements continues to be phenomenal. In only three several weeks, we’re seeing partners achieve growth levels which are in front of what we should expected this early in to the new program. In Q3 FY19, our most lately completed quarter, partners drove some jaw-shedding results:

  • Nearly 400 partners saw their companies grow by 100% annually
  • Partners initiated an archive-breaking rise in pipeline with 59% YoY growth
  • Partners guaranteed an archive-breaking 2,000  new clients
  • Partner-initiated bookings increased 63% annually


Additionally to the enhanced NextWave program, we lately completed our global partner satisfaction survey the response was unparalleled, and also the answers are much more impressive. Yearly, we invite you to definitely rank every aspect of our funnel strategy. The feedback you provide is crucial to shaping our funnel strategy therefore we stand above altering market dynamics. This season over 4,200 partners completed laptop computer - a business record. The best of this: you rated Palo Alto Systems because the No. 1 cybersecurity vendor within the following critical partnership areas:

  • Profitability
  • Margins
  • Revenue
  • Growth
  • Product satisfaction
  • Expertise possibilities


Once we evolve along with you in to the services-driven economy, we're pleased that all over the world, you've accepted the enhancements we brought to fuel mutual business growth and let more partner-brought services. The expertise chance around Palo Alto Systems product choices ranks 50% more than the following greatest industry vendor. Based on you, we're the obvious leader for brand new growth possibilities, outranking your competition by 300%.

“Some from the new enhancements towards the NextWave program are key products we've been requesting to assist Sirius deliver a lot of solutions and services our clients have to drive better engagement and loyalty,” stated Deborah Bannworth, senior v . p . for Proper Alliances, Inside Sales & Maintenance Services from Sirius Computer Solutions, Corporation.

We still listen, learn, and act to aid our NextWave partners in building effective Palo Alto Systems security-based practices. The success you’re seeing in the changes we’ve designed to help grow your company is encouraging. We expect to remaining your lover of preference and winning together!

Sunday, July 28, 2019

See the Unseen in AWS Mirrored Traffic With the VM-Series

Gain Complete Visibility and Eliminate Network Blind Spots in AWS Cloud


AWS’ inaugural security event re:Inforce is finally here. Furthermore, the wedding marks the launch of another exciting new feature from AWS: VPC Traffic Mirroring. This selection supplies a non-intrusive method to enable network visibility to your AWS deployments without requiring significant design changes to virtual network architecture.

Equally exciting, Palo Alto Systems has generated an integration of their VM-Series Virtualized Next-Generation Firewall with AWS traffic mirroring capacity. The VM-Series may be the industry-leading virtualized firewall protecting your applications and knowledge with next-generation security measures that deliver superior visibility, precise control, and threat prevention in the application level.

The VM-Series has supported AWS cloud since 2014 with inline security protections for application workloads running within the cloud. Based on Mukesh Gupta, v . p . of Product Management at Palo Alto Systems, “Enterprises require consistent peace of mind in the cloud without having to sacrifice deployment versatility and selection. Together with inline threat prevention abilities, the combination from the VM-Series using the recently announced AWS traffic mirroring capacity gives organizations an option to deploy the firewall out-of-band for application visibility and advanced threat recognition in AWS cloud.”



The VM-Series on AWS deployed from band now supports two critical security outcomes in AWS cloud:

  • Granular visibility into application traffic and recognition of network-borne threats through inspection of mirrored traffic.
  • Rapid recognition and response against advanced attacks utilizing an AI-driven approach, for example Cortex by Palo Alto Systems.


Application visibility and threat recognition


The VM-Series on AWS can evaluate, filter, and process the raw data available with the AWS traffic mirroring capacity within AWS cloud and supply contextually wealthy application, content, and threat information. The requirement for removing data from AWS cloud for more processing is eliminated, saving cost and supplying deep understanding of network traffic. According to this more in-depth inspection, customers can pick to allow alerts for an array of security issues, for instance:

  • High priority security alerts: Attacks for known exploits, for instance, an effort to take advantage of CVE-2017-5638 for Apache Struts-based web servers running in AWS. Mainly, the VM-Series is becoming an invasion recognition system (IDS).
  • Visitors to inappropriate, malicious destinations and command-and-control systems: identify when the source/destination is inappropriate or malicious, whether you will find geoblocking limitations to become met, or maybe there's bitcoin traffic or perhaps an SSH session to some known command-and-control (C2) domain.


In line with the visibility and recognition (in logs), you are able to filter for occasions, and let alerts and actions that may trigger removal using Action-Oriented log forwarding using HTTP(S). This gives a webhook to produce a ticket inside a service desk system or perhaps a security orchestration and response tool, for example Demisto, or launch an AWS Lambda function, which could quarantine by shutting lower the instance or lock lower the safety Group.

Rapid recognition and response against advanced attacks


The VM-Series firewall supports enhanced application logging, which converts raw packet data from AWS mirrored network traffic into context-aware network activity information for storage in Palo Alto Systems cloud services, including Cortex Data Lake. Security applications, for example Cortex XDR, can begin analyzing the wealthy data collected, using analytics and machine understanding how to identify stealthy attacks and expedite security investigations precisely. Identified threats could be mitigated through automated response from Demisto along with other security orchestration and response tools.

Success Secrets: How you can Pass PaloAlto Certification Exams in first attempt