{"id":136618,"date":"2021-07-01T15:00:04","date_gmt":"2021-07-01T22:00:04","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=136618"},"modified":"2021-07-15T15:04:33","modified_gmt":"2021-07-15T22:04:33","slug":"pan-os-10-1-innovations","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2021\/07\/pan-os-10-1-innovations\/","title":{"rendered":"PAN-OS 10.1 Innovations Empower Complete Zero Trust Network Security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The pandemic has changed the way we work and conduct business for good. <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/01\/sase-hybrid-workforce\/\"><span style=\"font-weight: 400;\">Poll after poll confirms<\/span><\/a><span style=\"font-weight: 400;\"> that people \u201cdo not want to go back to the office full time, even once it\u2019s safe to do so.\u201d With hybrid work environments becoming the new norm, organizations are reconsidering their networking and security infrastructure to support this new reality.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Corporations need to ensure that their employees have optimal user experience wherever and whenever they work, while maintaining safe access to the right data and applications for the right users and devices. This is difficult to achieve in a hybrid cloud world where data, applications and user identity are spread across on-premises and cloud sources. Meanwhile, security teams are under pressure to secure the ever-increasing surface area of their organizations efficiently with finite people and limited resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks announced <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/05\/zero-trust-for-network-security\/\"><span style=\"font-weight: 400;\">Complete Zero Trust Network Security<\/span><\/a><span style=\"font-weight: 400;\"> to address these requirements and safeguard productivity in this new reality of a hybrid work environment. In addition to new services such as <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/sase\/saas-security\"><span style=\"font-weight: 400;\">SaaS Security service<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/advanced-url-filtering\"><span style=\"font-weight: 400;\">Advanced URL Filtering<\/span><\/a><span style=\"font-weight: 400;\"> and expanded <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/advanced-dns-security\"><span style=\"font-weight: 400;\">DNS security<\/span><\/a><span style=\"font-weight: 400;\"> capabilities, we introduced innovations in the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/pan-os\"><span style=\"font-weight: 400;\">core operating system<\/span><\/a><span style=\"font-weight: 400;\"> to continue to empower organizations to move toward Zero Trust.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The latest PAN-OS 10.1 innovations simplify identity-based security, simplify and consolidate decryption, enable you to manage firewalls efficiently by using open and programmable platforms, and deliver hyperscale security in physical and virtual environments. Let's look at some of the key innovations introduced in PAN-OS 10.1.\u00a0<\/span><\/p>\n<h2><a id=\"post-136618-_o4ukas4qdois\"><\/a>Simplify Zero Trust for Identity<\/h2>\n<p>Enterprises today find it hard to consistently verify their users and enforce identity-based security as user information is fragmented between different identity stores, such as Active Directory (on-premises), Okta (cloud), Azure AD (cloud) and more. This has led to network security operators struggling to secure their workforce and enable safe and secure access to applications and data. Configuring, maintaining and synchronizing the network security ecosystem with the multiple identity providers is time-consuming and resource-intensive, resulting in significantly increased effort and delayed projects.<\/p>\n<p>With <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/videos\/cloud-identity-engine-demo\">Cloud Identity Engine<\/a>, security teams can now consistently authenticate and authorize their users, regardless of location or where user identity stores live. As a result, security teams can effortlessly allow access to applications and data everywhere \u2013 cloud, on-prem or hybrid \u2013 to quickly move toward a Zero Trust security posture. The <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/06\/simplifying-identity-based-security\/\">Cloud Identity Engine<\/a> offers a cloud-based architecture and assures synchronization of all identity-related data in the cloud to apply controls everywhere in the enterprise: data center, campus, public cloud, branches and remote users. New identity sources can be configured in about 10 minutes, versus days or months, saving time in deployment and management of identity-based controls on your network security infrastructure.<\/p>\n<figure id=\"attachment_136619\" aria-describedby=\"caption-attachment-136619\" style=\"width: 1214px\" class=\"wp-caption alignnone\"><div style=\"max-width:100%\" data-width=\"1214\"><span class=\"ar-custom\" style=\"padding-bottom:50.99%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-136619 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/06\/word-image-69.png\" alt=\"Transition from on-premises to cloud identity with PAN-OS 10.1 innovations.\" width=\"1214\" height=\"619\" \/><\/span><\/div><figcaption id=\"caption-attachment-136619\" class=\"wp-caption-text\">On Premises to Cloud Identity<\/figcaption><\/figure>\n<h2><a id=\"post-136618-_yzabq8wb9pfy\"><\/a>Consolidate and Simplify Decryption<\/h2>\n<p>Deploying decryption is crucial before securing all content, however, deploying and maintaining decryption has been a challenge for the industry. Organizations that deploy third-party security controls as part of their overall security suite need to decrypt traffic multiple times to realize the benefits of their entire security stack. Doing so introduces operational complexity, increases network latency and negatively impacts the end-user experience. Although firewall vendors offer decryption, they seldom send all the traffic to third-party security tools, which creates blind spots. As a result, enterprises buy additional appliances such as SSL decryption and dedicated packet broker appliances to decrypt, filter and forward traffic to security tools, increasing cost and operational complexity.<\/p>\n<p>Palo Alto Networks makes it <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/08\/network-advances-in-decryption\/\">easy to deploy and maintain decryption<\/a> with comprehensive visibility, support for modern protocols, easy troubleshooting and new hardware Next-Generation Firewalls (NGFW) and Data Processing Cards with heavily accelerated performance. With <a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-1\/pan-os-new-features\/networking-features\/network-packet-broker\">Network Packet Broker<\/a> in PAN-OS 10.1, NGFWs by Palo Alto Networks can intelligently broker all types of traffic (Decrypted TLS, encrypted TLS and non-TLS) to a suite of third-party security tools from a single device. This allows customers to simplify their network and reduce capital and operating expenses with built-in decryption and broker on the NGFWs. In addition, network security teams can now optimize their network performance and maximize their existing security tools' efficacy by selectively sending only the necessary traffic to a given third-party security tool. For more information, download our \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/decryption-why-where-and-how\">Decryption: Why, Where and How<\/a>\u201d whitepaper.<\/p>\n<h2><a id=\"post-136618-_j72ijy8upvb6\"><\/a>Simplify Management of Zero Trust Network Security Infrastructure<\/h2>\n<p>Network operators face a challenge while trying to enforce Zero Trust across their network. In PAN-OS 10.1 we have introduced two new capabilities to simplify management to better enable your Zero Trust strategy across network security infrastructure.<\/p>\n<h4><a id=\"post-136618-_q5dyk3cemsh2\"><\/a>OpenConfig (OC)<\/h4>\n<p>Programmatically managing network services that span multiple network elements in their multi-vendor infrastructure can be difficult due to a lack of common schema\/model interfaces.<\/p>\n<p>With the support for OC vendor-neutral data models, Palo Alto Networks brings additional automation capabilities to the NGFWs. Customers can now manage NGFWs with OC to automate network service configuration across their infrastructure and stream telemetry to quickly resolve NGFW health and performance issues for their entire deployment.<\/p>\n<h4><a id=\"post-136618-_3gia7h1ho6bq\"><\/a>Scheduled Push<\/h4>\n<p>When it comes to managing configuration changes in the management tools, administrators accumulate all the changes and have to wait for the next change management window to push the changes to the firewalls. Change management windows are typically off hours to avoid outages and admins\u2019 need to be present to push the changes interactively during that time.<\/p>\n<p>With PAN-OS 10.1, we are making it simple for admins to automate configuration changes for all firewalls with Scheduled Push with <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/panorama\">Panorama<\/a> \u2013 a network security management solution. Schedule Push reduces human involvement during off hours. Admins can now schedule a one-time or recurring push to firewalls of their choice within Panorama, without having to be present. Admins can also efficiently push changes across their entire deployment in one single push. This also works for multi-virtual system (VSYS) firewalls, so if multiple device groups are mapped to different VSYS on a firewall, a single scheduled push can update the multi-VSYS firewalls. Panorama also gives you the ability to track all the changes. The execution of the scheduled push happens unsupervised, but all details are captured in system logs and configuration logs, including any errors.<\/p>\n<h2><a id=\"post-136618-_tkbrwh5z8r3f\"><\/a>Hyperscale Virtualized Network Security<\/h2>\n<p>In hyperscale data centers, the need to leverage compute resources as efficiently as possible is paramount. Service providers and enterprises alike strive to maximize efficiency to drive operating expenses down. This is one of the core reasons that organizations adopt virtualization, but it raises a question about how to effectively enforce Zero Trust Network Security in a virtual environment.<\/p>\n<p>With the new Intelligent Traffic Offload feature, the <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/vm-series-virtual-next-generation-firewall\">VM-Series<\/a> virtual NGFWs eliminate the tradeoff between security and cost in service provider and hyperscale data center environments. Organizations can extend Zero Trust Network Security posture to a virtualized infrastructure without breaking the bank or compromising network performance.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"1280\"><span class=\"ar-custom\" style=\"padding-bottom:56.25%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-136632 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/06\/word-image.gif\" alt=\"Turbocharge your VM series performance with Intelligent Traffic Offload Service by PAN-OS 10.1 innovations.\" width=\"1280\" height=\"720\" \/><\/span><\/div><\/p>\n<p>Find out how we\u2019re securing the new flexible workplace. For a complete list of new PAN-OS 10.1 innovations, please see our <a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-1\/pan-os-release-notes\/features-introduced-in-pan-os.html\">PAN-OS Release Notes<\/a>. Watch our virtual launch event on-demand: <a href=\"https:\/\/start.paloaltonetworks.com\/zero-trust-security-series#Episode-02\">Complete Zero Trust Network Security<\/a>. And get ready to secure productivity wherever it takes place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The latest PAN-OS 10.1 innovations empower organizations to move toward Zero Trust Network Security, simplifying identity, decryption and more.<\/p>\n","protected":false},"author":723,"featured_media":136658,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6717],"tags":[7806,5906,7434,7807,7808,758,7804,7810,73],"coauthors":[7809],"class_list":["post-136618","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-products-and-services","tag-cloud-identity-engine","tag-decryption","tag-identity","tag-network-packet-broker","tag-openconfig","tag-pan-os","tag-pan-os-10-1","tag-simplifying-network-operations","tag-zero-trust","net_sec_category-next-generation-firewalls","net_sec_category-zero-trust-security"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/06\/Brainstorm.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/136618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=136618"}],"version-history":[{"count":11,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/136618\/revisions"}],"predecessor-version":[{"id":138355,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/136618\/revisions\/138355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/136658"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=136618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=136618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=136618"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=136618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}