{"id":2879,"date":"2012-10-03T08:00:33","date_gmt":"2012-10-03T15:00:33","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=2879"},"modified":"2022-04-05T02:31:18","modified_gmt":"2022-04-05T09:31:18","slug":"perspective-on-the-citrix-and-palo-alto-networks-partnership","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2012\/10\/perspective-on-the-citrix-and-palo-alto-networks-partnership\/","title":{"rendered":"Perspective on the Citrix and Palo Alto Networks Partnership"},"content":{"rendered":"<p>Hi, I'm Chad Kinzelberg. I run corporate and business development at Palo Alto Networks and I'm here to share my perspective on the Citrix\/Palo Alto Networks partnership that we announced today.<\/p>\n<p><object id='CitrixTVEmbed6574' class='CitrixTVEmbed'><param name='ctvId' value='6574' \/><param name='width' value='480' \/><param name='height' value='270' \/><param name='hd' value='false' \/><param name='autoStart' value='false' \/><\/object><SCRIPT type='text\/javascript'>\/* <![CDATA[ *\/var CITRIXWS=CITRIXWS||{};(function(){var playerId='CitrixTVEmbed6574',c=window.CITRIXWS;if(!(c.ctvPlayer)){c._ctvq=c._ctvq||[];c._ctvq.push(playerId);var ctv=document.createElement('script');ctv.type='text\/javascript';ctv.async=true;ctv.src='https:\/\/www.citrix.com\/static\/ctv\/player\/js\/CitrixTVEmbed.js';var s=document.getElementsByTagName('script')[0];s.parentNode.insertBefore(ctv,s)}else{c.ctvPlayer.Embedder.createPlayer(playerId)}})();\/* ]]> *\/<\/SCRIPT><\/p>\n<p>As many of you may know, Palo Alto Networks pioneered <a href=\"http:\/\/www.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noopener\">next-generation firewalls.<\/a>\u00a0 We build a firewall that uses policies based on applications, users, and content \u2013 not the traditional stateful inspection technology that most organizations have used for the last decade. \u00a0With a focus on what we call safe application enablement \u2013 which means that organizations can use almost any application without taking on unnecessary risk \u2013 we've built a customer base of over 9,000 enterprise customers in 5 years of selling firewalls. \u00a0Our next-generation firewall enables these organizations to allow users to employ a diverse set of applications \u2013 SaaS, cloud, social, mobile applications - but mitigate the associated risk. \u00a0We use the phrase, \"allow, but\u2026\" to signify this \u2013 allow, but scan for threats, or limit to certain users, or limit function, or limit bandwidth consumption, etc. \u00a0Like Citrix, we've been recognized externally for our leadership in our core market (in our case, the <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/threat-prevention\" target=\"_blank\" rel=\"noopener\">network security\u00a0market<\/a>) by folks like Gartner and Forrester.<\/p>\n<p>To me, the most interesting element of this partnership is that two leaders in their respective spaces have come together to enable customers to get things done better and faster. \u00a0I would argue that Citrix has the most comprehensive view of application delivery in the market. \u00a0It isn't just enterprise web application delivery controllers that Citrix focuses on, but a picture that includes delivery of web applications, desktop applications, enterprise apps of varying architectures, distributed apps, and importantly, cloud-based applications. \u00a0Similarly, Palo Alto Networks has the most comprehensive view of network security in the market \u2013 with a solution that effectively narrows the attack surface of the network (without impeding business), and protects against known and unknown threats \u2013 across all users and applications, regardless of location. \u00a0For customers, the benefit of this partnership includes both those comprehensive strategies, delivered in an increasingly integrated manner. \u00a0Today, we announced <a href=\"http:\/\/www.paloaltonetworks.com\/citrix\" target=\"_blank\" rel=\"noopener\">deployment guides<\/a> for several key applications. \u00a0We're also working to align not only products, but services and support as well \u2013 so customers get an integrated approach to application delivery and security, without the serious functional compromises that almost always come with a single-vendor, \"integrated\" approach. \u00a0<\/p>\n<p>In other words, we\u2019re delivering best-in-class delivery and security, without the figure-it-out-yourself, do-it-yourself integration. \u00a0I think because of the tremendous value enterprises will find in this partnership, you'll see a lot more from Citrix and Palo Alto Networks together.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hi, I'm Chad Kinzelberg. I run corporate and business development at Palo Alto Networks and I'm here to share my perspective on the Citrix\/Palo Alto Networks partnership that we announced today. As &hellip;<\/p>\n","protected":false},"author":28,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[75,5],"tags":[1818],"coauthors":[710],"class_list":["post-2879","post","type-post","status-publish","format-standard","hentry","category-data-center-2","category-firewall","tag-partners"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2879"}],"version-history":[{"count":28,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2879\/revisions"}],"predecessor-version":[{"id":2910,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2879\/revisions\/2910"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2879"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=2879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}