{"id":32434,"date":"2017-06-13T11:15:15","date_gmt":"2017-06-13T18:15:15","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=32434"},"modified":"2017-12-08T14:06:13","modified_gmt":"2017-12-08T22:06:13","slug":"palo-alto-networks-application-framework","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/06\/palo-alto-networks-application-framework\/","title":{"rendered":"Accelerating Security Innovation: Introducing the Palo Alto Networks Application Framework"},"content":{"rendered":"<p>At Palo Alto Networks, we strive to provide the most compelling security to our customers, delivered with the utmost consistency across the network, endpoint and cloud. We are trusted by more than 39,500 customers to protect their organizations, prevent cyberattacks, and help maintain trust in the digital age. Our decade-long journey was founded on two words: innovation and disruption. The time has come to once again help change the future of the security industry, but this time we aren\u2019t forging the way by ourselves \u2013 we are building on everything we have done and dramatically changing the consumption model for the most comprehensive security achievable. It is time to unleash security innovation, entrepreneurship and better protection for our customers.<\/p>\n<p>The <a href=\"http:\/\/go.paloaltonetworks.com\/applicationframework\">Palo Alto Networks Application Framework<\/a>, announced today at our Ignite 2017 conference in Vancouver, reinvents how our customers rapidly adopt the most\u00a0<span class=\"s1\">innovative<\/span> new security technologies, consumed via cloud-based apps developed by any provider, large or small.<\/p>\n<p>The framework is built on top of the Palo Alto Networks Next-Generation Security Platform, allowing our customers to access, evaluate and adopt emerging new security technologies, as an extension of the infrastructure they already own and operate. These apps can be built by us, by third-party partners, by MSSPs and by customers directly to solve any use case imaginable.<br \/>\n<div style=\"max-width:100%\" data-width=\"2999\"><span class=\"ar-custom\" style=\"padding-bottom:51.12%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-53382 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/platform-diagram-dec-2017-final_full-2.png\" alt=\"platform-diagram-dec-2017-final_full\" width=\"2999\" height=\"1533\" \/><\/span><\/div><br \/>\nIt\u2019s time to elevate this discussion beyond the level of individual products and vendors. Now, customers can embrace the technology they need to keep up with the ever-changing threat landscape, not make security decisions based on the typically large upfront ROI risk and cost of deploying and managing new hardware. It is not reasonable to ask security teams to differentiate workflows and derive actionable next steps from a mountain of threat intelligence, throwing manpower and new products at the challenges, only to find the next day that the threats and specific resource needs have once again shifted.<\/p>\n<p>The answer is to drive a level of innovation that is at least as speedy, flexible and adaptive as attackers themselves. Our journey here is beginning, but we can\u2019t do this alone. Delivering on this promise takes an entire community of developers and entrepreneurs to solve the most challenging security use cases facing our customers today.<\/p>\n<p><strong>Meet Our Community<\/strong><\/p>\n<p><div style=\"max-width:100%\" data-width=\"1480\"><span class=\"ar-custom\" style=\"padding-bottom:52.57%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-48990 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/Apollo-Blog.png\" alt=\"Apollo Blog\" width=\"1480\" height=\"778\" \/><\/span><\/div><\/p>\n<p><span class=\"s1\">The Application Framework will feature apps developed by security providers of all sizes, including expected collaboration from over 30 leading vendors, such as:<\/span><\/p>\n<p>Accenture<br \/>\nAlgoSec<br \/>\nAnomali<br \/>\nAruba, a Hewlett Packard Enterprise company<br \/>\nAttivo Networks<br \/>\nBlackStratus<br \/>\nBooz Allen Hamilton<br \/>\nCarbon Black<br \/>\nCrowdStrike<br \/>\nExtraHop<br \/>\nFidelis<br \/>\nFireMon<br \/>\nForeScout<br \/>\nFourV Systems<br \/>\nHYAS<br \/>\nIBM<br \/>\nPhantom<br \/>\nPhishMe<br \/>\nPortnox<br \/>\nProofpoint<br \/>\nProtectWise<br \/>\nRecorded Future<br \/>\nSafeBreach<br \/>\nSchlumberger<br \/>\nSecurityScorecard<br \/>\nSiemplify<br \/>\nSift Security<br \/>\nSisense<br \/>\nSplunk<br \/>\nSqrrl<br \/>\nSwimlane<br \/>\nTanium<br \/>\nTelstra<br \/>\nTenable<br \/>\nThreatQuotient<br \/>\nTufin<br \/>\nWandera<\/p>\n<p><strong>Become an Application Developer for Palo Alto Networks Application Framework<\/strong><\/p>\n<p>Today we also announced the formation of a $20 million security venture fund. The fund will provide early stage capital investments to fuel development of innovative security applications. The fund expects to collaborate with Greylock Partners and Sequoia Capital to identify and evaluate innovative security applications for potential co-investment. Prospective developers can sign up for review by our Corporate Development team and VC partners <a href=\"http:\/\/paloaltonetworks.com\/products\/application-framework\/venture-capital.html\">here<\/a>.<\/p>\n<p><strong>Learn More<\/strong><\/p>\n<p>You\u2019ll be hearing a lot from us in the coming weeks and months about the Palo Alto Networks Application Framework and everything our community is doing to support it. Regularly here on the blog, we\u2019ll be profiling the industry vendors who have signed on to be part of our vision \u2013 and how they plan to support it. Plus, there will be plenty of opportunities to engage with us as we anticipate full availability of the framework in early 2018.<\/p>\n<p>For more:<\/p>\n<ul>\n<li><a href=\"http:\/\/go.paloaltonetworks.com\/applicationframework\">Visit our Palo Alto Networks Application Framework resources page<\/a><\/li>\n<li><a href=\"http:\/\/go.paloaltonetworks.com\/loggingservice\">Read about our new Palo Alto Networks Logging Service<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2017\/palo-alto-networks-ushers-in-the-future-of-security-innovation-with-new-cloud-based-application-framework\">Read today\u2019s press releases on the framework and our venture fund<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/products\/designing-for-prevention\/security-platform\">Get a deep dive into our Next-Generation Security Platform and all its benefits<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Accelerating security innovation: introducing the Palo Alto Networks application framework.<\/p>\n","protected":false},"author":41,"featured_media":33862,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308],"tags":[3844,3582],"coauthors":[776],"class_list":["post-32434","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","tag-palo-alto-networks-application-framework","tag-security-platform"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/apollo-af-social-suite-blog11.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/32434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=32434"}],"version-history":[{"count":15,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/32434\/revisions"}],"predecessor-version":[{"id":53415,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/32434\/revisions\/53415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/33862"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=32434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=32434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=32434"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=32434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}