{"id":5625,"date":"2014-05-21T14:00:07","date_gmt":"2014-05-21T21:00:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5625"},"modified":"2014-06-03T16:43:34","modified_gmt":"2014-06-03T23:43:34","slug":"customer-spotlight-relieving-bandwidth-pressure-improving-security-animal-logic","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/05\/customer-spotlight-relieving-bandwidth-pressure-improving-security-animal-logic\/","title":{"rendered":"Customer Spotlight: Relieving Bandwidth and Security Pressure at Animal Logic"},"content":{"rendered":"<p><em>Customer Spotlight is our regular look at how various customers are using the Palo Alto Networks approach to enterprise security to solve their infrastructure challenges. Read more customer stories\u00a0<\/em><em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/customer-spotlight\/\" target=\"_blank\">here<\/a>.<\/em><\/p>\n<p>Based in Sydney, Animal Logic is one of the world\u2019s most accomplished digital studios, producing and developing groundbreaking animation, visual effects and design. Established in 1991, the studio has worked on some of the most recognizable films of the past quarter-century, including <em>The Matrix, Moulin Rouge, 300, The Great Gatsby, Iron Man 3<\/em> and more.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"200\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5629 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/268759_162942507109033_6039493_n.jpg\" alt=\"268759_162942507109033_6039493_n\" width=\"200\" height=\"200\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/268759_162942507109033_6039493_n.jpg 200w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/268759_162942507109033_6039493_n-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/05\/268759_162942507109033_6039493_n-40x40.jpg 40w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Much of Animal Logic\u2019s network traffic includes commercially sensitive, high quality audio, animation and visual effects content, and over time, it began experiencing Internet availability issues and reduced security as a result of inadequate firewalls and increasing user demand for bandwidth. In essence, its Internet connection kept maxing out and affected the company\u2019s ability to get work done.<\/p>\n<p><!--more--><\/p>\n<p>Eugene Purugganan, Systems Engineer at Animal Logic explained the issue: \u201cThe rise of Web 2.0 meant applications and other web-based\u00a0information were coming through the standard firewalls undetected. Our previous firewall needed to be upgraded because it didn\u2019t show IT staff what type of data was going through the firewall. A basic AV check doesn\u2019t cut it anymore when it comes to preventing threats. Meanwhile users were going around the firewall to get things through, by using proxies and tunneling applications or services that ran over the standard port 80 or 443.\u201d<\/p>\n<p>Animal Logic considered various firewall solutions but chose Palo Alto Networks because our next-generation firewall can identify traffic that traverses the network, while letting IT staff control access to applications and services to users who are authorized to do so. Since implementing Palo Alto Networks next-generation firewall, Animal Logic has been able to manage its network and security much more effectively, resulting in a more stable, consistent user experience.<\/p>\n<p>Check out Animal Logic\u2019s full story <a href=\"https:\/\/www.paloaltonetworks.com\/customers\/animal-logic.html\" target=\"_blank\">here<\/a>, and read coverage of Animal Logic\u2019s case study in <a href=\"http:\/\/www.theaustralian.com.au\/technology\/building-walls-of-security-logic\/story-e6frgakx-1226923005926\" rel=\"nofollow,noopener\"  target=\"_blank\">this story by The Australian<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Customer Spotlight is our regular look at how various customers are using the Palo Alto Networks approach to enterprise security to solve their infrastructure challenges. Read more customer stories\u00a0here. Based in Sydney, &hellip;<\/p>\n","protected":false},"author":48,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[295,410],"tags":[1815,145],"coauthors":[],"class_list":["post-5625","post","type-post","status-publish","format-standard","hentry","category-customer-spotlight","category-vertical","tag-firewall","tag-next-generation-firewall"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5625"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5625\/revisions"}],"predecessor-version":[{"id":5765,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5625\/revisions\/5765"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5625"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}