{"id":70139,"date":"2018-03-26T13:00:54","date_gmt":"2018-03-26T20:00:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=70139"},"modified":"2019-01-29T13:10:12","modified_gmt":"2019-01-29T21:10:12","slug":"customer-spotlight-temple-university-reduces-attack-surface-tam-service","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/03\/customer-spotlight-temple-university-reduces-attack-surface-tam-service\/","title":{"rendered":"Customer Spotlight: Temple University Reduces Attack Surface With TAM Service"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:50%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-70178 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/03\/CustomerReferenceGraphicsTwitter-03-1.png\" alt=\"CustomerReferenceGraphicsTwitter-03 (1)\" width=\"600\" height=\"300\" \/><\/span><\/div><\/p>\n<p>Home to a student and staff population of nearly 50,000, Temple University provides one of the most comprehensive and diverse learning environments in the United States. For a large university like Temple, enabling open access to a variety of network assets, while simultaneously protecting intellectual property and private information, is paramount.<\/p>\n<p>According to Larry Brandolph, Temple\u2019s chief information security officer, this large-scale accessibility gives the university\u2019s network infrastructure a wide footprint, making it highly susceptible to cyberattacks.<\/p>\n<p>Looking to reduce the network\u2019s overall attack surface, Temple chose Palo Alto Networks as a long-term technology partner and a source for the information needed to meet their current and future network security needs.<\/p>\n<p>Central to this partnership is the technical account manager service, or TAM, which provides continuous updates and recommendations on how to enhance the platform by implementing additional next-generation features. Moreover, the TAM serves as an internal advocate for product support and provides access to technical experts.<\/p>\n<p>With the help of their TAM and a third-party reseller, Temple\u2019s network services team deployed Palo Alto Networks Next-Generation Security Platform, including four <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/next-generation-firewall\/pa-7000-series\">PA-7050s<\/a>, two <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/next-generation-firewall\/pa-3000-series\">PA-3060s<\/a>, and subscriptions to <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/subscriptions\/threat-prevention\">Threat Prevention<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/subscriptions\/url-filtering-pandb\">URL Filtering (PAN-DB),<\/a> <a href=\"https:\/\/www.paloaltonetworks.com\/products\/management\/panorama\">Panorama<\/a>, Premium Support, and Technical Account Manager service.<\/p>\n<p>The team was pleased to see the following results:<\/p>\n<ul>\n<li>A maximized utilization and value of the Palo Alto Networks platform.<\/li>\n<li>Improved traffic visibility to enforce security rules and accelerate incident response.<\/li>\n<li>Simplified network segmentation for greater control while allowing openness for students.<\/li>\n<li>A reduction in network security complexity, trimming the number of rules from 800 to 600.<\/li>\n<li>Proactive insights and roadmapping from the TAM to continually enhance network security capabilities.<\/li>\n<\/ul>\n<p>Satisfied with the platform\u2019s technical capabilities, the university also sees the TAM service relieving internal staff of many time-consuming research activities. Brandolph says,<\/p>\n<p>\u201cNetwork security is a critical investment for Temple University, and we want to get the most we can out of that investment. Our TAM is helping us do that.\u201d<\/p>\n<p>Read the rest of the <a href=\"https:\/\/www.paloaltonetworks.com\/customers\/temple-university\">Temple University case study<\/a> to learn how large organizations can maximize internal resources while minimizing their attack surface with Palo Alto Networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read the Temple University case study to learn how large organizations can maximize internal resources while minimizing their attack surface with Palo Alto Networks.<\/p>\n","protected":false},"author":468,"featured_media":70178,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[295,3013,6717],"tags":[5684,5681,5678],"coauthors":[4977],"class_list":["post-70139","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-customer-spotlight","category-education","category-products-and-services","tag-professional-services","tag-tam","tag-temple-university"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/03\/CustomerReferenceGraphicsTwitter-03-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/70139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/468"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=70139"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/70139\/revisions"}],"predecessor-version":[{"id":70223,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/70139\/revisions\/70223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/70178"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=70139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=70139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=70139"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=70139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}