{"id":72539,"date":"2018-04-16T11:45:39","date_gmt":"2018-04-16T18:45:39","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=72539"},"modified":"2019-01-29T13:18:06","modified_gmt":"2019-01-29T21:18:06","slug":"digital-transformation-gets-easier-security-just-works","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/04\/digital-transformation-gets-easier-security-just-works\/","title":{"rendered":"Digital Transformation Gets Easier When Security Just Works"},"content":{"rendered":"<p>When I ask customers what they like about Palo Alto Networks, their answer is consistent: it just works. They can operate efficiently and prevent successful cyberattacks. Our <a href=\"https:\/\/www.paloaltonetworks.com\/products\/security-operating-platform\"><strong>Security Operating Platform <\/strong><\/a>is built for automation \u2013 it <em>has<\/em> to be easy to operate if we\u2019re going to help our customers achieve digital transformation.<\/p>\n<p>You may not recognize the name \u201cSecurity Operating Platform\u201d because we have recently changed it from \u201cNext-Generation Security Platform.\u201d We feel this new name better reflects its unique value. The components of the platform are integrated, making it easy to <em>operate<\/em> and automate manual tasks.<\/p>\n<p>In <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/02\/digital-transformation-starts-people-accepting-change\/\">my last blog<\/a> post, I noted that the hardest part of digital transformation isn\u2019t deciding on vendors or deploying new technologies, but instead getting people to think differently and change how they work. One of the recommendations shared, based on what I\u2019ve been hearing for months now in my time spent with our customers and partners, is that organizations should bring stakeholders together and out of their silos to create cross-functional teams.<\/p>\n<p>Whether we call these teams \u201cagile\u201d or something else, this mode of working requires support from a platform that can automate workflows, meet compliance and provide consistent enforcement across network, cloud and endpoints. If the technology is not designed to support workflow across the environment, it is not going to support these cross-functional teams.<\/p>\n<p>We continue to expand the platform and add automation. A decade ago, we invented the Next-Generation Firewall, enabling organizations to adopt security best practices using app-, user- and content-based policies and applying a Zero Trust approach throughout. We added cloud-based security services for threat detection and prevention in what we call our first evolution. These services use the next-generation firewalls as sensors and for automated enforcement. In our second evolution, we extended the platform to include endpoint and cloud security. The security services integrate with the cloud and endpoint security to share intelligence and automate enforcement.<\/p>\n<p>Now, in our third evolution, we have further extended our automated approach to ecosystem partners. Innovative apps developed by us, by third parties, or by your own teams, can access a security data set that is specific to your environment, as well as access shared threat intelligence. The apps can monitor, detect and report on threats, automate workflows, and meet compliance. As threats evolve, we believe automation and analytics that work across cloud, network and mobile devices are required to detect and stop sophisticated attacks.<\/p>\n<p>We\u2019ll <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/04\/find-us-rsa-conference-2018\/\">see you at RSA Conference this week<\/a> and hopefully at our <a href=\"https:\/\/ignite.paloaltonetworks.com\/usa?CampaignId=7010g000001IH8U&amp;utm_content=Ignite18USA&amp;utm_medium=SocailMedia&amp;utm_source=ResourceCenter\">Ignite \u201918 Security Conference<\/a> next month, where we\u2019ll be celebrating disruption and digital transformation. I look forward to hearing from you \u2013 come experience our Security Operating Platform for yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Janet Matsuda, SVP Product Marketing at\u00a0Palo Alto Networks, talks about our Security Operating Platform and helping our customers achieve digital transformation<\/p>\n","protected":false},"author":505,"featured_media":72554,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,6717,1229],"tags":[5395,5777],"coauthors":[5398],"class_list":["post-72539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-products-and-services","category-security-platform","tag-digital-transformation","tag-security-operating-platform"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/04\/Security-Operating-Platform.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/72539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/505"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=72539"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/72539\/revisions"}],"predecessor-version":[{"id":72593,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/72539\/revisions\/72593"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/72554"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=72539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=72539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=72539"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=72539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}