{"id":8068,"date":"2015-02-03T10:45:57","date_gmt":"2015-02-03T18:45:57","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8068"},"modified":"2022-04-12T23:16:38","modified_gmt":"2022-04-13T06:16:38","slug":"palo-alto-networks-solving-governments-data-center-security-challenges","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/02\/palo-alto-networks-solving-governments-data-center-security-challenges\/","title":{"rendered":"Palo Alto Networks: Solving Government\u2019s Data Center Security Challenges"},"content":{"rendered":"<p>Governments worldwide are working hard to implement a number of changes in their data center infrastructures. Some have major data center consolidation projects underway, such as the Federal Data Center Consolidation Initiative in the U.S. Others are taking advantage of the benefits of virtualization or moving to Shared Services models. Finally, many are deciding if a public cloud infrastructure is appropriate for some of their government business. To cater to the U.S. government\u2019s interest in the public cloud, Amazon Web Services (AWS) has developed specialized cloud services, GovCloud and Commercial Cloud Services (C2S) for the Intelligence Community, designed specifically for U.S. government customers.<!--more--><\/p>\n<p>Having so much to consider for their data center infrastructure plans, security is certainly top of mind.\u00a0 Here at Palo Alto Networks, we\u2019re doing all we can to support governments as they secure their cyber infrastructure. We have been working with numerous customers \u2013 including many in the U.S. federal sector \u2013 to evolve their infrastructure, securely, regardless of the stage in their data center transitions.<\/p>\n<p>Recently, we worked with MeriTalk to develop a \u201chealth check\u201d with U.S. federal government agencies (<a href=\"http:\/\/www.meritalk.com\/heart-of-network.php?mkt_tok=3RkMMJWWfF9wsRolvK3PZKXonjHpfsX56OQtXKezlMI%2F0ER3fOvrPUfGjI4ETcJlI%2BSLDwEYGJlv6SgFSrLNMapoz7gLXxQ%3D\" target=\"_blank\" rel=\"noopener\">read the full report here<\/a>). The survey queried 300 U.S. Federal IT managers about what security issues were top of mind as they implement changes to their data centers. The results are fascinating and show that many government agencies share common security concerns in their data center and cloud planning.<\/p>\n<p>The good news is that our portfolio provides security solutions that protect customer data no matter where the government is in their data center evolution. Palo Alto Networks is able to solve many of the <a href=\"http:\/\/www.meritalk.com\/heart-of-network.php?mkt_tok=3RkMMJWWfF9wsRolvK3PZKXonjHpfsX56OQtXKezlMI%2F0ER3fOvrPUfGjI4ETcJlI%2BSLDwEYGJlv6SgFSrLNMapoz7gLXxQ%3D\" target=\"_blank\" rel=\"noopener\">security challenges the survey respondents identified<\/a> with their current data center security solutions. Let's look at a few of them:<\/p>\n<p><strong>Integration challenges<\/strong><\/p>\n<p>Integration can mean many things, but when it comes to data center security it typically refers to how well the solution can tie into the existing physical or virtualized network infrastructure. To integrate easily into an existing physical data center network, each <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/next-generation-firewall\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Next-Generation Firewal<\/a>l supports a range of network modes, including L2, L3, Virtual Wire and mixed mode. Virtual Wire makes our Next-Generation Firewalls truly transparent network device, looking much like a bump in the wire which solves many customer network integration challenges and can be used in both Active-Passive and Active-Active high availability modes.<\/p>\n<p>From a virtualized computing environment perspective, integration means how tightly the security solution ties into the hypervisor and orchestration tools in use. <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/vm-series-virtual-next-generation-firewall\" target=\"_blank\" rel=\"noopener\">The Palo Alto Networks VM-Series<\/a> of virtualized firewalls allows customers to deploy the exact same next-generation firewall and advanced threat prevention features used in our physical appliances in private, public or hybrid cloud computing environments. The VM-Series supports a range of hypervisors including VMware ESXi and NSX, Amazon Web Services and KVM with OpenStack. In each of these environments, customers analyze traffic moving into and across the cloud environment, protecting both applications and data from advanced threats. Additionally, the VM-Series incorporates a fully-documented XML API to simplify integration of third party orchestration and management tools. Our ease of provisioning, noted below, helps ensure seamless integration as changes happen within the data center or cloud, regardless of your platform choice or data center instantiation.<\/p>\n<p><strong>Time to provision<\/strong><\/p>\n<p>In both physical and virtualized network environments, customers struggle with managing the discrepancies that may occur between compute workload additions, removals or changes and how quickly a security policy can be deployed. To help minimize these delays, Palo Alto Networks firewalls provide a rich set of native management features that streamline policy deployment so that security keeps pace with the changes in your compute workloads (physical and virtual).<\/p>\n<p>As compute workloads change, are added or removed, features within the PAN-OS security operating system will see those contextual changes, proactively learning which IP addresses are changing, then apply those updates to the security policy automatically. The result is a dramatic reduction in the delay that can occur between workload changes and security policy updates. In the event that many virtual or physical Palo Alto Networks next-generation firewalls are deployed, our <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/panorama\" target=\"_blank\" rel=\"noopener\">Panorama<\/a> technology makes managing them easy and ensures that security policies are applied consistently and cohesively. Panorama also provides centralized logging and reporting capabilities that give users visibility into virtualized applications, users and content.<\/p>\n<p><strong>Performance shortcomings<\/strong><\/p>\n<p>In order to address the computationally intensive nature of full application traffic classification and inspection, Palo Alto Networks Next-Generation Firewall appliances are purpose-built to deliver predictable performance with security features enabled. A single-pass software architecture performs its defined functions only once on a given set of traffic, eliminating the multi-pass scan and decision making process that UTMs and other security solutions follow. This single pass software architecture is matched to purpose-built hardware that uses dedicated processing for the key areas of networking, security, content inspection and management. The end result is a next-generation firewall architecture that is fully capable of 120 Gbps of cyber security processing. Customers who have used proxy-based firewalls and UTMs are astonished at the performance gains our platforms provide.<\/p>\n<p><strong>Fragmented solutions<\/strong><\/p>\n<p>One of the advantages of the <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/next-generation-firewall\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks Enterprise Security Platform<\/a> is the contextual control it provides by knowing what applications are being used, who is using them and what data they contain. All visibility, policy control, logging, reporting and forensics features within our enterprise security platform take full advantage of this contextual awareness to provide a closed-loop feedback platform for network and data center security. All security functions employed \u2013 advanced threat prevention with WildFire&#x2122;, known threat prevention with IPS, network anti-virus and anti-spyware, mobile security management with GlobalProtect&#x2122;\u2013 are correlated and shared across the platform to continuously update and employ the very latest attack preventions for the data center and your network.<\/p>\n<p><strong>Lack of security for virtual machines<\/strong><\/p>\n<p>Palo Alto Networks VM-Series virtualizes the functions of its enterprise security platform, allowing customers to secure virtualized workloads while preventing advanced cyberattacks. In fact, it was a global government customer who gave us the idea years ago to create a virtualized instance of our platform and customers love it. If you use AWS GovCloud, the VM-Series for AWS is available as a Bring Your Own License (BYOL) model and the VM-Series also supports VMware ESXi\/NSX, KVM or Citrix SDX. You can purchase the VM-Series from your authorized Palo Alto Networks partner.<\/p>\n<p>With the power of the Palo Alto Networks Enterprise Security Platform, we can protect your north-south traffic as well as your east-west traffic. We ensure that attackers are not only blocked as they enter your overall network, but are also blocked as they attempt to move laterally<em> into<\/em> and <em>through<\/em> your data center.<\/p>\n<p><strong>Additional resources to assist you in your data center to cloud security needs:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/data-center\" target=\"_blank\" rel=\"noopener\">Virtualization<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\" target=\"_blank\" rel=\"noopener\">cloud migration<\/a>\u00a0resources from Palo Alto Networks<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/techbriefs\/network-segmentation-solution-brief\" target=\"_blank\" rel=\"noopener\">Zero-trust considerations<\/a> for your Data Center<\/li>\n<li>Data Center consolidation: When you need to achieve high bandwidth throughput and 120 Gbps protection in a singular platform, <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/next-generation-firewall\/pa-7000-series\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks PA-7050<\/a> utilizes over 400 processors distributed across networking, security, switch management and logging functions to ensure you have the power that you need.<\/li>\n<li>High Scale manageability with <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/panorama\" target=\"_blank\" rel=\"noopener\">Panorama<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/securing-public-cloud-govt\" target=\"_blank\" rel=\"noopener\">VM-Series for AWS GovCloud and Commercial Cloud Services (C2S)<\/a><\/li>\n<\/ul>\n<p><strong>See what the media has to say about the results of the MeriTalk survey:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/www.executivegov.com\/2015\/02\/meritalk-cyber-threats-are-primary-concern-in-federal-data-center-modernization\/\" target=\"_blank\" rel=\"noopener\">Executive Gov,\u00a0MeriTalk: Cyber Threats are Primary Concern in Federal Data Center Modernization<\/a><\/li>\n<li><a href=\"http:\/\/www.enterprisetech.com\/2015\/02\/02\/u-s-datacenter-upgrades-plagued-security-concerns\/\" target=\"_blank\" rel=\"noopener\">EnterpriseTech: U.S. Datacenter Upgrades Plagued by Security Concerns\u00a0<\/a><\/li>\n<li><a rel=\"nofollow noopener\" href=\"http:\/\/talkincloud.com\/cloud-computing-research\/02032015\/how-are-feds-handling-data-center-defense\" target=\"_blank\">Talkin' Cloud: How Are Feds Handling Data Center Defense?<\/a><\/li>\n<li><a href=\"http:\/\/www.cio.com\/article\/2878657\/data-center\/security-concerns-cloud-federal-data-center-overhaul.html\" rel=\"nofollow,noopener\" >CIO: Security Concerns Cloud Federal Data Center Overhaul<\/a><\/li>\n<li><a rel=\"nofollow\" href=\"http:\/\/www.eweek.com\/small-business\/cyber-security-a-top-concern-for-federal-it-workers.html\">eWeek: Cybersecurity A Top Concern for Federal IT Workers<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Governments worldwide are working hard to implement a number of changes in their data center infrastructures. Some have major data center consolidation projects underway, such as the Federal Data Center Consolidation Initiative &hellip;<\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113,75,5,484],"tags":[814,454,1052,589,318,758,613,309],"coauthors":[717,800],"class_list":["post-8068","post","type-post","status-publish","format-standard","hentry","category-cloud-computing-2","category-data-center-2","category-firewall","category-government","tag-amazon-web-services","tag-enterprise-security-platform","tag-govcloud","tag-meritalk","tag-pa-7050","tag-pan-os","tag-panorama","tag-vm-series"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8068"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8068\/revisions"}],"predecessor-version":[{"id":8081,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8068\/revisions\/8081"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8068"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}