{"id":8859,"date":"2015-04-20T08:02:52","date_gmt":"2015-04-20T15:02:52","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8859"},"modified":"2015-04-20T07:28:24","modified_gmt":"2015-04-20T14:28:24","slug":"nss-labs-releases-latest-next-generation-ips-report-palo-alto-networks-achieves-superior-security-efficacy","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/04\/nss-labs-releases-latest-next-generation-ips-report-palo-alto-networks-achieves-superior-security-efficacy\/","title":{"rendered":"NSS Labs Releases Latest Next-Generation IPS Report \u2013 Palo Alto Networks Achieves Superior Security Efficacy"},"content":{"rendered":"<p>NSS Labs just released its latest Next-Generation Intrusion Prevention System (NGIPS) Test Report. As expected, the report recognizes the Palo Alto Networks Intrusion Prevention System (IPS) service for its strong security efficacy.\u00a0 Here\u2019s a nice quote from Mr. Vikram Phatak, the CEO of NSS Labs.<\/p>\n<p><em>\u201cExploits being used by Threat Actors in active campaigns are the most likely source of compromise that enterprises face every day.\u00a0 The Palo Alto Networks PA-5020 was the only product that blocked 100% of these live exploits during our test, and 98.8% against all exploits, earning a recommendation by NSS Labs for security effectiveness.\u201d<\/em><\/p>\n<p><center><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/NSS.jpg\"><div style=\"max-width:100%\" data-width=\"300\"><span class=\"ar-custom\" style=\"padding-bottom:92%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-8860 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/NSS.jpg\" alt=\"NSS\" width=\"300\" height=\"276\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/NSS.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/NSS-230x211.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/NSS-43x40.jpg 43w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/span><\/div><\/a><\/center><!--more--><\/p>\n<p>There\u2019s a lot of deep-level technical security information inside the report but I wanted to pull out a few highlights to give you a taste of what\u2019s included.\u00a0 Of course I invite anyone to read through the detailed report, which is posted at <a href=\"http:\/\/go.paloaltonetworks.com\/nss\" target=\"_blank\">http:\/\/go.paloaltonetworks.com\/nss<\/a>.\u00a0 And, as an aside, if you want to read a primer on how bad guys attempt to sneak past IPS systems, the NSS Report is an excellent starting point.<\/p>\n<p>The NSS Labs NGIPS Test Report focuses on five specific areas \u2013 security effectiveness, performance, stability and reliability, management and configuration, and total cost of ownership.\u00a0 As Mr. Phatak points out in his quote, Palo Alto Networks has achieved an overall exploit block rate of 98.8%.<\/p>\n<p>NSS Labs employs a number of tests in order to evaluate a product\u2019s overall exploit block rate. The first grouping of tests taps into a library of over 1800 exploits that exercise different attack vectors, impact types, and older exploits to make sure vendors don\u2019t age out signatures in order to preserve performance levels.\u00a0 For this first grouping of tests Palo Alto Networks successfully blocked 1852 of 1898 exploits to achieve an overall rate of 97.6%.<\/p>\n<p>The next group of tests produced some results that I am particularly proud of.\u00a0 Mr. Phatak makes a reference to a live exploit test in his quote.\u00a0 This is a very interesting exercise that focuses on active threats and attack methods discovered by the NSS global threat intelligence network over the course of many months during the test window for the overall NGIPS evaluation of the Palo Alto Networks IPS service.\u00a0 In other words, these are exploits that each vendor must block without any prior testing or planning.\u00a0 During this time window, the NSS researchers hurled 613 previously unknown exploit at the Palo Alto Networks IPS service and the service blocked all 613. Palo Alto Networks is the only company that achieved a <strong>100% block rate<\/strong>.<\/p>\n<p>Other highlights include performance where the PA-5020 delivered 2.97 Gbps of NGIPS throughput, nearly 50% above our documented rate of 2 Gbps.\u00a0 And we cruised through all resistance to evasion, stability and reliability, and application control tests.<\/p>\n<p>As a CSO, I look at these results as a strong testament to my long-held belief that prevention isn\u2019t futile. With the right approach across people, process and technology, organizations can in fact prevent the bulk of advanced threats.\u00a0 While the focus of this particular evaluation is on our own IPS\u2019s ability to block known exploits -- which we clearly excel at - it is but one element of preventing known and unknown attacks down the attack life cycle that also includes stopping the delivery and installation of malware through malicious domains and URLs and foiling the establishment of command and control activity channels. This latest NSS NGIPS Test Report validates a key and essential component to the Palo Alto Networks system of systems approach and I am very proud.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NSS Labs just released its latest Next-Generation Intrusion Prevention System (NGIPS) Test Report. As expected, the report recognizes the Palo Alto Networks Intrusion Prevention System (IPS) service for its strong security efficacy.\u00a0 &hellip;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,115],"tags":[1149,1148,1150],"coauthors":[791],"class_list":["post-8859","post","type-post","status-publish","format-standard","hentry","category-firewall","category-reports","tag-next-generation-intrusion-prevention-system","tag-nss-labs","tag-pa-5020"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8859"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8859\/revisions"}],"predecessor-version":[{"id":8863,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8859\/revisions\/8863"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8859"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}