Palo Alto Networks Traps: Advanced Endpoint Security

 

Westcon-Comstor presents the next generation of Advanced Endpoint Protection: Palo Alto Networks Traps offers unrivalled protection against sophisticated exploits and advanced malware – stopping both known and unknown attacks before any damage is done.

 

Palo Alto Networks Traps replaces traditional antivirus with multi-method prevention, a comprehensive combination of purpose-built malware and exploit prevention methods that protect users and endpoints from known and unknown threats. Traps prevents security breaches, in contrast to breach detection and incident response after critical assets have already been compromised.

Webinar recorded

Webinar:
Protect Yourself
from
Antivirus

screen-shot-2016-10-19-at-11-14-34

Download your copy
of the Advanced Endpoint Protection
for dummies

Some of its key features are:

Prevention First

With the proliferation of free and low-cost tools, threat actors can now generate new and unique attacks that evade signature-based antivirus. Current endpoint security solutions and antivirus cannot protect users and systems against evasive, unknown or zero-day attacks.

Palo Alto Networks® Traps advanced endpoint protection, with its unique combination of the most effective, purpose-built, malware and exploit prevention methods, prevents known and unknown threats before they compromise an endpoint.

Exploitation Techniques

Traps uses an entirely new and unique approach to prevent exploits. Instead of focusing on the millions of individual attacks, or their underlying software vulnerabilities, Traps focuses on the core exploitation techniques used by all exploit-based attacks. Each exploit must use a series of these exploitation techniques to successfully subvert an application. Traps renders these techniques ineffective by blocking them the moment they are attempted.

Traps Multi-Method Malware Prevention

Traps prevents malicious executables with a unique, multi -method prevention approach that maximizes the coverage against malware while simultaneously reducing the attack surface and increasing the accuracy of malware detection. This approach combines several prevention methods to instantaneously prevent known and unknown malware from infecting a system.

Automated Threat Intelligence

Traps utilizes the WildFire Threat Intelligence Cloud enabling organizations to continuously share the growing threat intelligence gained from tens of thousands of enterprise customers globally to coordinate prevention and response. The automatic reprogramming and conversion of threat intelligence into prevention all but eliminates the opportunity for an attacker to use unknown and advanced malware to infect a system. An attacker can use each piece of malware once, at most, anywhere in the world and only has seconds to carry out an attack before WildFire renders it entirely ineffective

Next-Generation Security Platform

With the ever-decreasing cost of computing power, threat actors can launch increasingly numerous and sophisticated attacks with far greater ease than ever before. Disjointed layers of security, and point solutions that rely on obsolete technologies or human response to alerts, are no longer sufficient or scalable. Only a platform that consolidates, automates and natively integrates multiple preventive technologies can ensure the prevention of advanced, targeted and evasive attacks. When used in conjunction with Palo Alto Networks’ next-generation firewalls Traps comprehensively extends the threat prevention profile across the entire organisation in an automated, extensible and natively integrated manner.

Why Westcon?

The next generation of endpoint security requires an equally capable distributing partner. As an established distributing partner for Palo Alto Networks, Westcon-Comstor is uniquely situated to aid you with the successful marketing of Traps. We enable your team and your customers to focus on their respective tasks while we manage the deployment and the maintenance of your solutions.

Westcon-Comstor is one of a select few Palo Alto Networks Certified Professional Services Providers. With our comprehensive expertise and our dedicated resources, we are well equipped to support you during the planning and the deployment of your European or global Traps projects. Leveraging “best practice” deployment methodologies, our certified experts will develop a unique solution tailored exactly to your needs, while individual trainings in our Authorized Elite Support Centers enable your team to use your new Traps solution to its full potential from day one.

westcon_comstor_logo_tag

Westcon-Comstor offers you a comprehensive portfolio of value-added services, including pre- and post-sales consulting, deployment services, ongoing support tools, certifications, and trainings. In short, we will support you in all phases of your project, from vision to success:

To speak to us about Traps Advanced Endpoint Protection and how you can enter the next generation of security, call Louise Williamson at +44 175 379 79 20 or send her an email  Louise.Williamson@westcon.com

The End of traditional Antivirus

Nearly thirty years ago, an engineering student proved that there was no way of antivirus (AV) predicting every unknown threat. He carried his findings on a floppy disk. Three decades later, the floppy disk is history but traditional AV is still living in the past. It no longer offers any security solutions – it has become the problem.

Traditional AV not only fails to protect endpoints from the unknown. It costs users with inefficient operation and unnecessary risk. AV is simply unable to keep pace with the speed of technology today. It needs to be replaced.

Despite no shortage of security products on the market, endpoint attacks are still on the rise. Ten years ago, two or three new threats were introduced every hour. Today it’s twice that many every second. Despite the fact that almost all of us are “protected” by some form of antivirus (AV), traditional AV no longer offers adequate security value. An outdated technology, AV simply can’t keep up with the rapid evolution of threats.

AV tries to identify specific attacks and updates slowly and unevenly. This leaves users vulnerable to ever advancing threats.

The History
of Antivirus

1983: Fred Cohen coins the term computer virus

1987: Bernd Fix performs the first real-world use of antivirus software

1987: Fred Cohen demonstrates the impossibility of algorithmically predicting every future virus

1987: John McAfee founds McAfee company (now Intel Security)

1989: Friðrik Skúlason develops the first antivirus with a heuristic engine

1990: Computer Antivirus Research Organization (CARO) founded

1991: Symantec releases Norton Anti-Virus

1997: Eugene Kaspersky releases Kaspersky Anti-Virus

2008: first cloud-based anti-malware functionality

2016: Yahoo announces the largest breach in history after data from 500 million users is stolen

Evolution of
Existing Threats

1994: 29,000 unique malware samples

1999: 98,000 unique malware samples

2005: 333, 000 unique malware samples

2007: 5.5 million new samples this year alone

2012: half a million new samples every day