Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

Juniper Networks Vs. Palo Alto Networks

Markman Advisors picture Cir. 1988), that Palo Alto is estopped from attempting to invalidate the asserted patents, thus rendering its defense of invalidity insufficient as a matter of law. The Diamond case requires three dispositive findings, which according to Juniper are satisfied here: (1) the inventor assigned his patent rights for valuable consideration; (2) the inventor executed an inventor's oath averring that he was the first and true inventor; (3) the accused infringer was in privity with the inventor. If Juniper wins this argument, the down-side risk for Palo Alto cannot be overstated. A party accused of patent infringement typically has two fundamental defenses at its disposal: (1) it is not infringing the patents; and (2) even if it is infringing, the patents are invalid. Defendants typically pursue both of these defenses in parallel through the course of a litigation. The good news for defendants is that they only need to win one of these defenses-non-infringement or invalidity-to win the case. Here, however, Juniper is seeking to strip Palo Alto, right from the start, of one of its two principal defenses.
For the original version including any supplementary images or video, visit http://seekingalpha.com/article/1819652-juniper-networks-vs-palo-alto-networks

Palo Alto Networks Extends Network Security to Branch Office

"We're looking to Palo Alto Networks to possibly help us with this challenge as they can seamlessly extend our existing user-specific policies to the recent influx of Apple products on our networks." WildFire- Controlling Modern Malware With the introduction of WildFire, customers can extend the capabilities of all of their Palo Alto Networks next-generation firewalls to addresses the challenge of modern malware, which is often targeted, unknown, highly evasive and network enabled. This latest innovation to Palo Alto Networks' industry-acclaimed next-generation firewalls identifies unknown malicious files by directly and automatically executing them in a virtual cloud-based environment to expose malicious behavior even if the malware has never been seen in the wild before. For malicious files, Palo Alto Networks automatically generates new signatures that are distributed with regular signature updates, and provides the user with actionable analysis of exactly how the malware behaves, who was targeted and the application that delivered the threat. By tightly integrating the firewall with the cloud-based analysis engine, WildFire significantly reduces the time-to-protection for all customers, and makes this critical new protection accessible to any enterprise. "Our approach to modern malware is the latest example of how we question conventional network security approaches until we've developed a better way of addressing the problem," said Nir Zuk, founder and CTO of Palo Alto Networks. "Combining prior technical contributions such as sandboxing technology and cloud-based malware analysis with the unprecedented capabilities of a next-generation firewall has resulted in innovation that enterprises can feasibly deploy throughout their networks." Availability Palo Alto Networks PA-200, GlobalProtect, and WildFire are all available immediately. PAN-OS 4.1 is a free upgrade for customers on maintenance. For more information on pricing for Palo Alto Networks PA-200, WildFire, and GlobalProtect, contact your local reseller or visit http://www.paloaltonetworks.com . About Palo Alto Networks Palo Alto Networks is the network security company.
For the original version including any supplementary images or video, visit http://news.thomasnet.com/companystory/Palo-Alto-Networks-Extends-Next-Generation-Firewall-Visibility-and-Control-to-Enterprise-Branch-Offices-and-Apple-Devices-605273

Palo Alto Networks Extends Next-Generation Firewall Visibility and Control to Enterprise Branch Offices and Apple Devices

The PA-200 allows the IT team to have the same firewall protection across all branch offices without breaking the bank, according to King. The company also announced a new version of its GlobalProtect remote access technology to protect remote users running Mac OS X and iOS devices. GlobalProtect, which already supported Microsoft Windows devices, protects remote users with the same policies and controls that are being applied back at the corporate office, according to King. The auto-firewall is "just on," so users don't have to think about turning it on or checking to see what it's doing, King said. The iOS version of GlobalProtect is not a new application, so Palo Alto Networks doesn't have to wait on Apple to approve it, according to King. Instead, it uses the native VPN capability on iOS devices, and is configured using mobile-device management tools to provide the protection. The company's newly announced WildFire capability focuses on blocking malware specifically designed to bypass front-line defenses. With WildFire running, the firewall can identify outbound traffic generated by malware on an already-compromised system on the network and generate a signature to identify the traffic to stop future incidents. WildFire identifies malicious files by unpacking and executing them in a virtual cloud-based sandbox, King said.
For the original version including any supplementary images or video, visit http://www.eweek.com/c/a/Security/Palo-Alto-Networks-Extends-Network-Security-to-Branch-Office-352723/

Don't be the product, buy the product!