Palo Alto Networks
   HOME

TheInfoList



OR:

Palo Alto Networks, Inc. is an American multinational
cybersecurity Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
company with headquarters in
Santa Clara, California Santa Clara (; Spanish for " Saint Clare") is a city in Santa Clara County, California. The city's population was 127,647 at the 2020 census, making it the eighth-most populous city in the Bay Area. Located in the southern Bay Area, the cit ...
. The core products is a platform that includes advanced firewalls and
cloud-based Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user. Large clouds often have functions distributed over mult ...
offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. In 2018, Palo Alto Networks was listed 8th in the
Forbes ''Forbes'' () is an American business magazine owned by Integrated Whale Media Investments and the Forbes family. Published eight times a year, it features articles on finance, industry, investing, and marketing topics. ''Forbes'' also r ...
Digital 100. In June 2018, former
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
and
SoftBank is a Japanese multinational conglomerate holding company headquartered in Minato, Tokyo which focuses on investment management. The Group primarily invests in companies operating in technology, energy, and financial sectors. It also runs the Vi ...
executive Nikesh Arora joined the company as Chairman and CEO.


History

Palo Alto Networks was founded in 2005 by Israeli-American Nir Zuk, a former
engineer Engineers, as practitioners of engineering, are professionals who invent, design, analyze, build and test machines, complex systems, structures, gadgets and materials to fulfill functional objectives and requirements while considering the limit ...
from Check Point and NetScreen Technologies, and was the principal developer of the first stateful inspection firewall and the first
intrusion prevention system An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
. Zuk created Palo Alto Networks with the intention of solving problems enterprises were facing with existing
network security Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves th ...
solutions: the inability to safely allow employees to use modern applications, which entailed developing a firewall that could identify and provide fine-grained control of applications. In 2007, the company produced and shipped its first product, an enterprise firewall. In 2009,
Gartner Gartner, Inc is a technological research and consulting firm based in Stamford, Connecticut that conducts research on technology and shares this research both through private consulting as well as executive programs and conferences. Its client ...
released a publication defining the next-generation firewall. In contrast to traditional firewalls of the time which relied on simple rules such as
port numbers In computer networking, a port is a number assigned to uniquely identify a connection endpoint and to direct data to a specific service. At the software level, within an operating system, a port is a logical construct that identifies a specific ...
and protocol to block traffic, the authors stated that next-generation firewalls should operate on and inspect all layers of the network stack and be intelligent enough to block threats independently of port numbers or protocols used. In particular, the publication defined this next-generation firewall as containing (in addition to the full capabilities of both traditional firewalls and intrusion prevention systems): Support for in-line deployment without disrupting network operations, application awareness, and full stack visibility allowing for fine-grained detection and control of applications, extra-firewall intelligence, and upgrade paths. Starting in 2011, Gartner began listing Palo Alto Networks as a leader on its enterprise firewall, Magic Quadrant. In 2019, they were named a leader in the Gartner Magic Quadrant for Network Firewalls for the 8th year in a row. The company debuted on the
NYSE The New York Stock Exchange (NYSE, nicknamed "The Big Board") is an American stock exchange in the Financial District of Lower Manhattan in New York City. It is by far the world's largest stock exchange by market capitalization of its liste ...
on July 20, 2012, raising $260 million with its
initial public offering An initial public offering (IPO) or stock launch is a public offering in which shares of a company are sold to institutional investors and usually also to retail (individual) investors. An IPO is typically underwritten by one or more investme ...
, which was the 4th-largest tech IPO of 2012. It remained on the NYSE until October 2021 when the company transferred its listing to Nasdaq. In 2014, Palo Alto Networks founded the Cyber Threat Alliance with
Fortinet Fortinet is an American multinational corporation headquartered in Sunnyvale, California. The company develops and sells cybersecurity solutions, such as physical firewalls, antivirus software, intrusion prevention systems, and endpoint secur ...
,
McAfee McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
, and
NortonLifeLock Gen Digital Inc. (formerly Symantec Corporation and NortonLifeLock) is a multinational software company co-headquartered in Tempe, Arizona and Prague, Czech Republic. The company provides cybersecurity software and services. Gen is a Fortune 50 ...
(formerly known as Symantec), a not-for-profit organization with the goal of improving cybersecurity "for the greater good" by encouraging collaboration between
cybersecurity Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
organizations by sharing cyber threat intelligence amongst members. By 2018, the organization had 20 members including
Cisco Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
, Check Point,
Juniper Networks Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California. The company develops and markets networking products, including routers, switches, network management software, network security product ...
, and Sophos. The company expanded over the years, offering a wide selection of enterprise cybersecurity services beyond its original next-generation firewall offering, such as Traps endpoint protection and Wildfire malware prevention. In 2017, Palo Alto Networks announced ''Logging Service'', a cloud-based service allowing customers to amass their own data for
machine learning Machine learning (ML) is a field of inquiry devoted to understanding and building methods that 'learn', that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence. Machine ...
and
data analytics Analytics is the systematic computational analysis of data or statistics. It is used for the discovery, interpretation, and communication of meaningful patterns in data. It also entails applying data patterns toward effective decision-making. It ...
. In 2018, the company began opening dedicated cybersecurity training facilities around the world as part of the ''Global Cyber Range Initiative''. In May 2018, the company announced ''Application Framework'', an open cloud-delivered ecosystem where developers can publish security services as SaaS applications that can be instantly delivered to the company's network of customers. In 2018, several high-profile tech executives joined Palo Alto Networks. In June 2018, former Google Chief Business Officer and
SoftBank is a Japanese multinational conglomerate holding company headquartered in Minato, Tokyo which focuses on investment management. The Group primarily invests in companies operating in technology, energy, and financial sectors. It also runs the Vi ...
President President most commonly refers to: *President (corporate title) * President (education), a leader of a college or university * President (government title) President may also refer to: Automobiles * Nissan President, a 1966–2010 Japanese ...
Nikesh Arora joined the company as chairman and CEO. His predecessor, Mark McLaughlin, became vice chairman of the board of directors. Arora received a pay package worth about $128 million, making him one of the highest-paid executives in the United States. In September 2018 Liane Hornsey, formerly Chief People Officer at
Uber Uber Technologies, Inc. (Uber), based in San Francisco, provides mobility as a service, ride-hailing (allowing users to book a car and driver to transport them in a way similar to a taxi), food delivery (Uber Eats and Postmates), packa ...
, joined Palo Alto Networks as Chief People Officer. In October 2018, Amit Singh, formerly
President President most commonly refers to: *President (corporate title) * President (education), a leader of a college or university * President (government title) President may also refer to: Automobiles * Nissan President, a 1966–2010 Japanese ...
of
Google Cloud Google Cloud Platform offers numerous integrated cloud-computing services, including compute, network, and storage. Products Past and present products under the Google Cloud platform include: Current * Google Cloud Datastore, a NoSQL databa ...
, succeeded Mark Anderson as President of Palo Alto Networks. In August 2021, William (BJ) Jenkins succeeded Singh as president, with Singh assuming the role of Chief Business Officer. In 2019, the company announced the K2-Series, a 5G-ready next-generation firewall developed for service providers with 5G and IoT requirements in mind. In February 2019, the company announced Cortex, an AI-based continuous security platform. CEO Nikesh Arora described Cortex as an "Application Framework 2.0".


Acquisitions

* Morta Security was acquired for an undisclosed sum in January 2014. * Cyvera was acquired for approximately $200 million in April 2014. * CirroSecure was acquired for an undisclosed sum in May 2015. * LightCyber was acquired for approximately $100 million in March 2017. * Cloud Security company Evident.io was acquired for $300 million in cash in March 2018, creating the Prisma Cloud division. * Secdo was acquired for an undisclosed sum in April 2018. * Cloud security company RedLock was acquired for $173 million in October 2018. * In February 2019, Palo Alto Networks acquired security orchestration company Demisto for $560 million. * In May 2019, Palo Alto Networks acquired container security startup Twistlock for $410 million. * In June 2019, Palo Alto Networks acquired serverless security startup PureSec for $47 million. * In September 2019, Palo Alto Networks announced its intent to acquire IoT startup Zingbox for $75 million. * In November 2019, Palo Alto Networks announced its intent to acquire machine identity-based micro-segmentation company Aporeto, Inc. for $150 million * In March 2020, Palo Alto Networks announced its intent to acquire
SD-WAN A software-defined wide area network (SD-WAN) is a wide area network that uses software-defined network technology, such as communicating over the Internet using overlay tunnels which are encrypted when destined for internal organization location ...
company CloudGenix, Inc. for $420 million. This acquisition was completed in April 2020. * In August 2020, Palo Alto Networks announced its intent to acquire Crypsis Group for $265 million. * In November 2020, Palo Alto Networks announced its intent to acquire Expanse for $800 million. * In February 2021, Palo Alto Networks announced it acquired Bridgecrew for around $156 million. * In November 2022, Palo Alto Networks announced its intent to acquire Cider Security for an enterprise value of around $300 million.


Products


Enterprise Products

Palo Alto Networks offers an enterprise cybersecurity platform which provides
network security Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves th ...
, cloud security, endpoint protection, and various cloud-delivered security services. Components of the security platform listed on the Palo Alto Networks website include: *Next-generation firewalls, running PAN-OS, offered in multiple forms including: ** As a physical appliance through the PA series, which includes small form-factor firewalls such as the PA-220 for small businesses and offices, to the PA-7000 series built for large enterprises and service providers. ** As a virtualized appliance through the VM series, allowing the firewall to be run as a
virtual machine In computing, a virtual machine (VM) is the virtualization/ emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized h ...
to secure virtualized data centers and private clouds. It is also compatible with public cloud environments such as
Amazon Web Services Amazon Web Services, Inc. (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis. These cloud computing web services provide d ...
, Microsoft Azure, and
Google Cloud Google Cloud Platform offers numerous integrated cloud-computing services, including compute, network, and storage. Products Past and present products under the Google Cloud platform include: Current * Google Cloud Datastore, a NoSQL databa ...
. ** As a streamlined cloud service provided by Palo Alto Networks through GlobalProtect Cloud Service. *Panorama, a network security control center that allows customers to manage a fleet of firewalls at an enterprise scale from a single console. *Traps, advanced endpoint protection. Unlike traditional antivirus, Traps does not rely on signatures to detect malware. Instead, it focuses on analyzing the behavior of programs to detect zero-day exploits. Threat intelligence is shared with and obtained from Wildfire. *Wildfire, a cloud-based threat-analysis service that uses dynamic analysis,
static analysis Static analysis, static projection, or static scoring is a simplified analysis wherein the effect of an immediate change to a system is calculated without regard to the longer-term response of the system to that change. If the short-term effect i ...
,
machine learning Machine learning (ML) is a field of inquiry devoted to understanding and building methods that 'learn', that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence. Machine ...
, and bare-metal analysis to discover and prevent unknown threats.


Cloud Storage and Analysis Products

In 2019, Palo Alto Networks reorganized its SaaS offerings under the Cortex branding. * Cortex Data Lake - Cortex data lake is a cloud-delivered log aggregation service for Palo Alto Networks devices located in on-premise networks, directly from endpoints, or cloud based products such as Prisma Access. This data lake information is then fed into the Hub apps that provide analysis, response, and other added services. *Hub - Hub is an open cloud-delivered ecosystem where customers can subscribe to security applications developed by 3rd-party developers or Palo Alto Networks. Some applications from Palo Alto Networks such as XDR (analytics) and Auto Focus (threat intelligence) are Cortex-branded apps on Hub. * Cortex XDR - XDR is the primary tool for data analysis from Palo Alto Networks that leverages modern threat detection and response capabilities on the centralized data collected in the Cortex Data Lake. * AutoFocus - This service provides threat intelligence to enhance the analytic capabilities of the hub applications as an external source of relevant security information. * Cortex XSOAR - Integrating its acquisition of Demisto into the Cortex cloud suite, XSOAR is the Security Orchestration And Response component responsible for automation and integration with other security and network systems for the automation of incident response and intelligence gathering processes. *Prisma Access - Prisma Access is the Palo Alto Networks offering for moving the enterprise network monitoring and analysis functions into the cloud. It is the most comprehensive SASE solution of its kind, secures access, protects users and applications, and controls data for remote users and locations. *Prisma Cloud - Prisma Cloud secures any cloud environment and all compute form factors used to build and run cloud native applications, including multi- and hybrid-clouds environments. It addresses the majority of cloud security use cases a customer might have, such as CSPM, containers, server less, and identity-based micro segmentation. It is Palo Alto Networks cloud native security solution that integrates with
DevOps DevOps is a set of practices that combines software development (''Dev'') and IT operations (''Ops''). It aims to shorten the systems development life cycle and provide continuous delivery with high software quality. DevOps is complementary to ...
continuous integration and continuous development (CI/CD) processes for a more holistic control of the security life-cycle of cloud assets.


Threat research

Unit 42 is the Palo Alto Networks threat intelligence and security consulting team. They are a group of cybersecurity researchers and industry experts who use data collected by the company's security platform to discover new cyber threats, such as new forms of malware and malicious actors operating across the world. The group runs a popular
blog A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order s ...
where they post technical reports analyzing active threats and adversaries. Multiple Unit 42 researchers have been named in the MSRC Top 100,
Microsoft's Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
annual ranking of top 100 security researchers. In April 2020, the business unit consisting of Crypsis Group that provided digital forensics, incident response, risk assessment, and other consulting services merged with the Unit 42 threat intelligence team. According to the FBI, Palo Alto Networks Unit 42 has helped solve multiple cybercrime cases, such as the Mirai Botnet and Clickfraud Botnet cases, the LuminosityLink RAT case, and assisted with "Operation Wire-Wire". In 2018, Unit 42 discovere
Gorgon
a hacking group believed to be operating out of Pakistan and targeting government organizations in the United Kingdom, Spain, Russia, and the United States. The group was detected sending spear-phishing emails attached to infected
Microsoft Word Microsoft Word is a word processor, word processing software developed by Microsoft. It was first released on October 25, 1983, under the name ''Multi-Tool Word'' for Xenix systems. Subsequent versions were later written for several other pla ...
documents using an exploit commonly used by cybercriminals and cyber-espionage campaigns. In September 2018, Unit 42 discovered Xbash, a ransomware that also performs cryptomining, believed to be tied to the Chinese threat actor "Iron". Xbash is able to propagate like a
worm Worms are many different distantly related bilateral animals that typically have a long cylindrical tube-like body, no limbs, and no eyes (though not always). Worms vary in size from microscopic to over in length for marine polychaete wo ...
and deletes databases stored on victim hosts. In October, Unit 42 warned of a new crypto mining malware, XMRig, that comes bundled with infected
Adobe Flash Adobe Flash (formerly Macromedia Flash and FutureSplash) is a multimedia software platform used for production of animations, rich web applications, desktop applications, mobile apps, mobile games, and embedded web browser video players. Fla ...
updates. The malware uses the victim's computer's resources to mine Monero cryptocurrency. In November 2018, Palo Alto Networks announced the discovery of "Cannon," a
trojan Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * ''Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 189 ...
being used to target United States and European government entities. The hackers behind the malware are believed to be Fancy Bear, the Russian hacking group believed to be responsible for hacking the Democratic National Committee in 2016. The malware communicates with its command and control server with
email Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
and uses
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can de ...
to evade detection.


References


External links

* {{NASDAQ-100 2005 establishments in California 2012 initial public offerings Companies based in Santa Clara, California Companies listed on the Nasdaq Companies formerly listed on the New York Stock Exchange Computer security companies Networking companies of the United States Technology companies based in the San Francisco Bay Area Technology companies established in 2005