Medindia
Medindia LOGIN REGISTER
Advertisement

Palo Alto Networks Delivers Enhanced Visibility, Threat Protection for Beth Israel Deaconess Medical Center

Wednesday, October 21, 2009 General News
Advertisement
Beth Israel Deaconess Medical Center Simplifies Infrastructure, Enforces Application and User Policies with PA-4000 Series Next-Generation Firewalls
Advertisement

SUNNYVALE, Calif., Oct. 21 -- Palo Alto Networks™, the leader in next-generation firewalls, today announced that Beth Israel Deaconess Medical Center (BIDMC) has deployed PA-4000 Series next-generation firewalls for improved visibility and control of applications, and enhanced threat protection. As a result, the medical center has replaced legacy infrastructure, and enhanced its health compliance efforts.
Advertisement

BIDMC is an internationally renowned institution with a state-of-the-art trauma center that is known for its innovative training and advanced use of technology. Each year, approximately 250,000 patients and their families count on the center's surgical and clinical expertise. Its thriving research and unparalleled Harvard-affiliated medical education program enable the center to deliver the highest level of patient safety and quality of care.

According to Mark Olson, Beth Israel Deaconess Medical Center manager of IS security, the center initially deployed Palo Alto Networks' PA-4000 to increase the visibility into the applications on its network. They soon saw the full strength of the Palo Alto Networks platform and now also use its threat prevention capabilities, effectively replacing their existing URL filtering point-solutions. As a result, BIDMC has improved its security posture and simplified its security infrastructure.

"Visibility is important to us, and no other product we've seen has the price/performance benefits and overall security cost of ownership improvements that Palo Alto Networks delivers," said Olson. "Palo Alto Networks also helps our compliance efforts by giving us detailed information that is easier to comprehend than our other products on who should have access to what information. Compared to our other products, Palo Alto Networks has better throughput and gives us more meaningful rule sets."

"Leading organizations like Beth Israel Deaconess Medical Center recognize that information security cannot be effective without seeing and controlling the applications that run on the enterprise network," said Larry Link, Palo Alto Networks' VP of sales. "Palo Alto Networks' next-generation firewalls enable organizations to manage applications and stop threats, while simplifying network security."

Added Olson, "With Palo Alto Networks' visibility, we can take a stronger policy position. It makes auditing and policy control much more precise and a lot less labor intensive, saving a lot of time that was wasted before. With Palo Alto Networks, it's easy to implement a policy, and we know it's taken care of."

Palo Alto Networks' next-generation firewalls are the industry's most powerful firewall products, enabling enterprises to see and control applications, users and content – not just ports, IP addresses and packets. This is a critical need for enterprises' management of risk as industry studies continue to show enterprises lack visibility into and control of application traffic due to the outdated functionality of legacy security technology.(1) Palo Alto Networks' next-generation firewalls enable enterprises to create granular, business-relevant security policies and safely control new enterprise and consumer applications as business enablers instead of the block-or-nothing approach offered by traditional port-blocking firewalls.

About Palo Alto Networks

Palo Alto Networks™ is the leader in next-generation firewalls, enabling unprecedented visibility and granular policy control of applications and content – by user, not just IP address – at up to 10Gbps with no performance degradation. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. For more information, please visit http://www.paloaltonetworks.com.

Note 1 – "Application Usage and Risk Report," Palo Alto Networks, April 20, 2009.

Palo Alto Networks, the Palo Alto Networks Logo and App-ID are trademarks of Palo Alto Networks, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

SOURCE Palo Alto Networks

Sponsored Post and Backlink Submission


Latest Press Release on General News

This site uses cookies to deliver our services.By using our site, you acknowledge that you have read and understand our Cookie Policy, Privacy Policy, and our Terms of Use  Ok, Got it. Close