新一代网络安全防护新一代网络安全防护建议书建议书PaloaltoNetworksInc.PaloaltoNetworksInc.2013-22013-2目录目录第1章背景介绍.............................................................................................................3第2章安全需求分析.....................................................................................................42.1安全防护目标.....................................................................................................42.2面临问题及风险.................................................................................................4第3章企业网络安全方案.............................................................................................53.1PAN的产品及网络部署.....................................................................................53.1.1部署方式................................................................................................53.1.2中央管理平台实现集中管理................................................................63.2PAN方案功能.....................................................................................................73.2.1应用程序、用户和内容的可视化...........................................................73.2.2报告和日志记录.....................................................................................103.2.3带宽监视和控制......................................................................................113.2.4精细的网络、应用策略控制.................................................................123.2.5一体化综合的威胁防范能力.................................................................133.2.6网络部署的灵活性.................................................................................15第4章PaloAlto解决方案特色....................................................................................164.1下一代安全防火墙的领先者-PaloAlto............................................................164.2提供网络高可视性与控制能力.......................................................................184.3更加灵活的转址功能(NAT)...........................................................................194.4用户行为控制...................................................................................................204.5提供SSL加密传输及穿墙软件分析控管能力...............................................224.6提供服务质量(QoS)管理能力....................................................................224.7网络用户身份认证...........................................................................................234.8新一代软硬件架构确保执行威胁防护时系统高效运行...............................244.9全新管理思维,提供灵活的安全策略...........................................................264.10强大的事件跟踪、分析工具,多样化的报表.............................................274.11流量地图功能..................................................................................................304.12灵活的工作部署模式与其它特色.................................................................314.13内置设备故障应变机制.................................................................................32第5章同传统防火墙以及UTM产品的优势............................................................335.1应用程序识别、可视性及控制(App-ID).....................................................