We use Panorama to push configurations from Panorama to multiple firewalls simultaneously or sequentially, especially if we have a loss of a firewall. This includes protocol, source, and destination specifications for configuring flows from inside to outside.
DLP is designed to monitor and control data being transferred from the network over the Internet. When data is being sent, DLP checks the content against predefined references. If a match is found, it takes the specified action set by the administrator. For example, if I configure DLP to block the transmission of credit card information and someone tries to send such data, the system will inspect the packet, recognize the match, and deny the transmission, preventing the data from leaving the network.
Our clients primarily deploy Palo Alto Networks Enterprise DLP to control the flow of information in and out of their networks. The main use cases include monitoring and managing sensitive data such as credit card information and personally identifiable information.
The use case is very simple. So, the DLP platform can target the call center since it also is an application-based solution for the user who can use the privilege of checking traffic. It is possible to manage the object as it changes since each one of these objects is kind of tagged, so it's able to block. This is a big packaging spectrum at the end or part of Palo Alto because this is a typical scenario. I'm talking about my applications that Palo Alto blocks in case of some issues.
Director IT at a outsourcing company with 1,001-5,000 employees
Real User
Top 20
2022-04-29T22:50:00Z
Apr 29, 2022
Our primary use case is for blocking credit card numbers. We are PCI-compliant and we use this solution as a secondary control to make sure that credit card information is not coming through our network. It's deployed on all of our firewalls. We do have some virtual Palo Altos, but this product, in particular, is on-premises.
I have been using Palo Alto Networks Enterprise Data Loss Prevention to backup all our logs, access, and so on. We also backup every configuration and blocklist as well. We have about 200 users that go for the device everyday. As a result, we have thousands of logs that we need to check everyday.
Learn what your peers think about Palo Alto Networks Enterprise Data Loss Prevention. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Cloud-Delivered Data Protection: The industry’s first cloud-delivered Enterprise DLP that consistently protects sensitive data across all networks, clouds and users.
We use Panorama to push configurations from Panorama to multiple firewalls simultaneously or sequentially, especially if we have a loss of a firewall. This includes protocol, source, and destination specifications for configuring flows from inside to outside.
DLP is designed to monitor and control data being transferred from the network over the Internet. When data is being sent, DLP checks the content against predefined references. If a match is found, it takes the specified action set by the administrator. For example, if I configure DLP to block the transmission of credit card information and someone tries to send such data, the system will inspect the packet, recognize the match, and deny the transmission, preventing the data from leaving the network.
Our clients primarily deploy Palo Alto Networks Enterprise DLP to control the flow of information in and out of their networks. The main use cases include monitoring and managing sensitive data such as credit card information and personally identifiable information.
The use case is very simple. So, the DLP platform can target the call center since it also is an application-based solution for the user who can use the privilege of checking traffic. It is possible to manage the object as it changes since each one of these objects is kind of tagged, so it's able to block. This is a big packaging spectrum at the end or part of Palo Alto because this is a typical scenario. I'm talking about my applications that Palo Alto blocks in case of some issues.
Our primary use case is for blocking credit card numbers. We are PCI-compliant and we use this solution as a secondary control to make sure that credit card information is not coming through our network. It's deployed on all of our firewalls. We do have some virtual Palo Altos, but this product, in particular, is on-premises.
I have been using Palo Alto Networks Enterprise Data Loss Prevention to backup all our logs, access, and so on. We also backup every configuration and blocklist as well. We have about 200 users that go for the device everyday. As a result, we have thousands of logs that we need to check everyday.