Chief Information Security Officer at Packages Group
Real User
Top 10
2024-11-11T15:42:00Z
Nov 11, 2024
We are an insurance-based company, and we had some regulatory requirements that needed to be fulfilled. We've used Palo Alto primarily for our network security needs. It was part of our infrastructure for over three years before being replaced.
Technical Engineer - Technical Security at a tech services company with 1,001-5,000 employees
Real User
Top 5
2024-10-14T15:26:00Z
Oct 14, 2024
Our primary use case for Palo Alto Networks IoT Security is for the operational technology (OT) network. We have industrial systems, referred to as ICS or Industrial Control Systems, to control manufacturing devices. The IoT subscription is necessary for various compliances, such as ICS compliance or SCADA compliance. For that, we have Palo Alto Networks Firewall and IoT Security ensuring adequate security is in place.
We use Palo Alto Networks IoT Security. The on-premises firewalls send logs to the customer's Cortex Data Lake. The IoT solution collects these Cortex Data Lake logs to suggest security policies for the firewall automatically. We provide an automated security posture by integrating artificial intelligence and Cortex Data Lake data.
We offer IoT devices for applications such as fleet management solutions. When developing these devices, we want to explore security tools that can safeguard these types of device management solutions.
Learn what your peers think about Palo Alto Networks IoT Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
In our organization, we use the product "PA 3220" for Security and NAT policy configuration to block unwanted traffic. We can create different zones in our network, such as trusted, untrusted, DMZ. advance threat protection, and anti-malware protection. We can create site-to-site and remote site VPNs as per users' requests. With the help of the SP3 engine, we can allow traffic with a high level of performance. We are able to configure the high availability as Active-Active or Active-Passive to load balance the traffic on the firewall interface. A vulnerability assessment is also done.
Introducing comprehensive IoT Security solutions tailored for enterprises, healthcare, and industrial operations. Safeguard every device, visible or unseen, with Zero Trust security protocols, ensuring protection against known and unknown threats. With rapid 15X faster deployment times, Enterprise IoT Security, Medical IoT Security, and Industrial OT Security streamline operations, allowing teams to prioritize security over setup. Seamlessly integrate with Palo Alto Networks ML-Powered NGFWs...
We are an insurance-based company, and we had some regulatory requirements that needed to be fulfilled. We've used Palo Alto primarily for our network security needs. It was part of our infrastructure for over three years before being replaced.
Our primary use case for Palo Alto Networks IoT Security is for the operational technology (OT) network. We have industrial systems, referred to as ICS or Industrial Control Systems, to control manufacturing devices. The IoT subscription is necessary for various compliances, such as ICS compliance or SCADA compliance. For that, we have Palo Alto Networks Firewall and IoT Security ensuring adequate security is in place.
We use Palo Alto Networks IoT Security. The on-premises firewalls send logs to the customer's Cortex Data Lake. The IoT solution collects these Cortex Data Lake logs to suggest security policies for the firewall automatically. We provide an automated security posture by integrating artificial intelligence and Cortex Data Lake data.
We use Palo Alto Networks IoT Security for firewall protection to keep our client's data safe.
We offer IoT devices for applications such as fleet management solutions. When developing these devices, we want to explore security tools that can safeguard these types of device management solutions.
We use this solution as a network firewall related to IoT.
In our organization, we use the product "PA 3220" for Security and NAT policy configuration to block unwanted traffic. We can create different zones in our network, such as trusted, untrusted, DMZ. advance threat protection, and anti-malware protection. We can create site-to-site and remote site VPNs as per users' requests. With the help of the SP3 engine, we can allow traffic with a high level of performance. We are able to configure the high availability as Active-Active or Active-Passive to load balance the traffic on the firewall interface. A vulnerability assessment is also done.