Network Protection Overview
Extend the endpoint protection of your compute devices into the network, for you your family or mobile workforce, no matter where they go.
The world you need to secure continues to expand as users and applications shift to locations outside the traditional network perimeter. We all face new security challenges with maintaining pace with current cyber threats, visibility into network traffic and taking appropriate actions to stop threats. Traditional technologies used to protect mobile endpoints, such as host endpoint antivirus software and remote access virtual private networks (VPNs), cannot stop the advanced techniques employed by today’s sophisticated attackers.
The EXOsecure Digital Spartan Service provides GlobalProtect™ from Palo Alto Networks. GlobalProtect™ network security for endpoints enables you to protect users by extending the Palo Alto Networks Next-Generation Firewall to all users, regardless of location. It secures traffic by applying the platform’s capabilities to understand application use, associate the traffic with users and devices, and enforce security policies with next-generation technologies.
Extending the Platform Protection Externally
GlobalProtect™ safeguards you, your family or mobile workforce by inspecting all traffic using EXOsecure Next-Generation Firewalls deployed as internet gateways at the network perimeter. Laptops, smartphones, and tablets with the GlobalProtect app automatically establish a secure IPsec/SSL VPN connection to the Next-Generation Firewall using the best gateway, thus providing full visibility of all network traffic, applications, ports, and protocols. By eliminating the blind spots in mobile workforce traffic, EXOsecure can provide feedback to you or your Business and therefore provide and maintain a consistent view into application usage.
Secure access to the Internet & cloud-based applications.
Advanced Threat Prevention
- Secures internet traffic
- Stops threats from reaching the endpoint.
- Protects against phishing and credential theft.
- Quarantines compromised devices by leveraging immutable characteristics.
- Enforces acceptable use policies.
- Filters access to malicious domains and adult content.
- Prevents the use of avoidance and evasion tools.
- Secures access to SaaS applications.
- Control’s access and enforces policies for SaaS applications while blocking unsanctioned applications.