Palo Alto Networks offers the Palo Alto Networks Next-Gen Intrusion Prevention System (NGIPS) capabilities through the Threat Prevention subscription, preventing known vulnerability exploits, malware and command-and-control activity. Native integration with Palo Alto Networks Next-Gen Intrusion Prevention System Platform. Palo Alto Networks Next-Gen Intrusion Prevention System functionality is a core capability of our platform, preventing threats across the full attack lifecycle, including those hiding in all application traffic regardless of port or protocol, including SSL encrypted content, with full user context. Vulnerability-based protections detect and block exploits and evasive techniques on both the network and application layers, including port scans, buffer overflows, packet fragmentation and obfuscation. IPS protections include both anomaly detection and signature matching, using stateful pattern matching to understand packet arrival order and sequence. Attackers target endpoints, which is why you must also protect desktops, laptops, servers and mobile devices from exploits.
In-line malware prevention is automatically enforced, stopping malware delivery and installation through our proprietary payload-based signatures, which are updated through daily content updates. Payload-based signatures do not rely on easily changed attributes, instead detecting patterns in the body of the file that can be used to identify future variations of the malware, even if the content has been slightly modified. Users can extend this capability with the WildFire threat analysis service to detect and prevent zero-day exploits and malware, bringing the daily content updates to near-real time. Command-and-control activity is stopped from being used to exfiltrate data, deliver secondary malware payloads, or provide additional instructions for future stages of the attack. The service employs an approach to shutting down this critical threat vector by automatically generating C2 signatures that go beyond basic domain and URL matching, producing research-grade protections at machine speed and scale.
Palo Alto Networks Next-Gen Intrusion Prevention System — World-Class Threat Research
Palo Alto Networks conducts all signature generation in-house, without repackaging third-party content. This allows us to develop and enforce the highest efficacy protections for our customers, without compromise. Palo Alto Networks signature developers and threat research team leverage third-party intelligence during the course of their research efforts to enrich their understanding and ensure we have the widest possible visibility into vulnerability exploits. Furthermore, the Palo Alto Networks threat research team, Unit 42, has discovered more than 130 critical zero-day vulnerabilities in Microsoft, Adobe, Apple, Android and other ecosystems, allowing us to create signatures for never-before-seen threats. Attackers target endpoints, which is why you must also protect desktops, laptops, servers and mobile devices from exploits. Traps advanced endpoint protection prevents exploits, including zero-days exploits, on the endpoint by zeroing in on and stopping the small set of techniques that all exploits must execute in order to be successful.
Traps Advanced Endpoint Protection
Preemptively block known and unknown malware, exploits and zero-day threats. With the unique multi-method prevention approach of Traps advanced endpoint protection from a single, lightweight agent. Automatically reprogram your endpoints to block known and unknown threats. Without human intervention — using threat intelligence gained from our global community of customers and partners across endpoints, networks and SaaS applications. Empower users to use web, mobile and cloud-based applications without fearing cyberthreats. Protect users from inadvertently compromising their systems without depending on burdensome virus scans. Traps replaces legacy antivirus and secures endpoints with a multi-method prevention approach that blocks malware and exploits. Both known and unknown, before they compromise endpoints, such as laptops, desktops and servers.
Palo Alto Networks Next-Gen Intrusion Prevention System