GEM Technologies welcomes Palo Alto Networks as our newest technology partner

Security threats have substantially evolved since the inception of the perimeter firewall. Yet, the same approach to filtering out these security threats – stateful inspection – is used today. This legacy approach of allowing or denying traffic based on port based, IP address filtering does not take into consideration the complexities of today’s network traffic.

  • What if you want to allow Facebook, but not Facebook instant messaging?

  • What if you want to enable internet email, but prevent documents from being attached?

  • Wouldn’t you like to prevent users from using bit torrent applications?

Instead of the yes/no approach that firewalls have utilized for many years, Palo Alto Networks firewalls take a more intelligent approach to deciding which traffic should be allowed on your corporate network. Today’s network threats have become increasing intelligent, shouldn’t your firewall be more intelligent too? Call us today to set an appointment for a (limited time) free evaluation and firewall vulnerability report.

Leave a Reply

Your email address will not be published. Required fields are marked *