Palo Alto Networks URL Filtering Categories Excel Spreadsheet

Palo Alto Networks does a great job of keeping their URL filtering categories up to date on their website, but I find I often need it in a workable format to review Block/Permit categories with clients. I made this spreadsheet I use and thought you might find it helpful. PAN URL Category List.xls

PALO ALTO NETWORKS Global Protect Reference Architecture

Chris Beyer, our Co-Founder and CTO, gave two presentations with reference designs for implementing Global Protect at Palo Alto’s Ignite 2016 user conference in Las Vegas.

The End of Traditional VPN – Global Protect for Remote Access includes a list of things to consider when planning your migration to Global Protect for remote user connectivity, some reference use cases, and lessons learned from real-world migrations we have implemented for customers. The End of Traditional VPN - GlobalProtect for Remote Access.pdf

Internal Network Segmentation covers deploying Global Protect in your internal network to secure critical systems and enable more granular controls within your security policies. Internal Network Segmentation with GlobalProtect.pdf

Tufin & Synacktek webinar on migrating to NERC CIP v5

Chris Beyer, our Co-Founder and CTO, teamed up with our partner Tufin to talk about compliance with North American Electric Reliability Corp. (NERC) Critical Infrastructure Protection (CIP) Standard Version 5. In this webinar on transitioning to NERC CIP V5, we share insights on cyber security for bulk power grid networks, including:

  • Overview of NERC CIP V5 Standards
  • Strategies and tools for meeting the new Cyber Security Standards 
  • Industry trends on transitioning to compliance, including polling results

Watch the Webinar



We continue to develop Splunk apps to maximize your Splunk value and simplify product integrations. Please see our apps below:

SYNACKTEK's Firewall Dropped Traffic App will help you easily see and organize the traffic that is being dropped within your environment, helping identify misconfigured or rogue devices.

To learn more and see screenshots, click here.

Download the SYNACKTEK Firewall drop traffic documentation here.

Download the SYNACKTEK Firewall drop traffic app here.