Palo Alto Networks URL Filtering Categories Excel Spreadsheet
Palo Alto Networks does a great job of keeping their URL filtering categories up to date on their website, but I find I often need it in a workable format to review Block/Permit categories with clients. I made this spreadsheet I use and thought you might find it helpful. PAN URL Category List.xls
PALO ALTO NETWORKS Global Protect Reference Architecture
Chris Beyer, our Co-Founder and CTO, gave two presentations with reference designs for implementing Global Protect at Palo Alto’s Ignite 2016 user conference in Las Vegas.
The End of Traditional VPN – Global Protect for Remote Access includes a list of things to consider when planning your migration to Global Protect for remote user connectivity, some reference use cases, and lessons learned from real-world migrations we have implemented for customers. The End of Traditional VPN - GlobalProtect for Remote Access.pdf
Internal Network Segmentation covers deploying Global Protect in your internal network to secure critical systems and enable more granular controls within your security policies. Internal Network Segmentation with GlobalProtect.pdf
Tufin & Synacktek webinar on migrating to NERC CIP v5
Chris Beyer, our Co-Founder and CTO, teamed up with our partner Tufin to talk about compliance with North American Electric Reliability Corp. (NERC) Critical Infrastructure Protection (CIP) Standard Version 5. In this webinar on transitioning to NERC CIP V5, we share insights on cyber security for bulk power grid networks, including:
- Overview of NERC CIP V5 Standards
- Strategies and tools for meeting the new Cyber Security Standards
- Industry trends on transitioning to compliance, including polling results
Splunk FIREWALL DROPPED TRAFFIC APP
We continue to develop Splunk apps to maximize your Splunk value and simplify product integrations. Please see our apps below:
SYNACKTEK's Firewall Dropped Traffic App will help you easily see and organize the traffic that is being dropped within your environment, helping identify misconfigured or rogue devices.
To learn more and see screenshots, click here.
Download the SYNACKTEK Firewall drop traffic documentation here.
Download the SYNACKTEK Firewall drop traffic app here.