Listing Thumbnail

    Level 3 - Palo Alto Next Generation Firewall Enforcement

     Info
    Detailed analysis of network traffic to identify breaches and provide evidence-based recommendations to improve security. In addition, we train the user to perform real-time analysis and configure advanced policies on AWS against threats such as phishing and brute force attacks.
    Listing Thumbnail

    Level 3 - Palo Alto Next Generation Firewall Enforcement

     Info

    Overview

    In-depth traffic analysis to identify gaps in existing policies and provide evidence-based recommendations for upgrading the AWS security. This is a custom, service-based implementation for traffic analysis, not a best practices review. Enabling the user to perform real-time traffic analysis and create advanced security policies (phishing prevention, brute force attack signatures, etc.).

    The service provides a detailed analysis of 10% of the security policies and their associated profiles, evaluating the impact on the traffic generated by Content-ID. It includes customization of threat reports and security operations, as well as detection of configuration failures and possible breaches. A network-wide reporting environment is enabled, identifying relevant logs to SNMP and SNMP trap.

    Three specific policies are also analyzed to generate advanced reports and recommendations, reviewing real-time traffic and rule actions without making changes. In addition, knowledge transfer is provided to up to 12 team members for up to eight hours, with a focus on security gap analysis and attack surface reduction.

    • Security policy analysis includes log forwarding, URL filtering, anti-virus checking, file blocking, anti-spyware, DNS protection, vulnerability protection, wildfire scanning, custom EDLs and custom reporting.
    • Analysis and customization of threat reports.
    • Customization of security operation reports, firewall maintenance, compromise detection and configuration failure detection.
    • Identify the generation of logs to SNMP and SNMP trap that are required.
    • Analysis of three (3) policies and their associated profiles to create advanced threat reports and recommendation reports.
    • Real-time traffic review in security policies.
    • Training of up to twelve (12) members of the team for a maximum of eight (8) hours.

    Highlights

    • Advanced policy and security profile analysis: 10% policy evaluation and customization of advanced reports to identify threats and optimize configuration without modifying existing rules.
    • Real-time monitoring and reporting: configuration of a network-wide reporting environment, including SNMP integration and detailed reporting on threats and security operations.
    • Specialized knowledge transfer: hands-on training for up to 12 staff members, focused on security breach detection, attack surface reduction and advanced policy management.

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Our Service Level Agreement (SLA) guarantees 24/7* support to ensure uninterrupted assistance for our clients. We commit to a first response time of under 15 minutes, providing prompt attention to your needs. Our SLA includes vendor support to address issues requiring external expertise, ensuring seamless problem resolution. Clients can reach us anytime through Xelco, telephone, email, or live chat, offering flexible communication options tailored to their preferences.

    Software associated with this service