0% found this document useful (0 votes)
10 views15 pages

Corp Narrative

The document discusses the evolving threat landscape in cybersecurity, highlighting a decrease in the time from compromise to exfiltration and the increasing complexity of security tools. It emphasizes the importance of platformization and AI-driven solutions in enhancing security outcomes and operational efficiency. Palo Alto Networks positions itself as a leader in providing comprehensive security solutions across various platforms, catering to a wide range of industries.

Uploaded by

xoulkat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views15 pages

Corp Narrative

The document discusses the evolving threat landscape in cybersecurity, highlighting a decrease in the time from compromise to exfiltration and the increasing complexity of security tools. It emphasizes the importance of platformization and AI-driven solutions in enhancing security outcomes and operational efficiency. Palo Alto Networks positions itself as a leader in providing comprehensive security solutions across various platforms, catering to a wide range of industries.

Uploaded by

xoulkat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Section Title Information

Corporate
Narrative
Presenter Name
Presenter Title
© 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information 01
The Threat Landscape Continues to Evolve: A View from Our
Customer Base

Sophisticati Speed Complexity


on

39% of the time, initial In 2023, the median time 30-70 tools per security
access exploited an between compromise and brings complexity and
internet-facing endless integrations
exfiltration decreased to less
vulnerability
than one day

Source: Incident Response Report, Unit 42


© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
The Business of Security is
Changing

Focus on Security Reducing downtime, strategic


Outcomes and legal risks

Get ahead of AI Threat + Shield

Create a Culture of Embed security in the


Security organization

New SEC regulations Proactive

© 2023 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
The Pace of Security Has Accelerated Dramatically

Median days from compromise to exfil.

9 Days
2 Hours
Days Average time to
resolve a security
incident2

Latest
6 DAYS
2021 2023
attacks1

Source: 1Unit 42 IR data 2Unit 42 Cloud Threat Report, Vol 7. © 2024 Palo Alto Networks
OUR PROMISE

Deliver the most comprehensive and


automated security that uses AI to
protect and support you in real
time.

© 2024 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
What We Provide

Our next-gen platforms enable cyber transformation

Network Security Cloud Security Security Operations


STRATA PRISMA CLOUD CORTEX

Best-in-class security Comprehensive platform A new approach to SOC


delivered across hardware, to secure everything that with fully integrated data,
software and SASE runs in the cloud analytics and automation

Threat Intelligence and Advisory Services


World-renowned threat intelligence, cyber risk management and advisory services

© 2023 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
Harness the Power of AI-Ready Infrastructure Through
Platformization
For Today’s Threats
SUB-CATEGORY ZERO TRUST PLATFORM SUB-CATEGORY CODE TO CLOUD PLATFORM

Firewall CSPM

Intrusion Detection Cloud Workload


Protection
Cloud
URL Filtering Identity & Access
Management Security
Sandbox Detection
Code Security
Platform
DNS Security Web Application / API
Security
IoT Security
Network
Data Loss Prevention Security
Cloud Access Security
Platform SUB-CATEGORY AI-DRIVEN SOC PLATFORM
Broker
Posture and Health SIEM
Management

Remote Access for Users


Endpoint + EDR
AI-Driven
NTA / UEBA
Security
SWG
Operation
SD-WAN SOAR s Platform
Attack Surface
Secure Web Browser Management

© 2023 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
Harness the Power of AI-Ready Infrastructure Through
Platformization
and Tomorrow’s Threats
SUB-CATEGORY ZERO TRUST PLATFORM SUB-CATEGORY CODE TO CLOUD PLATFORM

Firewall CSPM

Cloud Workload
Intrusion Detection Protection

URL Filtering Identity & Access


Management
Cloud
Security
Sandbox Detection Code Security
Platform
DNS Security Web Application / API
Security

IoT Security Blast Radius

Data Loss Prevention Network Prisma Cloud Copilot

Cloud Access Security


Security AI-Security Posture
Broker Platform Management
Posture and Health SUB-CATEGORY AI-DRIVEN SOC PLATFORM
Management
SIEM
Remote Access for Users
Endpoint + EDR
SWG AI-Driven
SD-WAN
NTA / UEBA
Security
SOAR Operation
Secure Web Browser s Platform
Attack Surface
Management
AI Runtime
Cortex Copilot
AINetworks,
© 2023 Palo Alto AccessInc. All rights reserved. Proprietary and confidential information.
Powered by Precision AI™ to Drive Real-Time Outcomes

MACHINE DEEP
LEARNING LEARNING

Precision AI
A SYSTEM THAT
LEVERAGES THE
BEST OF EACH AI
TECHNOLOGY

GENERATIVE AI

Precision AI
Leveraging the best of AI while avoiding the
limitations
© 2023 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
Why Palo Alto Networks? Innovation Built for Your
Security Journey

Data R&D Growth Efficacy


Investments

Each day we Invested nearly Acquired Leader in


analyze

1.4B+ $1.7B+ 19 22
In research per Companies in 10 Magic Quadrants
new and unique year years to protect and Waves
objects across customers
network, endpoint
and cloud

https://investors.paloaltonetworks.com/static-files/1c75f5af-1aaa-4957-911c-4541e5614700

© 2023 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
Delivering Real-World Results Through Platformization

Streamline Operations Automate Response Simplify Procurement


Building security policy with
fewer vendors is 3 or 4 times
easier than upgrading a

Without a platform, we’d
probably have to increase
the SOC team by

The entire procurement
process actually has to go
through a bunch of
security policy for each potentially 50–75%. different steps … we saved
different one. about 40–50% of the
procurement time.

Transportation & Logistics Oil & Gas Insurance

© 2023 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
PANW has validated “Platformization” in the Cybersecurity
Industry
Network Security Security Operations
Platform Cloud Security Platform Platform
Best-in-class Zero Trust Platform across Comprehensive, cloud-native platform to Breakthrough outcomes for SOC by unifying
Hardware, Software & SaaS secure everything in the cloud data, analytics & automation

NGFW SASE SSE DevSecOp CNAPP CSPM


Gartner Magic Gartner Magic Gartner Magic
s Frost & GigaOm CSPM EPP IR MDR
Quadrant for Quadrant for Quadrant for Sullivan Radar Radar Gartner Magic Forrester Frost &
GigaOm Radar
Network Single Vendor Security for CNAPP Quadrant for Cybersecurity IR Sullivan Radar
for Developer
Firewalls SASE Services Edge Endpoint Protection Services Wave for MDR
Security Tools
Platforms
Policy as Cloud
SD-WAN ZTNA Zero Trust XDR SOAR
Gartner Magic Forrester ZTNA Code Workload
Platform GigaOm Radar for Forrester XDR GigaOm Radar
Quadrant for New Wave
Forrester Zero
Security Wave for SOAR
SD-WAN Policy as Code
Trust Platform Forrester Wave: Cloud
Providers Wave Workload Security

Browser OT Internet of DSPM Containe CIEM Attack Autonomous


GigaOm Radar Kuppingercole
Security Security Medical r Surface SOC
for Data Security Cloud
Frost Radar for Forrester OT GigaOm Autonomous
Things Posture Security Infrastructure Management
Zero Trust Security SOC Radar
Frost & Sullivan Management GigaOm Radar Entitlement Kuppingercole
Browser Solutions
Radar for Healthcare for Container Management Leadership Compass for
Security Wave
IoMT Security Attack Surface
Management

We will continue innovating to extend our industry leadership position

12 | © 2024 Palo Alto Networks, Inc. All rights reserved.


Our Mission

The cybersecurity
15K Employees | 90K+ Customers Globally | ~$100B
Market Cap

partner of choice, 9 of 10
of the Fortune 10
8 of 10
Largest U.S. Banks

protecting our digital 10 of 10 6 of 10


way of life. Largest Utilities
in the World
Largest Oil & Gas
in the World

8 of 10 7 of 10
Largest Manufacturing Top U.S. Hospitals
Companies in the World

© 2023 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
Cybersecurity Partner of
Choice

© 2023 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
Thank You
paloaltonetworks.co
m

© 2023 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy