{"id":1590,"date":"2010-02-22T00:00:00","date_gmt":"2010-02-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/02\/22\/next-generation-firewall-software-introduced-by-palo-alto-networks\/"},"modified":"2021-12-30T11:39:40","modified_gmt":"2021-12-30T11:39:40","slug":"next-generation-firewall-software-introduced-by-palo-alto-networks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/02\/22\/next-generation-firewall-software-introduced-by-palo-alto-networks\/","title":{"rendered":"Next generation firewall software introduced by Palo Alto Networks"},"content":{"rendered":"<p>Palo Alto Networks is to launch next generation firewall software to enable finer-grained control over business and Web 2.0 applications.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chris King, director of product marketing at Palo Alto, explained that it is building on key themes on the threat landscape and realising that there is a lot of applications that have a value but are fraught with risk.<\/p>\n<p>It explained that its next generation firewalls combine three identification technologies to provide the necessary visibility and control over applications, users and content.<\/p>\n<p>Ren\u00e9 Bonvanie, vice president of worldwide marketing at Palo Alto Networks, said that he believed that the market is ready for this, and he was happy with what was coming along.<\/p>\n<p>http:\/\/www.scmagazineuk.com\/next-generation-firewall-software-introduced-by-palo-alto-networks\/article\/164251\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1590","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1590"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1590\/revisions"}],"predecessor-version":[{"id":4077,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1590\/revisions\/4077"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}