We have pioneered the next generation of network security with our innovative platform that allows enterprises, service providers, and government entities to secure their networks and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The core of our platform is our Next-Generation Firewall, which delivers application, user, and content visibility and control integrated within the firewall through our proprietary hardware and software architecture. Our platform offers a number of compelling benefits for our end-customers, including the ability to identify, control, and safely enable applications while inspecting all content for all threats in real time. We believe our platform also offers superior performance compared to legacy approaches and reduces the total cost of ownership for organizations by simplifying their network security infrastructure and eliminating the need for multiple, stand-alone security appliances. Our products and services can address a broad range of our end-customers’ network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices.
Our platform is based on an innovative traffic classification engine that identifies network traffic by application, user, and content. As a result, it provides in-depth visibility into all traffic and all applications, at the user level, at all times, and at the full speed of the network in order to control usage, content, risks, and threats. This enables our end-customers to transform their organizations by safely enabling applications through a positive security model with fine-grained policy implementation capabilities.
Our platform is delivered in the form of a hardware appliance and includes a suite of subscription services as well as support and maintenance. Our subscription services can be easily activated on any of our appliances without requiring additional hardware or processing resources, thereby providing a seamless implementation path for our end-customers. All of our appliances incorporate our PAN-OS operating system and are based on our proprietary identification technologies, App-ID, User-ID, and Content-ID, which allow security policies to be defined within the context of applications, users, and content. We deliver these capabilities through an innovative, single-pass parallel processing architecture that simultaneously performs multiple identification, security, and networking functions. As a result, our end-customers achieve safe application enablement and advanced levels of security, while maintaining high network performance.