This whiteboard session takes a look at how a Palo Alto Networks next-generation firewall allows you to identify and control your datacenter applications, protect them from known and unknown threats and prevent data exfiltration.
I thought it was a great presentation for a network security student trying to get an idea of the real equipment and application of this firewall. Thanks for the demonstration. I now have an idea of how this works which a text book cannot explain.
On a wire, if the hacker encrypts the encrypted channel ( typically a ransomware attack) , how does the monitoring application identify this attack . If identified, what would be the next remedy
Your last example with lync assumes the user is authenticated and the hacker is not and so the hacker connection wont work. how about publicly available services such as http(s) when there is no authentication involve? will the security fallback to traditional firewall with IPS?
Couple of tips: 1)The lightning streak/ shining white band at the bottom of the video is distracting and annoying to the eye. 2) Atleast for the video, I don't see any colors changing with change in pen/s (for most of the pens)