{"id":2742,"date":"2012-08-06T16:31:15","date_gmt":"2012-08-06T23:31:15","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=2742"},"modified":"2012-08-07T08:50:25","modified_gmt":"2012-08-07T15:50:25","slug":"firewall-expert-series-globalprotect","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2012\/08\/firewall-expert-series-globalprotect\/","title":{"rendered":"Firewall Expert Series: GlobalProtect"},"content":{"rendered":"<p><strong>Firewall Expert Series: GlobalProtect<\/strong><\/p>\n<p>An interesting thing happened on the road to mobility. In the past, road warriors only needed a VPN connection in order to access corporate resources from time to time. It\u2019s what VPNs were designed to do, namely to take the cost out of modem banks and toll free phone lines, and replace them with cheaper connections to an Internet Service Provider. The VPN provided a way for users to set up temporary remote access connections over public networks.<!--more--><\/p>\n<p>While VPN remote access remains a vital component of a mobility solution, it\u2019s not the only requirement. \u00a0Times have changed, and today organizations are concerned about risks that employees are exposed to when off network as well. Users are often connecting from open public network connections that provide no protection whatsoever for the endpoint. In addition, the user may engage in activity (intentionally or accidentally) that could imperil the organization, the data and the endpoint, such as being tricked into visiting malicious websites or downloading malware.<\/p>\n<p>What\u2019s clear is that organizations need to provide more than just remote access to their mobile users. In order to address new requirements for mobility, there is a shift underway from the traditional remote access to \u201cprotected connectivity\u201d.<\/p>\n<p>Protected connectivity has three elements:<\/p>\n<p>1)\u00a0\u00a0\u00a0\u00a0\u00a0 Protect the Network Connection<\/p>\n<p>2)\u00a0\u00a0\u00a0\u00a0\u00a0 Protect the Network Traffic<\/p>\n<p>3)\u00a0\u00a0\u00a0\u00a0\u00a0 Enforce Consistent Security Policies<\/p>\n<p>Palo Alto Networks holds ongoing 30 minute webinars to provide information about different elements of the next-generation firewall. This month, we\u2019ll be taking a deeper look at how to use GlobalProtect for protected connectivity. Learn about how it works, and see a short demonstration from both the end-user and the administrator\u2019s viewpoint.<\/p>\n<p><a href=\"https:\/\/www1.gotomeeting.com\/register\/843318576\" rel=\"nofollow,noopener\" >Register for the Firewall Expert Series<\/a><\/p>\n<p>Guarding Mobile and Remote Users with GlobalProtect<\/p>\n<p>August 9, 2012<\/p>\n<p>10:00 AM PST<br \/>\n12:00 PM CST<br \/>\n1:00 PM EST<\/p>\n<p>For more information about what GlobalProtect can do for you, visit <a href=\"http:\/\/www.paloaltonetworks.com\/globalprotect\">http:\/\/www.paloaltonetworks.com\/globalprotect<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Firewall Expert Series: GlobalProtect An interesting thing happened on the road to mobility. In the past, road warriors only needed a VPN connection in order to access corporate resources from time to &hellip;<\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[96,76],"tags":[98,97],"coauthors":[],"class_list":["post-2742","post","type-post","status-publish","format-standard","hentry","category-distributed-enterprise","category-mobility","tag-firewall-expert-series","tag-webinar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2742"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2742\/revisions"}],"predecessor-version":[{"id":2744,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2742\/revisions\/2744"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2742"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=2742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}