{"id":4444,"date":"2014-01-14T05:30:47","date_gmt":"2014-01-14T13:30:47","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4444"},"modified":"2016-12-09T11:27:29","modified_gmt":"2016-12-09T19:27:29","slug":"palo-alto-networks-releases-pan-os-6-0","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/01\/palo-alto-networks-releases-pan-os-6-0\/","title":{"rendered":"PAN-OS 6.0: Raising the Bar in the Fight Against Advanced Threats"},"content":{"rendered":"<p>Today <a href=\"https:\/\/paloaltonetworks.com\/company\/press\/2014\/palo-alto-networks-raises-the-bar-on-battling-sophisticated-cyber-attacks \" target=\"_blank\">Palo Alto Networks announced the availability of PAN-OS 6.0<\/a>, and with it another major milestone in our commitment to defend enterprises, service providers and governments from the most advanced cyber threats.\u00a0 At the center of our enterprise security strategy is an innovative platform, powered by PAN-OS, that provides breakthrough protection from the data center to the network perimeter, as well as the distributed enterprise. With over <a href=\"https:\/\/www.paloaltonetworks.com\/products\/newinpan-os.html\" target=\"_blank\">60 new features<\/a> now available in this release there is quite literally something for everyone.<!--more--><\/p>\n<p>As you read through the feature overview you\u2019ll see two dominant themes emerge.\u00a0 First, we continue to invest heavily in exposing new evasion tactics used by attackers to avoid detection. A clear example can be seen with the enhancements made to <a href=\"https:\/\/www.paloaltonetworks.com\/products\/technologies\/wildfire.html\" target=\"_blank\">WildFire<\/a>, which protects our customers from unknown malware, and zero-day exploits across nearly 400 different applications. Detecting these threats requires that you inspect all traffic \u2013 regardless of the port it\u2019s transmitting through, the protocol used, or whether it\u2019s encrypted, which we estimate constitutes as much as 20-30% of enterprise traffic today.<\/p>\n<p>Second, it should go without saying that the intelligence gathered during detection must be closely integrated with your defenses and shared globally, such that previously unknown attack patterns can never be repeated.<\/p>\n<p>Here are some of the highlights:<\/p>\n<ul>\n<li>PAN-OS 6.0 expands WildFire\u2019s dynamic analysis to include all major file types including Android APK, Java, PDF, PE and Microsoft Office.\u00a0 Inspection can be performed against fully emulated Windows XP and Windows 7 environments with granular reporting and analysis tools to help expedite incident response.<\/li>\n<li>PAN-OS 6.0 adds new DNS analysis and monitoring techniques to identify previously unknown command-and-control (C&amp;C) servers, as well as infected hosts operating within your enterprise.\u00a0 C&amp;C intelligence is routed back to our Threat Prevention and URL Filtering subscription service to block any future communication and quickly remediate existing infections.<\/li>\n<\/ul>\n<p>Be sure to check out the full breadth of this release at our <a href=\"https:\/\/www.paloaltonetworks.com\/products\/newinpan-os.html\" target=\"_blank\">What\u2019s New in PAN-OS 6.0 feature page<\/a>.\u00a0 We\u2019ll detail all of the enhancements made across the platform including VM-Series, GlobalProtect, and Panorama.\u00a0PAN-OS 6.0 will be available the week of January 20th.<\/p>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Today Palo Alto Networks announced the availability of PAN-OS 6.0, and with it another major milestone in our commitment to defend enterprises, service providers and governments from the most advanced cyber threats.\u00a0 &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,5,108],"tags":[197,283,69],"coauthors":[716],"class_list":["post-4444","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-firewall","category-threat-prevention-2","tag-apts","tag-pan-os-6-0","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4444"}],"version-history":[{"count":6,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4444\/revisions"}],"predecessor-version":[{"id":4479,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4444\/revisions\/4479"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4444"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}