n n n

Palo Alto Networks Implementation

Customer Need

  1. Client’s outdated Juniper firewall technology was End-of-Life and needed replaced
  2. Firewalls that were protecting the client’s Internet Edge were not very robust in their protection, and they were legacy Layer 3/4 architecture
  3. Business was at risk for more threats in the form of malware and intrusions
  4. Multiple methods of protection were required (i.e. Juniper firewall and Websense URL Filtering)



  1. s4nets implemented the Palo Alto Security Infrastructure consisting of the following:
    1. Panorama Virtual Machine (VM) (Centralized Management server)
    2. (2) PA-3020 firewalls in a High Availaiblity (HA) pair for the Internet
    3. (2) PA-3020 firewalls in a High Availability (HA) pair for the Extranet (customer-facing applications)
  2. The solution addressed the client’s requirements for having a Next-Gen firewall, threat protection, URL filtering, User-ID, and centralized management among others
  3. s4nets implemented Panorama, performed and validated rule migration from the Juniper firewall, migrated the rules from legacy Layer 3/4 to Layer 7 Next-Gen, and helped the client meet every requirement they wanted to see in a new solution


s4nets worked with a local financial services company to design, implement and deploy a Palo Alto Security Architecture. This was the client’s first exposure to Palo Alto Networks, and the s4nets security team worked with the client’s team step-by-step through all stages to ensure a seamless delivery of the solution, as well as to perform knowledge transfer.


  1. The solution was a more robust security platform for the organization that folded two platfroms (firewall and URL filtering) into one and provided the client with meaningful reporting
  2. The solution transformed the client into a more secure business from a Cyber threat response

Network Security


June 23, 2017