Announcing Traps 5.0: Cloud-Delivered Advanced Endpoint Protection

Share and earn Cybytes
Facebook Twitter LinkedIn Email

Our recent enhancements to Traps have focused on reinforcing prevention capabilities and introducing innovative techniques for protecting against malware, exploits and ransomware. At the same time, our team has also been focused on transforming Traps into a cloud-delivered advanced endpoint protection service.

Today, we are excited to announce Traps 5.0, the most significant release for Traps to date.

Let’s take a look at what’s included in the Traps 5.0 release.


Traps Management Service
The multi-region, cloud-based Traps management service saves organizations from having to invest in building out their own global security infrastructures and ties into Palo Alto Networks Next-Generation Security Platform for additional integration and value. The service is simple to deploy and requires no server licenses, databases or other infrastructure to get started, enabling organizations to protect hundreds to millions of endpoints without incurring additional operating costs.


Palo Alto Networks Logging Service Integration
Integration into the Palo Alto Networks Logging Service allows more effective event management, threat hunting and incidence response, combining endpoint, network and cloud context.

The Traps management service and agents forward all logs to our Logging Service, which is viewable in the Traps management service itself. Logging Service becomes a central repository for the collection and storage of events and incident data captured by Traps, regardless of location.


Reimagined User Interface
You asked; we listened! Traps 5.0 brings a new user interface specifically designed to be more intuitive and minimize the operational challenges that are often associated with endpoint security management. This new interface delivers out-of-the-box protections that streamline the process of protecting new endpoints which come online, and key workflows that focus on policy and event management.

Some of the many capabilities delivered by the new interface include simplified workflows for creating and executing policies that follow the order of operations; sensitivity ranked alerts to enable quick and prioritized event triage; and dynamic grouping so, as new endpoints are added, policy associated with the appropriate policy group is immediately applied.

Additionally, WildFire reports are now viewable directly from security alerts within Traps. The WildFire reports contain critical event details including targeted users, application(s) that delivered the threats, URLs involved in the delivery of threats, and the behavior that was observed in WildFire dynamic analysis.




Linux Support
Linux rounds out the list of major OS platforms now supported by Traps, enabling customers to protect resource- and performance-sensitive cloud workloads against exploits with host-based security. With many of these Linux-based workloads moving to the cloud, the lightweight Traps agent gives you exploit protection with minimal impact on performance and system resources.


Proactive Scanning for Incident Response and Compliance
Previous versions of Traps focused on refining the ability to block malware as it attempted to execute. Traps 5.0 introduces the ability to periodically scan endpoints for dormant malware. If a malicious file is identified, Traps can automatically quarantine the file, ensuring it does not detonate and potentially infect the endpoint and spread to other endpoints.



To learn more about Traps 5.0:

The post Announcing Traps 5.0: Cloud-Delivered Advanced Endpoint Protection appeared first on Palo Alto Networks Blog.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Palo Alto Networks
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets. Our platform was built from the ground up for breach prevention, with threat information shared across security functions system-wide, and designed to operate in increasingly mobile, modern networks. By combining network, cloud and endpoint security with advanced threat intelligence in a natively integrated security platform, we safely enable all applications and deliver highly automated, preventive protection against cyberthreats at all stages in the attack lifecycle without compromising performance. Customers benefit from superior security to what legacy or point products provide and realize a better total cost of ownership.
Promoted Content
Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model
Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyber threats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber criminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning across the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – everyone is a potential target. Ransomware has existed in various forms for decades, but in the last several years criminals have perfected the key components of these attacks. This has led to an explosion of new malware families and has drawn new actors into participating in these lucrative schemes.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?