Customer Spotlight: Temple University Reduces Attack Surface With TAM Service

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

CustomerReferenceGraphicsTwitter-03 (1)

Home to a student and staff population of nearly 50,000, Temple University provides one of the most comprehensive and diverse learning environments in the United States. For a large university like Temple, enabling open access to a variety of network assets, while simultaneously protecting intellectual property and private information, is paramount.

According to Larry Brandolph, Temple’s chief information security officer, this large-scale accessibility gives the university’s network infrastructure a wide footprint, making it highly susceptible to cyberattacks.

Looking to reduce the network’s overall attack surface, Temple chose Palo Alto Networks as a long-term technology partner and a source for the information needed to meet their current and future network security needs.

Central to this partnership is the technical account manager service, or TAM, which provides continuous updates and recommendations on how to enhance the platform by implementing additional next-generation features. Moreover, the TAM serves as an internal advocate for product support and provides access to technical experts.

With the help of their TAM and a third-party reseller, Temple’s network services team deployed Palo Alto Networks Next-Generation Security Platform, including four PA-7050s, two PA-3060s, and subscriptions to Threat Prevention, URL Filtering (PAN-DB), Panorama, Premium Support, and Technical Account Manager service.

The team was pleased to see the following results:

  • A maximized utilization and value of the Palo Alto Networks platform.
  • Improved traffic visibility to enforce security rules and accelerate incident response.
  • Simplified network segmentation for greater control while allowing openness for students.
  • A reduction in network security complexity, trimming the number of rules from 800 to 600.
  • Proactive insights and roadmapping from the TAM to continually enhance network security capabilities.

Satisfied with the platform’s technical capabilities, the university also sees the TAM service relieving internal staff of many time-consuming research activities. Brandolph says,

“Network security is a critical investment for Temple University, and we want to get the most we can out of that investment. Our TAM is helping us do that.”

Read the rest of the Temple University case study to learn how large organizations can maximize internal resources while minimizing their attack surface with Palo Alto Networks.

The post Customer Spotlight: Temple University Reduces Attack Surface With TAM Service appeared first on Palo Alto Networks Blog.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
35 Followers
About Palo Alto Networks
Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. With our deep cybersecurity expertise, commitment to innovation, and game-changing Next-Generation Security Platform, customers can confidently pursue a digital-first strategy and embark on new technology initiatives, such as cloud and mobility. This kind of thinking and know-how helps customer organizations grow their business and empower employees all while maintaining complete visibility and the control needed to protect their critical control systems and most valued data assets. Our platform was built from the ground up for breach prevention, with threat information shared across security functions system-wide, and designed to operate in increasingly mobile, modern networks. By combining network, cloud and endpoint security with advanced threat intelligence in a natively integrated security platform, we safely enable all applications and deliver highly automated, preventive protection against cyberthreats at all stages in the attack lifecycle without compromising performance. Customers benefit from superior security to what legacy or point products provide and realize a better total cost of ownership.
Promoted Content
Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model
Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyber threats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber criminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning across the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – everyone is a potential target. Ransomware has existed in various forms for decades, but in the last several years criminals have perfected the key components of these attacks. This has led to an explosion of new malware families and has drawn new actors into participating in these lucrative schemes.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel