ICS/OT

Palo Alto Networks Unveils New Rugged Firewall for Industrial Environments 

Palo Alto Networks has launched a new rugged firewall for industrial environments and announced several OT security improvements.

Palo Alto Networks OT security firewall

Palo Alto Networks on Wednesday unveiled a rugged firewall for industrial environments along with several new features available through its Industrial OT Security offerings.

The new ruggedized next-generation firewall (NGFW) for harsh industrial environments is the PA-450R. The new product, recommended for operational technology (OT) environments such as power substations, leverages machine learning to block threats and Palo Alto Networks says it delivers three times more performance compared to previous generation firewalls.

The PA-450R natively integrates with the company’s Industrial OT Security offerings and provides visibility, security, trust verification and threat prevention. 

The company also announced that its OT security offerings now provides asset identification and risk visibility capabilities for cellular-connected devices that use 5G. 3G- and 4G-connected devices are also supported.

“Working seamlessly within the Palo Alto Networks NGFW, this solution offers customers the ability to correlate mobile-specific contexts, including IMEI and IMSI, with high-fidelity device identification, such as device type, vendor make, model, operating system and risk and behavior analytics. We’ve also enhanced the Industrial OT Security’s device database by incorporating an additional 220,000 device types, sourced from the GSMA database,” Palo Alto Networks explained.

The new capability enables organizations to quickly detect, for example, potentially malicious communication between a mobile device and an application that may be unauthorized.

The cybersecurity giant also announced a risk priority classification feature designed to evaluate threat likelihood indicators and the impact to a customer’s environment. The feature leverages data such as CVSS score, threat insights from CISA’s KEV catalog, and the exploit prediction scoring system (EPSS).

For organizations using software-defined wide area network (SD-WAN) technology, Palo Alto Networks announced that its Prisma SD-WAN on-premises controller can be used in their OT environments, enabling customers to safely identify and profile devices using industrial protocols like Modbus, Siemens S7, and EtherNet/IP.

Advertisement. Scroll to continue reading.

In addition, the recently announced Strata Cloud Manager (SCM) operations management solution features a dedicated OT security dashboard for quick access to OT risks and alerts.

Related: Russian Hackers Used OT Attack to Disrupt Power in Ukraine Amid Mass Missile Strikes

Related: Free Tool Helps Industrial Organizations Find OPC UA Vulnerabilities

Related: CISA Warns of Unitronics PLC Exploitation Following Water Utility Hack

Related Content

Incident Response

Palo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.

ICS/OT

Palo Alto Networks firewall vulnerability CVE-2024-3400, exploited as a zero-day, impacts a Siemens industrial product.

Malware & Threats

Shadowserver has identified roughly 6,000 internet-accessible Palo Alto Networks firewalls potentially vulnerable to CVE-2024-3400.

Malware & Threats

Palo Alto Networks firewall vulnerability CVE-2024-3400 increasingly exploited after PoC code has been released. 

Malware & Threats

Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus. 

Malware & Threats

A state-sponsored threat actor has been exploiting a zero-day in Palo Alto Networks firewalls for the past two weeks.

Vulnerabilities

Palo Alto Networks warns of limited exploitation of a critical command injection vulnerability leading to code execution on firewalls.

Vulnerabilities

Palo Alto Networks patches several high-severity vulnerabilities, including ones that allow DoS attacks against its firewalls.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version