TAP into Technology | Garland Technology Blog

[Demo] Chaining the Edge of your Network

Written by Chris Bihary | 12/1/16 1:00 PM

In our recent webinar with Palo Alto Networks' Fuel User Group I asked the attendees a survey question:

"How many security tools do you currently deploy?"

The answer from the majority of the group was "4 or more." The attendees - all Fuel Group User members, are in the same security stack scenerio as every one else managing the network's edge. We all know that more tools will be added to the stack, some will need to share data and others will need only a slice.

Watch our 6 minute video that shows you how to create visibility for each device while still providing individual device management.

[Demo Video] Chaining the Edge of Your Network

In this quick demonstration video you will learn how to create a unified security layer with network security chaining of up to four active, inline security tools.