Palo Alto Networks Traps – Endpoint Protection

Traps prevents security breaches!


Traditional antivirus (AV) is not the solution to endpoint security – it is the problem. AV is no longer effective at stopping today’s cyberthreats and to prevent security breaches in your organization, you must protect yourself not only from known and unknown cyberthreats but also from the failures of any traditional AV solutions deployed in your environment.

Traps replaces traditional antivirus with a proprietary combination of purpose-built malware and exploit prevention methods that protect users and endpoints from both known and unknown threats. With Traps, you prevent security breaches, in contrast to detecting and responding to incidents after critical assets have already been compromised.

The updated release of Traps eliminates the need for traditional AV by enabling you to:

  • Prevent cyber breaches by pre-emptively blocking known and unknown malware, exploits and zero-day threats.
  • Protect and enable your users to conduct their daily activities and use web-based technologies without concern for known or unknown cyberthreats.
  • Automate breach prevention by virtue of the autonomous reprogramming of Traps using threat intelligence gained from Palo Alto Networks WildFire threat intelligence service.

To learn more about Traps and its new updated capabilities download the latest resources from Palo Alto Networks:

  • Solution Brief: Traditional endpoint protection solutions use methods that cannot keep up with the rapidly evolving threat landscape. There’s a new way to approach endpoint security. Prevent breaches – without AV. Advanced Endpoint Protection – Technology Overview
  • Whitepaper: It’s time to replace your traditional antivirus with next-generation endpoint security. But how? Protect Yourself from Antivirus.
  • Datasheet: See how Palo Alto Networks Traps advanced endpoint protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Traps Datasheet
  • Dummies Guide: Todays’ sophisticated cyberattacks are designed to inflict maximum damage to an organisations systems and networks, steal sensitive information and render an organisations systems and networks unusable. This guide shows you how to protect your assets. Advanced Endpoint Protection for Dummies.

If you would like to know more about Traps and how Network Utilities can educate and support you please get in touch with our specially trained team.

t: 020 8783 3800 e:

You can read the full blog here written by Michael Moshiri (Director, Product Marketing, Palo Alto Networks).

Other pages of interest:
Palo Alto Networks Raises the Bar for Endpoint Security with Updates to Traps Advanced Endpoint Protection Offering. Read the full blog here.

Independent Authority Certifies that Palo Alto Networks Traps Helps Customers Meet PCI and HIPAA Cybersecurity Requirements. Read the full blog here.

About Network Utilities
Identity Centric Networks & Security

Network Utilities (Systems) Ltd have been providing identity centric network and security solutions to organisations ranging from Telecoms and ISPs to large corporates and SMEs for over twenty three years. Partnering closely with both industry leading and niche technology vendors to bring customers the best solutions the industry has to offer. Read more at

Network Utilities to launch Monitoring-as-a-Service at IP EXPO

ip-expo-linkedin-imageAs you may or may not know we have recently launched our Monitoring-as-a-Service offering over the summer to help you plan for your IT holiday cover, as we all know networks, application and storage just keep on running.

We are pleased to announce that our expert team will be at IP EXPO on the 5th and 6th October to talk to you about our new Monitoring-as-a-Service offering. The service, delivered by a 24/7 UK based operations centre and technical team monitors network, server and storage architectures for both security and availability with optional pay-as-you go incident packs for rapid remediation of any issues.

“In the past, SMEs have sometimes overlooked managed services due to the perceived high cost and limited flexibility,” explains David Silsby, Enterprise Sales Director for Network Utilities, “With our new monitoring as a service offering, we have looked at what SME’s really require and created a product that is extremely cost effective and allows the customer to pay for what they need and scale up as they grow – without skimping on crucial elements such as skilled support staff or customer service.”

The service includes flexible notification and escalation that can be setup for contact via phone or email, with a tailored dashboard to allow clients to view all monitored devices in real time, supported by monthly reports detailing the overall health of the network and attached IT infrastructure. Every client also gains a dedicated account manager that helps manage the service while providing guidance on wider networking and security challenges.

Come on down to stand A9 and you could be the winner of an Amazon voucher or an awesome Apple watch.

Register to attend IP EXPO here

We look forward to seeing you there.

Are you ready for a break? Your IT infrastructure may not be….

With summer upon us, many organisations are planning for holiday cover and IT departments are more stretched than ever. Unlike some areas of the business that may work 9 to 5, Monday to Friday; networks, application and storage just keep on running. Yet for many firms, the ability to attract and retain IT staff and especially security specialists means that there is often little available slack to take over the reins.  A better, long term option is needed!

Managing risk

With senior IT specialists potentially away, one of the biggest issues is ensuring that the people taking over responsibilities have the right skill set, and that they understand escalation procedures in the event of a service impacting issue.  Most organisations will have break-fix maintenance contracts in place in case of a hardware breakdown. However, many of the most difficult problems to overcome come from software, configuration changes or the patches issued to fix security vulnerabilities.  A recent survey from EMC found that 49% of all unplanned downtime is down to software issues while the average business experienced more than three working days (25 hours) of unexpected downtime in the last 12 months.

Keeping it secure 

Security is one of the most challenging risks. Although staff may need to take a break, cyber criminals are continually looking for new vulnerabilities to exploit; while software vendors are issuing patches to thwart them. In the event of an emergency patch being issued, the Heartbleed vulnerability of 2014 being a prime example, IT departments need to react quickly to patch affected systems before they are successfully exploited.  One solution is to employ short term IT contractors. However, this is not always ideal as it requires time for these new hands to get up to speed on the systems and procedures of the organisation, and the cost is often prohibitive with day rates well in excess of £500 not unusual. Another option is to put junior staff in an acting senior role to cover any absence. With this approach comes the risk that if something untoward happens, they simply don’t have the skills to deal with the situation. Or in some cases, lack the authority to even enact the fix such as taking critical systems offline to apply a needed patch.

Even after the holiday season passes; the challenge still remains. Many organisations are moving to more flexible hours to satisfy the needs of teleworking staff and international business processes that span time zones. The end result is that even though the supposed ‘night shift’ may be less busy, the core competency of IT skill sets need to be readily available.

A better option

In response, some organisations with deep pockets and regulatory constraints, such as financial services, may well run to the expense of doubling up IT staffing levels with dedicated out-of-hours teams. However, for the vast majority of midmarket organisations, a more sensible approach is to use a managed service approach that can cost effectively take over the bulk of day-to-day time consuming tasks such as device and application monitoring. In addition, if there is a staffing shortage or incident; these managed services can be ramped up to meet short term requirements and then turned down to reduce expense. A good managed service will retain and make available the skilled staff that are needed on certain occasions, and economies of scale of the shared model means that you only need to pay a fraction of the 24/7 staffing that doing it in-house would incur. This approach can be particularly beneficial in overcoming the skills shortage in areas like IT security and networking by freeing up time and allowing in-house IT teams to focus on activities that add value to the business.

Crucial for business continuity and network uptime, our 24/7/365 network monitoring service gives you the peace of mind to know our expert engineers always have a close eye on your network. Visit for more.


An Introduction to ChangeGear – ChangeManager

We’re proud to introduce SunView Software’s ChangeGear Change Manager, the new generation multi-modal change management solution purpose-built for speed and agility in the enterprise.

Network Utilities & Sunview Software at The Service Desk Show 2016

The Service Desk & IT Support Show took place at London’s Olympia on 8-9 June 2016. Together with our partners SunView Software an industry leader in service management software, we showcased a new multi-modal change management offering based on SunView’s powerful ChangeGear platform, ChangeManager. View our short video to hear why effective change management has never been more important in today’s agile enterprise.

Network Utilities and A10 Networks were recent sponsors of the RANT Forum

You’ve done everything in your power to inspect incoming and outgoing traffic, but everyone has a blind spot, and no matter how many times you check over your shoulder, that malicious, encrypted traffic can slide right by your network defences, buried in encrypted SSL traffic. How can we inspect ALL traffic, eliminate this blind spot and keep legitimate traffic flowing?

Network Utilities and A10 Networks were recent sponsors of the RANT Forum. In this short video we discuss RANT and discuss how Network Utilities together with A10 can support your current infrastructure and defence challenges.

Webinar Recording: Secure Access has Never Been More Vital – Find Out Why With Pulse Secure

In this webinar recording you will learn:

• Why enforcing traditional IT rules on a tech savvy workforce is no longer necessary
• How transforming traditional IT into Hybrid IT can enable the workforce and maximise their productivity
• How IT can offer flexibility while ensuring compliance and full corporate policy adoption
• How IT can offer continuous secure access seamlessly to their workforce
• How Secure Access for the Next Generation is solving mobile productivity challenges for organisations today