In The News

Filter Results By

Filter by Year

Filter by Type

  • In The News (1231)

Filter by Topic

Filter by Industry

  • Healthcare (1)

Viewing All Results

Most Viewed

Tech Trade Asia , March 17, 2014, 12:00 AM

Enterprise security company Palo Alto Networks may be growing 46% year on year, but that's not enough - it is now focused on an even more aggressive growth curve, and partnering with mega tech distributor Ingram Micro to do it.

Palo Alto Networks had already built up a channel network since it first arrived in the Asia Pacific region four years ago, but the strategy to work with the world's largest distributor of computer and technology products is very much about getting to the next level, said Sharat Sinha, Vice President, Asia Pacific, Palo Alto Networks.  

57 Views
Resource
IT-Zoom | July 1, 2015, 12:00 AM

IT security professionals in enterprises must consider the Internet of Things as a new and dangerous attack vector. In future we should make all thoughts about the safety of our cars. In the beginning of the era of the internet of things we need to completely rethink the issue of endpoint security. Required the use of technology, the operations is prevented at the endpoint device before malware can be active.

Resource
Computerwoche | July 1, 2015, 12:00 AM

Protection against hacker attacks is essential to enterprises. To prevent effectively, companies should internalize the life cycle of a cyber attack and the corresponding countermeasures. 

Palo Alto Networks has analyzed the life cycle of a cyber attack. This company should be enabled cybercriminals to ride in the parade.

Resource
Search Security | July 1, 2015, 12:00 AM

In today's IT threat landscape acts Malware highly targeted and often even with intelligent evasive maneuvers. Modern malware is designed to be as invisible as possible. 

Target of criminal actors is to break through the network boundaries and to extract valuable data with malware that moves laterally through the company's network. All this happens because the malware for traditional network security solutions is often not evident.A year or so ago, McAfee, Symantec, Palo Alto Networks and Fortinet formed a Cyber Threat Alliance, with the general intention of swapping a wider range of information about participants on the dark side of the internet, as well as building co-operation with governments.

Resource
CIO | July 1, 2015, 12:00 AM

The Osram GmbH has standardized its security infrastructure worldwide. The Munich-based lighting manufacturer would be after the switch to the enterprise security platform of Palo Alto Networks for over tangible positive effects. So apparently were saved on operating costs through the project a total of more than 500,000 euros.A year or so ago, McAfee, Symantec, Palo Alto Networks and Fortinet formed a Cyber Threat Alliance, with the general intention of swapping a wider range of information about participants on the dark side of the internet, as well as building co-operation with governments.

Resource
IT Business | June 25, 2015, 12:00 AM

If cybercriminals access to credit card or financial information, the subject of Internet security and privacy for those involved in importance. This applies even more when Hackers access to medical records and medical data. In addition, a secure IT is increasingly becoming a competitive factor.

Resource
iTPro.fr | June 23, 2015, 12:00 AM

Within Palo Alto Networks, a research team, called Unit 42 and consists of cybersecurity engineers spread across the planet, these nuggets research , participates in the ecosystem to understand towards what fertile ground must be dug and can experience some bugs. Guard and be proactive against attacks. This trend will grow in 2015.

Resource
Digital News Asia | June 23, 2015, 12:00 AM

SHADOW IT is a trend that is catching the attention of CIOs (chief information officers) across the Asia Pacific region, as they consider its security implications and how to best stay on top of the situation.

Put simply, the term ‘Shadow IT’ refers to employees using IT solutions without corporate approval.

The concern is understandable, as unauthorised technology could create new vulnerabilities in the network.

Resource
Computerworld | June 18, 2015, 12:00 AM

The Palo Alto Networks found a series of cyber attacks on military and government networks in Southeast Asia. Called Operation Lotus Blossom, the action of hackers aimed to obtain confidential information from executive powers Taiwan, Vietnam, Philippines, Indonesia and Hong Kong.

Resource
B!T Magazine | June 18, 2015, 12:00 AM

The Unit 42, advanced research unit of the Palo Alto Networks released short of a major campaign of cyber attacks against government and military organizations in countries such as Hong Kong, Taiwan, Vietnam, Philippines and Indonesia.

Resource
Investors Business Daily | June 17, 2015, 12:00 AM

Palo Alto Networks' (NYSE:PANW) threat intelligence team has uncovered more than 50 separate cyberattacks against government and military organizations in Hong Kong, Taiwan, Vietnam, Indonesia and the Philippines.

In a report released late Tuesday, Santa Clara, Calif.-based Palo Alto Networks said "potentially state-sponsored cyberattacks" over the past three years appear to be an attempt to gain inside information on operations of nation-states throughout Southeast Asia

Resource
SC Magazine | June 17, 2015, 12:00 AM

cyberespionage campaign dubbed “Operation Lotus Blossom” has carried out more than 50 attacks against government and military organizations across Southeast Asia over the last three years, according to researchers from Palo Alto Networks's Unit 42.

Resource
Help Net Security | June 17, 2015, 12:00 AM

Palo Alto Networks uncovered a series of potentially state-sponsored cyberattacks targeting government and military organizations in countries throughout Southeast Asia. Help Net Security has learned that their Unit 42 team has been gathering and analyzing data since January of 2015.

Resource
ABS-CBN News | June 17, 2015, 12:00 AM

Based on a recent study conducted by an international cyber security firm, agents of one country have been hacking into Philippine cyberspace and looking at government and military documents. This report tells us the Philippines is beefing up efforts against cyber attacks.

Resource
The Data Drive | June 16, 2015, 12:00 AM

Palo Alto Networks shared research that uncovers a series of potentially state-sponsored cyberattacks targeting government and military organizations in countries throughout Southeast Asia. 


Discovered by the Palo Alto Networks Unit 42 threat intelligence team and dubbed “Operation Lotus Blossom”, the attacks appear to be an attempt to gain inside information on the operation of nation-states throughout the region.  The campaign dates as far back as three years and involves targets in Hong Kong, Taiwan, Vietnam, the Philippines and Indonesia.

Resource
Wirtschaftsblatt | June 16, 2015, 12:00 AM

Companies in the IT risks are still too little aware. Manufacturers already see a lucrative market. VIENNA. Still too little is spoken about data and IT security in Austria, says Scott Gainey, Vice President of the US IT security company Palo Alto Networks. "There is the prevailing attitude that Austria was not a target for attacks."Correct this assessment did not do so already long.

Resource
Security Week | June 16, 2015, 12:00 AM

Researchers at Palo Alto Networks have identified a cyber-espionage operation targeting government and military organizations in Southeast Asia.

The group responsible for the campaign has been nicknamed 'Lotus Blossom', and given its targets and persistence, is likely state-sponsored, according to Palo Alto Networks. More than 50 different attacks have been linked to the campaign, which has gone on for the past three years.

Resource
v3.co.uk | June 16, 2015, 12:00 AM

Security firm Palo Alto Networks has discovered a cluster of potentially state-sponsored security attacks that appear to be targeting government and military organisations across south east Asia.

'Operation Lotus Blossom' targets state information from Hong Kong, Indonesia, the Philippines, Vietnam and Taiwan, the firm said.

Resource
Security Week | June 15, 2015, 12:00 AM

Researchers at Palo Alto Networks have identified a cyber-espionage operation targeting government and military organizations in Southeast Asia.

The group responsible for the campaign has been nicknamed 'Lotus Blossom', and given its targets and persistence, is likely state-sponsored, according to Palo Alto Networks. More than 50 different attacks have been linked to the campaign, which has gone on for the past three years.

Resource
eGovernment | June 15, 2015, 12:00 AM

Two-thirds of IT decision makers in US federal prepares cyber security in the context of the modernization of data centers headache. How are security incidents in the federal administration in Germany handled, what about the defense strategy?

For years, Meri Talk dedicated to the optimization of IT by government agencies in the United States. Now, the organization announced the latest results of its investigation "Heart of the Network: Defense Data Center" known. The study, which was created in cooperation with Palo Alto Networks, deals with the "health" of the cyber security of the nerve centers of the IT infrastructure, the data center.

Resource
Financial Review | June 15, 2015, 12:00 AM

As cyber security problems intensify, a group of cyber security companies is hoping an alliance of private security specialists and government bodies with access to official intelligence information may be able to slow the proliferation of the identity theft, ransomware, hacking, key loggers, botnet recruitment, funds misappropriation and industrial espionage now rife on the internet.

A year or so ago, McAfee, Symantec, Palo Alto Networks and Fortinet formed a Cyber Threat Alliance, with the general intention of swapping a wider range of information about participants on the dark side of the internet, as well as building co-operation with governments.

Resource
iTPro.fr | June 15, 2015, 12:00 AM

In this video interview, Arnaud Kopp talks about prevention, AutoFocus and Wildfire and how collaboration and sharing experience can help ecosystems to fight cyberattacks.

Resource
Dutch IT-channel | June 12, 2015, 12:00 AM

Palo Alto Networks, player in enterprise security, today announced enhancements to its Enterprise Security Platform, designed to run applications securely and to prevent cyber offenses.

The adjustments have been included in the PAN-OS 7.0 version, increase prevention capabilities of the security platform through rigorous analysis, automation and operational efficiency. The improvements are designed to help customers block threats to their networks, endpoints and cloud-enabled data centers.

Resource
CIO | June 12, 2015, 12:00 AM

Palo Alto Networks was the first company that was seen by Gartner in 2009 as a provider of next-generation firewalls. According to Christian Hentschel , Theatre VP EMEA at the US company, it was a breakthrough for the security industry with a vengeance. He compares this feat of the supplier also happy to shake up the auto industry what Tesla did by coming to market in 2008 with the revolutionary electric Roadster.

Resource
Global Security Mag | June 11, 2015, 12:00 AM

Palo Alto Networks announced several enhancements to its security platform designed to secure applications and prevent cyberfailles. The advances announced today, which are included in the PAN-OS 7.0, strengthen the platform of prevention capacity by improving the strength of analysis, automation and operational functioning, all designed to help customers prevent threats to undermine their networks, access points and their data centers in the cloud.

Article
zawya | June 9, 2015, 12:00 AM

Palo Alto Networks (NYSE: PANW), the leader in enterprise security, today announced enhancements to its industry-leading security platform designed to safely enable applications and prevent cyber breaches. The advancements announced today, which are included in the PAN-OS 7.0 release, expand the prevention capabilities of the platform through enhanced analysis, automation and operational efficiencies - all designed to help customers block threats from compromising their networks, endpoints and cloud-enabled data centers.