Displaying 1 to 30 of 71

How Palo Alto Network’s Next-Generation Firewalls Protect Against Torpig Attack

In this blog, I talk about how our next-generation firewalls protect against botnets such as Torpig.

  • 0
  • 153

Iron Man and Next-Generation Firewalls

Gartner’s research on next-generation firewalls and how they are changing the enterprise firewall marketplace is pretty compelling. And the recommendation to migrate from traditional firewalls and IPS to next generation firewalls at refresh time is very clear. Here’s your chance to hear from Greg Young, Gartner Research VP, and one of the authors of the 2010 Enterprise Firewall Magic Quadrant. And catch the premier of what is likely to be one of the hottest movies of the year.

  • 0
  • 143

Social media messaging is getting around traditional firewalls

Is the firewall obsolete? Probably not, but current implementations were never designed to cope with the threats posed by Webmail, various social networking tools, and even popular corporate collaboration applications like SharePoint and WebEx.

  • 0
  • 134

Network Security Check-Up for Health Care Networks

Health care providers are an interesting situation with regard to network security. Like many industries, they’re dealing with rapid technological change in the face of a variety of regulations – in the U.S. health care industry it’s HIPAA and HITECH, and PCI – focused on the portability, security and privacy of PHI and the security of patients’ credit card data, respectively.

  • 0
  • 139

The new Facebook threat to business

The Boy Billionaire, aka Facebook CEO Mark Zuckerberg, has done it again. His proposal to turn Facebook messaging into a sort of universal communications platform is probably the worst idea of the year. It's bad for the privacy of users and for corporate IT, which will have to deal with a huge spike in hard-to-defend Webmail.

  • 0
  • 129

How Safe are Our Apps?

Chris King from Palo Alto Networks chats about results from the company's 2010 Application Usage and Risk report, which shows that social networking is in full swing at the enterprise, despite reports of vulnerabilities. Surprisingly, productivity on social networks is not as much of a drain as once thought. King discusses these issues and other application trends with Keith Shaw.

  • 0
  • 131

Is a next-generation firewall in your future?

Next-generation firewalls from Palo Alto Networks combine three identification technologies to provide the unprecedented visibility and policy control over applications, users and content – all in a high-performance firewall platform.

  • 0
  • 145

A Start-Up That Actually Met Its 'Hockey Stick' Revenue Projection

When pitching venture firms, entrepreneurs typically include a slide that shows revenue curving sharply up and to the right shortly after launch – what’s known as the “hockey stick” – but even the best companies rarely meet those projections.

  • 0
  • 140

The Future of Network Security

The Future of Network Security with Nir Zuk.

  • 0
  • 131

Workers Abusing Social Sites On Corporate Networks

More than 70% of the traffic on corporate networks today comes from the Internet, and a sizable portion of it stems from employees’ use of Gmail, Hotmail, Facebook and BitTorrent for personal reasons.

  • 0
  • 141

Facebook Users are Voyeuristic While at Work

There are several realities that typically fall outside of the approved enterprise communications mechanisms. These applications can enhance business responsiveness and performance – but, conversely – introduce inbound risks such as malware and vulnerability exploits, and outbound risks such as data loss and inadvertent sharing of private or proprietary data.

  • 0
  • 144

Webmail Poses Great Security Risk than Social Networking

A new report from Palo Alto Networks states that employee use of webmail poses a far greater security risk than use of social networks.

  • 0
  • 142

Study Looks At Move To Cloud-Based Applications, Facebook Usage At Work

In its latest edition of the Application Usage and Risk Report, Palo Alto Networks draws attention to several realities that typically fall outside of the approved enterprise communications mechanisms.

  • 0
  • 134

Global Usage of 'Saying, Socializing and Sharing' Applications Remarkably Consistent

Software applications that enable employees to communicate personally with each other, participate in social networks and share files with one another are being used in 96 percent of the organizations recently studied, and account for about one-quarter of the total bandwidth being consumed by those organizations.

  • 0
  • 130

Employees' Use Of Webmail, File-Sharing Services Riskier Than Their Facebook Activity

Facebook usage by employees gets a bad rap, but it turns out workers are doing more surfing on the social network than potentially giving away company secrets: New data from some 700 of Palo Alto Networks' application-layer firewall customers shows Webmail use poses a much bigger problem.

  • 0
  • 129

Next-generation firewalls not ready to replace all legacy firewalls

Next-generation firewalls, or application-aware firewalls, have enjoyed well-deserved hype from network engineers and analysts, but the technology is still evolving. Many enterprises are also holding onto their old port and protocol firewalls, at least for now.

  • 0
  • 142

Report: Facebook Users in the Workplace are "Voyeurs"

It's 3 p.m. Do you know where your company's employees are? Probably not, because a whole lot of them are paging through Facebook, and not for business purposes either.

  • 0
  • 129

Top 10 Consumer Apps/Devices Infiltrating the Business

The war is over and, in case you missed it, IT lost. The once ferocious attempts to guard the corporate perimeters against unapproved devices and applications is sputtering to an end because, frankly, all but myopic IT diehards recognize this is battle that's already over.

  • 0
  • 120

A-Teams of IT: How to build a crack strike force

IT is a tough job, but somebody's got to do it. And these days it takes a team of talented technology professionals, each with his or her own special expertise, to carry out mission-critical assignments.

  • 0
  • 138

Palo Alto Expands Into Two-Tier Distribution In North America

Network security upstart Palo Alto Networks has signed distribution agreements with Westcon Group and Computerlinks, marking the first time Palo Alto's security products will be sold through two-tier distribution in North America.

  • 0
  • 127

Network Security Vendor Palo Alto Networks Partners with Distributor Westcon

Palo Alto Networks, the three-year-old networking security vendor, has moved to two-tier distribution, signing with Westcon and Computerlinks. And Westcon has a new many to handle its security division, former Avnet executive Andrew Warren.

  • 0
  • 138

Palo Alto Networks: Can VARs Assist Long-term March to IPO?

Palo Alto Networks has a concise message for channel partners: The security company was cash-flow positive in its most recent quarter, and is looking to double its business in the year ahead. To assist with that effort, Palo Alto Networks has recruited roughly 150 channel partners and is now working with two distributors: Westcon Group and Computerlinks.

  • 0
  • 124

Palo Alto Eyes IPO, Distribution As Growth Goes Viral

Back in June 2008, when Lane Bess signed on as CEO of Palo Alto Networks, sales were modest and industry buzz was a whisper.

  • 0
  • 134

Westcon Security names new VP, inks distribution partnership

Distributor has inked a deal with Palo Alto Networks to expand its solutions offerings

  • 0
  • 129

What's APPening with Google Docs

Gartner’s recent forecast analysis for Software-as-a-Service observes that Web-based office suites such as Google Apps (including Google Docs) will coexist with traditional office suites as business users will find them appropriate for real-time collaboration or as secondary online tools for taking notes.

  • 0
  • 137

NSS Labs Report on Palo Alto Networks

The Palo Alto PA-4020 is 93.4% effective and costs $38/Mbps-Protected.

  • 0
  • 134

What Product Blocks the Highest Percentage of Modern Threats?

As you probably know, last year Gartner recommended that enterprises migrate from stand-alone IPS to next-generation firewalls for performing IPS functions. While this advice made intuitive sense based on the tight relationship between apps and threats, there was nevertheless a lack of empirical evidence to confirm that a next-generation firewall could actually stand up to the challenge of being a true IPS – until now.

  • 0
  • 127

Tracking File Movement: Take Measures to Protect Enterprise Information

Do you know whether files are leaving your enterprise? Can you track file movement? If not, you’re not alone, but you’ll want to consider stepping up security measures to protect vital enterprise information.

  • 0
  • 140

What the Intel/McAfee Merger Means for Enterprise Security Managers

Much of the chatter over the past two days about the Intel/McAfee deal has been about why Intel decided to acquire McAfee. But what does the deal mean for enterprise security managers? We asked a few experts at other security vendors to for their take on the news.

  • 0
  • 136
Displaying 1 to 30 of 71