Date

By Year

By Type

  • In The News (1296)

By Topic

By Product Category

By Services

By Technologies

By Industry

By Audience

By Language

Displaying 1531 to 1560 of 1626

Westcon Security names new VP, inks distribution partnership

Distributor has inked a deal with Palo Alto Networks to expand its solutions offerings
  • 0
  • 2371

What Product Blocks the Highest Percentage of Modern Threats?

As you probably know, last year Gartner recommended that enterprises migrate from stand-alone IPS to next-generation firewalls for performing IPS functions. While this advice made intuitive sense based on the tight relationship between apps and threats, there was nevertheless a lack of empirical evidence to confirm that a next-generation firewall could actually stand up to the challenge of being a true IPS – until now.
  • 0
  • 2446

Making the Next Generation Firewall Smarter for the Enterprise

Traditionally, firewalls have been designed to be cornerstone of network security. But, in reality legacy firewalls are no longer an effective security solution to manage the risks and rewards of today’s Internet applications in the enterprise.
  • 0
  • 2263

Why employees break security policy

It happens every day: an employee who's out of the office wants to get into his machine at work. Instead of using a more secure method, he decides to email some files to his home machine, or upload a file to Facebook, or use a popular PC file-sharing tool. And the next thing you know, your organization is dealing with a major data leak.
  • 0
  • 3542

Intrusion Prevention News and Errata

This week the Ponemon Institute released a study of almost 600 IT security professionals who overwhelmingly reported an increase in advanced threats and a lack of proper security mechanisms to deal with them.
  • 0
  • 2375

Palo Alto Networks Extends Firewall Visibility to Remote Endpoints

More and more applications are moving to cloud and more users are moving off-premise.
  • 0
  • 2327

Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Deny Service

Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can cause denial of service conditions.
  • 0
  • 2376

Palo Alto Allows Enterprises to Control Employee Usage of Facebook

When pitching venture firms, entrepreneurs typically include a slide that shows revenue curving sharply up and to the right shortly after launch – what’s known as the “hockey stick” – but even the best companies rarely meet those projections.
  • 0
  • 2376

Tech Brief

The iPad app that was famous for a few hours, a web browser that strips away adverts, and the man who bought his local police website as revenge for a speeding ticket.
  • 0
  • 2415

Next-Gen Firewalls: Control Apps and Protect Networks

In the past, firewalls worked based on their protocol to apply to all available applications. Next generation firewalls, like those being developed by Palo Alto Networks need to better control apps to protect the network. This Info Tech report discusses next-gen firewalls and how compliance and application usage is changing the role of the firewall in network security.
  • 0
  • 2348

PAN Makes Facebook ''Read-Only'' With New Tool

Other than obliterating productivity, Facebook represents a substantial security risk in the corporate world. However, it's also becoming a powerful marketing tool. So, how do you leverage Facebook without opening the company up to all kinds of malware?
  • 0
  • 2508

Financial Services Firms Face Social Media Compliance Challenges

Brokerages and other financial services firms turning to sites like Facebook and Twitter for marketing and customer outreach face a number of thorny social media compliance issues.
  • 1
  • 2386

Back to the Future

The life of leisure has been postponed. Instead, Michael Lehman has gone back to the future in a sense, taking on the CFO role at Palo Alto Networks, a pre-IPO company in the enterprise network-security industry.
  • 0
  • 2079

Top Concerns of Silicon Valley Business Leaders

For seven years the Silicon Valley Leadership Group has asked member companies in high tech, biotech, financial services and related industries to participate in a business climate survey.
  • 0
  • 2044

Interview: Nir Zuk, Chief Technology Officer, Palo Alto Networks

Nir Zuk, founder and CTO of Palo Alto Networks, is passionate about technology, and has little patience for large, slow-moving bureaucracies.
  • 0
  • 2437

Appliance Approach Secures Australian Blue Chips

Nir Zuk, founder and CTO of Palo Alto Networks, is passionate about technology, and has little patience for large, slow-moving bureaucracies.
  • 0
  • 2414

Social Networks Pervasive in Regulated Industries

The spread of social networks in the enterprise is happening at a far greater rate than is generally believed, according to a report just released by network security firm Palo Alto Networks.
  • 0
  • 2087

Social Networking Risks Under Little Control

While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks.
  • 0
  • 2098

Magic Quadrant Says Now is the Time for Next-Generation Firewalls

You've heard the buzz about next-generation firewalls -- intelligent firewalls that dig deeper than port number and into application visibility.
  • 0
  • 2084

Security Risks Rise as Enterprises Go Social

Sure, social networks are all the rage on the consumer Web, and industry observers have noted that enterprises aren't far behind. But the rush to embrace social technologies carries a heightened security risk, experts warn.
  • 0
  • 2048

Facebook, Google Apps Use Soars in Enterprises, Security Firm Says

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm.
  • 0
  • 2091

Enterprise Networking: Google Apps, Facebook Devour Enterprise Network Bandwidth

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm.
  • 0
  • 2120

Security: Shining a Spotlight on Social Media Risks

New reports from Palo Alto Networks and Webroot indicate that security consciousness is growing among social networkers but so are the risks, especially in highly regulated industries. Channel Insider takes a closer look at what this means for the channel.
  • 0
  • 2110

Tech Apocalypse: Five Doomsday Scenarios for IT

Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and many of them are vulnerable. We see it almost every day.
  • 0
  • 2111

Innovation is Discovered at RSA 2010

The RSA Conference is wrapping up, and it was a much more upbeat experience than the past couple of years. Exhibitors were happy with the booth traffic, many interviewed executives reported sizable year-over-year revenue gains, and most were optimistic about prospects for the balance of 2010.
  • 0
  • 3278

Cell user? Online Networker? Prepare to be Hacked!

With the hue and cry at this year’s RSA Security Conference in San Francisco about the lack of security for users in the mobile “cloud,” it begs the question: what are people doing about it?
  • 0
  • 2875

Products of the Week

Next-generation firewalls from Palo Alto Networks combine three identification technologies to provide the unprecedented visibility and policy control over applications, users and content – all in a high-performance firewall platform.
  • 0
  • 2145

How to Safely Enable Enterprise 2.0 Applications in the Workplace

The adoption and usage of Enterprise 2.0 applications in the workplace is growing at astronomical rates. While there is ample proof of the business benefits of their use, there continue to be major security and compliance risks associated with them.
  • 0
  • 2158

Social Networking Everywhere

The growth of applications like Twitter and Facebook over the last year has been astounding. At Palo Alto Networks, Worldwide Marketing VP Rene Bonvanie says that presents a problem for many employers.
  • 0
  • 2256
Displaying 1531 to 1560 of 1626