• Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Industries
  • Partners
  • Why Palo Alto Networks?
  • Company
  • More
  • Sign In
    Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Explore Zero Trust

UK Cabinet Office Technology

Mar 24, 2015 at 12:00 AM

The UK Cabinet Office Technology Transformation programme was established to replace an end-of-life outsourced IT service.

The aim of the programme is to enable modern flexible ways of working and to provide civil servants with technology at least as good as they have at home.

During user testing at the start of this project, staff told the UK Cabinet Office IT team that they wanted better connectivity; greater choice of applications; to be able to be more mobile with more portable devices and to be able to collaborate on documents in real time.


Read the Blog

 


Article

What is a Botnet?

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
May 5, 2022

Article

What is the Difference between FISMA and FedRAMP?

To deliver cloud-based services to the government, it’s important to have an understanding of government-enacted Federal IT compliance standards
April 7, 2022

Article

Cyber Range

To keep network and security professionals’ security acumen fresh, Palo Alto Networks and Cyber Test Systems present a professional mobile Cyber Range suite.
April 28, 2021

Research Reports

Operation Lotus Blossom (Reports)

Operation Lotus Blossom describes a persistent cyber espionage campaign against government and military organizations in Southeast Asia. The report exposes the targets, tools, and attack techniques, and provides full details on the Lotus Blossom campaign, including all indicators of compromise. Unit 42 discovered these attacks using the Palo Alto Networks AutoFocus™ platform, which enables analysts to correlate the results of the hundreds of millions of reports generated by WildFire™.
Santa Clara, CAJune 16, 2015

Article

What is Cloud Security?

Cloud Security is composed of various technologies and tools designed to protect each aspect of the shared responsibility model.
May 5, 2022

Other

Prisma Cloud NIST SP 800-190: At a Glance

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-190 provides guidance on securing application containers and related ecosystem components. While it thoroughly describes the security risks and associated countermeasures for protecting containerized apps, it leaves organizations to fend for themselves on the tactical front. Twistlock is a purpose-built software suite for securing cloud-native workloads. From the beginning, we’ve been developing technology to address the types of risks NIST SP 800-190 describes.
June 12, 2020

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved