See our SolarStorm response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

UK Cabinet Office Technology

Mar 24, 2015 at 12:00 AM

The UK Cabinet Office Technology Transformation programme was established to replace an end-of-life outsourced IT service.

The aim of the programme is to enable modern flexible ways of working and to provide civil servants with technology at least as good as they have at home.

During user testing at the start of this project, staff told the UK Cabinet Office IT team that they wanted better connectivity; greater choice of applications; to be able to be more mobile with more portable devices and to be able to collaborate on documents in real time.


Read the Blog

 


Related Resources

Article

What is a Botnet?

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
September 1, 2020

Article

What is the Difference between FISMA and FedRAMP?

To deliver cloud-based services to the government, it’s important to have an understanding of government-enacted Federal IT compliance standards
August 31, 2020

Article

What is Cloud Security

Cloud Security is composed of various technologies and tools designed to protect each aspect of the shared responsibility model.
September 2, 2020

Other

Reference Architecture for OT and IoT Device Security in Industrial Control Systems

This document provides a high-level reference architecture for OT and IoT device security in Industrial Control Systems (ICS) using Palo Alto Networks’ Next-generation firewalls, the Cortex Data Lake, and IoT Security Service.
June 17, 2020

Other

Prisma Cloud NIST SP 800-190: At a Glance

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-190 provides guidance on securing application containers and related ecosystem components. While it thoroughly describes the security risks and associated countermeasures for protecting containerized apps, it leaves organizations to fend for themselves on the tactical front. Twistlock is a purpose-built software suite for securing cloud-native workloads. From the beginning, we’ve been developing technology to address the types of risks NIST SP 800-190 describes.
June 12, 2020

White Paper

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.
June 5, 2018

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.