Date

Education and Professional Services

Displaying 1 to 30 of 3133

RUSSIA'S ELITE HACKERS MAY HAVE NEW PHISHING TRICKS

A MAJOR QUESTION hanging over the United States midterm election season: Where was Russia?
  • 0
  • 18

Researchers uncover new malware activity by Russian hackers

Researchers have attributed new malware activity targeting governments in several countries to a Russian hacking group.
  • 0
  • 11

Russian hacking tool gets extra stealthy to target US, European computers

This malicious software will email your hacker from your computer without you ever knowing.
  • 0
  • 12

Advanced Endpoint Protection for Manufacturing

How Traps protect healthcare endpoints today and its business, operational and security benefits are explained.
  • 0
  • 1

What’s next for DHS cyber changeup

What’s next for DHS cyber changeup
  • 0
  • 10

Endpoint Security in Healthcare

How Traps protect healthcare endpoints today and its business, operational and security benefits are explained.
  • 0
  • 24

Cybersecurity Career Guide: Who Works in Cybersecurity, How We Got Started, Why We Need You

This book provides information and resources for students and those who are interested in starting a career in cybersecurity. We reached out to some of the best cybersecurity practitioners in the industry and asked them to share their insights on how they got started. The result is a compilation of amazing stories of how these cybersecurity practitioners got started and the tools they continue to use to learn and grow in their careers.
  • 1
  • 1825

K-12 Use Case: Protect Endpoints

Real-world example and explanation of how a K-12 school district secures their endpoints with Palo Alto Networks.
  • 1
  • 253

SECURITY FIRST: Creating a Secure, Compliant Public Cloud Environment

This e-book provides a framework for developing a security-first approach to monitoring the state of your cloud environment, applying rapid fixes, and gaining control over all your operations in the cloud.
  • 0
  • 13

Detection and Response, Why Limit Yourself to the Endpoint?

Visibility is an undeniable requirement of all security teams, but it shouldn’t come at a cost. EDR products are positioned as our last chance to improve defenses though since inception discovery and response times have only increased. Is EDR really enough? Do we need more visibility from other sources? Are security operations actually improving? We’ve surveyed over 300 of your peers to answer one important question, “Will Endpoint Detection and Response help me?”
  • 0
  • 7

What is Malware Protection?

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.
  • 0
  • 10

XDR: A New Approach to Detection and Response

Enterprises rely on Endpoint Detection and Response (EDR) as a means to respond to cybersecurity incidents. As cybercriminals and their tactics have become more sophisticated, the time to identify and time to contain breaches has only increased. It is becoming increasingly apparent that EDR has failed, and that we need a new approach to detection and response. XDR allows you to rapidly detect and respond to threats across your enterprise, spanning your network, cloud and endpoints.
  • 0
  • 73

Use Case: Simplify Cybersecurity and Maintain Resilience in the Water Sector

Read this use case for real-world examples of how water districts and authorities reduce cybersecurity risk while securing new digital innovations.
  • 0
  • 25

Palo Alto Networks to Present at Upcoming Investor Conferences

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that members of its management team will be presenting at the following financial community events: Wells Fargo...
Santa Clara, CA
  • 0
  • 40

Palo Alto Networks Named a Leader in Zero Trust Report

Palo Alto Networks® (NYSE: PANW), the global leader in cybersecurity, announced today it has been positioned as a leader in "The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers,...
Santa Clara, CA
  • 0
  • 492

Leader in the Forrester Zero Trust eXtended (ZTX) Wave

Palo Alto Networks was recognized as a Leader in the Forrester 2018 Zero Trust eXtended (ZTX) Wave.
  • 0
  • 61

5G Security - Establishing a holistic security approach

Security is more important than ever for Service Providers evolving networks to 5G. New approaches for securing their networks will be needed.
  • 0
  • 100

How to Run a Best Practice Assesment in the Customer Support Portal

How to Run a Best Practice Assesment in the Customer Support Portal
  • 0
  • 36

Prevention Across the Attack Lifecyle with the Security Operating Platform

The Security Operating Platform provides multiple layers of prevention at each stage of the attack lifecycle.
  • 1
  • 56

Understanding the Best Practice Assesment

Understanding the Best Practice Assessment
  • 0
  • 39

Bridging Security Gaps with Network-to-Endpoint Integrations

The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.
  • 0
  • 31

Key Specifications for Palo Alto Networks Interfaces and Transceivers

The data interfaces implemented by Palo Alto Networks® are based on industry standards and implementation agreements primarily authored by the Institute of Electrical and Electronics Engineers (IEEE) 802.3 committee and the Small Form Factor (SFF) Committee. Each interface definition is supported by specifications and agreements defining the electromechanical coupling, electrical and optical signals, as well as management properties of compliant implementations.
  • 0
  • 122

Palo Alto Networks to Announce Fiscal First Quarter 2019 Financial Results on Thursday, November 29, 2018

Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, announced today that it will release the financial results for its fiscal first quarter 2019, ended October 31, 2018, after U.S....
Santa Clara, CA
  • 0
  • 161

How to Secure Connected Vehicles

The end-to-end cybersecurity strategy that protects connected vehicles.
  • 0
  • 16

Machine Learning 101: Streamline Security and Speed Up Response Time

Machine learning is changing the way we live our lives. It can reduce errors and even achieve the impossible by accomplishing tasks that cannot be performed manually.
  • 0
  • 32

North-West University

Palo Alto Networks® Security Operating Platform with high-capacity Next-Generation Firewalls deployed in a high-availability configuration, enabled with threat prevention and integrated cloud-based threat analysis
  • 0
  • 38

Prevention Across the Attack Lifecycle with the Security Operating Platform

The Security Operating Platform provides multiple layers of prevention at each stage of the attack lifecycle.
  • 1
  • 67

Focused Services - Elite

Focused Services – Elite provides the highest level of support services around the clock. A team of designated engineers is available 24/7 to resolve technical issues or support pre-scheduled events. This level of service also includes on-site troubleshooting assistance and two Threat Assessment Services per year. Focused Services – Elite helps you stay continuously ahead of threats with the experts you need, when you need them.
  • 0
  • 3000

AWS Deployment Guide: Protecting Inbound Traffic to a Single VPC

Provides a step-by-step guide for creating a single VPC on AWS with load balancers that are distributing traffic to distribute traffic inbound from the internet across a pair of VM-Series firewalls that are managed by Panorama and Logging Service. This guide assumes a working knowledge of AWS and the VM-Series.
  • 0
  • 5

Azure Reference Architecture

Although IaaS providers are responsible for ensuring the security and availability of their infrastructure, ultimately, organizations are still responsible for the security of the applications and data. This reference architecture describes how your organization can use the Palo Alto Networks® VM-Series firewalls to bring visibility, control, and protection to your applications built in Microsoft Azure. This document provides architectural guidance for solution architects and engineers who are familiar with the next-generation firewall but not Azure. It links the technical aspects of the Azure and Palo Alto Networks solution together before exploring the technical design models of the architecture. Use this guide as a roadmap for architectural discussions between Palo Alto Networks and your organization.
  • 3
  • 6562
Displaying 1 to 30 of 3133