Date

By Source

By Technology

By Services

By Audience

Displaying 1 to 30 of 9533

The impact of DevOps on your bottom line

DevOps is the most important innovation to the IT sector since the invention of the personal computer. Nearly everyone I have talked to in my travels, these past few years, says they are building their own DevOps shop.

  • 0
  • 2

Electric Transmission Data Networks Use Case White Paper

This use case provides a high-level reference design for network security in electric transmission data networks.

  • 0
  • 288

Simplify PCI Compliance With Network Segmentation for airlines

PCI compliancy is mandatory for the airlines, the scope extends to all system components that are included in or connected to the Cardholder Data Environment (CDE).

  • 0
  • 6

Use Case: Consolidate Network Security, Reduce Costs and Complexity

Businesses embrace digital technologies that modernize their operations and enable innovation. Yet these same technologies introduce new security vulnerabilities and new data that must be secured. The result is a costly cybersecurity arms race, in which businesses introduce new security products to counter new attack vectors. Individually-managed or standalone security products add complexity, reduce visibility, and strain under-resourced security teams.

  • 1
  • 18

Palo Alto Networks Discovers New QEMU Vulnerability

Unit 42 discovers new QEMU vulnerability.

Ryan Salsamendi,
  • 0
  • 2

Establish An Effective Security Posture In Next-Generation Mobile Networks

Mobile network operators need a new approach to security that will keep up with rapid network evolution and growing threats.

  • 0
  • 198

Rethink Network Availability

Mobile network operators are now facing new malware-based incidents that threaten network availability as well as subscriber confidentiality.

  • 1
  • 204

6 Key Security Requirements for Next–Generation Mobile Networks

A new security approach is needed focusing on prevention, application-layer visibility, cost efficiency and automation.

  • 5
  • 388

Rethink Mobile Security Monetization

This paper for mobile network operators provides a framework for value and revenue opportunities across the entire subscriber base.

  • 2
  • 200

Command-and-Control (C2) FAQ

A new category has been added to URL Filtering.  This new category will be “command-and-control” to further breakout specifics from within the malware category.    Note: Administrators should set their command-and-control category to BLOCK immediately.    The below is a FAQ in regards to the command-and-control category.   Weren’t we

jdelio,
  • 0
  • 0

The UK’s National Health Service: A New Cybersecurity Dawn?

The UK's National Health Service: a new Cybersecurity dawn?

Claire Silcock,
  • 0
  • 0

Highlighting Japan-India Cybersecurity Cooperation in the “Confluence of the Two Seas”

CSO Japan Mihoko Matsubara highlights the cooperation of Japan and India as an example of global cybersecurity collaboration.

Mihoko Matsubara,
  • 0
  • 0

Analyzing the Various Layers of AgentTesla’s Packing

Palo Alto Networks Unit 42 analyzes the layers of AgentTesla's Packing.

Jeff White,
  • 0
  • 0

Aligning Cybersecurity With Business Goals: 5 Steps to Success

Cybersecurity oversight can be unsettling for C-suite executives and board members. The connection between the board room and those managing technical infrastructure is critical, yet C-suite executives or board members typically don’t have the skills or knowledge of the threat landscape or technologies involved in cybersecurity programs to flatten the management structure enough for top-to-bottom direct management. For the foreseeable...

Larry Jones,
  • 0
  • 2

Palo Alto Networks News of the Week – September 23, 2017

Catch up on all the top Palo Alto Networks news of the week.

Justin Hall,
  • 0
  • 6

Detection off, Prevention on

Learn how Palo Alto Networks prevention strategy can help you to protect your enterprise.

  • 0
  • 5

LiveWeek 22 Sep 2017

NEW RELEASE: TRAPS 4.1 NEW!! Traps 4.1 - Expanded protection against ransomware @joboyd @jdelio Traps 4.1. continues to develop our innovative, multi-method prevention approach to endpoint security with a specific focus on preventing ransomware. New capabilities in Traps 4.1 monitor ransomware behavior and upon detection, shut down an attack and block new exploit

editeur,
  • 0
  • 0

Channel Scoop – September 22, 2017

Dig into this week's NextWave Partner Channel Scoop.

Lang Tibbils,
  • 0
  • 0

Extract Even More Value From Your Palo Alto Networks Environments at .conf2017

Extract even more value from your Palo Alto Networks environments at .conf2017

Lee Space,
  • 0
  • 3

DNS Signature generic:www.indocommco.com

Hi team,   This is false positive, please check: File Hash: - URL only Link to Virustotal report for the file: https://www.virustotal.com/#/url/1dfc3433bd62b0f90d67c55eddae355dcb2886a8f77d3542243e2dc326cbd584/detection Current VirustTotal Verdict: No engines detected this URL, 0/64 Description: Found in PANDB PAN-DB Categorization URL Category: indocommco.com <-> Business and Economy www.indocommco.com <-> Malware Unique Threat ID: 180875763 Create

MG,
  • 0
  • 3

proofpoint credentials in the node prototype

I created input, process and output nodes for proofpoint. Its asking me for proofpoint credentials.   Where we can put the proofpoint credentials in the node prototype?

Saadabdulmajeed,
  • 0
  • 1

Palo Alto Networks Opens Doors to Its New Santa Clara Headquarters

New Campus, Triple in Size, Offers Collaborative Workspaces for Thousands of Silicon Valley Employees

Santa Clara, CA
  • 0
  • 124

Welcoming the APAC WildFire Cloud

Announcing the APAC WildFire cloud, located in Singapore, which extends our regional cloud approach to cover Asia-Pacific, the European Union, Japan and North America.

Scott Simkin,
  • 0
  • 3

Head-to-Head Comparisons: PA-5000 Series vs. PA-5200 Series NGFWs

Palo Alto Networks continue to design new Next-Generation Firewall appliances to handle demanding throughput needs and help deliver the next generation of security capabilities anywhere in the network and enable businesses to deploy next-generation security in all locations.

  • 0
  • 34

Migrationtool disk size for AppID-Adoption

Hi, Guys,   Today we have a problem with MigrationTool when we use it for AppID-Adoption. We forward PA logs do MigrationTool server, but it was only 18GB disk space for /var/log. Even for small environments, it is very little storage.    To fix it today, we need root the

pauloraponi,
  • 0
  • 0

Palo Alto Networks Unveils APAC WildFire Cloud in Singapore

SINGAPORE, 21 September, 2017 -- Palo Alto Networks® (NYSE: PANW), the next-generation security company, today unveiled its APAC WildFire™ cloud, located in Singapore. The service allows customers in the region to benefit from Palo Alto Networks WildFire cloud-delivered threat analysis and prevention capabilities, while addressing customer’s data privacy concerns, via an APAC-based cloud. WildFire is now available with regional-specific clouds in Asia-Pacific (APAC), the European Union, Japan, and North America.

Singapore
  • 0
  • 109

Migration tool 3.3.15 Debug Error

I'm able to merge my configs but the file outputs are empty. I'm seeing this error in the debug logs and wondering if this may be the cause. Anyone else experiencing this?   [:error] [pid 5186] [client 192.168.32.1:29538] PHP Warning: scandir(../Templates): failed to open dir: No such file or directory

GeneGibson,
  • 0
  • 0

False Positive: Hamster Free Video Converter

I think this is a false positive. Only 1 other virus engine besides PA is saying it is bad.   File Hash: 0617c8c1be55ea923fbfef8d0a92957b8a753e47fb77d847d33778ae563e011c Link to Virustotal report: https://www.virustotal.com/#/file/0617c8c1be55ea923fbfef8d0a92957b8a753e47fb77d847d33778ae563e011c Current VirusTotal Verdict: PA says "generic.ml". Rising says "Malware.Undefined!8.C (CLOUD)" Description: This is the installer for "Hamster Free Video Convter". Basically a

amorrow,
  • 0
  • 0

Traps 4.1 - Expanded protection against ransomware

From Joel Boyd @joboyd   Traps 4.1 strengthens ransomware prevention by adding new capabilities that include monitoring for ransomware behavior and upon detection, shutting down an attack and blocking new exploit techniques leveraged during recent WannaCry and NotPetya attacks. This latest version also brings granular child process protection and DLL

jdelio,
  • 0
  • 1

Q1 FY18 NextWave Huddle Key Takeaways

Get our key takeaways from the Q1 FY18 NextWave Partner Huddle.

Ron Myers,
  • 0
  • 0
Displaying 1 to 30 of 9533