Date

Education and Professional Services

Displaying 1 to 30 of 3187

RedLock Cloud Threat Defense

Watch this video to understand how RedLock® - Palo Alto Networks security and compliance service – provides the context required to comprehensively secure your AWS®, Azure and Google Cloud environments.
  • 0
  • 5

Getting security where you need it

Introducing GlobalProtect cloud service Watch the Lightboard to learn how GlobalProtect cloud service uses a cloud-based security infrastructure to minimize the operational burden associated with protecting remote networks and mobile users from cyberattacks with consistent next-generation security policies.
  • 0
  • 3001

Stay a Step Ahead in SaaS Security

The appeal of SaaS applications, such as Office 365®, G Suite, Box and Salesforce® is growing, but so are the hidden threats in SaaS offerings: costly data leaks, regulatory noncompliance, malware propagation and so on. This video covers how a fully cloud-delivered security platform addresses cloud access security broker or CASB requirements to minimize the wide range of cloud risks.
  • 0
  • 8

Aperture at a Glance

Aperture delivers complete visibility and granular enforcement across all user, folder and file activity within sanctioned SaaS applications.
  • 7
  • 17033

Safely Enable Your SaaS Applications

The use of SaaS applications is creating gaps in security visibility and new risks for threat propagation, data leakage and regulatory noncompliance. See how Aperture can help.
  • 2
  • 13246

Enterprise Security Evolved

The market is crowded with point products that are not delivering enough protection and causing significant operational pain. It’s time to evolve enterprise security.
  • 0
  • 56

Global Protect Cloud Service Data Sheet

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.
  • 2
  • 7818

Lightboard Series: Protect SaaS Applications with Next-Gen Security

Lightboard Series: Protect SaaS Applications with Next-Gen Security
  • 1
  • 275

Top 10 AWS Cloud Security Risks and How to Resolve Them

Download the ebook now to learn about the top risks you are likely to encounter in your AWS environment.
  • 0
  • 295

Use Case: Consolidate Network Security, Reduce Costs and Complexity

Businesses embrace digital technologies that modernize their operations and enable innovation. Yet these same technologies introduce new security vulnerabilities and new data that must be secured. The result is a costly cybersecurity arms race, in which businesses introduce new security products to counter new attack vectors. Individually-managed or standalone security products add complexity, reduce visibility, and strain under-resourced security teams.
  • 5
  • 407

Government Use Case: Secure Law Enforcement Networks

Read how law enforcement organizations around the world are securing sensitive data and preventing cyberattacks with Palo Alto Networks
  • 0
  • 14

Cybersecurity Business Value Calculator

Organizations increasingly invest in cybersecurity to keep users, data and IP secure. Global cyber security spend on products and services is expected to exceed $1 trillion USD by 2021. With attacks continuing to happen at alarming rates, it’s more important now than ever for these investments to be spent on the right tools and technologies. Are you getting the most out of your security investments? Meta: With attacks happening at alarming rates, cybersecurity investments must be spent on the right tools and technologies. Are you getting the most out of your security investments?
  • 1
  • 20

Take the Next Step Toward Even Better Security with the Self-Service Best Practice Assessment!

In this live, expert-led workshop, you will learn how to generate custom reports and dashboards that give you visibility into the exact aspects of your Security Operating Platform deployment which you need to prioritize.
  • 0
  • 10

Take the Next Step Toward Even Better Security with the Self-Service Best Practice Assessment!

In this live, expert-led workshop, you will learn how to generate custom reports and dashboards that give you visibility into the exact aspects of your Security Operating Platform deployment which you need to prioritize.
  • 0
  • 10

Jump Into the Security Operating Platform

The Security Operating Platform prevents cyberattacks with automation, shared intelligence, and consistent enforcement across the network, cloud and endpoints.
  • 0
  • 26

Minimize Risk and Secure Your Business

The Security Operating Platform prevents successful cyberattacks that disrupt business, allowing security teams to focus on higher value activities.
  • 0
  • 26

Take the Next Step Toward Even Better Security with the Self-Service Best Practice Assessment!

In this live, expert-led workshop, you will learn how to generate custom reports and dashboards that give you visibility into the exact aspects of your Security Operating Platform deployment which you need to prioritize.
  • 0
  • 5

PCNSE Promo

  • 0
  • 29

Value of Instructor Led Training

Value of Instructor-Led Training
  • 0
  • 9

The Business Case for Cloud Threat Defense

Read this report for an understanding of how RedLock can reduce financial risks due to security breaches, third-party tools and labor requirements to resolve issues faster; provide security governance and increase cross-team visibility such as asset management; and easily generate compliance reports that map and provide audit trails for your cloud resources.
  • 0
  • 57

PCNSA Promo

  • 0
  • 17

Security Operations Assessment Service

Palo Alto Networks Security Operations Assessment Service improves your confidence in your SOC by identifying gaps within your operations; providing clear recommendations to strengthen operations, increase automation, and improve response times.
  • 1
  • 2173

APP-ID s FOR ICS AND SCADA

Learn about our existing application identifiers for ICS & SCADA networks, how you can develop your own using custom App-ID decoders, and how you can submit a request for new App-IDs.
  • 2
  • 1788

Cybersecurity Academy Curriculum

The Palo Alto Networks Cybersecurity Academy is a university program to help educate the next generation of cybersecurity experts. This document is a list of the curriculum associated with the program.
  • 3
  • 1575

‘Shift left’ prevents missteps that lead to 90% of breaches in cloud computing

Lugging workloads from on-premises to public cloud is straining when done with flimsy security policies.
  • 0
  • 133

Outcomes of Implementing Zero Trust

John Kindervag, founder of Zero Trust and Field CTO at Palo Alto Networks, discusses the evolution and positive outcomes of implementing a Zero Trust method.
  • 0
  • 31

What is Malware Protection?

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.
  • 1
  • 126

What is Malware Protection?

Attackers always look for quick ways to steal data. Using readily available automated tools and advanced techniques, they can do so with ease, leaving your traditional network defenses ineffective.
  • 0
  • 47

What Are Fileless Malware Attacks and “Living Off the Land”? Unit 42 Explains

For many, the cryptocurrency phenomenon is intriguing but complicated, involving “blockchain,” “distributed ledgers” and other jargon. Ryan Olson, VP of Threat Intelligence Unit 42, explains one of the hidden threats of the cryptocurrency boom — cryptomining attacks.
  • 0
  • 67

How Cryptocurrency Is Driving Cyber Risk: Executive Summary

The report is based on groundbreaking research and analysis from Unit 42, the global threat intelligence team at Palo Alto Networks.
  • 1
  • 0
Displaying 1 to 30 of 3187