Date

Education and Professional Services

Displaying 1 to 30 of 4233

Security Operations Optimization Service for Next-Generation Firewall

Customize elements of the Security Operating Platform® to provide consistent incident handling, simplify operations with automation, and improve response times.
  • 0

What is Secure Web Gateway (SWG)?

Secure Web Gateway is crucial to protect employees from malicious websites, but a new approach to security is needed to address the cloud and remote workers.
  • 0

Threat Brief: Windows CryptoAPI Spoofing Vulnerability CVE-2020-0601

Unit 42 provides analysis and mitigation actions for Microsoft's latest patches, including one for CVE-2020-0601 - AKA "Curveball"
Brandon YoungMike Harbison,
  • 0

Exploits in the Wild for Citrix ADC and Citrix Gateway Directory Traversal Vulnerability CVE-2019-19781

We provide the root cause analysis of the vulnerability identified in Citrix Application Delivery Controller (ADC) and Citrix Gateway, CVE-2019-19781, as well as Proof of Concept examples (PoC), additional Indicators of Compromise we've identified and attack activities we observed in the wild.
Yue GuanQi DengZhibin ZhangSiddhart ShibirajZhanhao ChenCecilia HuJohn Harrison,
  • 0

What is a Public Cloud Firewall?

Public cloud firewalls - sometimes referred to as virtual firewalls - are virtual network security devices deployed in public cloud environments.
  • 0

Consulting Services for Demisto

This describes the specific deliverables that are part of the our professional service and customer success offerings.
  • 0

QuickStart Service for Demisto

This describes the specific deliverables that are part of the our professional service and customer success offerings.
  • 0

Why is Data Protection so Difficult?

Data protection is not easy. Learn why data loss prevention and cloud data protection is so difficult in this short video.
  • 0

The Challenges of Data Protection

Learn the challenges organizations face with data loss prevention and data protection solutions, and how automation can help in this short video.
  • 0

Solving Data Protection Challenges with Palo Alto Networks

Learn how Palo Alto Networks is redefining data loss prevention and cloud data protection strategies in this short video.
  • 0

Cortex XDR 2.0 Demo

This demo reveals how to shut down attacks without disrupting your users. Watch it now to get an edge against advanced adversaries.
  • 0

Prisma Cloud Compute Edition

Learn about the different customer success plans for Prisma Cloud Compute Edition
  • 0

Prisma Access Customer Success Datasheet

Learn about the different customer success plans for Prisma Cloud
  • 0

Overcoming Cloud Data Proctection Challenges

Data loss prevention is a necessary tool for protecting users and data. Learn how a next-gen cloud DLP solution protect data everywhere in this ebook.
  • 0

Secure The Cloud: Zero Trust Network Access

Learn how Zero Trust Network Access provides an integrated, comprehensive solution for segmentation, access control, and threat prevention in this interactive.
  • 0

Top 5 Requirements for Effective Endpoint Protection

Attackers must complete a certain sequence of events, known as the attack lifecycle, to accomplish their objectives, whether stealing information or running ransomware. Nearly every attack relies on compromising an endpoint to succeed, and although most organizations have deployed endpoint protection, infections are still common.
  • 0

Palo Alto Networks Panorama vs. Cisco FMC

PanoramaTM network security management reduces network complexity with logical device groups; simplifies management with easy, global policy control; and reduces network dwell time for threats by highlighting critical information for response priori- tization.
  • 0

Advanced Threat Visibility and Response

When an incident occurs, SOCs tend to respond based on defined processes and procedures to mitigate the threat and protect the network. When attackers target networks or systems, however, they tend to use multiple TTPs (tools, tactics and procedures) to compromise them, maintain presence and exfiltrate data. While responding to an incident, it is imperative to understand the entire scope of the incident, including the compromise of other networks/subnetworks, related incidents and threat attribution, wherever possible. Once the SOC has visibility into these aspects, it becomes much easier to respond to the incident and mitigate the threat as well as improve visibility and response to such threats in the future.
  • 0

Palo Alto Networks & Claroty Integration Guide

Technology Partner, Integration, Integration guide, use case, deployment guide, tech partner, Claroty, IoT, ot.
  • 0

Enabling Secure Industrial Digital Transformation

This executive-level whitepaper from industrial automation market experts, ARC Advisory Group, covers the challenges industrial asset owner-operators will face as they embark on their OT digital transformation initiatives.
  • 0
  • 54

Making Secure SD-WAN Manageable: Take an Integrated Approach

Learn how consolidating and integrating networking and security functions, as well as unifying management and monitoring with SD-WAN in the branch, can lead to more secure and efficient operations.
  • 0
  • 53

Kuveyt Türk

To strengthen Kuveyt Türk’s security architecture against emerging threats and make the network more resistant to cyberthreats.
  • 0

Threat Brief: Iranian-Linked Cyber Operations

With elevated tensions in the Middle East region, there is significant attention being paid to the potential for cyber attacks emanating from Iran. The following threat brief contains a summary of historical campaigns that are associated with Iranian activity and does not expose any new threat or attack that has occurred since the events of January 3rd, 2020.
Unit 42,
  • 0

Deployment Guide - GCP VPC Network Peering

Provides deployment details for using the VM-Series in the GCP VPC Network Peering design model, which centralizes security resource management while allowing administrators of peered projects to manage their network resources independently. This design model is also useful when you want to provide security to existing disparate projects.
  • 0
  • 3048

Deployment Guide for Google Cloud Platform - Shared VPC Design Model

This reference document provides detailed guidance on the requirements and functionality of the Shared VPC design model and explains how to successfully implement that design model using Panorama and Palo Alto Networks® VM-Series firewalls on Google Cloud Platform.
  • 1
  • 3644

Reference Architecture Guide for Google Cloud Platform

This reference document links the technical design aspects of the Google Cloud Platform with Palo Alto Networks solutions and then explores several technical design models. The design models include a model with all instances in a single project to enterprise-level operational environments that span across multiple projects using Shared VPC.
  • 0
  • 4356

Deployment Guide for Panorama on Google Cloud Platform

This reference document provides detailed guidance on how to deploy Panorama on GCP
  • 0
  • 3304

Federal Government Defense Security Reference Blueprint

This guide outlines the challenges Defense agencies face and methods they can use to integrate the Palo Alto Networks ecosystem into the Federal Enterprise Architecture (FEA) to fight modern threats, meet current and future security objectives, and improve cyber resilience and operations.
  • 0
  • 66

PANW Cybersecurity Academy Program Guide

Download this document to learn the policies and guidelines that set forth the rules and requirements for participating academic institutions in the Cybersecurity Academy.
  • 1
Displaying 1 to 30 of 4233