Date

Education and Professional Services

Displaying 1 to 30 of 3190

What is Machine Learning?

Machine learning is when a program takes new data, learns from it and makes changes without being explicitly programed to do so. With machine learning, the machine is enabled to create or modify rules to further improve itself.
  • 0
  • 2223

Interview: Balance Cloud Advantages and Risk with Contextual Data

Watch as our regional CISO of Central Europe, Sergej Epp and SVP Products and Engineering for Public Cloud, Varun Badhwar discuss the importance around balancing cloud advantages and risks with contextual data.
  • 0
  • 3

Aperture at a Glance

Aperture delivers complete visibility and granular enforcement across all user, folder and file activity within sanctioned SaaS applications.
  • 7
  • 17101

Getting security where you need it

Introducing GlobalProtect cloud service Watch the Lightboard to learn how GlobalProtect cloud service uses a cloud-based security infrastructure to minimize the operational burden associated with protecting remote networks and mobile users from cyberattacks with consistent next-generation security policies.
  • 0
  • 3048

Stay a Step Ahead in SaaS Security

The appeal of SaaS applications, such as Office 365®, G Suite, Box and Salesforce® is growing, but so are the hidden threats in SaaS offerings: costly data leaks, regulatory noncompliance, malware propagation and so on. This video covers how a fully cloud-delivered security platform addresses cloud access security broker or CASB requirements to minimize the wide range of cloud risks.
  • 0
  • 12

Dedicated Architect Data Sheet

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.
  • 0
  • 1

RedLock Cloud Threat Defense

Watch this video to understand how RedLock® - Palo Alto Networks security and compliance service – provides the context required to comprehensively secure your AWS®, Azure and Google Cloud environments.
  • 0
  • 22

Safely Enable Your SaaS Applications

The use of SaaS applications is creating gaps in security visibility and new risks for threat propagation, data leakage and regulatory noncompliance. See how Aperture can help.
  • 2
  • 13261

Enterprise Security Evolved

The market is crowded with point products that are not delivering enough protection and causing significant operational pain. It’s time to evolve enterprise security.
  • 0
  • 168

Global Protect Cloud Service Data Sheet

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.
  • 2
  • 7872

Lightboard Series: Protect SaaS Applications with Next-Gen Security

Lightboard Series: Protect SaaS Applications with Next-Gen Security
  • 1
  • 275

Top 10 AWS Cloud Security Risks and How to Resolve Them

Download the ebook now to learn about the top risks you are likely to encounter in your AWS environment.
  • 0
  • 305

Use Case: Consolidate Network Security, Reduce Costs and Complexity

Businesses embrace digital technologies that modernize their operations and enable innovation. Yet these same technologies introduce new security vulnerabilities and new data that must be secured. The result is a costly cybersecurity arms race, in which businesses introduce new security products to counter new attack vectors. Individually-managed or standalone security products add complexity, reduce visibility, and strain under-resourced security teams.
  • 5
  • 409

Directory Sync Privacy Data Sheet

Document describing how Directory Sync collects and processes data
  • 0
  • 1

Government Use Case: Secure Law Enforcement Networks

Read how law enforcement organizations around the world are securing sensitive data and preventing cyberattacks with Palo Alto Networks
  • 0
  • 15

Take the Next Step Toward Even Better Security with the Self-Service Best Practice Assessment!

In this live, expert-led workshop, you will learn how to generate custom reports and dashboards that give you visibility into the exact aspects of your Security Operating Platform deployment which you need to prioritize.
  • 0
  • 13

Jump Into the Security Operating Platform

The Security Operating Platform prevents cyberattacks with automation, shared intelligence, and consistent enforcement across the network, cloud and endpoints.
  • 0
  • 37

Take the Next Step Toward Even Better Security with the Self-Service Best Practice Assessment!

In this live, expert-led workshop, you will learn how to generate custom reports and dashboards that give you visibility into the exact aspects of your Security Operating Platform deployment which you need to prioritize.
  • 0
  • 6

Cybersecurity Business Value Calculator

Organizations increasingly invest in cybersecurity to keep users, data and IP secure. Global cyber security spend on products and services is expected to exceed $1 trillion USD by 2021. With attacks continuing to happen at alarming rates, it’s more important now than ever for these investments to be spent on the right tools and technologies. Are you getting the most out of your security investments? Meta: With attacks happening at alarming rates, cybersecurity investments must be spent on the right tools and technologies. Are you getting the most out of your security investments?
  • 1
  • 22

Minimize Risk and Secure Your Business

The Security Operating Platform prevents successful cyberattacks that disrupt business, allowing security teams to focus on higher value activities.
  • 0
  • 30

Take the Next Step Toward Even Better Security with the Self-Service Best Practice Assessment!

In this live, expert-led workshop, you will learn how to generate custom reports and dashboards that give you visibility into the exact aspects of your Security Operating Platform deployment which you need to prioritize.
  • 0
  • 13

PCNSA Promo

  • 0
  • 23

Value of Instructor Led Training

Value of Instructor-Led Training
  • 0
  • 11

The Business Case for Cloud Threat Defense

Read this report for an understanding of how RedLock can reduce financial risks due to security breaches, third-party tools and labor requirements to resolve issues faster; provide security governance and increase cross-team visibility such as asset management; and easily generate compliance reports that map and provide audit trails for your cloud resources.
  • 0
  • 66

PCNSE Promo

  • 0
  • 33

Security Operations Assessment Service

Palo Alto Networks Security Operations Assessment Service improves your confidence in your SOC by identifying gaps within your operations; providing clear recommendations to strengthen operations, increase automation, and improve response times.
  • 1
  • 2173

APP-ID s FOR ICS AND SCADA

Learn about our existing application identifiers for ICS & SCADA networks, how you can develop your own using custom App-ID decoders, and how you can submit a request for new App-IDs.
  • 2
  • 1797

Cybersecurity Academy Curriculum

The Palo Alto Networks Cybersecurity Academy is a university program to help educate the next generation of cybersecurity experts. This document is a list of the curriculum associated with the program.
  • 3
  • 1588

‘Shift left’ prevents missteps that lead to 90% of breaches in cloud computing

Lugging workloads from on-premises to public cloud is straining when done with flimsy security policies.
  • 0
  • 153

Outcomes of Implementing Zero Trust

John Kindervag, founder of Zero Trust and Field CTO at Palo Alto Networks, discusses the evolution and positive outcomes of implementing a Zero Trust method.
  • 0
  • 33
Displaying 1 to 30 of 3190