Date

Education and Professional Services

Displaying 1 to 30 of 3326

Palo Alto Networks Endpoint Protection and Response Product Secures FedRAMP Milestone

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced its Traps™ endpoint protection and response product has achieved the designation of "In Process" for the Federal...
Santa Clara, CA
  • 0
  • 60

Security Operating Platform Overview R3

This reference document provides an overview of the Security Operating platform for securing the enterprise, securing the cloud and securing the future with Cortex.
  • 0

The Truth About Zero Trust

As Zero Trust has become more widely known, so too have the misconceptions around what Zero Trust is and how to achieve a Zero Trust network architecture.
  • 0

BDO Cortex Managed Services Solution Brief

BDO, through BDO Israel’s Cybersecurity Center and its global network of BDO firms, has specialized in establishing managed detection and response (MDR) capabilities for organizations since 2002. In the past, only large enterprises built such capabilities. Today, it is clear that organizations of all sizes must have effective detection and response capabilities as part of their cybersecurity programs. However, costs, knowhow, and talent acquisition are real challenges for every organization, highlighting the importance of the evolution of managed detection and response service
  • 0
  • 106

Critical Start Cortex managed services

Using a battle-tested assessment and implementation process, CRITICALSTART can assist you with deployments of all sizes. CRITICALSTART’s Zero-Trust Analytics Platform (ZTAP) model investigates all security alerts until they are classified as good or normal and are safely filtered out. Using this approach, customers experience a 99 per-cent reduction in alerts. Zero Trust is the only option when it comes to zero tolerance
  • 0
  • 106

PwC Cortex Managed Services Solution Brief

Cortex™ AI-based continuous security platform by Palo Alto Networks delivers new levels of simplicity in security operations and significantly improved security outcomes through automation and unprecedented accuracy. The platform solves pain points for managed service partners, providing complete visibility from a single data source and the ability to respond as a managed service across the whole environment. Today, with Cortex XDR detection and response, partners can provide managed threat hunting, investigation, and response across network, endpoint, and cloud environments
  • 0
  • 108

New Mirai malware variant targets enterprise devices

Cyber attacks attempts to deploy the keylogging, screenshot-taking, password-stealing Cardinal RAT malware.
  • 0

This updated trojan malware campaign targets fintech and cryptocurrency trading companies

Cyber attacks attempts to deploy the keylogging, screenshot-taking, password-stealing Cardinal RAT malware.
  • 0

Brace yourselves: New variant of Mirai takes aim at a new crop of IoT devices

Virulent malware updated to add 11 new exploits.
  • 0

Introduction to Heatmaps and BPA

  • 0
  • 201

Stay Audit Ready with Continuous Cloud Compliance

In this webinar, our experts discuss common cloud compliance misconceptions and provide advice on how to get your cloud compliance program in the best shape.
  • 0

Build Security In: Cloud Security at DevOps Speed

In this webinar, we’ll explore the needs of DevOps, Security and IT as well as five principles that will help your teams move at the speed of the cloud – together – without creating gaps in your security posture.
  • 1

EDU-330 Firewall: Troubleshooting

  • 0
  • 199

Securing AWS with Palo Alto Networks at a Glance

With Palo Alto Networks you can protect your data and apps in AWS and fulfill your role in the shared responsibility model.
  • 0

An Executive’s eGuide to Protecting Workloads and Data on AWS

This reference document outlines how the enforcement and data collection elements of our Security Operating Platform can be automated to improve and enforce a strong security posture.
  • 0
  • 3018

GlobalProtect Cloud Service Datasheet

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.
  • 2
  • 8542

Security Operations Extends Beyond EDR

Security teams are being asked to do more with less as they face increasingly complex scenarios and tight timelines. We worked with 451 research group to survey respondents with experience in deploying EDR from a variety of midsized and larger organizations in North America, Europe, and Asia. We asked them broader questions Like: Are there other opportunities for improvement in the SOC? What else is being used besides EDR? How do organizations plan their security operations for increased effectiveness? The survey data indicates that there are many opportunities for improving security operations, both within each tier and across tiers. Read this paper and learn more on the capabilities and process available for you, today.
  • 0

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is a protocol that translates user-friendly domain names, such as www.paloaltonetworks.com, into machine usable IP addresses—in this case, 199.167.52.137. Without DNS, we’d have to memorize random strings of numbers, which our brains aren’t well equipped to do. DNS is fundamental to every single modern organization, all over the world. Network operators cannot block DNS traffic, and firewalls have to let it through. Networks need DNS to function properly.
  • 0

Focused Services - Elite

Focused Services – Elite provides the highest level of support services around the clock. A team of designated engineers is available 24/7 to resolve technical issues or support pre-scheduled events. This level of service also includes on-site troubleshooting assistance and two Threat Assessment Services per year. Focused Services – Elite helps you stay continuously ahead of threats with the experts you need, when you need them.
  • 0
  • 3000

RedLock Premium Customer Success Plans

RedLock premium customer success plans outlining the value customer receive with choosing our different success plans.
  • 0
  • 3000

RedLock Customer Success Plans

RedLock customer success plans outlining the value customer receive with choosing our different success plans.
  • 0
  • 3000

Network Visibility Service - Transformation Level 1

Read about how this service provides initial configuration and visibility into non-encrypted traffic
  • 0
  • 6386

Best Practice Assessment Privacy

We have created privacy document for Best Practice Assessment tool. This document primarily focuses on how we process customer files and maintain them securely.
  • 0
  • 6413

Focused Services - Plus

Focused Services – Plus provides advanced customer care with direct access to a designated engineer for priority case handling, paired with deep technical expertise to accelerate incident resolution. Our experts will develop a tailored release strategy for you as well as conduct a yearly Threat Assessment Service that will validate the effectiveness of your controls.
  • 0
  • 3000

RedLock Standard Customer Success Plans

RedLock standard customer success plans outlining the value customer receive with choosing our different success plans.
  • 0
  • 3000

Replacing Remote Access VPN With GlobalProtect Cloud Service

This solution brief provides an overview for using GlobalProtect Cloud Service as remote access VPN.
  • 1
  • 10079

Attack scale dictates ‘zero-trust’ cybersecurity approach for Palo Alto Networks

Just how significant is the threat activity by malicious actors against the global cybercommunity? One major cybersecurity company offers a hint of the current level of attacks.
  • 0
Displaying 1 to 30 of 3326