Date

Education and Professional Services

Displaying 1 - 30 of 4652

Video

SASE: Cloud-Delivered Network Security

Learn how SASE provides cloud-delivered security

Datasheet

QuickStart Service for CloudGenix SD-WAN - Additional Site Add-on

This service description document (“Service Description”) outlines the Palo Alto Networks QuickStart Service for Prisma Cloud Enterprise Edition(“Service”).

Datasheet

QuickStart Service for CloudGenix SD-WAN

This service description document (“Service Description”) outlines the Palo Alto Networks QuickStart Service for Prisma Cloud Enterprise Edition(“Service”).

Datasheet

Prisma Access Technical Specifications Datasheet

Key features, performance capacities and specifications for Prisma Access.

Book

Data Center and Hybrid Cloud Security for Dummies

To ensure business success, information security teams have to put automation and operational simplification into practice and fully leverage their benefits. This eBook provides the latest best practices and approaches to security to help you better protect your data and applications in the on-prem data center and across multi-cloud environments.

Datasheet

Cortex XSOAR Partner Program Guide

Cortex XSOAR Partner Program Guide details responsibilities of Technology Partners in the Cortex XSOAR Partner ecosystem.

Datasheet

Cortex XSOAR Marketplace Solution Overview

Discover SOAR Content and Increase SecOps Automation with Cortex XSOAR Marketplace

In The News

The 25 Most Influential Executives Of 2020

Arora has charted a course of aggressive growth for the world’s largest pure-play cybersecurity vendor with eight acquisitions over his first two years as CEO.

In The News

Palo Alto Networks Digs Into Kubernetes Security Flaw

The Unit 42 research arm of Palo Alto Networks this week issued a security alert that warns a previously disclosed Kubernetes vulnerability may be more severe than initially appreciated.

In The News

The Top 25 Channel Sales Leaders Of 2020

Soderlund has helped Palo Alto Networks push into the systems integrator market, expanding its partnership with NTT Ltd.

Unit 42

Threat Assessment: WastedLocker Ransomware Activities

WastedLocker is a prime example of a targeted ransomware attack, which are comparatively more effective and yield higher ransoms than common attacks.
Alex HinchliffeDoel SantosAdrian McCabeRobert Falcone,

Datasheet

Cortex XSOAR

The Cortex XSOAR gives you an overview of Cortex XSOAR automation, case management, collaboration and threat intel management features, as well as support and deployment options.

Use Case

Strengthen security with Zero Trust

Read this use case to discover how government agencies seek to limit the damage, withstand the impact, and decrease the effect of cyber attacks by pursuing a Zero Trust Architecture.

References and Case Studies

Teleflex

Read this case study to learn why Telefax chose CloudGenix SD-WAN.

Webinar

The Industry’s Best SD-WAN with Integrated Security: CloudGenix & Prisma Access

This webinar shows how users can benefit from a SASE approach that brings together SD-WAN with integrated security for distributed branch and retail environments.

White Paper

Palo Alto Networks & Venafi Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.

Datasheet

Cortex XSOAR Hosted Solution datasheet

With Cortex XSOAR’s hosted solution, security teams can improve response times and efficiencies without having to devote dedicated resources for infrastructure, maintenance, and storage.

Article

What are Proxy Servers

Proxy servers are a dedicated computer or a software system that sits between end user devices and a desired destination, such as a website, web application, or a cloud-based application.

Article

An Overview of FedRAMP and Why You Should Care About It

In 2017, the White House signed an executive order to strengthen the cybersecurity of federal networks and critical infrastructure. With this directive, combined with the Modernizing Government Technology Act, U.S federal agencies are focusing on modernizing their IT infrastructure while making security a top priority. A key component of this modernization is accelerating the adoption of secure, cloud-based services. The Federal Risk and Authorization Management Program, or FedRAMP, was conceived as a way to minimize cybersecurity risk for federal agencies as they move to the cloud.

Article

Top 5 Requirements for Securing Your Branch Offices

Securing your branch office is a crucial and necessary tactic to protecting your organization’s data and employees, as well as ensuring your organization does not suffer the consequences of a breach.

Article

What Is a Hybrid Data Center?

A hybrid data center is an evolution strategy that allows for creating the right mix of cloud and traditional IT that best suits your organizational needs.

Article

What Is a Cloud VPN?

A cloud VPN (also known as virtual private network as a service (VPNaas) or hosted VPN) is a new type of VPN technology that’s specifically designed for the cloud.

White Paper

Federal Cloud Journey Guidance

Helping to guide federal organizations as they continue to migrate to cloud environments.

Article

3 Ways to Prevent Evasive Threats

To identify and prevent evasive threats, security tools must employ purpose-built virtual analysis, bare metal analysis, and incorporate threat intelligence.

Datasheet

Prisma Access (GlobalProtect Cloud Service) Datasheet

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.

Datasheet

XDR RFP CHECKLIST

XDR must deliver a wide range of common EDR capabilities to provide efficient and effective security against modern attacks, while also integrating with other key prevention, detection, and response tools across the infrastructure. The following RFP checklist includes requirements within nine key categories to help you evaluate the quality of the platforms you’re considering. Use this checklist as a starting point and tailor it to your company’s needs to ensure you’re able to identify vendors that can best support your organization.

Unit 42

Kubernetes Vulnerability Puts Clusters at Risk of Takeover (CVE-2020-8558)

CVE-2020-8558 exposed internal services of Kubernetes nodes. Read more details about the issue and recommendations for mitigation.
Yuval AvrahamiAriel Zelivansky,

White Paper

Cortex XSOAR and Google Chronicle Integration

In today’s ever-changing cloud landscape, it's easy for incident response teams to miss out on potential threats that can impact their organization because they’re time-strapped by manual processes or unable to take advantage of the breadth of external threat intelligence available and how these threats impact their organizations.

White Paper

Agile and keyless cloud security response

Cortex XSOAR’s security orchestration and automation capabilities can now be used to deploy and manage a variety of AWS services in a keyless and secure manner.

Datasheet

Redefining cloud security orchestration

Cloud security demands agility and flexibility in the face of an expanded threat surface and disparate teams. Cortex XSOAR primes users for fast and standardized cloud security through multi-source ingestion of cloud data and playbooks that coordinate and automate incident response actions across cloud and on-premises environments.
Displaying 1 - 30 of 4652