Protect Against Russia-Ukraine Cyber Activity
  • Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Network Security
  • Secure Access Service Edge
  • Cloud-Native Security
  • Security Operations
  • Threat Intel & Incident Response
  • More
  • Sign In
    Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
    Language
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Get Started

Palo Alto Networks Introduces the Autonomous Security Platform, Cortex XSIAM, to reimagine SIEM and SOC Analytics

A major challenge in cybersecurity today is our inability to leverage massive scales of data for our defense. To meet this challenge, Palo Alto Networks (NASDAQ: PANW) today announced Cortex®...
See more

Palo Alto Networks Introduces PAN-OS 10.2 Nebula: The Industry's First Inline Deep Learning Protection for Network Security to Help Stop Sophisticated Attacks as They Happen

Palo Alto Networks (NASDAQ: PANW), a 10-time leader in network firewalls, today announced Nebula, the latest upgrade of its industry-leading PAN-OS software, to help find the evasive, zero-day...
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Topic

By Topic

  • Network Security (415)
  • Cloud Security (336)
  • Security Operations (235)
  • Threat Detection and Prevention (232)
  • Security Operating Platform (173)
  • Public Cloud Security (140)
  • Secure access service edge (SASE) (119)
  • Network Security Management (106)
  • Private Cloud Security (81)
  • Zero Trust (80)
  • Security Ecosystem (78)
  • Saas Security (54)
  • Amazon Web Services (54)
  • Mobile Security (51)
  • Google Cloud (48)
  • Microsoft Azure (46)
  • Secure Remote Workforce (28)
  • Data Center (26)
  • Next Generation Firewall (24)
  • Remote Workforce (12)
  • Attack Surface Management (12)
  • VMWare NSX (10)
  • Microsoft Hyper-V (5)
  • Professional Services (3)
  • Cloud Security (2)
  • Threat Prevention (2)
  • Network Security (1)
  • KVM (1)
  • + Show More
By Industry

By Industry

  • Federal Government (87)
  • Financial Services (59)
  • Healthcare (56)
  • Higher Education (56)
  • IoT (54)
  • High Technology (50)
  • State & Local Government (47)
  • Manufacturing (37)
  • Other Industries (37)
  • K-12 Education (33)
  • ICS SCADA (29)
  • Utilities & Energy (25)
  • Retail (21)
  • Energy (15)
  • Automotive (11)
  • Transportation (11)
  • Service Provider & Telecommunications (9)
  • Media & Entertainment (8)
  • Education (8)
  • Technology (8)
  • Airlines (7)
  • Pharma & Life Sciences (6)
  • Professional & Legal Services (6)
  • Software Geographic Information Systems (2)
  • Nonclassifiable Establishments (1)
  • Aerospace & Defense (1)
  • + Show More
By Type

By Type

  • In The News (1754)
  • Press Release (613)
  • Video (321)
  • White Paper (279)
  • Datasheet (279)
  • Webinar (252)
  • Customer Story (202)
  • Article (199)
  • Research Reports (106)
  • Guide (87)
  • Infographic (60)
  • Use Case (59)
  • Book (52)
  • Other (46)
  • Tech & Solution Brief (10)
  • Presentations (9)
  • Tool (4)
  • Playbook (2)
  • Brochure (2)
  • FAQ (2)
  • Podcast (2)
  • Solution Brief (1)
  • Unit 42 (1)
  • Interactive Content (1)
  • + Show More
By Product Category

By Product Category

  • NGFW (323)
  • Cortex XDR (262)
  • Prisma Cloud (241)
  • VM-Series (180)
  • Cortex XSOAR (137)
  • Prisma Access (134)
  • WildFire (129)
  • Cortex (123)
  • Panorama (96)
  • URL Filtering (95)
  • Threat Prevention (92)
  • Unit 42 (88)
  • Prisma SD-WAN (87)
  • Cortex Xpanse (74)
  • GlobalProtect (66)
  • PA-Series (56)
  • SaaS Security (56)
  • Threat Intel Management (41)
  • DNS Security service (31)
  • PAN-OS 10.0 (19)
  • IoT Security (18)
  • Prisma SASE (16)
  • CN Series (9)
  • Cortex XSIAM (9)
  • Enterprise DLP (8)
  • Zero Trust (7)
  • Okyo Garde (7)
  • Cloud NGFW (5)
  • Advanced Threat Prevention (2)
  • Cortex Data Lake (2)
  • + Show More
Education and Professional Services

Education and Professional Services

  • Professional Services (53)
  • Transformation Services (13)
  • Support (10)
  • Customer Success (9)
  • Training (6)
  • Cybersecurity Academy (4)
  • Firewall Migration (3)
  • Certified Partners (2)
Displaying 1 - 30 of 5569
  • 1
  • 2
  • …
  • 185
  • 186

Services

Cortex: A Holistic Ecosystem for Government Security Operations

Download this 2-page document for information on the Cortex portfolio of products including Cortex XDR, Cortex XSOAR, and Cortex Xpanse.
May 18, 2022

Book

Why Next-Gen SD-WAN Is the Solution for You Ebook

Read our complimentary e-book to discover the problems with legacy SD-WAN and how next-gen SD-WAN can help your organization stay connected while maintaining control and visibility.
May 18, 2022

References and Case Studies

Logicalis racks up comprehensive and speedy incident response with Cortex XSOAR

XSOAR reduces response time significantly—90-95% incidents resolved through automated playbooks
May 17, 2022

Video

Configuring Okyo Garde for IT Administrators

This video shows step-by-step instructions for employees to easily set up and connect their work devices to Okyo Garde
May 17, 2022

Article

What Is a Cloud Native Application Protection Platform (CNAPP)?

Cloud Native Application Protection Platforms (CNAPP) allow organizations to secure cloud native applications across the full application lifecycle.
May 17, 2022

Article

Endpoint Protection

Helping visitors to understand Endpoint Protection, the various options, and how the market has progressed to provide the most robust protection from modern threats.
May 17, 2022

Article

Legacy Networks: What Was There Before Zero Trust

To shift how we think about security design and deploying Zero Trust, it’s useful to understand security before the introduction of Zero Trust.
May 17, 2022

Article

What is Remote Access?

Remote access provides end users with the ability to access resources on the corporate network from a distant location.
May 17, 2022

Article

What Is Zero Trust for the Cloud?

Zero Trust is an IT security model that eliminates the notion of trust to protect networks, applications and data, unlike the perimeter security model
May 17, 2022

Article

Implementing Zero Trust Using the Five-Step Methodology

There is a five-step model for implementing and maintaining Zero Trust. By using this, you can understand where you are in your implementation process
May 17, 2022

Article

What is a Zero Trust Architecture

Zero Trust has become one of cybersecurity’s most used buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t.
May 17, 2022

White Paper

Kubernetes Privilege Escalation: Excessive Permissions in Popular Platforms

Kubernetes threat actors are growing more sophisticated with their attack techniques, including beginning to target Role-Based Access Control (RBAC) misconfigurations.
May 16, 2022

Press Release

Palo Alto Networks and Deloitte Deepen Strategic Alliance Into Managed Security Services

The new arrangement will offer threat detection, 5G security and enable the Zero Trust Enterprise for US organizations SANTA CLARA, Calif., May 16, 2022 /PRNewswire/ -- Palo Alto Networks (NASDAQ:...
Santa Clara, CAMay 16, 2022

Unit 42

A Look Into Public Clouds From the Ransomware Actor's Perspective

Ransomware in public clouds is rare, but cloud threat actors could adapt their TTPs to be more cloud native. Now is the time to get ahead of it.
Jay Chen, May 16, 2022

Datasheet

IoT Security Privacy Sheet

The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed, and stored by and within the service
May 15, 2022

Datasheet

Web Application and API Security (WAAS) At a Glance

Prisma’s Cloud Web Application and API Security (WAAS) module provides comprehensive detection and protection of Web Applications and API risks for any cloud native architecture. Download the At a Glance to learn more.
May 13, 2022

Guide

SASE for Branch - Architecture Guide

Learn how to use the Palo Alto Networks Prisma Access to secure direct Internet access from your remote sites with a cloud-delivered security platform.
May 13, 2022

Guide

SASE Overview

Learn how to use the Palo Alto Networks Prisma Access to secure mobile users as they access applications hosted in the internet or on-premises, regardless of where they connect from. Design models include authentication with Azure Active Directory and multiple methods to connect to internal or cloud-hosted applications.
May 13, 2022

Guide

SASE for Users - Architecture Guide

Learn how to use the Palo Alto Networks Prisma Access to secure mobile users as they access applications hosted in the internet or on-premises, regardless of where they connect from. Design models include authentication with Azure Active Directory and multiple methods to connect to internal or cloud-hosted applications.
May 13, 2022

Guide

SASE for Users - Deployment Guide

Provides detailed guidance on the requirements and steps to configure Prisma Access to enable secure mobile user access to internet or internally-hosted applications. Explains how to authenticate to Azure Active Directory and how to use static or dynamic routing to connect to your cloud or on-premises based applications.
May 13, 2022

Guide

SASE for Branch - Deployment Guide

Provides detailed guidance on the requirements and steps to configure Prisma Access to connect remote sites and enable direct internet access. Provides multiple options with static and dynamic routing and explains how to integrate with User-ID to enable group-based security policies.
May 13, 2022

Article

What is the MITRE ATT&CK Framework?

MITRE has identified hundreds of different techniques adversaries use to execute cyberattacks. ATT&CK organizes them into a framework to help security practitioners.
May 12, 2022

Article

What Is Zero Trust Network Access (ZTNA)

Learn how Zero Trust Network Access (ZTNA) works and provides better access control for your remote users.
May 12, 2022

Other

Retailers Require Best-in-Class Security on Their Digital Transformation Journey

Digital transformation was here long before COVID-19, but the pandemic significantly accelerated the timeline, especially for the retail industry. Now, as retailers invest in their digital infrastructure, security is a top priority, along with adapting to customers’ new buying habits.
May 12, 2022

Webinar

Why You Need a Platform for Cloud Security Success

Join Patrick Chang (Sr. Director Product Management, Palo Alto Networks), Karl Otts, (CISSP, Head of Cloud Security, EPAM Systems), and Aaron Tang (CISSP, Sr. Associate, Schellmann & Company, LLC) for this on-demand webinar as they explain ways to identify cloud security tools and strategies that can evolve with you, and show how Prisma Cloud enables cloud security scalability without the sacrifice.
May 12, 2022

Infographic

Cloud Native Security Maturity: Using Security to Drive Software Development Efficiency

View this infographic to see how a mature security program enables greater productivity and business innovation that enhance the benefits of adopting cloud native software development.
May 12, 2022

Article

Digital Forensics and Incident Response (DFIR)

Digital forensics and incident response are branches of cybersecurity that involve identifying, investigating, remediating, and potentially testifying related to cyber attacks, litigations, or other digital investigations.
May 12, 2022

Article

What is Zero Trust Network Access (ZTNA) 2.0

Zero Trust Network Access 2.0 overcomes the limitations of legacy ZTNA solutions, providing secure connections to deliver better security outcomes for businesses with hybrid workforces.
May 11, 2022

Press Release

Palo Alto Networks Calls on Cybersecurity Industry to Adopt ZTNA 2.0 -- Zero Trust with Zero Exceptions

First-gen ZTNA solutions have major gaps in security protection and can put organizations at significant risk SANTA CLARA, Calif., May 11, 2022 /PRNewswire/ -- Palo Alto Networks (NASDAQ: PANW),...
Santa Clara, CAMay 11, 2022

White Paper

The Evolution of ZTNA to Fully Support Zero Trust Strategies

Understand the evolution to ZTNA 2.0 and learn how to use the framework to securely connect your employees to the resources they need to work anywhere.
May 11, 2022
Displaying 1 - 30 of 5569
  • 1
  • 2
  • …
  • 185
  • 186

Get the latest news, invites to events and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Tech Insider
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Newsroom
  • Careers
  • Contact Us
  • Product Certifications
  • Manage Email Preferences
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved