Date

By Type

By Product Category

Education and Professional Services

  • Cybersecurity Academy (4)
  • Federal Government
Displaying 1 to 30 of 39

Government Use Case: Secure Law Enforcement Networks

Read how law enforcement organizations around the world are securing sensitive data and preventing cyberattacks with Palo Alto Networks
  • 0
  • 99

Large U.S. Government Agency Improves Network Security and Performance

Growing amounts of SSL/TLS encrypted traffic can be hiding threats. Decrypting and inspecting encrypted traffic can add latency, costs and management overhead. Read how this federal agency chose Palo Alto Networks next-generation firewalls to decrypt traffic inline and whitelist applications, reducing risk, increasing performance and simplifying security management.
  • 1
  • 178

Cyber Range

To keep network and security professionals’ security acumen fresh, Palo Alto Networks and Cyber Test Systems present a professional mobile Cyber Range suite.
  • 0
  • 3010

Government Use Case: Protect Endpoints

A real-world example and explanation of how a government agency achieved better protection and visibility of their computers and servers with Palo Alto Networks.
  • 4
  • 1180

Cybersecurity for Government Platform Brief 

A strong cyber defense, agile to the needs of governments globally as well as to adversaries’ tactics and tool changes, is germane to the future. Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience – from the endpoint to the heart of the network, data center and cloud – and for all threat types for IT and OT networks.
  • 1
  • 1013

Best Practices for Network Security Consolidation in Government

Through network security consolidation, government agencies can achieve tighter integration between previously disparate systems while automating and simplifying the process for responding to and preventing malicious activity.
  • 1
  • 193

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.
  • 6
  • 1449

What Is the EU NIS Directive?

This paper provides an overview of the security and incident notification obligations of the EU NIS Directive and outlines how a Security Operating Platform can help.
  • 0
  • 371

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.
  • 2
  • 2673

USE CASE: Grow and Maintain Cyber Skills With a Cyber Range

Repurpose existing talent, grow, test and maintain cyber skills with a Cyber Range using Palo Alto Networks Next Generation Security platform for your Blue team.
  • 6
  • 4344

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.
  • 2
  • 455

State of the Cybersecurity Nation: Legislation and Europe’s Security Professionals

With both the threat landscape evolving rapidly and regulatory requirements becoming more demanding, organisations are struggling to prepare for cybersecurity incidents.
  • 13
  • 282

Securing AWS GovCloud 

Explore the benefits of the Cybersecurity Framework and how Palo Alto Networks Security Operating Platform capabilities map to and fulfill CSF categories
  • 4
  • 697

Government Use Case: Decrypt SSL and SSH Traffic to Disrupt Attacker Communications and Theft

SSL-encrypted traffic is growing in government networks, resulting in multiple blind spots for security monitoring tools and creating an opportunity for attackers to hide malware. Many governments are considering or mandating the decryption of encrypted communications moving in and out of their networks. While traditional approaches favor dedicated SSL decryption appliances, these add latency, costs and increase time to resolution for security incide
  • 1
  • 407

Continuous Diagnostics and Mitigation

This white paper describes how the Palo Alto Networks Next-Generation Security Platform, in combination with select technology and delivery partners, supports all three CDM phases and enables agencies to achieve the security objectives of the program.
  • 0
  • 5833

8 Imperatives for Governments to Defeat Advanced Threats

Advanced attacks are organized campaigns that leverage multiple techniques. Don’t be the government organization flying blind to attacks against your organization.
  • 1
  • 383

Today’s Cybersecurity Challenges in Government

Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience.
  • 0
  • 1024

Government Brochure 

Governments around the world are undergoing change. Whether reducing data center footprints, virtualizing existing services to reduce costs and "go green", or advancing security strategies to thwart advanced attacks in the field or at home, governments are demanding more from their cybersecurity solutions today.
  • 8
  • 1479

MeriTalk - Pedal to the Metal:
Mitigating New Threats Faster with Rapid Intel & Automation

Cyberattacks are one of the most pressing national security and economic concerns of governments around the world. Government agencies are taking an “all-in” approach to fight back, sharing more cyberthreat information with one another and purchasing threat feeds. However, with the influx of threat data, many agencies are having difficulty using these insights to update their sensors with real-time protection and reconfigure their defenses on the fly. And during a cyberattack, responding quickly is crucial to minimizing potential damage.
  • 0
  • 294

Military Tactical Case Study

Read how Palo Alto Networks VM-Series Next-Generation Security Platform secures communications for mission-command applications for this military customer.
  • 0
  • 959

Government Endpoint Use Case

Read how government endpoints can be protected against today’s threat environment with minimal disruptions to operations while meeting the needs of end users.
  • 0

The Advantages of User Awareness in Public Sector Network Security 

To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. 
  • 1
  • 666

Meeting CSIP Objectives With an Automated and Preventive Security Approach 

Every day, the U.S. federal government experiences increasingly sophisticated and persistent cyberthreats. The government is expending significant resources to ensure the cybersecurity of federal networks, systems and data remains a top priority. This white paper: Gives a short backgrounder on the U.S. government’s Cybersecurity Strategy and Implementation Plan (CSIP). Describes how the Palo Alto Networks® Next-Generation Security Platform enables U.S. federal agencies to identify and protect High Value Assets (HVAs) and information and detect and rapidly respond to cyber incidents. Provides a case study on how one U.S. federal agency used Palo Alto Networks to help meet CSIP objectives.
  • 0
  • 616

Uncover SSL-Encrypted Attacks in Government Networks

A comprehensive security strategy for federal and other government agencies requires in-depth analysis of encrypted traffic to detect and prevent hidden attacks and data leakage. As more Internet traffic is encrypted, increasing numbers of attackers, including state-sponsored actors, are using this technology to hide malware, and botnet-based command and control traffic to exfiltrate data and escalate the likelihood of successful attacks. Palo Alto Networks Next-Generation Security Platform provides a combination of advanced capabilities to prevent undesired applications and malicious content, including the decryption and scrutinization of encrypted communications, along with Hardware Security Module (HSM) support for enhanced performance and security of certificate and key management.
  • 1
  • 685

Moving Beyond Proxies

Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security products, providing limited security functionality against today’s advanced threats. Once upon a time, Proxies fulfilled a need traditional firewalls could not meet: visibility into web traffic starting with categorization of HTTP and later HTTPS traffic. However, little to no emphasis was put on traffic and the vast number of applications utilizing other avenues of accessing corporate networks. Proxy vendors still over-emphasize the importance of HTTP and HTTPS traffic while downplaying the role of applications utilizing other entry points in cyber attacks. This whitepaper highlights the short comings of proxies, and showcases how a next generation security platform can provide faster, simpler and more comprehensive security. This white paper is available in Portuguese.
  • 8
  • 3758

Heart of the Network – Data Center Defense

Feds need to protect the data center from internal and external threats as they transition to cloud environments. How are they managing the transition?
  • 0
  • 312

Palo Alto Networks Appoints New Federal CSO and Adds Global Defense and Intelligence Leader to its Public Sector Council

Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced the addition of two decorated military and intelligence leaders to further enhance the company’s cybersecurity strategy and global policy expertise.
Santa Clara, CA
  • 0
  • 2354

Palo Alto Networks Unit 42 Uncovers New Cyberattacks Targeting Government and Military Networks in Southeast Asia

Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today shared research that uncovers a series of potentially state-sponsored cyberattacks targeting government and military organizations in countries throughout Southeast Asia.
Santa Clara, CA
  • 10
  • 1201

Operation Lotus Blossom

Operation Lotus Blossom describes a persistent cyber espionage campaign against government and military organizations in Southeast Asia. The report exposes the targets, tools, and attack techniques, and provides full details on the Lotus Blossom campaign, including all indicators of compromise. Unit 42 discovered these attacks using the Palo Alto Networks AutoFocus platform, which enables analysts to correlate the results of the hundreds of millions of reports generated by WildFire.
Santa Clara, CA
  • 11
  • 6245

UK Cabinet Office Technology

The UK Cabinet Office Technology Transformation programme was established to replace an end-of-life outsourced IT service. The aim of the programme is to enable modern flexible ways of working and to provide civil servants with technology at least as good as they have at home. During user testing at the start of this project, staff told the UK Cabinet Office IT team that they wanted better connectivity; greater choice of applications; to be able to be more mobile with more portable devices and to be able to collaborate on documents in real time.
  • 0
  • 478
Displaying 1 to 30 of 39