Date

Education and Professional Services

  • Cybersecurity Academy (4)
Displaying 1 - 30 of 90

White Paper

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.

Use Case

Automating Cyber Operations

To gain, maintain, and expand competitive advantage over adversaries in a new digital operating environment, SOCs must be capable of seamlessly employing, integrating, and automating its capabilities across all environments and in any domain.

White Paper

Guidance for the US Government on Zero Trust

Learn about how the Federal Government faces unique challenges regarding Zero Trust that commercial entities do not. While cybersecurity programs within the Federal Government are more mature and provide significant capability, many do not ad- dress the issue of inherit trust. Due to this, Zero Trust has gained momentum across the Federal Government.

White Paper

Federal Government Defense Security Reference Blueprint

This guide outlines the challenges Defense agencies face and methods they can use to integrate the Palo Alto Networks ecosystem into the Federal Enterprise Architecture (FEA) to fight modern threats, meet current and future security objectives, and improve cyber resilience and operations.

Use Case

Federal Government: Multi-Cloud Security, Governance and Compliance

The federal governments will use cloud as a new foundation to build more effective security capabilities across domains - including cyberspace. An explosion of government adoption of public, private, hybrid, and cloud services have introduced new ways to scale and deliver efficient operations across multiple cloud platforms. As federal agencies continue to transition and expand their footprint into the cloud, it is critical to ensure these systems are secure and vulnerabilities are addressed immediately.

Use Case

Cloud Native Security Across The Software Lifecycle

Federal departments and agencies will use the cloud as a new foundation upon which to build more effective security across domains, including cyberspace.

Datasheet

Centralized Cloud Visibility

Discover best practices to enable visibility and reduce risk in multi-cloud environments.

Infographic

Top Cloud Security Concerns for Federal Agencies

Top cloud security risks and concerns for Federal Agencies and how Palo Alto Networks help address those concerns.

Guide

At a Glance: WildFire: U.S. Government malware prevention service

Learn how this industry-leading malware prevention service built for the U.S. government prevents highly evasive zero-day threats and malware from impacting agencies.

White Paper

Continuous Diagnostics and Mitigation (CDM) - at a Glance

This whitepaper describes how Palo Alto Networks provides an easy-to-use, cost-effective management environment that enables integrators and agencies to meet CDM requirements.

Other

Twistlock - AAG - NIST SP 800-190

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-190 provides guidance on securing application containers and related ecosystem components. While it thoroughly describes the security risks and associated countermeasures for protecting containerized apps, it leaves organizations to fend for themselves on the tactical front. Twistlock is a purpose-built software suite for securing cloud-native workloads. From the beginning, we’ve been developing technology to address the types of risks NIST SP 800-190 describes.

Book

BeyondCorp: A Step Towards Zero Trust for the Cloud

This eBook looks at BeyondCorp, how it works, its key principles, and how it applies towards implementing a comprehensive Zero Trust approach in the cloud.

Video

Securing Branch Offices with Prisma

Learn how Prisma can help secure your branch offices through cloud-delivered security in this short video.

Article

What is the Difference between FISMA and FedRAMP?

If you plan to deliver cloud-based services to the government, it’s important to have a fundamental understanding of government-enacted Federal IT compliance standards now more than ever.

Article

Best Practices for Network Security Consolidation in Government

Through network security consolidation, government agencies can achieve tighter integration between previously disparate systems while automating and simplifying the process for responding to and preventing malicious activity.

Use Case

Use Case: Deliver Agile, Comprehensive Security to Remote Workers and Offices Globally

Learn how a global organization reduced security costs and enabled seamless, high-performance collaboration for traveling workers and remote offices.

Use Case

Government Use Case: Secure Government Law Enforcement Networks

Read how law enforcement organizations around the world are securing sensitive data and preventing cyberattacks with Palo Alto Networks

References and Case Studies

Royal Air Forces Association

The RAF Association deployed the Palo Alto Networks Security Operating Platform, with the Next-Generation Firewall deployed in its data center and Azure public cloud.

Article

Cyber Range

To keep network and security professionals’ security acumen fresh, Palo Alto Networks and Cyber Test Systems present a professional mobile Cyber Range suite.

Article

Government Use Case: Protect Endpoints

A real-world example and explanation of how a government agency achieved better protection and visibility of their computers and servers with Palo Alto Networks.

White Paper

Cybersecurity for Government Solutions Brief

A strong cyber defense, agile to the needs of governments globally as well as to adversaries’ tactics and tool changes, is germane to the future. Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience – from the endpoint to the heart of the network, data center and cloud – and for all threat types for IT and OT networks.

White Paper

Cyberscurity for State and Provincial Governments

Overview of how state and provincial governments can secure network, endpoint, and cloud environments with the Security Operating Platform

Video

4 Benefits of Network Security Consolidation in Government

SECURE YOUR DATA, CITIZENS AND NATION

White Paper

Mitigating Risk In Australia’s Critical Infrastructure

Palo Alto Networks Security Operating Platform Supports Use of ASD Top 37 STRATEGIES TO MITIGATE CYBERSECURITY INCIDENTS

White Paper

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.

Datasheet

What Is the EU NIS Directive?

This paper provides an overview of the security and incident notification obligations of the EU NIS Directive and outlines how a Security Operating Platform can help.

White Paper

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.

References and Case Studies

Large U.S. Government Agency Improves Network Security and Performance

Growing amounts of SSL/TLS encrypted traffic can be hiding threats. Decrypting and inspecting encrypted traffic can add latency, costs and management overhead. Read how this federal agency chose Palo Alto Networks next-generation firewalls to decrypt traffic inline and whitelist applications, reducing risk, increasing performance and simplifying security management.

White Paper

USE CASE: Grow and Maintain Cyber Skills With a Cyber Range

Repurpose existing talent, grow, test and maintain cyber skills with a Cyber Range using Palo Alto Networks Next Generation Security platform for your Blue team.
Displaying 1 - 30 of 90