Date

Education and Professional Services

  • Cybersecurity Academy (4)
  • Federal Government
Displaying 1 to 30 of 77

Securing the Unpatchable in Financial Institutions

There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
  • 4
  • 578

Best Practices for Network Security Consolidation in Government

Through network security consolidation, government agencies can achieve tighter integration between previously disparate systems while automating and simplifying the process for responding to and preventing malicious activity.
  • 2
  • 215

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.
  • 2
  • 476

Heavy Reading’s 2019 5G Security Survey

Read a custom research report produced for F5 Networks, Fortinet, NetNumber, and Palo Alto Networks on the service provider priorities and preferences in implementing security to their 5G networks.
  • 1

Use Case: Deliver Agile, Comprehensive Security to Remote Workers and Offices Globally

Learn how a global organization reduced security costs and enabled seamless, high-performance collaboration for traveling workers and remote offices.
  • 0
  • 103

Government Use Case: Secure Government Law Enforcement Networks

Read how law enforcement organizations around the world are securing sensitive data and preventing cyberattacks with Palo Alto Networks
  • 1
  • 122

Large U.S. Government Agency Improves Network Security and Performance

Growing amounts of SSL/TLS encrypted traffic can be hiding threats. Decrypting and inspecting encrypted traffic can add latency, costs and management overhead. Read how this federal agency chose Palo Alto Networks next-generation firewalls to decrypt traffic inline and whitelist applications, reducing risk, increasing performance and simplifying security management.
  • 1
  • 211

Royal Air Forces Association

The RAF Association deployed the Palo Alto Networks Security Operating Platform, with the Next-Generation Firewall deployed in its data center and Azure public cloud.
  • 1
  • 507

Cyber Range

To keep network and security professionals’ security acumen fresh, Palo Alto Networks and Cyber Test Systems present a professional mobile Cyber Range suite.
  • 0
  • 3111

Government Use Case: Protect Endpoints

A real-world example and explanation of how a government agency achieved better protection and visibility of their computers and servers with Palo Alto Networks.
  • 4
  • 1230

Cybersecurity for Government Solutions Brief

A strong cyber defense, agile to the needs of governments globally as well as to adversaries’ tactics and tool changes, is germane to the future. Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience – from the endpoint to the heart of the network, data center and cloud – and for all threat types for IT and OT networks.
  • 1
  • 1036

Cyberscurity for State and Provincial Governments

Overview of how state and provincial governments can secure network, endpoint, and cloud environments with the Security Operating Platform
  • 0
  • 420

4 Benefits of Network Security Consolidation in Government

SECURE YOUR DATA, CITIZENS AND NATION
  • 3
  • 255

Mitigating Risk In Australia’s Critical Infrastructure

Palo Alto Networks Security Operating Platform Supports Use of ASD Top 37 STRATEGIES TO MITIGATE CYBERSECURITY INCIDENTS
  • 0
  • 389

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications..
  • 6
  • 1449

What Is the EU NIS Directive?

This paper provides an overview of the security and incident notification obligations of the EU NIS Directive and outlines how a Security Operating Platform can help.
  • 0
  • 387

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments..
  • 2
  • 2673

Cybersecurity for Local Governments

Overview of how municipal and county governments can secure network, endpoint, and cloud environments with the Security Operating Platform
  • 1
  • 806

USE CASE: Grow and Maintain Cyber Skills With a Cyber Range

Repurpose existing talent, grow, test and maintain cyber skills with a Cyber Range using Palo Alto Networks Next Generation Security platform for your Blue team..
  • 6
  • 4344

Women In Cyber Podcast-2

  • 0
  • 300

Cyber for women podcast

  • 0
  • 96

TRI-AD

As a leading provider of benefits administration services, TRI-AD understands the importance of protecting the private information of its clients’ plan participants. Recognizing the rise of evermore sophisticated cyberthreats, the firm decided to simplify its network security infrastructure by replacing a mix of firewalls, VPN appliances and antivirus software with a single, integrated approach using Palo Alto Networks® Next-Generaton Security Platorm.
  • 0
  • 492

Telstra and Palo Alto Networks Cybersecurity Roundtable

Watch Telstra’s Mike Burgess and Palo Alto Network’s Sean Duca in this Cybersecurity Roundtable hosted by The Australian.
  • 0
  • 640

State of the Cybersecurity Nation: Legislation and Europe’s Security Professionals

With both the threat landscape evolving rapidly and regulatory requirements becoming more demanding, organisations are struggling to prepare for cybersecurity incidents. .
  • 13
  • 282

Win the Cyberwar with Zero Trust

Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.
  • 5
  • 557

Protect Workloads in the Hybrid Cloud

Public cloud infrastructure-as-a-service (IaaS) or Platform-as-a-service (PaaS) offerings, such as Amazon Web Services, Microsoft Azure or Google Cloud Platform, can quickly and economically accommodate unexpected or temporary business computing workloads. Many aviation organizations are extending their private data centers to the public cloud for a hybrid cloud model for competitive and operational benefits. In the aviation industry, concerns over data, workloads, siloed legacy systems, processes, infrastructure security and latency are still a major concern. Regardless of where data resides, is ultimately the target of malicious entities. Learn how Palo Alto Networks is taking care of this challenge.
  • 0
  • 182

Securing AWS GovCloud 

Explore the benefits of the Cybersecurity Framework and how Palo Alto Networks Security Operating Platform capabilities map to and fulfill CSF categories
  • 4
  • 709

Securing the Mobile Workforce

In recent years, cybersecurity has emerged as one of the top concerns for the leadership of business and government organizations around the world. The troubling number of high-profile attacks targeting some of the largest companies in the world has led many to question whether adequate measures are in place on their own networks. Sophisticated attackers are employing new techniques to penetrate a network, and using methodologies to avoid detection by masking their activities in legitimate application traffic.
  • 29
  • 3153

Use Case Decrypt SSL and SSH Traffic

SSL-encrypted traffic is growing in government networks, resulting in multiple blind spots for security monitoring tools and creating an opportunity for attackers to hide malware. Many governments are considering or mandating the decryption of encrypted communications moving in and out of their networks. While traditional approaches favor dedicated SSL decryption appliances, these add latency, costs and increase time to resolution for security incide
  • 1
  • 426
Displaying 1 to 30 of 77