Date

By Industry

Education and Professional Services

  • Cybersecurity Academy (4)
Displaying 1 to 30 of 34

Use Case: Consolidate Network Security, Reduce Costs and Complexity

Businesses embrace digital technologies that modernize their operations and enable innovation. Yet these same technologies introduce new security vulnerabilities and new data that must be secured. The result is a costly cybersecurity arms race, in which businesses introduce new security products to counter new attack vectors. Individually-managed or standalone security products add complexity, reduce visibility, and strain under-resourced security teams.
  • 5
  • 534

Government Use Case: Secure Law Enforcement Networks

Read how law enforcement organizations around the world are securing sensitive data and preventing cyberattacks with Palo Alto Networks
  • 0
  • 99

Use Case: Simplify Cybersecurity and Maintain Resilience in the Water Sector

Read this use case for real-world examples of how water districts and authorities reduce cybersecurity risk while securing new digital innovations.
  • 0
  • 192

Royal Air Forces Association

The RAF Association deployed the Palo Alto Networks Security Operating Platform, with the Next-Generation Firewall deployed in its data center and Azure public cloud.
  • 1
  • 489

Government use case: Maintain the integrity of election systems

Enable citizens to exercise their right to vote, preserve trust in the process, and meet recommendations and regulations for securing the vote
  • 0
  • 992

Handbook: How to Create a Modern Ransomware Strategy

Read this handbook to gain insight and best practices from your peers and industry experts on creating a modern ransomware strategy.
  • 1
  • 338

Government Use Case: Protect Endpoints

A real-world example and explanation of how a government agency achieved better protection and visibility of their computers and servers with Palo Alto Networks.
  • 4
  • 1180

Rancho California Water District

Rancho California Water District (RCWD) serves and supports approximately 150 square miles, 3 different critical water infrastructures and 45,000 endpoints. Dale Badore, Datacenter Operations Supervisor, shares how he moved to a high-available single vendor infrastructure with the Palo Alto Networks Security Operating Platform. RCWD selected Traps to protect their endpoints, which now provides the company with a next-generation non-signature-based protection system and detection into anonymous activity.
  • 1
  • 266

Cyberscurity for State and Provincial Governments

Overview of how state and provincial governments can secure network, endpoint, and cloud environments with the Security Operating Platform
  • 0
  • 405

City of Glendale

The City of Glendale is the fourth largest city in Los Angeles County, Eric Brumm, Deputy Chief Information Officer oversees the Infrastructure Services Division, which acts like a service provider to 14 different departments within the City of Glendale. Mr. Brumm discusses how his team replaced their legacy firewall solution with Palo Alto Networks Security Operating Platform and can now easily build powerful protection policies and have the visibility to see what is going in the background as traffic is flowing through the city’s network.
  • 0
  • 198

Ministry of Energy, Industry and Mineral Resources

The Ministry of Energy, Industry, and Mineral Resources implemented Traps™ advanced endpoint protection, part of Palo Alto Networks® Security Operating Platform, which also includes next-generation firewalls and numerous integrated threat intelligence services to help ensure strong security at the endpoint.
  • 0
  • 345

Best Practices for Network Security Consolidation in Government

Through network security consolidation, government agencies can achieve tighter integration between previously disparate systems while automating and simplifying the process for responding to and preventing malicious activity.
  • 1
  • 193

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.
  • 6
  • 1449

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.
  • 2
  • 2673

Cybersecurity for Local Governments

Overview of how municipal and county governments can secure network, endpoint, and cloud environments with the Security Operating Platform
  • 1
  • 783

Local Government Use Case: Transition to a Cybersecurity Platform to Improve Effectiveness and Efficiency PDF

As new digital technologies or threats emerge, the traditional approach has been to add new, discrete security appliances and solutions to the network and its elements. As security products proliferate, so do costs and operational complexity, while network and security teams struggle to get a comprehensive view of traffic and potential threats. Read a real-world example of how a local government adopted elements of the Security Operating Platform over time, and how the platform approach helps them  prevent 1M threats a month from impacting city operations.
  • 0
  • 223

USE CASE: Grow and Maintain Cyber Skills With a Cyber Range

Repurpose existing talent, grow, test and maintain cyber skills with a Cyber Range using Palo Alto Networks Next Generation Security platform for your Blue team.
  • 6
  • 4344

Ada County

Idaho’s Largest County Takes a Next-Generation Approach to Governing Security
  • 0
  • 664

Alameda County Office of Education

Alameda County Office of Education updates to a “network security as a service” model delivered through an affordable subscription pay plan. Multiple virtual systems, or firewalls, work under a dedicated Palo Alto Networks platform to prevent cyberattacks and maintain secure browsing/ data protection for students and staff alike.
  • 0
  • 335

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.
  • 2
  • 455

State of the Cybersecurity Nation: Legislation and Europe’s Security Professionals

With both the threat landscape evolving rapidly and regulatory requirements becoming more demanding, organisations are struggling to prepare for cybersecurity incidents.
  • 13
  • 282

Secure the Network through Application Visibility PDF

Governments and businesses must continuously assess the use of new applications and services that improve processes and operations. As such, they must weigh the business benefits from the adoption of newly sanctioned applications against potential risk to the business, its data and other resources. Applications themselves, such as remote access, can represent undue risk. In addition, if applications are not appropriately secured in the business network, today’s attackers can hide communications within the very communication mechanisms the applications use. Adoption of security that appropriately identifies, granularly controls and secures enterprise applications can be slow if those charged with such controls don’t understand the necessity, value or ease with which appropriate controls can be adopted. Download our use case "Secure the Network through Application Visibility" for the benefits of this approach, along with some common concerns over adoption, and read about the experiences of several customers across different industries who made this transition.
  • 6
  • 375

How Palo Alto Networks Next-Generation Security Platform Supports Use of the NIST Cybersecurity framework

Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk. The CSF can be applied to businesses of all sizes, across regions and industries, and is being incorporated into national risk frameworks around the globe. Given its proven ability to aid in risk management and reduction, some industries have even begun to mandate its implementation. Namely, the White House recently issued an executive order requiring all federal agencies to immediately begin using the CSF to assess and manage cyber risk to protect critical infrastructure in their enterprises. Designed to foster positive and productive risk and cybersecurity management dialogue among internal and external business stakeholders, the CSF provides a common language for all appropriate teams, spanning IT, operations, security, finance, C-suite and board of directors. Based on this open dialogue, organizations can more effectively quantify risk and prioritize investments to mitigate it. Palo Alto Networks® Next-Generation Security Platform aligns with the CSF’s primary directive of enabling critical infrastructure operations to effectively identify, manage and reduce cyber risk. Rooted in prevention, the Next-Generation Security Platform is natively integrated to counter cyberattacks before they manifest in an organization’s environment. With full visibility into traffic – across the network, endpoints and the cloud – organizations can prevent cyberattacks based on how or where applications and data reside or are being used. This allows critical infrastructure organizations to identify the most serious ongoing threats to key business operations and reduce overall cybersecurity risk. Download this white paper to explore the benefits of the CSF and how Palo Alto Networks Next-Generation Security Platform capabilities map to and fulfill CSF subcategories.
  • 2
  • 1271

Simplify PCI Compliance with Network Segmentation PDF

Establishing, maintaining and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for all entities involved in payment card processing – including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive authentication data (SAD). For all system components included in or connected to the Cardholder Data Environment (CDE), organizations must comply with more than three hundred requirements. It is in every organization’s best interest, therefore, to take advantage of network segmentation provisions stated in the PCI DSS to effectively isolate their CDE and thereby decrease the amount of infrastructure that is considered in scope. Download our use case "Simplify PCI Compliance With Network Segmentation" to learn how Palo Alto Networks Next-Generation Security Platform delivers maximum protection for an organization’s entire computing environment while greatly reducing the scope of PCI compliance.
  • 0
  • 1957

State of Colorado

Colorado faces over 8MIL cyberthreats daily. Read how they've gained visibility and control with intelligent and automated prevention.
  • 7
  • 1287

Zurich Municipality Locks Down Endpoints and Secures Network with the Palo Alto Networks Enterprise Security Platform

Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today announced that the City of Zurich's Entsorgung Recycling Zurich (ERZ) department has selected the Palo Alto Networks Enterprise Security Platform to secure its computing environment from evolving sophisticated cyber threats, and reduce IT management burdens.
Santa Clara, CA
  • 4
  • 517

State of California Department of General Services Selects Palo Alto Networks for Its New Security Infrastructure

Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today announced that the California Department of General Services (DGS) has chosen to build its security infrastructure on the Palo Alto Networks Security Platform. DGS chose Palo Alto Networks as the foundation of a new, next-generation consolidated security infrastructure to deliver citizens and state employees superior security, ease of management, network agility, and transparency.
Santa Clara, CA
  • 1
  • 1128

Regio IT

IT service provider regio iT is a partner for city and district municipal authorities. With branches in Aachen and Gütersloh, regio iT helps around 320 customers and 20,500 clients from the municipal field meet challenges brought on by rapid development in the IT world and increasing cost pressures. regio iT’s current 340 employees take on the tasks of operating and supporting database and server systems as well as entire IT infrastructures for energy suppliers, waste disposal companies, schools, and non-profit organizations, and of managing the data of citizens within the region. Available in German.
  • 4
  • 1618

California Department of Water Resources

In this video, you’ll hear Tony Morshed, Chief Technology Officer at California Department of Water Resources (DWR) discuss the state’s Software-Defined Data Center strategy. DWR leverages the Palo Alto Networks Next-Generation Security Platform, including WildFire and Panorama subscriptions. In addition, DWR takes advantage of the microsegmentation capability that VMware’s NSX solution provides.
  • 0

Video: California Department of Water Resources, securing NSX with the VM-Series

In this video, you’ll hear Tony Morshed, Chief Technology Officer at California Department of Water Resources (DWR) discuss the state’s Software-Defined Data Center strategy. DWR leverages the Palo Alto Networks Next-Generation Security Platform, including WildFire and Panorama subscriptions. In addition, DWR takes advantage of the microsegmentation capability that VMware’s NSX solution provides.
  • 0
  • 946
Displaying 1 to 30 of 34