Date

Education and Professional Services

Displaying 1 - 30 of 2828

Datasheet

Security Lifecycle Review Privacy

The purpose of this document is to help Palo Alto Networks® customers assess the impact of the Security Lifecycle Review (SLR) app on their overall privacy posture.

Video

Security Lifecycle Review

Security Lifecycle Review

Webinar

4 Life Hacks to Love Your Security Job

This webinar will help. Designed with you in mind, it features our own Kasey Cross as well as Kerry Matre, author of Elements of Security Operations. Together, they’ll show you how you can cut down on repetitive tasks to spend more time investigating incidents and hunting for hidden threats.

Program

Unit 42 Threat Landscape Review

Report reviews the current threat landscape and puts a spotlight on malware attack vectors in key industries.

Research Reports

Unit 42 Threat Landscape Review

Today’s cyber attackers utilize an increasingly sophisticated set of evasion tactics. Disjointed techniques and a fragmented security approach leave enterprises prone to risk. The volume of attacks is rising, applying strain on a limited population of security specialists. It is essential that defenders and security specialists understand the trends and distributions in the attack landscape. This paper takes a survey of the Palo Alto Networks Threat Data generated across the customer base.
Palo Alto Networks, Santa Clara, CA

Webinar

First Half of 2014 Cyber Security Review - Japanese Webinar

7月と8月に上半期のセキュリティ市場の振り返りのWebセミナーを実施しました。 実際の被害例をあげて実施したため、参加者の方に高評価されるセミナーとなりました。

Video

Security Lifecycle Review (SLR) on the App Framework

Security Lifecycle Review (SLR) is a cloud-based application that analyzes the network traffic and reports on the business and security risks facing an organization to provide visibility into the network. SLR leverages the Palo Alto Networks Next Generation Firewall logs Cortex Data Lake data to identify the applications and threats exposing vulnerabilities in an organization’s security’s posture.

Webinar

Threat Review Series: What the Enterprise Can Learn From WikiLeaks

The WikiLeaks saga has captured attention world-wide, with the majority of analysis focused on the actual leaked content. Yet while WikiLeaks is certainly the most high-profile breach in recent memory, the techniques used to exfiltrate and hide information are directly applicable to enterprises today. In this session we will summarize the key lessons of WikiLeaks and how security managers can protect their networks today.

In The News

Roll out of Cortex XSOAR by Palo Alto Networks designed to make life of security analyst easier

The cybersecurity firm introduced an extended security orchestration, automation and response platform this week to provide capabilities for security analysts to deal with threats across the enterprise.

References and Case Studies

Animation and Visual Effects Studio Animal Logic Brings Creativity to Life With Secure Access to Network and Cloud Resources

You know those mischievous bunnies in the movie “Peter Rabbit”? How about the heroic minifigs in “The LEGO Movie” or the fighting owls in “Legend of the Guardians: The Owls of Ga’Hoole”? Maybe the prancing penguins in “Happy Feet” had you dancing. Or perhaps “Alien: Covenant,” “Guardians of the Galaxy Vol. 2” or “The Great Wall” had you on the edge of your seat. If you’ve been amazed by the breathtaking visuals, compelling characters or memorable performances in any of these films, you can thank the creative wizardry of Animal Logic.

Research Reports

Transforming Detection and Response A new Cortex XDR™ review from SANS

In this new review, “Transforming Detection and Response,” the SANS Institute offers an objective, third-party view of the product capabilities of Cortex XDR™. Learn why SANS believes the true power of Cortex XDR is its ability to help analysts not only contain and scope attacks, but ultimately prevent them from occurring in the future.

Research Reports

Threat Landscape Review

Unit 42's Threat Landscape Review examines data from WildFire™, a key component of the Palo Alto Networks threat intelligence cloud, to identify how organizations in different industries are targeted and affected by malware.
Palo Alto Networks, Santa Clara, CA

Guide

Guide: Container Security for Dummies

In this eBook you will learn how to begin addressing container security holistically, how to start embedding security across the entire container life cycle (i.e. DevSecOps), and how to gain full stack security awareness that will allow you to reduce, prioritize and automatically filter out alerts based on holistic, cloud context.

Webinar

Threat Review Series: Zeus and the Rise of the Banking Bots

In this edition of the threat review, we will follow the money with a dive into the world of banking malware and its growth into one of the most popular and lucrative avenues for professional hackers. We will take a closer look at Zeus, how it has evolved over time, and spawned a new generation of financial botnets that promise to cause even more damage. As always, we will cover the skills and intelligence you will need in order to protect your networks from these rapidly evolving threats.

Article

Cloud Native Security vs 3rd Party Security

Customers and prospects often ask if they should adopt the tools developed and provided by the cloud platforms themselves or invest in 3rd party solutions. Before jumping to technology decisions, it is wise to review both requirements and existing tools.

Video

Prisma Cloud Security Suite Expands with Twistlock and PureSec Acquisitions

The acquisitions of Twistlock and PureSec further advance Prisma leadership in public cloud security by providing customers with a comprehensive set of capabilities to secure all cloud workloads.

Article

Rewiring Security Operations Campaign

White Paper

Federal Civilian Security Reference Blueprint

The Security Reference Blueprint for Federal Civilian Departments and Agencies helps the U.S. deliver on its mission and business objectives to safely and securely render services to the American public, while advancing the Nation's agenda.

Datasheet

Next-Generation Security Platform Datasheet

Palo Alto Networks Next-Generation Security Platform helps enterprises, service providers and governments with a prevention-first approach to cybersecurity.

Press Release

KPIT Technologies Adopts Palo Alto Networks Security Operating Platform to Enable “Smart Enterprise”

SANTA CLARA, Calif. – September 6, 2018 – Palo Alto Networks® (NYSE: PANW), the global cybersecurity leader, today announced that KPIT has transformed its approach to cybersecurity by deploying Palo Alto Networks Security Operating Platform, including its firewalls and network security management.
Santa Clara, CA

White Paper

Comparing the VM-Series and Security Groups

A quick review of the shared responsibilities model and how the VM-Series complements native public cloud security features such as Security Groups and Web application firewalls.
Displaying 1 - 30 of 2828