Date

By Industry

By Product Category

  • Prisma Cloud (2)

By Features

By Technology

By Services

By Audience

By Language

  • English (1)
Displaying 31 - 60 of 3210

Blogs

Bringing High-Fidelity Threat Intelligence to Prisma Cloud

We've integrated high-fidelity threat intelligence into Prisma Cloud through AutoFocus, providing intelligence, analytics and context.
Jonathan Bregman,

Blogs

Palo Alto Networks Expands Cloud Hosting Locations to the UK

Our new UK cloud hosting location helps UK customers address their data residency and regulatory requirements.
Kasey Cross,

Blogs

The Ultimate Guide to the MITRE ATT&CK Round 2 Evaluation

For security teams seeking to evaluate EDR and XDR vendors, we've put together The Ultimate Guide to the MITRE ATT&CK Round 2 Evaluation.
Mark Brozek,

Blogs

Cloud Native Security: Intention vs. Practice

Comparing the results of our State of Cloud Native Security Report with threat research from Unit 42 reveals three interesting parallels.
Matthew Chiodi,

Blogs

5 Reasons Why You Should Consider Cloud-delivered Managed Security

A cloud-delivered managed security solution can be a good option for organizations that need to reduce costs while maintaining strong security.
Francisca Segovia Garcia,

Blogs

How to Start Threat Hunting

Four tips for how to start threat hunting from the panelists of our recent Inside the Hunt Virtual Threat Hunting Summit.
Mark Brozek,

Blogs

NIST Highlights Palo Alto Networks Supply Chain Best Practices

Governments should promote the adoption of supply chain best practices to foster a resilient ICT ecosystem.
Coleman Mehta,

Blogs

Palo Alto Networks Moves to Virtual Events Model Through 2020

The virtual events model includes online versions of Ignite, Federal Ignite and EMEA Ignite.
Linda Shanley,

Blogs

Build Endpoint Security into Your Zero Trust Strategy

A proper Zero Trust strategy should be consistent and coordinated, extending beyond network to include endpoint security.
Kasey Cross,

Blogs

Improve Your Cybersecurity Skills: Free Digital Learning

Bridge the cybersecurity skills gap with free educational resources, learning paths and industry-leading certifications tailored to real-world cybersecurity jobs.
Prameet Chhabra,

Blogs

Mapping the Cloud Native Security Genome

We examine the cloud native security genome, informed by in-depth primary research.
Rahul Sood,

Blogs

Multi-Cloud Networking Advances as Palo Alto Networks and Alkira Team Up

Palo Alto Networks and Alkira work to embed VM-Series virtual firewalls into a networking-as-as-a-service platform for better multi-cloud networking.
Mukesh Gupta,

Blogs

How to Bolster Your Business Case for XDR

New customer testimonials, test results and product reviews can all help you make a powerful business case for XDR in your organization.
Mark Brozek,

Blogs

Announcing CN-Series: The Industry’s First NGFW for Kubernetes

CN-Series helps keep cloud native applications nimble and secure with deep layer 7 container traffic visibility and control.
Mukesh Gupta,

Blogs

Announcing IoT Security: No Organization Is Protected Without It

IoT security raises unique challenges for organizations. Machine learning can play a key role in the IoT security lifecycle.
Anand Oswal,

Blogs

Paradigm Shift: The World’s First ML-Powered NGFW with PAN-OS 10.0

A paradigm shift in cybersecurity is needed. The world’s first ML-powered NGFW with PAN-OS 10.0 introduces more than 70 innovative new capabilities.
Lee Klarich,

Blogs

How to Create a DevSecOps Culture

A DevSecOps culture helps security teams and developers work together, to the benefit of your organization.
Matthew Chiodi,

Blogs

Online Learning: Security and Connectivity for Teachers and Students

Enabling successful online learning requires ensuring access to needed devices, maintaining adequate connectivity and implementing effective security.
Rachna SrivastavaShannon Bonfiglio,

Blogs

3 Ways SD-WAN Can Benefit Industrial Control System Environments

SD-WAN technology offers improved user experience, simplified operations and stronger cybersecurity for ICS and SCADA systems.
Lionel Jacobs,

Blogs

How Palo Alto Networks and Okta Are Helping Enable Secure Remote Work

Both Next-Generation Firewalls – and now, Prisma Access – integrate with Okta Identity Cloud to further simplify the remote worker experience.
Rachna Srivastava,

Blogs

Shift-Left with IaC Build Policies in Prisma Cloud

Prisma Cloud recently added IaC Build Policies, as well as support for Terraform 0.12.
Jonathan Bregman,

Blogs

Rethinking Zero Trust Network Access for a Zero Trust Strategy

A Zero Trust strategy is not a plug-in solution. Zero Trust Network Access can be one aspect of an end-to-end approach to Zero Trust.
Ben Forster,

Blogs

Proactively Addressing FedRAMP Continuous Monitoring Requirements

Earning and maintaining FedRAMP ATO is challenging. This four-step method, applicable to any business, can help with FedRAMP continuous monitoring requirements.
Matthew Chiodi,

Blogs

Cortex XDR 2.4: One Small Step for Cortex XDR, One Giant Leap for SecOps

Cortex XDR 2.4 is packed with features that enhance detection, investigation and ease of management, from vulnerability assessment to integration with Cortex XSOAR Threat Intel Management.
Kasey Cross,

Blogs

Secure EUC Environments with Palo Alto Networks and Nutanix

Palo Alto Networks and our technology partner Nutanix have teamed up to make it easy for you to implement Zero Trust in virtualized environments.
Alex Berger,

Blogs

Physical Hack, Insider Threat: Busted by Cortex XDR Managed Threat Hunting

An EMEA-based consulting firm was able to identify and stop an insider threat with the help of the Cortex XDR Managed Threat Hunting team.
David Szabo,

Blogs

Introducing the Palo Alto Networks Google Search Extension

The Google Search Extension from Palo Alto Networks can help you find our most valued documents directly in the Google search results page.
Kerry Matre,

Blogs

Achieving End-to-End Zero Trust

Achieving end-to-end Zero Trust requires a well-coordinated architecture and solutions that work across your entire infrastructure.
Nir Zuk,

Blogs

Managing Container Image Trust with Prisma Cloud

Better processes around container image trust create a more secure environment for less effort.
Brian Buquoi,

Blogs

Email Gateways Stop Phishing Attacks: Reality or Myth?

As necessary as email gateways are, they are not enough to protect against email-related attacks including phishing.
Manda Mafy,
Displaying 31 - 60 of 3210