Displaying 1 - 14 of 14
References and Case Studies
Securely and confidently powering the U.S.
A utility company trusts Palo Alto Networks for cyberattack prevention
References and Case Studies
Yancey Bros. Case Study - Palo Alto Networks Prisma SD-WAN
Read this case study to learn why Yancey Bros. chose Prisma SD-WAN.
Whitepaper
Revolutionize NGFWs and CASB App-ID with Machine Learning
In this white paper we bring to you Palo Alto Networks’ point of view on why revolutionizing the Next-generation Firewall and CASB App-ID with machine learning is vital for SaaS Security.
Whitepaper
ICS/SCADA INDUSTRY Solutions Brief
Get an overview of how Palo Alto Networks security platform can help protect your critical assets and enable a least privilege access control model in your control networks.
Use Case
Keeping the SOC Lights On
The SOC team first deployed CortexTM XSOAR playbooks to identify and remove duplicate alerts generated by its cyberse- curity tools.
Other
ICS & SCADA Mining Solutions Brief
The ICS and SCADA Solutions Brief for the Mining Industry highlights how Palo Alto Networks can assist operators to embrace the Digital Revolution in a manner that is safe and secure.
Whitepaper
Applying VLAN Insertion in ICS/SCADA
Network segmentation is a critical, fundamental building block in today’s modern process controls networks (PCN). Once thought to be an optional practice, the recent increase in attacks on ICS/SCADA systems shows it is vital to network design and security implementation. Case studies on both the Target® and the more recent Ukraine electrical grid attacks indicate that these attacks were containable – even preventable – had the proper network segmentation been in place.
Infographic
Which Cloud Defender Are You?
Learn how Zero Trust Network Access provides an integrated, comprehensive solution for segmentation, access control, and threat prevention in this interactive.
Other
Reference Architecture for OT and IoT Device Security in Industrial Control Systems
This document provides a high-level reference architecture for OT and IoT device security in Industrial Control Systems (ICS) using Palo Alto Networks’ Next-generation firewalls, the Strata Logging Service, and IoT Security Service.
Whitepaper
How Palo Alto Networks supports the NIST Cybersecurity Framework
Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk.
Video
Securing Branch Offices with Prisma
Learn how Prisma can help secure your branch offices through cloud-delivered security in this short video.
Video
Spotlight: Prologis
When Prologis needed to accelerate their move into the cloud, they turned to RedLock – Palo Alto Networks API-based security and compliance service – to do so securely. In this video, Tyler Warren, Senior Cloud Security Architect, discusses the value the organization has experienced as a result of deployment. RedLock has been critical for day-to-day business operations at Prologis, both as an IT and SecOps tool.
Whitepaper
Cybersecurity for Oil and Gas Platform Brief
Overview of how oil and gas companies can secure network, endpoint, and cloud environments with the Security Operating Platform
References and Case Studies
Murrumbidgee Irrigation
The importance of protecting SCADA systems has never been greater than is the case today. With SCADA systems scattered
across its vast irrigation infrastructure, Murrumbidgee Irrigation lives this challenge every day. When security penetration testing pinpointed potential security deficiencies, Murrumbidgee Irrigation embarked on an initiative to transform its security network architecture.
After comparing different solutions and testing many of them, Murrumbidgee Irrigation chose Palo Alto Networks® Next-Generation Security Platform. In addition to providing
the company’s small ICT team with a single point of contact for multiple areas of its security environment, the platform enabled Murrumbidgee Irrigation to move from a largely reactive security posture to one that is predictive.
Displaying 1 - 14 of 14